Threshold
Become a Distributor Contact Login My Cart 1-800-243-1969

About this blog

We write articles mainly about visitor management, which helps you to know who is (or has been) in your facility. It is just part of an organization’s physical security processes that protect people and property within and around a building or campus.

Categories

Search

Meet the bloggers

Paul Kazlauskas About me › My posts ›

Andrew Jones About me › My posts ›

Josette Lumbruno About me › My posts ›

Blog

Who is in your hospital right now? Where are they going, and why?

by Paul Kazlauskas

3 new eVisitor software security features help manage your visitor capacity.

Your hospital’s visitors, vendors, and contractors come and go. If you don’t know who they are, where they’re going, and why, you’re exposing your people and property to considerable harm.

eVisitor is a robust, yet simple visitor management software system that is easy to use. The software solution is reasonably priced and has flexible options, so you buy only what you will use. It has reliable, cloud-based data access for easy implementation on current Windows-based computers.

We are excited to announce 3 new software features that will help users manage their visitor capacity even better than before!

Room-Track, eVisitor Visitor Management
(1) Room-Track™ alerts you to how many visitors are in a room and who they are. As soon as you enter a room number, the red text appears as shown (if there are visitors already signed in to that room).

Room-Track, eVisitor Visitor Management
(2) The Visitors By Destination tab shows a list of all destinations that have visitors and the number of visitors in each. When you click on one of the rooms, you see who is visiting.

(3) Total Unique Visitors (also above) shows you at a glance how many visitors are in your entire facility.

Request a free demo of eVisitor Software

We will contact you to schedule an online appointment. If you have any questions, please call 800-243-1969. Thank you for your interest!

Want the latest, best security practices delivered straight to your inbox? Click the "Subscribe to the Blog" button (on the left side navigation).

Posted on 9/3/2020


Comments:


Name: * for display purposes
Email: * will not be shown
Comment: *
 * Please enter the numbers and/or letters shown below: