It’s important to know who’s welcome in your office, and more importantly, who’s not. Especially in large buildings and as companies grow, it’s not always easy to know who’s authorized.
Envoy is a crucial layer in integrated security systems, enhancing physical as well as data security. Know visitors are who they claim to be with ID scanning, keep track of who’s who with automatic photo capture, clearly see who’s signed-in with visitor badges for guests, and stop unwanted visitors from entering with our block list and registration features.
Real-time visitor dashboard
When a visitor signs in, their details appear on the visitor dashboard. Easily navigate or simply search for a specific sign-in to view photos, sign-in times, signed legal documents and more.
Capture a photo of each visitor during sign-in. Photos will appear on your dashboard, in host notifications and on the visitor badge. They're securely stored and will always be there if you need them.
Having a streamlined badge system in place is the easiest way to identify unwelcome visitors. And since Envoy automatically prints badges during sign-in, you never have to worry about badges again.
In addition to the visitor’s name, you can choose to display details like their photo, host’s name, purpose of visit, entry time, date and more. Using Envoy makes it easy to require each visitor to wear a badge—and when you see someone without one, you can promptly take steps to determine if they’re welcome in your building.
Require that visitors scan their ID with the iPad’s camera as they sign-in. If something is amiss, Envoy alerts the administrators you specify to approve or deny their entry.
This feature let you customize a block list based on keywords. Anytime a sign-in matches a keyword on the block list, a specially appointed security admin will be prompted to greet the visitor and allow or deny their entry.
“Physical security—knowing who’s in our building at every moment—is absolutely critical. If you care about security, Envoy is important. It’s a system that already takes social engineering into account.”—Nathan McBride, CIO & SVP, Innovation Architects, AMAG Pharmaceuticals
With registration, you can send a detailed invite email and speed up sign-in. Registration can play a key role in your security procedures, too. When an invite is created, it appears on the invites dashboard. Since admins can see invite details, like who created the invite and the private notes, it’s easy to know a visitor is authorized.
Security guard access
We ensure that your sensitive visitor information is protected by providing a security guard option. This feature includes read-only access to a live-updating list of the day’s invited visitors. This way, your security firm can always see which visitors are expected, arrival time, host details and private notes.
Customizable, required sign-in fields
Envoy allows you to tailor your sign-in field to suit your company’s needs. And since visitors sign in by typing on the iPad, the required information will always be legible and easy to access.
Unlike paper guest books, Envoy keeps visitor information confidential. The iPad displays your logo when no one is signing in. This way, guests cannot “innocently notice” other visitor's details.
Role-based administration allows you to have multiple Envoy admins. This way, members of your security, reception and facilities teams will all have the right levels of access to your visitor data.
Each employee in your directory can create a personal login to securely manage their visitors and invites. They can also take advantage of these features on mobile, with Envoy Passport.