The Business of Knowing

New visitor management techniques unify disparate security systems

You’ve all seen that guy in the hallway: that unfamiliar face. “He must be the new guy.” “He must be here for a meeting.” “Isn’t he Jane’s husband?” “He probably works for facility management.”

In too many cases, employee simply do not know who or why that person is wandering around the premises.

“High-security corporations providing services to the government, hospitals, nursing homes and correctional facilities need to track who is on their premises. They need to see trends. They need to know when an employee is terminated, who had been visiting that employee. Even schools need to know who is coming and going and who, by court rule, is allowed contact with the children and, most importantly, who isn’t,” said Bob Mann of SmartTech ID. “All too often, we see those organizations still using log books, relying on pen and paper to account for their visitor activities.”

The Log Book
For a long time, the log book at the reception desk has been the sole method of visitor tracking. Visitors enter, sign in and proceed into the building. Sometimes the process is accompanied by an identification check. The visitor may be issued a handwritten badge.

Although they are a low-cost solution requiring no configuration and minimal training, log books have serious shortcomings. The most significant are the inability to deliver historical information in a timely manner, enable a fast registration process, conduct thorough background checks and cross reference across multiple locations. Additionally, hand-written name badges may easily be transferred from one person to another.

It is frightening to know that even today the log book approach is often the sole source of visitor management, even at many key defense contracting facilities.

Without the ability to produce reports or disseminate critical information instantaneously, the log book leaves a corporation and its employees vulnerable. Imagine having to rely on a paper log book to track employees and visitors in an emergency situation, when time is of the utmost importance.

The Rise of Visitor Management
In 1997, computer-based visitor systems emerged onto the market that effectively turned the log book electronic. Moving from paper to digital format has eliminated many shortcomings. Queries may be run to produce reports on visitors’ activity with faster results. ID scanners have been employed to facilitate fast registration and verification. Watch lists are used to check visitors against a list of known offenders and threats. Badging systems permit images to be posted on name badges, preventing transferability. Networking has enabled multiple locations to share information and provide organization-wide reporting.

This basic visitor methodology has been cloned many times over by various security product organizations. The root of this fundamental design, however, remains the log book. That is, a closed data system for registering people at entry—something not all that different from pen and paper, though much more manageable.

Visitor management, for the most part, is yet another independent security system along with CCTV, access control, photo ID and asset tracking. Do these types of independent systems make sense? Looking at government intelligence prior to Sept. 11, 2001, customers saw dozens of security agencies that were collecting data independently. The old adage “a lot of data, but no information” certainly held true when it really mattered.

The disparate nature of corporate security systems leaves organizations with similar vulnerabilities. If only they could share information.

Loss of Efficiency
These closed data systems do not only present problems for security. A key issue for many organizations is maximizing efficiency. With the daily entry of full-time employees, contractors, temporary employees and visitors, it is imperative that a company can not only badge and register each of these groups quickly and in an organized manner, but also can retrieve information about them efficiently.

With isolated systems, however, this can be a cumbersome process. Often, each group’s information is kept in its own database, but these systems do not allow access to multiple databases simultaneously. In order to access the information for each database, they must be combined into a single master database. This solution is a poor one, leading to tedious management processes and often the loss of relevant information.

By having an internal database that is tied to the company databases, management becomes complex and unreliable. These systems require extensive field mapping, making changes difficult and allowing many opportunities for error. One glaring issue is that an update may not properly translate to all relevant databases. Errors like this are easy to miss and can breed confusion and a loss of productivity.

Furthermore, each group often has unique requirements for information and access points. In most programs, there may be a few groups, but they are often locked in format. This means that it is impossible or extremely difficult to add fields relevant to each organization and group.

Manufacturers decide and provide what they feel is relevant based on their research. In reality, each company is different in setup, procedure, traffic flow and information needed. Without knowledge of an organization’s requirements, a platform without extensive customization capability is insufficient.

The Next Giant Step
Now, 10 years since the inception of the visitor management system, a new player has emerged on the scene, taking another giant step in perimeter security. Incorporating integration into many data-existing information systems simultaneously, Jolly Technologies’ Lobby Track uses open-data architecture that allows for rapid access to multiple data systems at the click of a button.

“We realized that visitor security goes far beyond those people that take the visitor parking spots,” said Sandeep Jolly, president of Jolly Technologies. “It needs to encompass the cleaning crews, maintenance workers, contractors, temporary employees and many other people that traverse a facility on a regular basis. It needs to incorporate their existing information sources. It should include equipment and packages. And, most importantly, it needs to work in conjunction with existing systems.

“We have taken a very broad view of the visitor,” Jolly said. “It should even include the employee in many environments. We’ve created an architecture that permits multiple live simultaneous data connections and augmented it with data importing, data lookups, directory lookups and free-form data layout that allow for many disparate systems to be united in some very effective ways with centralized logs and reporting.”

By further encompassing secure photo ID, live connectivity to access control systems, time and attendance calculations, and visitor management into a single product, Lobby Track has moved visitor management from a standalone component to a unifying security system.

“We’ve only seen the tip of the iceberg as to what visitor management systems can do,” Mann said. “Systems that include time and attendance, package tracking, photo ID production, equipment labeling and tracking, trend analysis and centralized data management go a long way toward bridging the gap between where we are now and where we need to be.”

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.