Vox launches visitor management solution

October 2018 Editor's Choice, Access Control & Identity Management, Products & Solutions

Integrated cloud and telecommunications company, Vox, has launched a modular, cloud-based visitor management solution aimed at providing business and other organisations with a way to not only accurately keep track of people and vehicles entering their premises, but manage the collected information in a way that complies with upcoming privacy regulation.

Rudi Potgieter.
Rudi Potgieter.

“Vox Visitor Management provides customers with an electronic way to invite and track visitor movements into high traffic areas, including business parks and large residential estates,” says Rudi Potgieter, senior product manager at Vox. “It sits within our Guardian Eye stable, and forms part of our drive to take technical complexity away from customer premises so that they can better focus on their core business.”

As a hosted service, there is minimal hardware or data stored onsite. The tried and tested visitor log book with tear away slips at access control points are not compliant with the Protection of Personal Information (PoPI) Act, and migrating to a digital system will help customers in their efforts to become compliant before the regulation is enforced.

“We are going to market with a competitive subscription-based service; there is a hardware rental fee for the handheld devices and a licence fee that depends on whether the customer selects the ‘Visitor Management’ and ‘Visitor Management Pro’ version,” says Potgieter. “There are additional modules, such as SMS notifications, long-term information storage (beyond the two-month standard), and more, depending on customer requirements that can be added on.”

Enhancing safety and security

Guards at access control points are equipped with rugged terminals, which can be configured to enable closed user group VoIP calls and GSM-based failover service. “Depending on the customer’s requirements, we can extend the offering to add in Wi-Fi connectivity at the guardhouse and SIM cards for the devices,” adds Potgieter.

Having access to real-time information about the number of people that are on the premises, is especially helpful in adhering with safety, health, environment and quality guidelines; if there is need to carry out an evacuation, the responsible stakeholders can accurately ensure that everyone is accounted for.

A further safety benefit is that Visitor Management is linked to the SA Police’s Unicode database, which means that guards can be alerted to vehicles that are identified as having been involved in the commission of a crime.

Comprehensive visitor management

The Visitor Management provides the user with just a digital logbook, giving them a regulatory compliant way to keeping track of people and vehicles entering and exiting their premises, while the Visitor Management Pro provides a comprehensive offering to larger customers that need additional requirements taken into account, including workflows and notifications.

Through a web-based portal, users of the advanced version can invite visitors, with emails being automatically sent to the recipient. Apart from a computer-generated PIN or QR code that will be used to gain entry, emails can be customised to include a calendar invite attachment, maps and directions, and more. Hosts can be notified via email or SMS when their guests arrive and leave the premises.

The amount of information needed – beyond just the licence and registration disc – can also be set depending on the customer’s business requirements, and the visitor management system can be hardwired into a gate, such as Gate Guard, in which case the gate or boom will not open unless all the required data has been captured.

Depending on the customer’s standard operating procedure, additional parameters can be set, including how often a vehicle can enter and exit, or how long it can stay on the premises. If these are exceeded a notification is sent to the relevant persons, and it will then depend on whether the guard is authorised to make a decision, or if he/she has to alert their supervisor to the situation.

“From a security perspective, there is no single solution that can act as a silver bullet; everything we do in our Guardian range is built to be modular, with each added layer further improving security. While our products are interoperable – be it visitor management, automatic number plate recognition or surveillance – the benefit of choosing Vox across the stack means that customers have a more holistic approach to security and a single point of accountability,” concludes Potgieter.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.