Download PDF version Contact company

CheckPoint Tours is the latest service from the Connect ONE by Connected Technologies cloud-hosted integrated security management platform that bundles Intrusion, Access Control, Video Surveillance, Energy Management and Critical Environmental Monitoring in one single user interface.

ScanPass Mobile Credential

CheckPoint Tours tracks and documents activities and tasks required at the protected premises. It works with conventional access control readers or ScanPass Mobile Credential to track activities by guards or other personnel required to perform tasks at specific times and locations.

As the user scans/swipes each checkpoint their access is logged and can be reviewed. Multiple checkpoints can be added economically by using only ScanPass barcode stickers in place of card readers and additional hardware. CheckPoint Tours is another valuable service that provides real-time recordkeeping that security guards have completed their rounds or employees have performed required routines.

Download PDF version Download PDF version

In case you missed it

Proactive security: the future of perimeter defence
Proactive security: the future of perimeter defence

The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. W...

What are the benefits, and drawbacks, of AI in security?
What are the benefits, and drawbacks, of AI in security?

Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthrou...

ASSA ABLOY solution: Digital cabinet locks help Helsinki Airport to improve regulatory compliance and passenger safety
ASSA ABLOY solution: Digital cabinet locks help Helsinki Airport to improve regulatory compliance and passenger safety

Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is...