Until now we have discussed how visitors are signed in, identified and move around a facility, the last element that needs to be considered is how the visitor leaves the site at the end of their visit.
The next step in Visitor Management is to determine whether visitors are required to wear a visible form of identification, and if so, what does that look like?
This article discusses the various forms of visual identification, including pros and cons that should be taken into account before deciding on a particular method.
Implementing Effective Visitor Management Part 3 – Visitor Escorting
Within a security design and policy statement, everything should be based on the Security Risk Assessment and Design Basis Threat which enables us as security professionals to deploy protective security measures that are proportional and effective, without being overly obstructive.
Visitor Management Part 2 – Managing Visitor Access Permissions
Once a visitor has been signed in and identified, we need to ensure that they can move around the building to facilitate the purpose of the visit.
Visitor Management is an important part of security and access management within any company or facility, in many cases, visitors are not security checked and are an “unknown quantity” and therefore it is important to track and identify visitors visibly whilst they are on site.
Visitor Management Solutions vary in terms of complexity and convenience, some that may appear to be cost effective and easy to implement on the surface, are actually more expensive and less secure.