The use of third party contractors and sub-contractors has become a very commonplace occurrence nowadays, but allowing access to sensitive areas to outside parties can be very risky, experts believe.
Third party contractors are granted access to much of or all of their employer’s critical systems and sensitive areas, which can be problematic, especially since they are often overlooked as a potential threat to an organisation.
Using activity monitoring tools can mitigate some of the risks associated to the use of third party contractors or site visitors. These tools allow for increased visibility and transparency in order to see in real time who is accessing the specific areas of any company’s site.
TENSOR MANAGEMENT OF CONTRACTORS AND VISITORS SOFTWARE (MCVS) – A LEADING VISITOR MANAGEMENT SYSTEM TO IMPROVE THE SECURITY OF YOUR BUSINESS PREMISES
The Management of Contractors and Visitors Software(MCVS) is a network-based application that allows you to advance book visitor appointments and pre-book on site contractors. These bookings can be made either via the PC based application or a user’s Internet browser. Directly an appointment is booked, notification emails are sent to both the visitor and their host informing them of the appointment’s date, time and location.
Visitor appointments can be pre-booked either directly on the system or through the online Appointment Planner found within Tensor’s Self Service Module (SSM). Employees with an account can log into SSM using their Internet browser. Depending upon their security profile, SSM users can view and make appointments for themselves or colleagues. SSM users can also create new visitor and visitor company entries, view their own appointments, view all appointments at their site or view all appointments for their organisation.
The Visitor Monitoring (MCVS) module can be integrated with Tensor’s Access Control application. In this way when visitors and contractors arrive they are handed a smart card along with their identification pass. The smart card will grant them access through doors according to the security rules assigned to them on arrival. Furthermore, security settings are available to require authorised cardholders to escort visitors. The authorised escort must scan their card to validate the visitor’s card before access is granted.
If you would like to find out more about the Management of Contractors and Visitors Software (MCVS), just contact us or Book a Demo, we’d be more than happy to answer all of your questions and queries.