In this opening blog, we discuss what it means to redefine the check-in experience with 3 new and innovative ways to enable organizations to quickly deliver and manage a secure event based check-in solution.
For organizations there are several innovative ways to ensure success in deploying a visitor and event management solution to ensure business productivity while reducing risk.
First is ensuring a seamless experience across the full workspace check-in lifecycle, from visitor check-ins at the lobby to event check-ins that can span many locations. In this scenario, user types can span from not just visitors and vendors but also employees using their existing access control credentials and for guests who check-in at an event. For workspace environments where there is limited IT support and no existing employee access control (such as co-located offices) being able to quickly automate check-in operations to support these scenarios allows organizations to increase workspace efficiency across a myriad locations and users. Users include employees, visitors, guests, vendors, contractors and various combinations of each. They also include security officers and receptionists who manage the check-in operations and are provided various levels of role based access controls. If check-ins are managed as a location event, system administrators would have a global view of the check-in environment, especially useful in providing the Security Operations Team (SOC) with a more insightful information, such as number of check-ins across each location. What if the check-in event spans multiple buildings within a campus? The solution should create logical event groups for users who may check into several event locations.
Second, is having flexible infrastructure options for the devices used in managing check-ins, authenticating data sources, and hosting data. Although using small tablet devices for managing check-in may be an elegant and modern solution for many company lobbies, it may lack features to be useful in other more Enterprise environments such as integrating into Enterprise directory services or supporting additional devices. Authentication data sources should include multiple methods, such as entering email and contact info, scanning IDs, driver licenses and temp badges, to using a mobile wallet. Lastly, although hosting data in the cloud is an emerging option for many new visitor management systems, there needs to be provisions to ensure check-in operations continue even when access to the internet is not available or when an organization wants to use their own hosted data infrastructure.
And third, is making sure Enterprise security and privacy controls are integrated into the check-in solution. For security, this includes robust authentication when viewing a user’s profile and encryption to ensure data is protected both in-transport and at rest. Also maintaining a secure environment allowing customers to own and maintain their own encryption keys for access to the data to minimize any risk of unauthorized data access. And what if organizations want to use third party tools to run analytics on the check-in source data? There should be a secure way for the solution to provide this in the form a restful API or other similar means to get access to customer owned data without relying on the solution vendor. To ensure privacy, it is critical integrate various levels of privacy and data anonymization features such as Right to Be Forgotten in order to meet compliance standards such as GDPR and the upcoming California Consumer Privacy Act. Organizations who are exposed in this area are at risk in incurring large fines if personal identification information is not managed in a proper manner.
At i-checkin we are excited to offer new and innovative way to quickly build and manage a secure check-in solution for both workspaces and events. Organizations can scale their check-in operations seamlessly and anywhere without boundaries. They can automate and simplify visitor and guest authentications, badging, host notifications and legal agreements. Enterprise security and privacy is ensured during each phase of the check-in lifecycle.
To learn more about i-checkin and our Check-in Event Management System for Workspaces, visit our webpage at www.i-checkin.com.