Visitor Management Features
Learn more about how a visitor management system works, and the features offered with our cloud-based software.
Security
Our cloud-based visitor management software, BreezN, is backed by our global military security heritage, hosted on the Microsoft Azure Cloud which offers SOC 1, 2, and 3 reports. Increase overall security for your staff, facility, and data by implementing our VMS.
ID Scanning
Quickly and securely read an ID industry standard PDF417 barcode found on any state-issued driver's license.
Cloud Storage
Each of our customers gets their own isolated unique BreezN environment built in the Azure Cloud.
Watch List
Internal watch list that is configurable and shared across all of your sites and security officers get instant notifications.
Automatic Data Deletion
Your private BreezN environment will securely delete all data once it is outside of your configured retention period.
Background Checks
Integrate with industry leaders for instant background checks, denied party screening, and Sexual Predator Background Checks.
Data Encryption
All data moving in and out of your private environment is encrypted with TLS 1.2 and uses 256-Bit AES encryption while at rest.
Host Benefits
Improve workflows and increase workplace productivity with our BreezN Visitor Management software.
Workflow
-
Create List of Expected Visitors
-
Send Email Invites with Custom Details
-
Daily Summary of Visits
-
Bulk Upload Groups of Visitors
-
Sort, Filter, Export Visitor Details
-
Synchronize Multiple iPads Across Locations
Account Management
-
Access Provision for Administrators
-
Send Email Invites with Custom Details
-
Daily Summary of Visits
-
Bulk Upload Groups of Visitors
-
Sort, Filter, Export Visitor Details
-
Synchronize Multiple iPads Across Locations
Customize Kiosk
-
Add Your Logo
-
Custom Image
-
Custom Text
-
Multiple Languages
-
Branded Welcome
-
Configurable For Multiple Locations
Dashboard
-
Unlimited Colleagues
-
Manage Notifications - Text and Email
-
Security Alerts for Unwanted Visitors
-
Specific Alerts when VIPs Arrive
-
Upload Documents
-
Customize and Filter Columns
Mulitple Locations
-
Grouped Reporting
-
Global or Local User Rights
-
Global Active Directory Integration
-
Global Watch Lists
-
Easily Switch Between Locations
-
Manage One Account Versus Multiple
"Customer friendly and conscious! Very open to creative ideas shared by customers for customizations. THANK YOU! "
Shan Khawer - Security - Johnson & Johnson
Visitor Experience
Instantly impress your visitors with a modern lobby design and iPad kiosk sign in system. Extremely user-friendly, visitors and vendors can check-in quickly with a pre-registered QR code, by scanning their ID, or entering their information manually.
Pre-Registration
-
Email with Visit and Location Details
-
QR Code for Check-In and Sign Out
-
Welcoming Experience
-
Good First Impression
-
Check-In Under 5 Seconds
Sign-In
-
Self Check-In and Check-Out
-
iPad Kiosk - Freestanding or TableTop
-
Pre-Registered or Walk-In Visitors
-
ID Scanning
-
Visitor Picture for Badges
ID Badges
-
Visitor Pictures
-
ID Scanning
-
Instant Printing
-
Preprint Badges for Individuals or Groups
-
QR Code for Signing Out
Software
Our BreezN software is hosted on the Microsoft Azure Cloud, which allows you to scale globally while relying on industry-leading data security systems, and remain compliant with industry regulations.
Cloud-Based
-
No Proprietary On-Prem Hardware
-
Easy Setup and Deployment
-
Automatic Updates
-
99.9% IT Up Time
-
Data Stored in Unique Environment
Privacy
-
GDPR Compliant
-
Visitor Details Private
-
Visitors Can Decline Data Collection
-
Secure Data Infrastructure
-
Manage Employee Access and Roles
Integrations
-
LDAP
-
SAML 2.0
-
Azure AD
-
API
-
Outlook Plug-In
-
Visual Compliance
-
Active Directory
-
Cisco ISE
Compliance
We help companies across all types of industries meet their industry compliance needs.
HIPAA
The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with PHI must have physical, network, and process security measures in place and follow them to ensure HIPAA compliance.
ITAR
The International Traffic in Arms Regulations, or ITAR, is a set of government rules that control the export and import of defense-related articles, services and technology on the U.S. Munitions List (USML).
GDPR
The General Data Protection Regulation is a regulation in EU law on data protection and privacy for all individuals citizens of the European Union and the European Economic Area. It also addresses the export of personal data outside the EU and EEA areas.
C-TPAT
The Customs-Trade Partnership Against Terrorism (C-TPAT) is a supply chain security program led by U.S. Customs and Border Protection focused on improving the security of private companies' supply chains with respect to terrorism.
SOC 2
A component of the American Institute of CPAs (AICPA)'s Service Organization Control reporting platform. Its goal is to make sure that systems are set up so they assure security, availability, processing integrity, confidentiality, and privacy of customer data.
JCAHO
The Joint Commission on Accreditation of Healthcare Organizations or JCAHO is a nonprofit organization based in the United States that accredits over 20,000 healthcare organizations and programs in the country.
OSHA
Occupational Safety and Health Administration to assure safe and healthful working conditions for working men and women by setting and enforcing standards and by providing training, outreach, education, and assistance.
ISO
ISO is defined as the international standard that specifies requirements for a quality management system. Organizations use the standard to demonstrate the ability to consistently provide products and services that meet customer and regulatory requirements.
Talk with us today about how we can help meet all your enterprise visitor management needs.