SAFEVISITOR BLOG
How Does Geo-Fence Expand Your Security Perimeter?
In today’s world, security is always a topic of discussion for any organization. With the recent tragedy in Las Vegas, this topic will be discussed by many people over the next several weeks. There is no one method of security that works for everyone. Every organization has to evaluate their facilities, events, and business culture to determine the right mix of security options that will accomplish their goals.
At SafeVisitor, we take security seriously. We take it so seriously that we have formed an Advisory Board that includes a Secret Service Agent, a Cybersecurity Expert, and others who work or have worked in various areas of law enforcement and technology.
Expanding your security perimeter is one way to have more control over how close people can get to your facilities before being recognized. One tool we use for this at SafeVisitor is Geofencing.
What is Geofencing?
“Geofencing” is a term that is foreign to many people. In simple terms, a geofence is a GPS hotspot. It is similar to a Wi-Fi hotspot that you would purchase from a phone carrier to give you Internet access within so many feet of the hotspot. Our SafeVisitor Visitor Management System, paired with our free mobile app, utilizes geofencing to alert you when someone with the app on their phone approaches your building.
Setting up a geofence is a simple process and does not require any additional hardware. First, you must determine the area you want to cover at a location. You may want to cover the entire building, the building plus parking, or maybe just the front entrance. Once that has been determined, the geofence is active and ready to be used.
To fully utilize the geofence in SafeVisitor, a few things have to be done by the person who has been vetted by your organization. They must :
Download the SafeVisitor mobile app. This app is available in both Apple and Android stores.
Enter their SafeVisitor badge ID number that they would have received via email and the email address they used to register with SafeVisitor.
Once completed, if they have visited a building before, they will see their badge in the app along with their picture.
That is all that’s needed. When a person comes for a visit, they will open the app and make sure that Location Services is turned on. When they approach the building and step inside the geofence hotspot area, the attendant will see them on their dashboard in the Visitors Nearby tab. The moment they are within that hotspot, the system will log them in the Nearby Log. The attendant can choose to leave them in the Visitors Nearby tab or click the arrow next to them and check them into SafeVisitor. Either way, their arrival to your location has been logged by the system in an efficient manner.
Using a geofence can expand the perimeter of a location to allow you to see people on your property before they actually arrive at the front door. It’s just one tool that can be used in the security plan for your organization.
If you are interested in learning more about how SafeVisitor can protect your organization, you can sign up for a webinar by clicking HERE.
Visitor Management: How Can A Geofence Protect My Organization?
“Geofencing” is a term that is foreign to many people. In simple terms, a geofence is a GPS hotspot. It is similar to a Wi-Fi hotspot that you would purchase from a phone carrier to give you Internet access within so many feet of the hotspot.
Our SafeVisitor Visitor Management System (https://safevisitorsolutions.com) paired with our free mobile app, utilizes geofencing to alert you when someone with the app on their phone is approaching your building.
Let’s discuss how this can be used for additional protection of your organization and provide convenience when checking in people who have previously been vetted by your organization.
Setting up a geofence is a simple process. First, you must determine the area you want to cover at a location. You may want to cover the entire building, the building plus parking, or maybe just the front entrance. Once that has been determined, the geofence is active and ready to be used.
To fully utilize the geofence in SafeVisitor, a few things have to be done by the person who has been vetted by your organization. They must :
download the SafeVisitor mobile app. This app is available in both the Apple and Android stores.
enter their SafeVisitor badge ID number that they would have received via email and the email address they used to register with SafeVisitor.
Once completed, if they have visited a building before, they will see their badge in the app along with their picture.
That is all that’s needed. When a person comes for a visit, they will open the app and make sure that Location Services is turned on. When they approach the building and step inside the geofence hotspot area, the attendant will see them on their dashboard in the “Visitors Nearby” tab. The moment they are within that hotspot, the system will log them in the “Nearby Log”. The attendant can choose to leave them in the Visitors “Nearby tab” or click the arrow next to them and check them into SafeVisitor. Either way, their arrival to your location has been logged by the system in an efficient manner.
Geofencing can be especially useful when you are expecting many volunteers to arrive. By looking at the dashboard and verifying the person, the attendant can simply click the arrow next to the person on the dashboard to check the volunteer into the system. This allows the attendant to have a visual of the volunteer to compare to the picture on the dashboard without the volunteer having to physically scan into the building.
If you are interested in learning more about how SafeVisitor can protect your organization, you can sign up for a webinar by going to: https://attendee.gotowebinar.com/rt/4163182413889495042
Articles
-
Active Shooter
5
- Dec 3, 2018 Wait -- is Code Yellow a shooter or a bus problem? Dec 3, 2018
- Jul 2, 2018 Is your security toolkit complete? Jul 2, 2018
- Jun 1, 2018 Active Shooter: Facility Security Starts Far From Your Front Door Jun 1, 2018
- May 23, 2018 School Active Shooters: Getting "Left of Bang" May 23, 2018
- May 7, 2018 Active Shooters: Stop Reacting, Start Preventing May 7, 2018
-
Background Checks
4
- Oct 25, 2017 How Do We Comply With Indiana HEA 1079? Oct 25, 2017
- Oct 3, 2017 Top 5 Problems with Vendor Background Checks Oct 3, 2017
- Aug 25, 2017 Can I manage employee background checks in a visitor management system? Aug 25, 2017
- Aug 17, 2017 Do Visitor Management Systems Integrate with Comprehensive Background Checks? Aug 17, 2017
-
Building Security
3
- Jun 3, 2019 Preventing “road rage” in your parking lot Jun 3, 2019
- Sep 4, 2018 Metal Detectors Aren't a Magical Safety Solution Sep 4, 2018
- Feb 27, 2018 Making Sure Your Building is Safe No Matter Who is There Feb 27, 2018
-
Cloud Hosting
1
- Nov 7, 2017 Visitor Management System: Cloud Hosting vs Local Server Nov 7, 2017
-
Concealed Carry
1
- Feb 1, 2019 How should you deal with concealed carry? Feb 1, 2019
-
Corporate Security
2
- Aug 1, 2018 How a Warrior Views Your Facility Aug 1, 2018
- Dec 7, 2017 How to Protect Yourself at Work Dec 7, 2017
-
Emergency Alerts
2
- Nov 1, 2018 When an Excluded Visitor Creates a Disruption Nov 1, 2018
- Jan 9, 2018 How Our Emergency Button Helps Put the 'Safe' in SafeVisitor How Our Emergency Button Helps Put the 'Safe' in SafeVisitor Jan 9, 2018
-
Excluded Parties
1
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
-
Facial Recognition
1
- Aug 26, 2019 Use and Misuse of Facial Recognition Software Aug 26, 2019
-
Geofence
2
- Oct 6, 2017 How Does Geo-Fence Expand Your Security Perimeter? Oct 6, 2017
- Aug 22, 2017 Visitor Management: How Can A Geofence Protect My Organization? Aug 22, 2017
-
Pricing
1
- Sep 13, 2017 What is the Cost of a Visitor Management System? Sep 13, 2017
-
Reunification
2
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- May 1, 2019 Developing a plan for reunification after emergencies May 1, 2019
-
School Visitor Management
13
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- Oct 18, 2019 How to Make Schools Safer With A School Visitor Check-In System Oct 18, 2019
- Oct 4, 2019 What is Best Visitor Management System for Schools? Oct 4, 2019
- Sep 24, 2019 School Visitor Management Systems Are The Foundation for Security Sep 24, 2019
- Aug 30, 2019 What Should a Visitor Management System for Schools Do? Aug 30, 2019
- Aug 8, 2019 Visitor Management System for Schools Aug 8, 2019
- Apr 1, 2019 Anonymous reporting systems enhance safety Apr 1, 2019
- Mar 1, 2019 Someone phoned in a bomb threat. Now what? Mar 1, 2019
- Jan 2, 2019 Are Your After-School Events Safe Places? Jan 2, 2019
- Nov 14, 2017 What’s the Purpose of a Visitor Management System? Nov 14, 2017
- Sep 22, 2017 Are You Keeping Students Safe with a Quality Visitor Management System? Sep 22, 2017
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
- Aug 29, 2017 What Is the Best School Visitor Management System? Aug 29, 2017
-
Sex Offender Search
2
- Nov 1, 2017 Is the Visitor Management System Sex Offender Data Up To Date? Nov 1, 2017
- Aug 31, 2017 Visitor Management System: Do You Really Know All of Your Visitors? Aug 31, 2017
-
Vendor Management
1
- Oct 1, 2018 Visitor Management: How Well Do You Trust Vendors in Your Facilities? Oct 1, 2018
-
Visitor Management
2
- Sep 15, 2019 Visitor Management Software: Security Technology Removes Stress Sep 15, 2019
- Sep 9, 2019 What is Visitor Management System? Sep 9, 2019
-
Volunteer Management
2
- Nov 21, 2017 How do I Conduct a Kiwanis Background Check? Nov 21, 2017
- Sep 25, 2017 Creating a Volunteer Background Screening Consortium Sep 25, 2017
-
WA WATCH Background Check
1
- Jan 15, 2018 WA State Police WATCH Volunteer Background Checks Jan 15, 2018
-
visitor kiosk
1
- Aug 15, 2019 Visitor Management Kiosk Aug 15, 2019