Check out our special report on casino security
HID EasyLobby® Secure Visitor Management Satellite enterprise solution for visitor registration
Technical Specification
- Make: HID
- Model code: EasyLobby® Secure Visitor Management Satellite
- Visitor Management: Yes
HID Global’s EasyLobby® Secure Visitor Management (SVM™ ) Satellite is used to control and monitor entry and exit at one or more internal locations or “check points” for visitors who have already been badged at a SVM workstation at the main lobby, visitor center or guard gate. Upon arrival at a Satellite station, the visitor’s badge is scanned and the Satellite station will display the visitor’s photo, name and clearance level while informing the operator whether to allow or deny the visitor entry into that area.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | EasyLobby® Secure Visitor Management Satellite |
| Visitor Management | Yes |
| Additional info | HID Global’s EasyLobby® Secure Visitor Management (SVM™ ) Satellite is used to control and monitor entry and exit at one or more internal locations or “check points” for visitors who have already been badged at a SVM workstation at the main lobby, visitor center or guard gate. Upon arrival at a Satellite station, the visitor’s badge is scanned and the Satellite station will display the visitor’s photo, name and clearance level while informing the operator whether to allow or deny the visitor entry into that area. |
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
