The future of visitor management

March 2019 Access Control & Identity Management, Integrated Solutions, Commercial (Industry)

The visitor sign-in process at corporates is well known for being a laborious and painful process. Unable to provide a quality visitor experience while maintaining adequate building security, the visitor experience is usually sacrificed in favour of security. Ironically, this process often ends up being managed through a paper book, which is neither secure nor a good visitor experience.

It was for this reason the first phase of Kenai was developed, to create a fantastic first impression for visitors while simultaneously improving building security. The solution replaces the visitor book with an iPad application called Kenai. Not only does the kiosk look good on the reception desk, but the entire visitor process is transformed.

Kenai uses facial recognition as an integral part of the visitor sign-in flow, solving the front-desk dichotomy in an elegant way. Each returning visitor is recognised to speed up the sign in process, while capturing a photo of each visitor improves building security.

Pre-registration without downloading an app

The visitor journey begins when visitors are invited to a meeting. This is usually where the interaction ends before the visitor arrives on site, where they are required to fill in a paper book, stamp a parking ticket or watch an induction video.

We believe this process is best done before the visitor arrives on site, which is why we developed visitor pre-registration. Visitors receive a link automatically when invited to a meeting, and can complete all their details before arriving (including booking parking, watching an induction video and even taking an optional selfie if the visitor wants to speed up their sign-in process). Importantly, this is all done without the visitor being required to download an app, which our research shows visitors prefer not to do.

When visitors arrive on site, they simply take a photo at the Kenai kiosk and are recognised on the system – no need to fill in any more details on arrival. Visitors then digitally sign the customisable visitor agreement (NDAs, data privacy and building rules are included here) and select which host they are coming to see – a simple and elegant sign in process.

To further improve convenience, hosts are automatically notified of the visitor’s arrival via text and email to remove the need for a receptionist to make a phone call for every visitor. For clients that facilitate parking for their visitors, the pre-registration will allow visitors to input their vehicle details and book parking as part of the pre-registration process. All the visitor’s information is stored on a single client dashboard for easy viewing by the security and reception teams, no matter how many locations the client operates from.

The system complies with relevant data privacy legislation and was designed in such a way to put the power of data storage in the visitor’s hands. Not only can visitors elect not to be remembered as part of the sign-in flow, but it is easy for clients to delete visitor data on request through the Kenai web dashboard.

Modernising an archaic process

The result of this is that an archaic, unappealing process is transformed into a simple visitor experience, with enhanced building security and data capture that meets the latest compliance standards. First impressions are known to have an important impact on outcomes of meetings and corporates can’t afford to generate a poor client experience in the modern world.

Kenai’s current client list includes brands like Nedbank, RCS, Accenture and Fly Safair. The system has processed over 14 000 visitors to date.

The long-term vision of the company is to manage all personnel that enter a building on a single dashboard, be it visitors, contractors, couriers or employees. Current systems, including access cards, fingerprint scanners and paper books will be replaced or integrated into Kenai at lower overall cost. This is achievable through a unified system using facial recognition to remember all personnel in a transparent way.

For more information contact Kenai, +27 73 313 6477, info@kenai.co.za, www.kenai.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.