iTrace – Visitor Management Solution for Corporates

iTrace – Visitor Management Application Modules

Admin Module at Central Location Admin Module at Central Location
Host Module for Employees Host Module for Employees
Security Module at the Gate Security Module at the Gate

Solution in Brief...

  • Enterprise level Visitor Management Solution can be deployed with the following features :
    • On-line Pre-booking facility for the Visitors by the tenants.
    • Visitor Authentication using auto generated email. Following details will be shared with the Visitors :
      • QR Code
      • Tenant location details with location Map
    • ANDROID based KIOSKs for Walk-in Visitors with QR Code generation
  • Flap Barriers for Pedestrian Access with integrated HID Readers for Tenants & QR Code Reader for Visitors
Solution in Brief

Connectivity Schematics

QR Code Readers (2), HID Readers (2) & HID Controllers (2) will be part of the Flapbarrier / Turnstile

Connectivity-Schematics

iTrace – Web based Visitor Management Application (Architecture)

iTrace – Web based Visitor Management Application(Architecture)

iTrace – Module wise Features

Admin
  • Setup
  • Company Master
  • Location Master
  • Department Master
  • Designation Master
  • Host Employee Master
  • Visitor Organization
  • Vehicle Type
  • Meeting Purpose
  • Contract Type
  • Nationality
  • Floor Details
  • User Master
  • Email Settings
  • Gate pass Design
  • Gate Pass Profile
  • SMS Gateway Settings
  • Importing Host details
  • Reporting
  • Manage Visitors
Security
  • Creation of New Gate Passes
  • Creation of Contract Gate Passes
  • Creation of Employee Gate Passes
  • Appointment List
  • Visitor List
  • Visitor Sign-Out
  • Aadhar Fingerprint based Authentication for Visitors
  • Scan Photos
  • Change Gate No.
Host
  • Visitor List
  • New Appointment
  • Visitor Data
  • Message to Security
  • Changing of Password

Aadhar based Authentication for the Visitors

Aadhar based Authentication for the Visitors

Aadhaar Authentication – ONLINE Process

The End User (Customer) has to sign-up with UIDAI as AUA (Aadhar Authentication User Agency) OR the End User is to be aligned with the prescribed AUA. The Credentials issued by UIDAI are to be configured in the application.

Aadhaar-Authentication

There might be a per transaction charges which may have to be paid for routing the information packet through the prescribed AUA (Aadhaar Authentication User Agency).

Aadhaar-Authentication

iTrace Features

iTrace-Features
  • Admin, Host and Security Gate module
  • Gate pass creation
  • Visitor photo capturing by webcam (any camera connected to the computer)
  • Visitor fingerprint capturing, identifying old visitor by fingerprint
  • Visitor Aadhar Fingerprint Biometric based Authentication
  • Bar code Integration
  • Visitor data capturing – personal information, company information, material carrying, vehicle details, host employee and other details
  • Intimate host about visitor by SMS, pop up on PC, email or through the system
  • Host can approve, deny with reason
  • Appointment scheduling by host employee
  • Contract people gatepass module
  • Ban/pre approve/under watch visitors
  • Multiple gates supported
  • Dynamic gatepass design (user can design the gatepass) & printing supported
  • Previous visits scanning for security gate personnel
  • Waiting, In premise, visit completed, rejected visitors real time listing available
  • Comprehensive reporting
  • Access control card co relation
  • Bulk import of employee data
  • Intuitive and simple interface for security users

iTrace Benefits

Flexible Architecture :

The flexible architecture of Visitor Tracker allows various people in the organization to directly access the data they need. Visitor Tracker has 3 modules with user specific roles.

  • Administrator Module
  • Security Gate Module
  • Host Employee Module
Configurable with a number of hardware devices :

A number of devices can be configured with the system like web-cam, bar-code scanner, fingerprint scanner, printer & scanner.

 Batch visitor registration :

This feature allows large groups of visitors to be pre-registered into the system. This feature is useful when a large meeting or conference is being hosted at the facility.

Security & Safety :

Visitor information with photo is stored in a computer database, allowing reports of visitor activity to be quickly created. These reports can be used to tell how many times a particular visitor has signed-in and signed- out and when, and tell which visitors were in the facility during any given time period. This information can be useful when investigating security or safety incidents, and for auditing billings by vendors or contractors.

Employee visitor pre-registration :

This feature allows employees to pre-register their own visitors using a computer-based form. This is typically done over the company intranet, and allows employees to enter visitor name and expected date and time of arrival in the visitor management system. This allows security to know that the visitor is expected and speeds up the sign-in process when the visitor arrives.

 Intelligent Reporting :

A wide range of reports can be generated & exported in various formats like PDF, Excel, Word etc. Three different format of visitor pass which include “Small size without barcode”, ”small size with barcode”, ”large size with barcode”.

Master Reports
  • Host Reports
  • Department Report
  • Designation Report
  • Visitor Organization Report
  • Meeting Purpose

Visits - Visits report Security Wise Visitor Report Contract-Visitor Report

Visitors - Present in Preapproved List Present in Watch list, Ban list Removed from Watch list, Ban list

User Friendly :

Software has been designed in such a way as to be easy to use or operate :

  • Simple to install
  • Easy to update
  • Efficient
  •  Easy to trouble-shoot
  •  Adheres to standard
  •  Effective error handling