Visitor Welcome: Meet, Greet and Secure

Zalud, Bill
February 2010
Security: Solutions for Enterprise Security Leaders;Feb2010, Vol. 47 Issue 2, p36
Trade Publication
The article focuses on the importance of visitor management in a business establishment for the benefit of visitors and contractors and the business itself. It identifies several visitor management used by several business including Navistar Co., Nokia Corp, and United Airlines Inc. It also discusses visitor management as a procedural and electronic security system for balancing safety and security of occupants and the effective management tracking of visitor's entry/egress and whereabouts.


Related Articles

  • Nokia IP380.  // SC Magazine: For IT Security Professionals (UK Edition);Oct2004, p58 

    This article evaluates IP380 Nokia Secure Access System (NSAS), a virtual private network system from Nokia Corp. NSAS administration is browser based, but has a different layout to the Voyager system management interface. This is just as easy to use and presents no problems in practice. NSAS...

  • Creating Security's Strategic Plan. Scaglione, Bernard // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p44 

    The author provides tips on how to create a strategic security plan. He cites the importance of considering the important elements in a security plan and defining the responsibilities and functions of the company's security department and personnel. The author advises to create an identification...

  • SUCCESS STORIES IN ALARM INTEGRATION. Engebretson, Joan // SDM: Security Distributing & Marketing;Aug2005, Vol. 35 Issue 8, p44 

    Describes how alarm integration improves the effectiveness of access control and video surveillance at three separate facilities in the U.S. Features of the integrated security system installed at beverage manufacturer Bacardi Bottling Corp.; Advantages of the integrated system at Northeaster...

  • STEP 5 - IMPLEMENTATION.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p189 

    Your facility's integrated physical security plan has been accepted by senior management, the funding for it has been approved and now you must implement your strategic plan. Remember that there are three key components to implementation - physical security measures, operations and policies -...

  • Using a Parallel Network for a Video Camera. Engebretson, David // SDM: Security Distributing & Marketing;Jul2005, Vol. 35 Issue 7, p88 

    The article details the cabling options for installing a network camera. This camera will be installed in the work area, and viewed on a computer in the main cross-connect, with optional viewing over the Internet. Although this example uses a network camera, the same principles apply to any type...

  • MANTRAPS: A Unique Solution.  // Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p20 

    Features mantraps, a component of access control applications for security systems. Background on the tool that has a design more typical of bank backrooms and military operations in the past; Ability of mantraps to limit access to secure areas within a facility while providing an effective...

  • Piezo Effect; Access Impact. Powell, Simon // Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p24 

    Suggests that the increased availability of advanced encoding, encryption and identity systems can provide an unprecedented level of access control, audit capability and security within premises. Implementation of the technologies on networks that simplifies integration into local or remote...

  • Bideawhile's Diary ... In which Bideawhile prepares for diversification.  // Works Management;Jun2005, Vol. 58 Issue 6, p52 

    The article presents information about the author's weekly activities and personal engagements. The author informs that recently some electricians worked all night at her facility installing security and card access systems. However, the next morning she had five production lines which were not...

  • As the Perimeter Turns. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Sep2006, Vol. 43 Issue 9, p86 

    The article looks into the perimeter security system adopted by U.S. companies. Companies have been increasingly aware of the security risks, thus they resort to providing lobby and parking security through access control. Optical turnstiles can be customized to blend with the building's...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics