This application allows enterprises to closely monitor and control access to their buildings, screen for possible health hazards, and red-flag any potential threats using official detection guidelines, all through zero-contact registration.
Control access to your building in an agile, comprehensive and user-friendly application.
Keep People Safe
Make employees and visitors feel safe by utilizing a system that allows management to identify and control potential health risks.
Track Access History
Access request details are stored in a database and can be used to show history by user, date/time and location.
Grant or deny entry to your building based on users’ answers to screening protocol.
Application was designed to promote a seamless user experience and navigation.
Accessible across a variety of devices and can easily be customized as needed.
Application is web-based and has a flexible design template providing a greater browsing experience on all supported devices.
Access requests data is stored in a database and can be transformed into a variety of data visualizations for further analysis as requested.
Mitigate risks of infection by utilizing customizable screening protocols to identify risk factors and limit access to potential virus carriers.
Control who access your building in an agile, easy and user-friendly application.
Make employee and visitors fill safer through a system that’s allows managements to keep potential risk to be identified and controlled.
All data are saved in a Data Base that can be used to show access history by date, time and location.
1Exhibits records of all access requests that have been submitted by employees and visitors.
2When submitting an access request, users are required to select whether they are a Registered Employee or a Visitor. Visitors are required to provide additional identification & visit details.
3Employees can be registered in the application, which will store their identification details to expedite future access requests. Once registered, employees can search for their names in the directory and proceed with screening protocol.
4A temperature reading is required and will dictate whether the users can proceed in the screening protocol or if they are denied entry. If the temperature is within the allowed range, the users will proceed to the screening questions; if the temperature is outside of the allowed range, the users are denied entry.
5Users are required to answer custom screening questions to identify potential health risks. If users pass the screening questions, they are granted access; conversely, if users fail to pass any of the screening questions, they are denied entry.
Final Access Results
6When users complete & pass the screening protocol, they will be notified that their access is granted. Conversely, if at any point users fail to pass the screening protocol, they will be notified that their access is denied. If the user that is denied access is an employee, a notification email will be sent to the employee and their supervisor.