Next-Gen Visitor Management Features

Learn more about the features our BreezN software offers and how it’s shaping the workplace of the future.

Visitor management
Squares Pattern Decorative Squares Pattern for Veristream

Trusted By Customers Worldwide

LA Chargers
Kaiser Permanente
Geico
Papa Johns
Cummins
Aon

Visitor Management Security

Our cloud-based visitor management software, BreezN, is hosted on the Microsoft Azure Cloud which offers SOC 1, 2, and 3 reports. Increase overall security for your staff, facility, and data by implementing a digital check-in system.

ID Scanning

Quickly and securely read an ID industry standard PDF417 barcode found on any state-issued driver's license.

Cloud Storage

Each of our customers get their own isolated private BreezN environment built in the Microsoft Azure Cloud.

Watch List

Internal watch list that is configurable and shared across all of your sites and security officers get instant notifications.

Automatic Data Deletion

Your private BreezN environment will securely delete all data once it is outside of your configured retention period.

Background Checks

Integrate with industry leaders for instant background checks, denied-party screening, and sexual-predator background checks.

Data Encryption

All data moving in and out of your private environment is encrypted with TLS 1.2 and uses 256-Bit AES encryption while at rest.

Workflow

  • Create List of Expected Visitors
  • Send Email Invites with Custom Details
  • Daily Summary of Visits
  • Bulk Upload Groups of Visitors
  • Sort, Filter, Export Visitor Details
  • Synchronize Multiple iPads Across Locations

Account Management

  • Access Provision for Administrators
  • Send Email Invites with Custom Details
  • Daily Summary of Visits
  • Bulk Upload Groups of Visitors
  • Sort, Filter, Export Visitor Details
  • Synchronize Multiple iPads Across Locations

Customize Kiosk

  • Add Your Logo
  • Custom Image
  • Custom Text
  • Multiple Languages
  • Branded Welcome
  • Configurable For Multiple Locations

Dashboard

  • Unlimited Colleagues
  • Manage Notifications – Text and Email
  • Security Alerts for Unwanted Visitors
  • Specific Alerts when VIPs Arrive
  • Upload Documents
  • Customize and Filter Columns

Multiple Locations

  • Grouped Reporting
  • Global or Local User Rights
  • Global Active Directory Integration
  • Global Watch Lists
  • Easily Switch Between Locations
  • Manage One Account Versus Multiple

Visitor Experience with a Check-In Software

Instantly impress your visitors with a modern lobby design and iPad kiosk sign in system. Extremely user-friendly, visitors and vendors can check in quickly with a pre-registered QR code, by scanning their ID, or entering their information manually.

visitor pre-registration
Squares Pattern Decorative Squares Pattern for Veristream

Pre-Registration

  • Email with Visit and Location Details
  • QR Code for Check-In and Sign Out
  • Welcoming Experience
  • Good First Impression
  • Check-In Under 5 Seconds

Sign-In

  • Self Check-In and Check-Out
  • iPad Kiosk – Freestanding or TableTop
  • Pre-Registered or Walk-In Visitors
  • ID Scanning
  • Visitor Picture for Badges

ID Badges

  • Visitor Pictures
  • ID Scanning
  • Instant Printing
  • Preprint Badges for Individuals or Groups
  • QR Code for Signing Out

Cloud-Based

  • No Proprietary On-Prem Hardware
  • Easy Setup and Deployment
  • Automatic Updates
  • 99.9% IT Up Time
  • Data Stored in Unique Environment

Privacy

  • GDPR Compliant
  • Visitor Details Private
  • Visitors Can Decline Data Collection
  • Secure Data Infrastructure
  • Manage Employee Access and Roles

Integrations

  • LDAP
  • SAML 2.0
  • Azure AD
  • API
  • Outlook Plug-In
  • Active Directory
  • Cisco ISE
  • Visual Compliance
Meeting compliance with ease and avoid costly fines

Compliance regulations satisfied with visitor management

C-TPAT

C-TPAT holds importers responsible for implementing best practices for security across their supply chain to avoid running into any problems when products arrive at the border. Our solution features ID scanning and photo badge printing capabilities to identify unauthorized/unidentified persons efficiently.

GDPR

GDPR affects the way that data is stored across every industry, from pharmaceutical services to manufacturing companies and more. BreezN’s data management system allows for secure and reliable data processing, management, and encryption that meets the mark of GDPR.

HIPAA

Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA compliance. Our software allows for the screening of visitors against internal and/or government-issued watchlists, as well as security alerts if an unauthorized visitor attempts to access your facility.

OSHA

Record-keeping is imperative in meeting the standards of OSHA, as is the level of worker accessibility to these records. Having a digital check-in system that provides real-time visitor details allows you to run reporting at a moment’s notice.

JCAHO

JCAHO compliance requires healthcare facilities to be able to communicate with and evacuate visitors. The Joint Commission has standards on confidentiality and security similar to those of HIPAA.

ITAR

ITAR requires documentation that includes licenses, shipping documents for goods, in addition to citizenship verification, technology control plans, and nondisclosure agreements for all visitors to your facility.

SOC 2

Companies who store data in the cloud must abide by a set of policies. These policies monitor the security, availability, processing integrity, confidentiality, and privacy of customer data. Our software is hosted on the Microsoft Azure Cloud which offers SOC 1, 2, and 3 reports.

FSMA

For companies to comply with FSMA the FDA compiled a database of mitigation strategies, and one of the strategies is to implement a check in/check out procedure at security or reception areas, which includes verification of proper identification and screening equipment.

Security, compliance, and convenience at every stage.​

Let's talk about how visitor management and a digital visitor log can improve workplace security.

Visitor Log