The future of visitor management

March 2019 Access Control & Identity Management, Integrated Solutions, Commercial (Industry)

The visitor sign-in process at corporates is well known for being a laborious and painful process. Unable to provide a quality visitor experience while maintaining adequate building security, the visitor experience is usually sacrificed in favour of security. Ironically, this process often ends up being managed through a paper book, which is neither secure nor a good visitor experience.

It was for this reason the first phase of Kenai was developed, to create a fantastic first impression for visitors while simultaneously improving building security. The solution replaces the visitor book with an iPad application called Kenai. Not only does the kiosk look good on the reception desk, but the entire visitor process is transformed.

Kenai uses facial recognition as an integral part of the visitor sign-in flow, solving the front-desk dichotomy in an elegant way. Each returning visitor is recognised to speed up the sign in process, while capturing a photo of each visitor improves building security.

Pre-registration without downloading an app

The visitor journey begins when visitors are invited to a meeting. This is usually where the interaction ends before the visitor arrives on site, where they are required to fill in a paper book, stamp a parking ticket or watch an induction video.

We believe this process is best done before the visitor arrives on site, which is why we developed visitor pre-registration. Visitors receive a link automatically when invited to a meeting, and can complete all their details before arriving (including booking parking, watching an induction video and even taking an optional selfie if the visitor wants to speed up their sign-in process). Importantly, this is all done without the visitor being required to download an app, which our research shows visitors prefer not to do.

When visitors arrive on site, they simply take a photo at the Kenai kiosk and are recognised on the system – no need to fill in any more details on arrival. Visitors then digitally sign the customisable visitor agreement (NDAs, data privacy and building rules are included here) and select which host they are coming to see – a simple and elegant sign in process.

To further improve convenience, hosts are automatically notified of the visitor’s arrival via text and email to remove the need for a receptionist to make a phone call for every visitor. For clients that facilitate parking for their visitors, the pre-registration will allow visitors to input their vehicle details and book parking as part of the pre-registration process. All the visitor’s information is stored on a single client dashboard for easy viewing by the security and reception teams, no matter how many locations the client operates from.

The system complies with relevant data privacy legislation and was designed in such a way to put the power of data storage in the visitor’s hands. Not only can visitors elect not to be remembered as part of the sign-in flow, but it is easy for clients to delete visitor data on request through the Kenai web dashboard.

Modernising an archaic process

The result of this is that an archaic, unappealing process is transformed into a simple visitor experience, with enhanced building security and data capture that meets the latest compliance standards. First impressions are known to have an important impact on outcomes of meetings and corporates can’t afford to generate a poor client experience in the modern world.

Kenai’s current client list includes brands like Nedbank, RCS, Accenture and Fly Safair. The system has processed over 14 000 visitors to date.

The long-term vision of the company is to manage all personnel that enter a building on a single dashboard, be it visitors, contractors, couriers or employees. Current systems, including access cards, fingerprint scanners and paper books will be replaced or integrated into Kenai at lower overall cost. This is achievable through a unified system using facial recognition to remember all personnel in a transparent way.

For more information contact Kenai, +27 73 313 6477, info@kenai.co.za, www.kenai.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Intelligent access at the gate
Access Control & Identity Management Residential Estate (Industry)
LD Access provides a smart, streamlined approach to boom gate security, enhancing the verification of people and vehicles before entry. Through its Self-Service Scanning Kiosk and Mobile Scanning Unit, LD Access delivers secure, automated access control.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.