Manage the full visitor ecosystem

June 2019 Products & Solutions, Access Control & Identity Management

Having identified the fact that paper visitor books are useless in terms of data capture, non-compliant with PoPI and create the worst kind of impression on visitors, Kenai developed a solution to take advantage of the benefits that a digital version can provide.

“At Kenai, we looked at this process and realised several things,” explains Kenai’s James Lightbody. “Firstly, visitors like to be recognised when they return to an office building, they care about the first impression companies make as they enter the lobby. Secondly, various services surrounding the visitor journey/lobby (meeting rooms, catering, parking, deliveries etc.) were treated as entirely separate systems when in fact they were all linked. Finally, paper books are incredibly insecure and users get no assurance that their data won’t be used without their consent.”

The Kenai solution manages the entire visitor journey using facial recognition. From the time hosts set up a meeting, visitors are automatically sent an invite where they can pre-register before actually attending the meeting. Pre-registration facilitates data capture (and associated data privacy compliance), booking parking, induction procedures and more. On arrival, visitors are welcomed with an elegant iPad kiosk, with the company’s brand prominently on display. Features such as visitor agreement signing, automatic host notifications and various data privacy features are all dealt with on the kiosk in a simple and intuitive manner. Returning or pre-registered visitors are recognised, speeding up return sign-ins to under 10 seconds.

By integrating with other services, the Kenai system allows a company to book parking through pre-registration and automatically integrate with their parking management system, capture access card details at reception and tie the system into their access control. Catering and meeting room systems can even be automatically notified of a visitor’s arrival, integrating the entire visitor ecosystem.

“This is all enabled through a cloud-based architecture, which companies like RCS, Safair, Altron, Nedbank and many more have all embraced due to its scalability, security, simplicity of deployment, cost efficiency, ease of use and ability to integrate with other systems,” says Lightbody.

For more information contact Kenai, +27 73 313 6477, [email protected] www.kenai.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Streamlining security operations in the financial industry
Secutel Technologies Products & Solutions
In the banking and financial industry, false alarms can lead to significant financial implications and operational disruptions for security companies. Unnecessary responses to high-risk commercial sites with valuable assets can result in costly mistakes and inefficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Save energy with Paxton’s Net2 Access Control
Paxton Power Management Products & Solutions
Paxton offers access control systems that can help save building energy by utilising smart features. This not only has a positive environmental impact but, importantly, helps save businesses money.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
International access manufacturer sets up shop in SA
Technews Publishing Access Control & Identity Management News & Events Products & Solutions
The South African security market can always use some good news, and this year, STid has obliged by formally entering the South African market, setting up its main office in the Boomgate Experience Centre in Roodepoort, Johannesburg.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
The promise of mobile credentials
Technews Publishing Suprema neaMetrics HID Global Editor's Choice Access Control & Identity Management IoT & Automation
SMART Security Solutions examines the advantages and disadvantages of mobile credentials in a market dominated by cards and fobs, in which biometrics is viewed as a secure alternative.

Read more...
Prepare for cyber-physical attacks
Gallagher Information Security Access Control & Identity Management
As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity.

Read more...