FREE DELIVERY WHEN BOUGHT S$1000
FREE DELIVERY WHEN BOUGHT S$1000

Visitor Management System

Visitor Management System

Visitor Management System
falco

Visitor Management System

The VAULT Visitor Management Systems software enables a comprehensive operation, with numerous functions such as check-in and checkout, location, name tag printing, report preparation, asset and package management, service provider registration, and much more.

Loading...

Overview

Benefits

VMS Web

Is an Enterprise level visitor management registration system, with the latest resources, in accordance with the needs of companies that require maximum agility on temporary credential control.

Automatic CheckOut

When working in conjunction with the VAULT Site Systems, this solution offers the resource of automatic cancellation of the registered credential number when the credential is read by the safe card-collector reader, optimizing the operation and drastically increasing security

OCR & Save Time

OCR helps to fill up visitor’s name and ID no. By taking a photo of the visitor’s ID. This helps to speed up the registration process as well as making sure that visitor information is captured accurately without human error.

Label Design & Printing

A tool to create the layout of labels and to print credentials which enables the creation of a professional design

VMS Cloud Mobile

Combination of Vault Cloud VMS with Falco Face Reader is truly designed an automation process visitor pre-registration supporting facial recognition and enabling access upon the host’s validation.

Equipped with dashboard for status monitoring and comprehensive reporting. It’s convenient and integrates seamlessly, supporting unlimited host and/or visitor registrations as well as multi-tenant applications.

 

 

FALCO Face Recognition Reader

Designed with GDPR Compliance and is largely based on its ability to recognize facial features.

Every individual has their own unique set of distinguishable facial features, known as nodal points.

These nodal points are impossible to replicate and can be set for automatic erosion after a set time has elapsed. No actual photo images are stored on client networks, meaning visitor identities remain secure and safe.