Skakel Oor Jou ERP ontgroei? Kyk wat gebeur wanneer jy ophou betaal per gebruiker en vinnig begin beweeg. Sien migrasie-opsies →
Safety & Security

Real-Time Visitor Tracking Across a 200-Acre Industrial Complex

August 2025 7 min read

The challenge: a campus with too many doors and too little visibility

A large industrial campus spanning approximately 200 acres faces a category of security problem that is different in kind from what a single building or a small office park faces. The scale means that a visitor who enters at the main gate can be genuinely difficult to locate an hour later. Restricted zones — production areas, chemical storage, high-security research facilities — are spread across the campus and have their own access requirements. A visitor cleared for the administrative block has no business in the fabrication shop, but without an integrated system, the only thing preventing that is a guard who may or may not be paying attention.

The existing process was manual at every step. Visitors signed into a paper register at the main gate. A temporary pass was issued — typically a laminated card with a handwritten name and date. The host employee was called to escort the visitor in. What happened next was largely unmonitored. The visitor was expected to leave when their business was concluded and return the pass at the gate. Whether they actually did so — whether they overstayed, wandered into areas they were not authorised to enter, or departed without formally checking out — was detected only if a security guard happened to notice, which was rarely.

For planned visits, the pre-notification process was equally manual. A host employee who expected a visitor would typically email or call the security desk to add their visitor to a list. There was no formal approval workflow — no mechanism to ensure that the host's manager was aware of the visit, that the areas the visitor needed access to had been formally sanctioned, or that visitor credentials had been verified in advance. Walk-in visitors received the same process as pre-approved ones, which is to say, a name in a register and a laminated card.

The security operations team had a specific operational concern: emergency evacuation accountability. In a fire or industrial accident scenario, knowing who is on campus at any given moment is a life-safety requirement. A paper register at one gate, maintained manually, does not provide a reliable headcount. Visitors who had entered but not checked out were counted; visitors who had slipped out without signing off were still counted. The register was structurally unreliable for the purpose it was most critically needed.

The solution: end-to-end visitor lifecycle management

The implemented system covers the entire visitor journey from before they arrive to after they leave. Each stage is connected to the next, and no stage can be bypassed without the bypass itself being recorded as an exception.

The process begins with an appointment request, submitted by the host employee through the web portal. The request captures visitor identity details, purpose of visit, expected duration, and the specific areas of the campus the visitor will need to access. The request routes through a configurable approval workflow — typically the host's direct manager for standard visits, and a security officer for visits involving restricted areas. The visitor receives an SMS notification containing their appointment ID once approved. This ID is what they present at the security gate.

At the gate, the check-in process is structured. The visitor presents their appointment ID and a valid photo ID. The security officer verifies the ID, captures a photograph of the visitor in the system, and issues an active RFID card. The photograph is linked to the visitor record — it appears on any subsequent access event for that card, allowing guards at internal checkpoints to verify that the person presenting the card is the person the card was issued to. The RFID card issued to the visitor is not a passive barcode card. It is an active RFID tag, capable of being read by readers distributed across the campus without requiring the visitor to actively present the card. The visitor's location is updated continuously as they move through zones equipped with readers.

500+ Daily visitors tracked
Zero Unescorted restricted-zone access
Real-time Location accuracy across campus

Access control integration: the critical link

Visitor tracking without access control integration is an observation system, not a security system. Knowing where a visitor is does not prevent them from going somewhere they should not be. The system is integrated directly with the campus access control infrastructure — door readers, electronic locks, and turnstiles — so that the visitor's RFID card physically grants or denies access based on their approved appointment parameters.

When an appointment is approved, the system automatically calculates which access points the visitor requires permission for. A visitor coming to meet procurement in the administrative block gets access to the admin gate turnstile and the relevant floor's door reader. A service engineer coming to work on equipment in Building 7 gets access to the industrial gate, the relevant building entrance, and the specific zone where the equipment is located — and nothing else. This is not a manual configuration exercise at the time of the visit. The appointment details drive the access rule generation automatically.

Two automated enforcement mechanisms handle the temporal dimension. First, access is granted only within the approved visit window. A visitor approved for a 10:00–14:00 visit cannot use their card to enter a controlled area at 15:30 even if they are still on campus. Second, overstay detection runs continuously. If a visitor's card has not been presented at the exit reader within a configurable grace period after their appointment window closes, the security control room receives an alert. The alert identifies the visitor, their last known location, and the name of their host employee. The security team can respond with a targeted inquiry rather than a general campus sweep.

The emergency accountability problem — who is on campus right now — is answered in real time. The system maintains a live list of all active visitors, their current zone, and their host employee. In an evacuation, this list is available to security and emergency response coordinators immediately, without any manual compilation.

Results: visibility, compliance, and audit trail

The most significant operational outcome is the elimination of the visibility gap inside the campus. Previously, security knew when a visitor entered and — if procedures were followed — when they left. What happened in between was invisible. Now, visitor movement across the campus is tracked continuously. The security operations centre has a live view of all visitors on campus, their current zone, and how long they have been there. The shift from a register-based system to a real-time location system is not an incremental improvement — it is a fundamentally different operational posture.

Unauthorised zone access ceased to be a detection problem and became a prevention problem. The access control integration means that a visitor without a valid appointment for a restricted zone cannot physically enter that zone. The door will not open. This is categorically different from a system where a visitor could potentially enter a restricted area and be detected after the fact. The prevention is structural, not procedural.

For the security team, the audit trail capability transformed how post-incident reviews are conducted. When an incident occurs — a missing tool, a damaged piece of equipment, a safety concern — the visitor movement log provides a complete, timestamped record of which visitors were in which zones and when. This record is admissible, comprehensive, and produced without any special investigation. It is simply the byproduct of normal system operation.

Pre-visit workflow benefits were also substantial. The host employee notification via SMS — before the visitor arrives — reduced gate delays considerably. Visitors arrive knowing their appointment ID. Security officers verify against the system record rather than making phone calls to locate the host employee. Average gate processing time dropped from several minutes to under a minute for pre-registered visitors. The operational load on the security desk during peak arrival times — typically 9:00–10:30 for visitor-heavy facilities — reduced noticeably as a result.

Ready to see it in action?

Get started today. No credit card required.

Get Started Book a Demo