SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
Vertex Systems
 support@vertexsystems.net
   Tel: +91 22 32 67 11 66




                             Visitor Management Software
Overview
   The Visi-Track software deals with effective control,
    record maintenance and printing of gate passes for visitors
    to prevent the entry of any unauthorized or unwanted person
    entering the premises and keeping the tab on the authorized
    visitor visiting the area he/she is permitted to move in,
    meeting the person he/she is allowed to meet and avoid
    unwanted movement in the premises.

   The flexible architecture of Visi-Track allows various
    people in the organization to directly access the data they
    need. Naturally, the Visi-Track’s Security System Permits
    authorized persons to have access to only the limited data to
    which they have been rights.
Features
   v   Web based software
   v   Connected to webcam / digital camera for capturing visitors
       photograph
   v   Visitor’s arrival advanced notification to security
   v   Contractor master database is maintained for contract employee
       long period gate pass
   v   Visitors detailed database including photograph is maintained
   v   Storing of visitors photograph to print on the gate pass for
       future reference
   v   Notification of visitors’ arrival on visitee’s, PC
   v   Customised Gate Pass for Visitor
   v   Printing of different colour gate pass to different type of
       visitors, locations allowed etc
                 •                                               Continued
Features –       Contd.




 Link to Biometric Scanner
 Storing visitor finger prints.
 Next time gate pass issue by placing just the
  finger on the scanner.
 Link to UHF RFID for tracking visitor and
  marking the exit of the visitor
 Black listing of visitor/s
 Alerts for gate pass not returned
Application Modules
Visi-Track consists of 4 modules

 Administration Module
 Security Gate Module
 Notification Client Module
 Web- based application
Administration Module
   This module is normally installed on the Security
    Administrator PC. It consists of menus where the
    administrator can define

 Companies,
 location,
 departments
 and employees’ details
 Define and print short term gate passes and
 Generate reports
Security Gate Module
 The Security Gate module is installed at the main
  entrance of the premises
 It facilitates the admin staff at the security gate to
  register the visitors details with photograph and also
  send the notification to the employee sitting inside
  the premises . The system will print visitor pass with
  name of visitor, department and visitee along with
  validity period. The visitor can display the pass by
  hanging around the neck.
Notification Client
The client module is installed at different PC’s
on the network. Security can inform the person
about the visitor through the security gate
module. The employee can view the photograph
of the visitor and can send the response back to
security through this module.
Web- based Module
This application can be accessed through IE or
any other browser and help the employees to
register the expected visitor online and send the
information to the security.
Employees can view the reports of the visitors
for the date range
Gate Pass
Following Details can be printed on the Gate Pass

                                              Visitors’ name
                                              Time In/Time out
                                              Visitees’ name and department.
                                              Area allowed to visit alternatively
                                               with colour code to identify the area
                                              Signature of the visitee
                                              Vehicle number and driver name (if
                                               any)
                                              Returnable material details.
                                              ESIC number (in case of contract
                                               employees)
                                              Validity Period for Contract visitor
                                              Rules and regulations
                                              Any other information
Screen Shots
From this slide onward the screen shots of
  different modules are shown.
Log In




 Log in at the Security Gate module
The Following screen appears on logging in showing
the details of visitors status




      Click on New Button to Add detail of new visitor
Gate Pass no. is auto generated
   Click on requisition
        to see the                                       Select the Employee
      appointments                                                Select the visitors’ company, else type
       entered by
       employees                                                                           Select the visitors’ address, else type

Add no. if
  more
than one
  visitor
                                                                                       If the details of a visitor is present
 Select                                                                                in the database then the photo
purpose                                                                                will appear on the screen, else
 of visit
                                                                                       the camera will be activated
   Type
telephone/
mobile no.                                                                                 Select the visitors’ address, else type


    Type
 description                               Print Gate              Check if the          Send Intimation to employee and wait for
 of material                               pass after                person is                  response from employee
                           Check for      entering all                  with
                          vehicle and          the                 material , if
                          type vehicle    information               returnable
                              no.                                  then check
                                                                     the same
See the status of visitor i.e. Waiting, inside premises, left premises and
  waiting at the gate. The status is shown in different colors for easy
         identification. The out time of visitor is also displayed
Select Company of Contract
  Visitor, select Address and
 name of the contract visitor,
work department and period to
                                 Contract Visitor Pass
       prepare the pass
Client Notification

                                                    Employee can see
                                                      the photo of the
                                                     visitor by clicking
                                                         view photo




The employees receives the intimation
     about the visitor on their PC
Web- Based Module

The web based application gives user the liberty to send the
Advance notification to security about impending visitor,
Contract visitor etc.
On the browser select the address and login using user
Username and Password
The following screen appears with the following menus

   •New Requisitions (click to add new requisition)
   •Today’s List (click to view today’s visitors)
   •Contract visitors (click to view/add the contract visitors)
   •Export function (Export the report output)
New Requisition



      Select/Add company


 Select/Add name of
        visitor

Select date of visit

Type time of visit

 Select Purpose and
     click save
Select the type of search and select the
   date range to to view the records
                                                 Visitors List




 Click on camera icon to view photo of visitor
To add contract visitor, select/add
company, select/add name, select      Contract Visitor
department and date range of visit
Reports




Click on the reports menu to select the type of reports
to be generated
Department wise Visitors




Select the Company, Location department and date range to view the
records of visitors visited the particular department
Department Wise Visitor Report
Employee wise Visitor’s Report




Select the Company, Location, employee and date range to view the
records of visitors visited the particular employee
Employee wise Visitor Report
Date wise Visitor’s Report




Select the Company, Location and date range to view the records of visitors
visited during the period
Date-wise Visitors’ Report
Visitor Name wise Report




Select the Company, Location, Visitor and date range to view the
records of a particular visitor
Visitor Company wise Report




Select the Company, Location, Visitors’ company and date range to view the
records of visitors of a particular company visited
Visitor’s Company Wise Report
Reason wise report




Select the Company, Location, reason and date range to view the
records of visitors visited for a particular reason eg. Interview
Reason Wise Report
In Premises Report




Select the Company, Location and date range to view the records of visitors
Who have not returned the gate pass or still in the premises.
In Premises Visitors Report
Out of Premises Report




Select the Company, Location, Visitors’ company and date range to view the
records of visitors who are out of premises

Weitere ähnliche Inhalte

Was ist angesagt?

Cab booking system india
Cab booking system indiaCab booking system india
Cab booking system indiaCustom Soft
 
Visitor Management System
Visitor Management SystemVisitor Management System
Visitor Management SystemRITESH HELONDE
 
Online Airline Ticket reservation System
Online Airline Ticket reservation SystemOnline Airline Ticket reservation System
Online Airline Ticket reservation Systemsathyakawthar
 
online bus ticket booking system
online bus ticket booking systemonline bus ticket booking system
online bus ticket booking systemUmme habiba
 
LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]Nandu B Rajan
 
Hotel Management System
Hotel Management SystemHotel Management System
Hotel Management SystemAdil Ayyaz
 
Online Bus Reservation
Online Bus ReservationOnline Bus Reservation
Online Bus ReservationAstha Patel
 
Online shopping system (E-commerce)
Online shopping system (E-commerce)Online shopping system (E-commerce)
Online shopping system (E-commerce)Sarp Infotech
 
Mobile based attandance system
Mobile based attandance systemMobile based attandance system
Mobile based attandance systemAbhishek Jha
 
Online Bus Ticket Reservation System
Online Bus Ticket Reservation SystemOnline Bus Ticket Reservation System
Online Bus Ticket Reservation SystemTuvshinbayar Davaa
 
Online Bus ticket reservation
Online Bus ticket reservationOnline Bus ticket reservation
Online Bus ticket reservationSmit Patel
 
Visitor Management Software
Visitor Management Software Visitor Management Software
Visitor Management Software RITESH HELONDE
 
online Examination System (project report)
online Examination System (project report)online Examination System (project report)
online Examination System (project report)vivek anand
 
Online Shopping based on ASP .NET
Online Shopping based on ASP .NET Online Shopping based on ASP .NET
Online Shopping based on ASP .NET Pragnya Dash
 
Hotel management
Hotel managementHotel management
Hotel managementArman Ahmed
 

Was ist angesagt? (20)

Cab booking system india
Cab booking system indiaCab booking system india
Cab booking system india
 
Visitor Management System
Visitor Management SystemVisitor Management System
Visitor Management System
 
Online Airline Ticket reservation System
Online Airline Ticket reservation SystemOnline Airline Ticket reservation System
Online Airline Ticket reservation System
 
online bus ticket booking system
online bus ticket booking systemonline bus ticket booking system
online bus ticket booking system
 
LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]
 
Parking management system ppt
Parking management system pptParking management system ppt
Parking management system ppt
 
Hotel Management System
Hotel Management SystemHotel Management System
Hotel Management System
 
Online Bus Reservation
Online Bus ReservationOnline Bus Reservation
Online Bus Reservation
 
Online shopping system (E-commerce)
Online shopping system (E-commerce)Online shopping system (E-commerce)
Online shopping system (E-commerce)
 
School Management System
School Management SystemSchool Management System
School Management System
 
Mobile based attandance system
Mobile based attandance systemMobile based attandance system
Mobile based attandance system
 
Online Bus Ticket Reservation System
Online Bus Ticket Reservation SystemOnline Bus Ticket Reservation System
Online Bus Ticket Reservation System
 
Online Bus ticket reservation
Online Bus ticket reservationOnline Bus ticket reservation
Online Bus ticket reservation
 
E commerce proposal
E commerce proposalE commerce proposal
E commerce proposal
 
Visitor Management Software
Visitor Management Software Visitor Management Software
Visitor Management Software
 
online Examination System (project report)
online Examination System (project report)online Examination System (project report)
online Examination System (project report)
 
Online Shopping based on ASP .NET
Online Shopping based on ASP .NET Online Shopping based on ASP .NET
Online Shopping based on ASP .NET
 
Hotel management
Hotel managementHotel management
Hotel management
 
Parking management system
Parking management systemParking management system
Parking management system
 
College Bus Tracking Application
College Bus Tracking ApplicationCollege Bus Tracking Application
College Bus Tracking Application
 

Ähnlich wie Visitor Management SOlution

Document process v7
Document process v7Document process v7
Document process v7Bala Kris
 
Skur asfx analytixuserguide4_2
Skur asfx analytixuserguide4_2Skur asfx analytixuserguide4_2
Skur asfx analytixuserguide4_2Jeff Wessinger
 
System Analysis and Design Supporting Documents
System Analysis and Design Supporting DocumentsSystem Analysis and Design Supporting Documents
System Analysis and Design Supporting DocumentsChase Hoover
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO Alliance
 
Frosec - Visitor Management Software System
Frosec - Visitor Management Software SystemFrosec - Visitor Management Software System
Frosec - Visitor Management Software Systemfrosec
 
Bellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor ManagementBellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor Managementarun_nair
 
The Importance of Implementing a Visitor Management System in the UK
The Importance of Implementing a Visitor Management System in the UKThe Importance of Implementing a Visitor Management System in the UK
The Importance of Implementing a Visitor Management System in the UKRosalie Lauren
 
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009EuroCloud
 
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor ApproachContextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor ApproachPortalGuard
 
Claim based authentaication
Claim based authentaicationClaim based authentaication
Claim based authentaicationSean Xiong
 
Android app for call center software
Android app for call center softwareAndroid app for call center software
Android app for call center softwareShreya De
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
NYGGS -Transport Management System
NYGGS -Transport Management SystemNYGGS -Transport Management System
NYGGS -Transport Management SystemVibhu shukla
 
Android based mobile application with Call Tracking Details
Android based mobile application with Call Tracking DetailsAndroid based mobile application with Call Tracking Details
Android based mobile application with Call Tracking DetailsAriaTelecom
 
WhosOnLocation Overview
WhosOnLocation OverviewWhosOnLocation Overview
WhosOnLocation OverviewWhosOnLocation
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachPortalGuard
 

Ähnlich wie Visitor Management SOlution (20)

Document process v7
Document process v7Document process v7
Document process v7
 
Skur asfx analytixuserguide4_2
Skur asfx analytixuserguide4_2Skur asfx analytixuserguide4_2
Skur asfx analytixuserguide4_2
 
System Analysis and Design Supporting Documents
System Analysis and Design Supporting DocumentsSystem Analysis and Design Supporting Documents
System Analysis and Design Supporting Documents
 
uDocs SignIn v2
uDocs SignIn v2uDocs SignIn v2
uDocs SignIn v2
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
 
Frosec - Visitor Management Software System
Frosec - Visitor Management Software SystemFrosec - Visitor Management Software System
Frosec - Visitor Management Software System
 
Bellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor ManagementBellsofts Secured Maverick Enterprise Visitor Management
Bellsofts Secured Maverick Enterprise Visitor Management
 
The Importance of Implementing a Visitor Management System in the UK
The Importance of Implementing a Visitor Management System in the UKThe Importance of Implementing a Visitor Management System in the UK
The Importance of Implementing a Visitor Management System in the UK
 
Multi Roadshow with technology integration
Multi Roadshow with technology integrationMulti Roadshow with technology integration
Multi Roadshow with technology integration
 
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
 
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor ApproachContextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach
 
M-Brokrage
M-BrokrageM-Brokrage
M-Brokrage
 
Claim based authentaication
Claim based authentaicationClaim based authentaication
Claim based authentaication
 
Android app for call center software
Android app for call center softwareAndroid app for call center software
Android app for call center software
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
NYGGS -Transport Management System
NYGGS -Transport Management SystemNYGGS -Transport Management System
NYGGS -Transport Management System
 
Android based mobile application with Call Tracking Details
Android based mobile application with Call Tracking DetailsAndroid based mobile application with Call Tracking Details
Android based mobile application with Call Tracking Details
 
WhosOnLocation Overview
WhosOnLocation OverviewWhosOnLocation Overview
WhosOnLocation Overview
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
 

Kürzlich hochgeladen

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 

Kürzlich hochgeladen (20)

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 

Visitor Management SOlution

  • 1. Vertex Systems support@vertexsystems.net Tel: +91 22 32 67 11 66 Visitor Management Software
  • 2. Overview  The Visi-Track software deals with effective control, record maintenance and printing of gate passes for visitors to prevent the entry of any unauthorized or unwanted person entering the premises and keeping the tab on the authorized visitor visiting the area he/she is permitted to move in, meeting the person he/she is allowed to meet and avoid unwanted movement in the premises.  The flexible architecture of Visi-Track allows various people in the organization to directly access the data they need. Naturally, the Visi-Track’s Security System Permits authorized persons to have access to only the limited data to which they have been rights.
  • 3. Features  v Web based software  v Connected to webcam / digital camera for capturing visitors  photograph  v Visitor’s arrival advanced notification to security  v Contractor master database is maintained for contract employee  long period gate pass  v Visitors detailed database including photograph is maintained  v Storing of visitors photograph to print on the gate pass for  future reference  v Notification of visitors’ arrival on visitee’s, PC  v Customised Gate Pass for Visitor  v Printing of different colour gate pass to different type of  visitors, locations allowed etc • Continued
  • 4. Features – Contd.  Link to Biometric Scanner  Storing visitor finger prints.  Next time gate pass issue by placing just the finger on the scanner.  Link to UHF RFID for tracking visitor and marking the exit of the visitor  Black listing of visitor/s  Alerts for gate pass not returned
  • 5. Application Modules Visi-Track consists of 4 modules  Administration Module  Security Gate Module  Notification Client Module  Web- based application
  • 6. Administration Module  This module is normally installed on the Security Administrator PC. It consists of menus where the administrator can define  Companies,  location,  departments  and employees’ details  Define and print short term gate passes and  Generate reports
  • 7. Security Gate Module  The Security Gate module is installed at the main entrance of the premises  It facilitates the admin staff at the security gate to register the visitors details with photograph and also send the notification to the employee sitting inside the premises . The system will print visitor pass with name of visitor, department and visitee along with validity period. The visitor can display the pass by hanging around the neck.
  • 8. Notification Client The client module is installed at different PC’s on the network. Security can inform the person about the visitor through the security gate module. The employee can view the photograph of the visitor and can send the response back to security through this module.
  • 9. Web- based Module This application can be accessed through IE or any other browser and help the employees to register the expected visitor online and send the information to the security. Employees can view the reports of the visitors for the date range
  • 10. Gate Pass Following Details can be printed on the Gate Pass  Visitors’ name  Time In/Time out  Visitees’ name and department.  Area allowed to visit alternatively with colour code to identify the area  Signature of the visitee  Vehicle number and driver name (if any)  Returnable material details.  ESIC number (in case of contract employees)  Validity Period for Contract visitor  Rules and regulations  Any other information
  • 11. Screen Shots From this slide onward the screen shots of different modules are shown.
  • 12. Log In Log in at the Security Gate module
  • 13. The Following screen appears on logging in showing the details of visitors status Click on New Button to Add detail of new visitor
  • 14. Gate Pass no. is auto generated Click on requisition to see the Select the Employee appointments Select the visitors’ company, else type entered by employees Select the visitors’ address, else type Add no. if more than one visitor If the details of a visitor is present Select in the database then the photo purpose will appear on the screen, else of visit the camera will be activated Type telephone/ mobile no. Select the visitors’ address, else type Type description Print Gate Check if the Send Intimation to employee and wait for of material pass after person is response from employee Check for entering all with vehicle and the material , if type vehicle information returnable no. then check the same
  • 15. See the status of visitor i.e. Waiting, inside premises, left premises and waiting at the gate. The status is shown in different colors for easy identification. The out time of visitor is also displayed
  • 16. Select Company of Contract Visitor, select Address and name of the contract visitor, work department and period to Contract Visitor Pass prepare the pass
  • 17. Client Notification Employee can see the photo of the visitor by clicking view photo The employees receives the intimation about the visitor on their PC
  • 18. Web- Based Module The web based application gives user the liberty to send the Advance notification to security about impending visitor, Contract visitor etc. On the browser select the address and login using user Username and Password
  • 19. The following screen appears with the following menus •New Requisitions (click to add new requisition) •Today’s List (click to view today’s visitors) •Contract visitors (click to view/add the contract visitors) •Export function (Export the report output)
  • 20. New Requisition Select/Add company Select/Add name of visitor Select date of visit Type time of visit Select Purpose and click save
  • 21. Select the type of search and select the date range to to view the records Visitors List Click on camera icon to view photo of visitor
  • 22. To add contract visitor, select/add company, select/add name, select Contract Visitor department and date range of visit
  • 23. Reports Click on the reports menu to select the type of reports to be generated
  • 24. Department wise Visitors Select the Company, Location department and date range to view the records of visitors visited the particular department
  • 26. Employee wise Visitor’s Report Select the Company, Location, employee and date range to view the records of visitors visited the particular employee
  • 28. Date wise Visitor’s Report Select the Company, Location and date range to view the records of visitors visited during the period
  • 30. Visitor Name wise Report Select the Company, Location, Visitor and date range to view the records of a particular visitor
  • 31. Visitor Company wise Report Select the Company, Location, Visitors’ company and date range to view the records of visitors of a particular company visited
  • 33. Reason wise report Select the Company, Location, reason and date range to view the records of visitors visited for a particular reason eg. Interview
  • 35. In Premises Report Select the Company, Location and date range to view the records of visitors Who have not returned the gate pass or still in the premises.
  • 37. Out of Premises Report Select the Company, Location, Visitors’ company and date range to view the records of visitors who are out of premises