Vox launches visitor management solution

October 2018 Editor's Choice, Access Control & Identity Management, Products & Solutions

Integrated cloud and telecommunications company, Vox, has launched a modular, cloud-based visitor management solution aimed at providing business and other organisations with a way to not only accurately keep track of people and vehicles entering their premises, but manage the collected information in a way that complies with upcoming privacy regulation.

Rudi Potgieter.
Rudi Potgieter.

“Vox Visitor Management provides customers with an electronic way to invite and track visitor movements into high traffic areas, including business parks and large residential estates,” says Rudi Potgieter, senior product manager at Vox. “It sits within our Guardian Eye stable, and forms part of our drive to take technical complexity away from customer premises so that they can better focus on their core business.”

As a hosted service, there is minimal hardware or data stored onsite. The tried and tested visitor log book with tear away slips at access control points are not compliant with the Protection of Personal Information (PoPI) Act, and migrating to a digital system will help customers in their efforts to become compliant before the regulation is enforced.

“We are going to market with a competitive subscription-based service; there is a hardware rental fee for the handheld devices and a licence fee that depends on whether the customer selects the ‘Visitor Management’ and ‘Visitor Management Pro’ version,” says Potgieter. “There are additional modules, such as SMS notifications, long-term information storage (beyond the two-month standard), and more, depending on customer requirements that can be added on.”

Enhancing safety and security

Guards at access control points are equipped with rugged terminals, which can be configured to enable closed user group VoIP calls and GSM-based failover service. “Depending on the customer’s requirements, we can extend the offering to add in Wi-Fi connectivity at the guardhouse and SIM cards for the devices,” adds Potgieter.

Having access to real-time information about the number of people that are on the premises, is especially helpful in adhering with safety, health, environment and quality guidelines; if there is need to carry out an evacuation, the responsible stakeholders can accurately ensure that everyone is accounted for.

A further safety benefit is that Visitor Management is linked to the SA Police’s Unicode database, which means that guards can be alerted to vehicles that are identified as having been involved in the commission of a crime.

Comprehensive visitor management

The Visitor Management provides the user with just a digital logbook, giving them a regulatory compliant way to keeping track of people and vehicles entering and exiting their premises, while the Visitor Management Pro provides a comprehensive offering to larger customers that need additional requirements taken into account, including workflows and notifications.

Through a web-based portal, users of the advanced version can invite visitors, with emails being automatically sent to the recipient. Apart from a computer-generated PIN or QR code that will be used to gain entry, emails can be customised to include a calendar invite attachment, maps and directions, and more. Hosts can be notified via email or SMS when their guests arrive and leave the premises.

The amount of information needed – beyond just the licence and registration disc – can also be set depending on the customer’s business requirements, and the visitor management system can be hardwired into a gate, such as Gate Guard, in which case the gate or boom will not open unless all the required data has been captured.

Depending on the customer’s standard operating procedure, additional parameters can be set, including how often a vehicle can enter and exit, or how long it can stay on the premises. If these are exceeded a notification is sent to the relevant persons, and it will then depend on whether the guard is authorised to make a decision, or if he/she has to alert their supervisor to the situation.

“From a security perspective, there is no single solution that can act as a silver bullet; everything we do in our Guardian range is built to be modular, with each added layer further improving security. While our products are interoperable – be it visitor management, automatic number plate recognition or surveillance – the benefit of choosing Vox across the stack means that customers have a more holistic approach to security and a single point of accountability,” concludes Potgieter.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.