Connect ONE® takes the complexity out of managing visitors to the premises with registration and preregistration features that collect data on access around the facility, track the whereabouts of visitors, and assess the health and safety of individuals before they enter.

Dealers and their customers have more data and details on visitors, adding new tangible value to access control in a unified platform.  

Visitor management

Keeping paper logs for visitor management doesn’t cut it any longer and lessons learned from the pandemic dictate that health and safety protocols for the workplace should also be in place.

Connect ONE Visitor Management logs data like why the visitor is there, who they are seeing, which doors they passed through, and when they checked in and out, all in one place. 

Tracking visitors and guests

The purpose of the visit is also recorded in the preregistration process

Connect ONE Visitor Management provides tracking of visitors and guests and integration with access control systems, plus Safe Passage preregistration for self-approval of health, training, and/or legal waivers.

The purpose of the visit is also recorded in the preregistration process. Many of these new features can also apply with the integration of external visitor management services.  

Safe Passage

With Safe Passage, the visitor receives an email or text with a link to complete the authorization; no login for Connect ONE is required. There may be optional questions or waivers to answer or simply a signature required to continue.

The template can also be set to capture the person's image from their phone or tablet, which is then stored in the approved document and can be applied as the visitor’s photo in the application for activity reference and/or badging capabilities. 

Automatic flagged and filtered profiles

New actions are available for assigning a visitor to a host and applying check-in and check-out dates

Once a visitor user profile is designated, any users assigned to the profile are automatically flagged and filtered in reports and lists.

New actions are also available for assigning a visitor to a host and applying check-in and check-out dates, noted as events to a visitor log. An assigned host option sends a notification when the visitor checks in. 

Additional features

Other Connect ONE Visitor Management features include: 

  • Preregistration/Check-In/Out - The visitor completes Safe Passage authorization, which may include visit purpose, legal waiver, NDA, health questionnaire, photo and signature capture, from their own device, cost-effective and contactless.  
  • Host Notification - Custom messages notify hosts of the visitor’s time and area of check-in.  
  • Tracking - Active visitors are recorded, listed on the in/out dashboard, and added to Site Occupancy and Exit Exception Reports for mustering.  
  • Occupancy by Site - Lists all occupancy totals for all buildings by time, including visitors. 
  • Visitor Logbook - All time-stamped check-in/out activity is logged in the Event Activity Report. Event rule filters can be specified on the fly with automatic reporting and filtering, while user permission can beset with an activation and/or expiration date.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...