Distinctive characteristics to ease your visitors’ management.

Visitor Data Collection

IVET collects and stores the visitor's data for immediate and future consultation. At the moment the alternative is a note book handwritten which is very difficult to read and also almost impossible to consult after a relatively short period of time in case of need.

product image
product image

Visitor Verification

IVET has inbuilt ID verification of the visitor by the use of the token.

Visitor Flagging and Blacklisting

IVET can be programmed with unwanted visitor list or can advise the receptionist by flagging a particular expected visitor by dedicated message or anything of interest related to the visitor's purpose of visiting.

product image
product image

Visitor / Host Management

IVET manages the visitor-host relationship seamlessly while keeping the receptionist in the loop via a dedicated console.

Database Management

Tracking of Visitors over time, identification of Visitor and visits monitoring of staff interactivity with Visitors. Providing support via filters and advanced search parameters for investigations related to real-time visitors presence and remote monitoring.

product image
product image

Panic Button

It's a feature strongly wanted by the originator in dedicated point like the Receptionist console. The activation will send a warning message to the visitor and also in a blink of an eye produce the list of the visitors still in the premises. The relationship with their host and also if required the photograph for an easy search and recognition by rescuer.

Photo Identification

IVET seamlessly verifies the ID of visitor by using SMS. In Ghana as in most countries, cell phone numbers are tired to details of the owner. This provides a good form of tracing visitors if need be. In more sophisticated versions and on client request IVET can be complemented by taking a picture of the visitor.

product image