Download PDF version Contact company

To protect these tenants, Trinity provides CCTV and access control to all buildings. In addition, security officers patrol in the loading docks. However, Trinity wanted to enhance the existing security by providing a visitor management system through which tenants could approve or deny visitor access. Trinity wanted a visitor management system that provided reliability, redundancy, and ease of use for the clients.

EasyLobby Testing

The company first tried one system on a test basis but found that it was too complicated. For example, it required tenants to enter five pages of information into the system before a visitor could be approved. The system also had technical difficulties. Pages often wouldn’t load properly, meaning that visitors couldn’t be approved. After several months, tenants asked that the system be removed.

Trinity went in search of a new system. Lois Martano, security technology manager at Trinity Real Estate for Securitas Security Services, was tasked with heading the team to choose a new system. (Trinity contracts with Securitas to handle access control, CCTV, and visitor management.) Martano and her team decided to test a visitor management system from EasyLobby, part of HID Global.

EasyLobby Visitor Management Software

HID’s EasyLobby system includes a software program with a Web interface, an identification scanner, and paper badges. The software is used by individual employees to obtain visitor passes and by security officers to monitor the system. The badges are integrated with the C·CURE 800 access control system and turnstiles previously installed in the building lobbies.

The badges are integrated with
the C·CURE 800 access control
system and turnstiles previously
installed in the building

The EasyLobby software requires that an employee who is expecting a guest fill out a one-page entry form on the computer. The employee is required to enter the visitor’s first and last names, where the visitor is going, and whom they are seeing. Other required information includes the visitor arrival time and date and the departure time and date.

At the lobby desk, the visitor must present identification. While this is most frequently a driver’s license, Trinity plans to purchase passport scanners in the near future. The security officer at the desk scans the license or other identification, and the EasyLobby software matches the data to the visitor request entered by the employee.

The system then prints out a badge for the visitor. The badge includes a bar code with standard guest access information. Additional data is printed on the badge, such as all the information on the entry form, including the destination and employee being visited. A special visitor card reader in the lobby scans the badge to allow the visitor entry. Guards in the lobby are on hand to guide visitors to the correct reader.

Simplified Visitor Management

The Web-based system works quickly. According to Martano, it takes approximately 20 seconds for a person to be cleared at the lobby desk after the employee completes the entry form on his or her desktop computer. According to Martano, the system is also helpful with repeat visitors. For example, if an actor is coming to the building to film part of a movie and he’s going to be there for two weeks, his visitor pass will expire at the end of those two weeks. However, if the company calls the actor in to reshoot some of the footage, it need not create a new entry from scratch. Instead, an employee can conduct a search of past visitors by name. All of the actor’s visits come up on the screen. The employee can then highlight one of those visits to retrieve the entry screen, change the dates, and resubmit the visitor pass request.

The HID Global EasyLobby software also simplifies the process of replacing lost visitor badges and invalidating the old ones, and checking with the appropriate employee if an expired visitor badge is presented at the lobby. Additionally, tenants can create “watch” lists of visitors who will not be permitted entry, and run reports about visitor volume and activity during specified timeframes.

The software also allows security officers to easily monitor how many visitors are in the building

The software also allows security officers to easily monitor how many visitors are in the building at any given time. “This is especially helpful for fire-safety issues,” says Martano. “We can tell exactly how many people are there and who they are. This was very difficult to do with the old system.”

To help avoid problems at the front desk, the EasyLobby system sends an email letting the employee know that his or her visitor is due to arrive on a certain day at a certain time. “This allows the employee to check the date of the visit and the spelling of the visitor’s name,” says Martano.

Expanding Security Based On Tenant Needs

Based on positive tenant reviews, the system went live in one building initially and was expanded to two more a month later. The system will continue to be expanded based on tenant needs. Trinity has tweaked the system to respond to tenant issues. For example, tenants have asked Trinity to revisit its policy on extended visits. When the system was first installed, a pass could be issued for any length of time up to two weeks. Tenants asked to extend the time frame, noting that some interns stayed much longer than two weeks.

After looking at the issue and seeing how many visitors stayed longer periods of time, we decided to extend it,” says Martano. “It took 5 minutes to make a few changes and extend the date. Now, we can do passes for up to 60 days.”


Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.