Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Visitor Management Options Enhance Front Door Security

By Paul Terschuren
doors-900
June 28, 2016

Much has changed in visitor management procedures and policies since the days of entering a visitor’s name in the log book and slapping on a sticky badge with a handwritten name on it. Often, visitors were not even asked for identification, and there was no way to track or confirm if or when they left the building.

Given the current state of affairs around the world, the need to manage and monitor visitors has become a high security priority at most facilities and manual visitor enrollment systems have been replaced by state-of-the-art visitor management systems.Thesesophisticated systems provide necessary and added security functions for protecting employees, assets and buildings by confirming a visitor’s identification, compiling relevant information that could impact their visit or the organization and allowing true, real-time system integration, among other benefits.

Advanced visitor management systems include user conveniences such as scanning driver licenses, business cards and passports; badge printing in advance or upon arrival; and pre-registering of visitors using a Web browser. Automatic downloads of government watch lists can be used to alert receptionists or security guards of VIPs or unwanted visitors. 

Additional visitor management system specifications depend on the application (i.e. hospital, school, etc.) and the particular needs of the organization. For instance, a power plant may require that all visitors read a safety agreement and sign an electronic signature capture pad. Signatures are stored in the visitor management software and can be printed on badges and in reports. Or, an unsupervised lobby may only require a self-service kiosk consisting of a touch-screen monitor, keyboard, printer and various optional devices. The kiosk enables visitors to scan their identification, enter the appropriate data and print a badge. The system notifies the host via e-mail of the visitor’s arrival and records all data in an easy-to-use format. For heavy visitor traffic locations, mobile devices integrated with barcode or magnetic swipe readers and printers can be used to allow security personnel to complete the identification, authentication and badging process before the individual enters the building.

Among the many other available application specific software and hardware options, following are a few of the most common.

Education– Schools at all levels are under increased pressure to tighten security while maintaining an appearance of friendliness and specialized visitor management systems can help administrators achieve this balance. Using dedicated software, visitors, volunteers, temporary personnel and others are easily signed in and given temporary badges to indicate their presence is authorized. The software allows input of child custody information to provide school staff with accurate assurances for custodial issues. To enhance the safety and security for children, schools/districts can opt to perform automatic sex offender screening for all visitors. Comprehensive reports on the total number or type of visitors are easily generated using custom designed templates in addition to a variety of common report templates that are available.

Healthcare and Medical Facilities– As semi-public facilities, hospitals and medical care facilities have special challenges when it comes to managing visitors. Systems designed to address these particular challenges can screen, photograph, badge and track visitors and help keep out unwanted or uninvited visitors. Additional patient information pulled from hospital’s HL7 systems, provide patient’s exact location in real-time building, floor,, room and bed number can also be collected and used to monitor visitors. Unique badges with self-expiring access can be designed for each ward or specific department and help to ensure the overall safety and security of both the patients and staff. Some systems even feature maximum visitor alerts so that a patient or those patients in a semi-private room are not overwhelmed. Hospital visitor management systems are also designed to support HIPPA, HR7 and other government requirements such as those from the Joint Commission and Centers for Disease Control and Prevention.

Corporate– Keeping the wrong people out and letting the right people in quickly and efficiently starts with an organization’s front lobby. It’s here that the first steps are taken to ensure the safety and security of building occupants and assets. Visitors can be discretely screened against historical directories or watch lists to determine whether to approve or reject visitor requests – all within a few seconds. For pre-registered visitors or groups, a custom email can be sent to the visitor showing visit details, directions and a barcode that will speed the sign-in process. Another important element of a corporate visitor management system is the capability for integration with the building’s access control system and, in multi-campus enterprise applications, the ability to integrate with existing IT infrastructure including SQL and Oracle databases, and ODBC and LDAP directory systems.

Along with these application specific examples, visitor management systems used in government offices are deployed with a specialized module that processes PIV-compliant credentials in compliance with Homeland Security Presidential Directive 12(HSPD-12).

Today’s visitor management systems do much more than enhance “lobby” security measures. From sophisticated integration capabilities to feature-rich functionality, visitor management systems leverage technology to improve management of physical security.

KEYWORDS: access management contractor security security badge printing security technology visitor management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Paul Terschuren is the CEO of STOPware, Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Healthcare Facilities Require Specialized Visitor Management Options

    See More
  • COVID-19 Proves It’s Time for the IRS to Stop Identity Fraud at the Front Door

    See More
  • Balancing Perimeter Security and Visitor Management

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing