LobbyWorks standalone edition supports the same capabilities as Standard Edition but cannot be used to network multiple stations, connect to LobbyWorks Kiosk, LobbyWorks Web Center or LobbyWorks Notify.
Try our VMS Demo!
The LobbyWorks Visitor Management System enhances your investment in access control and perimeter security by providing a simple and effective way to register, badge, track and manage your facility’s visitor traffic. Visitor registration is quick and simple, and can be performed either at a guard station or using an optional self registration kiosk. LobbyWorks’ power and flexibility make it a natural fit for both simple, standalone deployments using the Professional Edition or multi-site deployments using the Standard Edition.
LobbyWorks scans a photo ID, business card or passport ID of arriving visitor, then instantaneously checks whether the visitor is expected, has been in the facility before and makes sure the visitor is not on a watch list. These quick and consistent checks ensure that only the right people are allowed on site. After scanning the information, LobbyWorks takes a digital photo or captures the visitor's signature.
LobbyWorks can automatically contact the visitor’s host by phone, email or with real time network messaging to announce the visit. Once the visitor is registered, an individualized badge is generated. Specific visit restrictions may be set, such as: clearance level, access area or visit expiry time.
At the end of the visit, LobbyWorks signs out the visitor. In case the visitor does not sign out, Lobby Works can contact the host to check if the visitor has left the site.
This simple yet powerful visitor registration process forms the basis for a very powerful security platform. Registering all visitors through LobbyWorks ensures that you have a centralized and complete record of your visitor traffic, strengthens visitor security and improves productivity and service to your customers.
Pre-register expected visitors through a simple web interface
Scan arriving visitors Photo ID or business card
Automatically identify returning visitors, expected visitors and visitors on a watch list
Capture visitor’s photo and/or signature
Track assigned visitor access cards
Check for visitors requiring special approval
Print professional color visitor passes with expiration date, visit area, host being visited and visit purpose
Automatically notify the host employee of a visitor’s arrival
Integrate with access control systems to manage badge holders as hosts and provides access cards to visitors
Process most visitors in 20 seconds or less
Register visitors through a self-serve kiosk
Easily and quickly generate detailed reports of visitor traffic by employee, department or building
Integrate with Microsoft Outlook Calendar or Lotus Notes for automated visitor pre-registration
|Features ||Professional Edition || ||Standard Edition |
| || || || |
|Multiple Stations || || ||P |
|Registration ||P || ||P |
|Tracking ||P || ||P |
|Badging ||P || ||P |
|Watch List ||P || ||P |
|Photo ||P || ||P |
|Business Card Image ||P || ||P |
|Driver’s License Image ||P || ||P |
|Signature Image ||P || ||P |
|Group Registration ||P || ||P |
|Asset Tracking || || ||P |
|Delivery Tracking || || ||P |
|Available Add-ons |
|Web Center || || ||P |
|Notify || || ||P |
|Kiosk || || ||P |
|Reports || || ||P |
Five Reasons Your Facility Needs a Visitor Management System
1. The world has changed. Workplace violence, industrial espionage and global terrorism
threaten the security of personnel and property. When facility entrances aren’t secure,
companies are vulnerable – and liable. Consider these examples:
• An armed suspect walked into Washington, D.C., police headquarters and shot and killed three people, including two FBI agents. A jury awarded $1.7 million to the husband of one of the slain agents. The reason? They determined that the facility should have had a better visitor sign-in system and other safeguards in place.
• Timothy McVeigh, the Oklahoma Federal Building terrorist bomber, reportedly conducted preliminary walkthroughs of the Murrah Building’s ground floor before perpetrating his horrendous attack. Other would-be terrorists are likely to attempt to case buildings before attack. Effective lobby security can prevent this.
• A jury awarded $10 million against a security firm that supplied a guard for a building lobby. The guard did nothing while three loiterers in the lobby harassed a tenant and then shot him six times, leaving him paralyzed.
"Visitor management is about controlling access, knowing who’s in the building, and making employees accountable for their visitors," says Ron Orchid, a security consultant with 30 years of experience who is general manager for Glover/Resnick & Associates.
Orchid says a visitor management system that comprises software tools and ID validation, combined with physical barriers and a well-designed lobby, can keep the wrong people out –and let the right people in, quickly and efficiently.
2. Your lobby is your first line of defense. "The lobby is the single-most important security point in any building or facility where protection of personnel and property is paramount," says Richard Grassie, a Certified Protection Professional (CPP) and president of TECHMARK Security Integration Inc. "Security around visitor management has to be nearly flawless." Grassie says a complete lobby system must be in place that supports security physically, electronically and procedurally. Visitor management systems are an integral element of the total system and must be capable of:
• Accurately and quickly capturing visitors’ pictures, signatures, business cards and drivers license information.
• Authenticating their ID or credentials.
• Performing discrete security checks using watch lists.
• Creating one-time-use visitor badges that feature the visitor’s photo, name, affiliation, host name and authorized areas of access, as well as the badge’s expiration time.
• Allowing employees to register visitors online ahead of time – and be notified electronically or by phone when a visitor arrives.
3. Digital trumps paper when it comes to security. "A digital system provides an audit trail that’s easy to create and access," says Orchid. When facilities rely on logbooks, reusable visitor badges and security guards to manage incoming visitors, security breaches can occur more readily than automated systems:
• Information written in the logbook can be illegible – or false. You have an inaccurate record of your visitors – and no warning that your visitors aren’t who they say they are.
• Competitors, hackers and suppliers can read your logbook and gain confidential information about your business.
• Visitors can neglect to sign out and return their badges; unauthorized visitors can use unreturned badges to infiltrate your facility and gain access to employees, restricted areas, equipment, compounds or proprietary data.
4. Visitor management is already working for facilities like yours. Consider these examples:
• A leading North American paper company installed Honeywell LobbyWorks™ to maintain security at its Canadian facility during a major renovation. The system verifies the contractors’ identities, tracks their comings and goings, and alerts them when they are due for safety training.
• At an off-site data-storage center in the Southeast, LobbyWorks streamlines entry for employees, contractors and others, while enabling the facility to "watch out" for unwelcome visitors.
• A major Canadian airport upgraded its corporate office’s visitor management system from a logbook-based system to LobbyWorks. During the airport’s expansion, the new system helps manage the influx of consultants, contractors and vendors and keeps the airport secure.
5. Systems offer benefits beyond security. In addition to strengthening facility security, visitor management systems also:
• Improve productivity — Visitors are pre-registered electronically and multiple visitors can be processed simultaneously. The system can be integrated with the facility’s existing email system, as well as other business and security systems. It also can be used to set up meetings and attendee lists.
• Enhance your image — Badges are professionally done and visitors are processed efficiently and professionally, eliminating large waiting lines in the lobby.
• Improve visitor service — Because they are pre-registered or can be registered quickly, visitors are made to feel expected and welcome.
• Control resources — The system can track assets and deliveries and provide traffic reports for resource planning.
• Enhance emergency response — If the building must be evacuated, the system can be used to determine the presence and location of visitors within the facility.
"A digital system is a more secure way for a lobby guard to authorize a visit – rather than through word of mouth or the visitors’ claim," Grassie says. "An automated system, used properly and effectively by lobby personnel, can significantly heighten facility security – and process visitors quickly."
For more information about the use and value of visitor management systems, please contact:
Ron Orchid, email@example.com
Richard Grassie, firstname.lastname@example.org
Tony Foglia, email@example.com
For more information on LobbyWorks™ visitor management system, call 1-800-876-1858 or visit www.honeywellaccess.com