Welcome!

News Feed Item

iView Systems' iPass(R) Kiosk Delivers Self Service Visitor Management and Completes the End-to-End Visit Process

OAKVILLE, ONTARIO -- (Marketwired) -- 02/26/14 -- iView Systems, a leading provider of loss prevention solutions for the security and surveillance environment, is pleased to announce the most recent addition to the iPass® family of Visitor Management solutions, the iPass® Kiosk. The iPass® Kiosk delivers easy to use self service visitor registration, sign in and management. The touch screen capable iPass Kiosk Self Service software Module provides a visitor self- registration solution that is optimized for busy buildings with high traffic or unsupervised lobbies. Combined with the iPass Visitor Management platform and iPass Visit Registration Web Portal, iView Systems now delivers a highly scalable, enterprise class end-to-end visitor management solution.

The iPass Kiosk guides visitors through an easy to use intuitive step-by-step registration and sign-in process, for both new walk-up or existing pre-registered visitors. Visitors can find and sign-in for existing pre-registered visits via their Smartphone, from an automated QR code based e-mail, by simply presenting their Smartphone on arrival. Additional configurable security and convenience features allow multiple self serve configurations including; visit filtering to allow daily or multi day visits, ID collection via scanner hardware, visit image capture, signature capture, custom form and disclaimer inclusion, custom badges, banned or watch visitor management, including visit denial and customizable branding of the kiosk software itself.

The iPass Visitor Management platform delivers simple and complex modes and approval requirements for any level of visitor management security. It also allows groups to be pre-registered via both the iPass Visitor Management module and Visit Registration Web Portal from Microsoft® Excel spreadsheets. The iPass Kiosk provides a streamlined registration process ensuring that the visitor is not on a list of banned persons and provides associated notifications that the visitor has arrived or is overdue for sign-out. The iPass solution offers an efficient way to manage unmanned lobbies; quickly process approved visitors and reduces workflow, while maintaining all levels of visit security.

This advanced system offers pre-registration management of visitors or groups via the iPass Visit Registration Web Portal. Users can modify and update visit information as required, specifying all visit details including special instructions for front line visit staff.

"The iPass Kiosk delivers the ability to completely tailor the visit registration process to meet the individual business and enterprise needs." said Martin Drew, president, iView Systems. "For any level of visit security requirements, the iPass Kiosk can manage the entire visitor process, without the need to allocate dedicated staff to the visitor management function. This improves productivity, while enhancing company image and facility security."

The iPass Visitor Management solution is available as a complete standalone package or as an integrated module and function within the iTrak Incident Reporting and Risk Management Platform, allowing complete inclusion in the incident management process from audit of onsite visitors to full investigation inclusion.

The iPass complete solution provides Real-time, interactive Visitor Management including:


--  Support for on premise customer installed and SaaS (Software as a
    Service) options.
--  Touch Screen support for Windows 7, Windows 8 including Windows tablet
    deployments.
--  Web pre-registration and self serve options for end-to-end visitor
    registration and management.
--  Multiple Badge printer, web camera and signature capture options.
--  Optional integration into the iTrak Incident Reporting and Risk
    Management Platform for complete security reporting and detailed visitor
    investigation.

About the iPass Visitor Management System

The iPass Visitor Management System provides a comprehensive application to register, badge and manage visitors. iPass delivers a complete standalone visitor management solution, or runs as an application module within the iTrak Incident Reporting Platform, taking advantage of existing personnel, subjects and location synergies within the iTrak system.

About the iTrak Incident Reporting and Risk Management Platform

The iTrak Incident Reporting and Risk Management System is a modular security and surveillance software platform designed to manage and automate key tasks in risk management environments. It provides today's increasingly overburdened security and surveillance professional with an integrated software tool, enabling the most efficient deployment of available resources.

About iView Systems

iView Systems specializes in the development and deployment of a complete integrated and converged physical security information management (PSIM) reporting platform for security, surveillance and loss prevention environments. iView Systems addresses the needs of multiple industries for a single desktop incident management and reporting system, providing both an incident and subject centric approach. iView Systems has rapidly attained industry recognition for its unique solutions and provides incident reporting, dispatch, identification and visitor management platforms and services to the global security marketplace, including the gaming, banking, corporate security and other loss prevention environments. iView Systems is located in Oakville, Ontario, Canada.

For more information on iView Systems, please visit www.iviewsystems.com.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...