Next-Gen Visitor Management Features

Our visitor check-in software is transforming lobbies by creating a more secure check-in process for all visitors and vendors.

Visitor management
Squares Pattern Decorative Squares Pattern for Veristream

Visitor Management Security

Our cloud-based visitor management software, BreezN, is hosted on the Microsoft Azure Cloud which offers SOC 1, 2, and 3 reports. Increase overall security for your staff, facility, and data by implementing a digital check-in system.

ID Scanning

Quickly and securely read an ID industry standard PDF417 barcode found on any state-issued driver's license.

Private Environment

Each of our customers get their own isolated private BreezN environment built in the Microsoft Azure Cloud.

Watch List

Internal watch list that is configurable and shared across all of your sites and security officers get instant notifications.

Automatic Data Deletion

Your private BreezN environment will securely delete all data once it is outside of your configured retention period.

Background Checks

Integrate with industry leaders for instant background checks, denied-party screening, and sexual-predator background checks.

Data Encryption

All data moving in and out of your private environment is encrypted with TLS 1.2 and uses 256-Bit AES encryption while at rest.

Workflow

  • Create List of Expected Visitors
  • Pre-Registration Email Invites with Custom Details
  • 12 Different Visitor Types with Custom Workflows
  • Announcement Notification
  • Sort, Filter, Export Visitor Details
  • Synchronize Multiple iPads Across Locations

Account Management

  • Access Provision for Administrators
  • Unlimited Users, Unlimited Visitors
  • Run Summary Reports of Visits
  • Bulk Upload Groups of Visitors
  • Personalized Profiles
  • Online Support, Knowledge Base

Customize Kiosk

  • Add Your Logo
  • Custom Image
  • Custom Text
  • Multiple Languages
  • Branded Welcome
  • Configurable For Multiple Locations

Dashboard

  • Real-Time Activity Tracking
  • Host Notifications – Text and Email
  • Security Alerts for Unwanted Visitors
  • Specific Alerts when VIPs Arrive
  • Schedule Recurring Visitors
  • Custom User Interface

Multiple Locations

  • Grouped Reporting
  • Global or Local User Rights
  • Global Active Directory Integration
  • Global Watch Lists
  • Easily Switch Between Locations
  • Manage One Account Across Multiple Locations

Visitor Experience with a Digital Check-In

Instantly impress your visitors with a modern lobby design and iPad kiosk sign in system. Extremely user-friendly, visitors and vendors can check in quickly with a pre-registered QR code, by scanning their ID, or entering their information manually.

visitor pre-registration
Squares Pattern Decorative Squares Pattern for Veristream

Visitor Check-In

  • Pre-Registration Email with Visit and Location Details
  • QR Code for Check-In and Check-Out
  • Welcoming Experience
  • Good First Impression
  • Pre-Registered or Walk-In Visitors
  • Check-In Under 5 Seconds
  • Group Sign-In
  • Recurring Visitors

iPad Kiosk

  • ID Scanning
  • QR Code Scanning
  • Sign NDAs
  • Digital Signature
  • Multiple Languages
  • Customizable Branded iPad Kiosk
  • Custom Questions
  • Manual or Automatic Check-Out

ID Badges

  • Instant Badge Printing
  • Visitor Photo Printed on Badge
  • Preprint Badges for Individuals or Groups
  • Print Various Badges Based on Visit Type
  • Expiring Badges
  • Customize with Logo
  • Print with Custom Information

  • Use for Visitor Check-Out

Cloud-Based

  • No Proprietary On-Prem Hardware
  • Easy Setup and Deployment
  • Automatic Updates
  • 99.9% IT Up Time
  • Data Stored in Dedicated Private Environment

Privacy

  • GDPR and CCPA Compliant
  • Visitor Details Private
  • Visitors Can Decline Data Collection
  • Secure Data Infrastructure
  • Manage Employee Access and Roles

Integrations

  • LDAP
  • SAML 2.0
  • Azure AD
  • API
  • Outlook Plug-In
  • Active Directory
  • Cisco ISE
  • Visual Compliance

Security

  • Private Dedicated Environment
  • Data Encryption at Rest
  • Data Encryption in Transit
  • Data Policy
  • DoS Protection
  • Security Alerts of Data Breaches
  • SOC 2
  • Third Party Penetration Tests
Meeting compliance with ease and avoid costly fines

Compliance regulations satisfied with visitor management

C-TPAT

C-TPAT holds importers responsible for implementing best practices for security across their supply chain to avoid running into any problems when products arrive at the border. Our solution features ID scanning and photo badge printing capabilities to identify unauthorized/unidentified persons efficiently.

GDPR

GDPR affects the way that data is stored across every industry, from pharmaceutical services to manufacturing companies and more. BreezN’s data management system allows for secure and reliable data processing, management, and encryption that meets the mark of GDPR.

HIPAA

Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA compliance. Our software allows for the screening of visitors against internal and/or government-issued watchlists, as well as security alerts if an unauthorized visitor attempts to access your facility.

OSHA

Record-keeping is imperative in meeting the standards of OSHA, as is the level of worker accessibility to these records. Having a digital check-in system that provides real-time visitor details allows you to run reporting at a moment’s notice.

JCAHO

JCAHO compliance requires healthcare facilities to be able to communicate with and evacuate visitors. The Joint Commission has standards on confidentiality and security similar to those of HIPAA.

ITAR

ITAR requires documentation that includes licenses, shipping documents for goods, in addition to citizenship verification, technology control plans, and nondisclosure agreements for all visitors to your facility.

SOC 2

Companies who store data in the cloud must abide by a set of policies. These policies monitor the security, availability, processing integrity, confidentiality, and privacy of customer data. Our software is hosted on the Microsoft Azure Cloud which offers SOC 1, 2, and 3 reports.

FSMA

For companies to comply with FSMA the FDA compiled a database of mitigation strategies, and one of the strategies is to implement a check in/check out procedure at security or reception areas, which includes verification of proper identification and screening equipment.

Security, compliance, and convenience at every stage.​

Learn how our visitor check-in software improves security for your workplace.

Visitor Log