Keep by Feenics offers many features to protect your employees and visitors when you return to work

Security practitioners tasked with transitioning their workforce back to the office are wrestling with new challenges. Keep provides a number of features to help prepare your facilities to deal with the covid pandemic and beyond.

User Contact Tracing and Proximity Reporting

Keep’s People Proximity reports allow you to identify individuals who may have been in contact with others who have been exposed to an infectious disease. With these reports, you can determine who was in the same area (and during specified time periods) as an exposed individual. From there, you can proactively inform your staff to take proper precautions. Filters are available to drill into individual rooms, areas, or time frames based on the movement of an exposed individual.

Occupancy Controls

Controlling area occupancy is a way to help enforce physical distancing requirements, capacity constraints, and other regulatory compliance mandates. Within Keep, there are multiple ways to influence occupancy requirements:

  1. Occupancy count implementation using area anti-passback: Keep allows areas (with “in” and “out” readers defined) to limit the number of people permitted within the area. Once full occupancy is reached, all entry access will be denied until others first exit the area and free up space. Keep’s reporting engine can show the current occupancy count as well as the identity of the occupying individuals. Real-time alerts will notify managers when an area has reached capacity.
  2. Reconfigure access privileges: With Keep, you can easily reconfigure access privileges to minimize traffic within a building or common area. Popular restructuring of access rights includes limiting access by time of day (shifts) or segmenting employee access based on days of the week.
  3. Reroute traffic from high-density areas: Re-routing traffic is another way to control occupancy using Keep. A typical use for re-routing people is to have multiple entry points, with each entry point assigned to a sub-group of the cardholder population who can gain access through that door.

Suspend Access Rights of Suspected, Exposed, and Close Contact Individuals

Keep allows for the rapid suspension of access privileges for exposed credential holders and/or those deemed at risk based on a People Proximity report, temporarily denying those individuals from accessing your facility.

Once an individual is deemed safe to return, their access rights can be easily restored.

Immediate Lockdown Functionality

As part of an effective containment strategy, Keep provides immediate lockdown capabilities of potentially contaminated areas. Once an exposed area is identified, it can be quickly locked down from Keep’s mobile app, web client, or Win App.

Once an area is deemed safe, it can easily be returned to operate in its normal configuration.

Remotely Onboard New Employees

A popular benefit offered by Keep is the ability to remotely onboard new employees, a benefit particularly important for those companies operating in a complete work-from-home or hybrid environment. Employee information required for the Keep access system can be imported from a human resource database, photos can be captured using hi-resolution mobile phone cameras, and access rights can be remotely assigned from a home office.

Touchless Access Control

Touchless access control is becoming increasingly popular for organizations looking to minimize contact surfaces and other common touchpoints. For this, Keep supports both Mobile Credentials and Touchless Entry Points.

Mobile Credentials: Mobile credentials streamline efficiencies from issuance to usage at the door and offer numerous benefits over their physical credential counterparts:

  1. Virtually no one forgets their phone or goes days without noticing they lost it.
  2. They provide touchless, more convenient access to entry points.
  3. Mobile credentials are more secure, particularly when paired with a phone’s multi-factor authentication.

Keep supports mobile credentials from popular vendors including Wavelynx, HID Origo, and Farpointe Conekt.

Touchless Entry Points: All the advanced safety protocols in the world will be for naught if everyone flows through a single door, each touching the handles and crash bars as they enter/exit. Keep supports high traffic entry/exit points outfitted with automatic door openers, PIR sensors, and touchless request to exits.

Temperature Monitoring / Fever Detection

Temperature monitoring is an important component of the security tech stack for those organizations that wish to create a “first line of defense” at the door.

Keep integrates with Invixium’s IXM Titan multi-purpose face recognition and fingerprint biometric reader. The reader supports mask detection and touchless face recognition while wearing a mask. In addition, the Titan reader can detect elevated body temperature when installed with its temperature enhancement kit.

When integrated, the Keep / Titan combination can enforce entry policies based on temperature readings.

Visitor Management

Keep’s Visitor Management module adds a critical layer of protection to a comprehensive security operation and offers a number of advantages to help you maximize your safe building environment:

  1. Touchless Check-in: Visitor check-in using mobile phones eliminates the need to interact with self-service kiosks or receptionists. With proper setup, visitors can self check-in, e-sign required attestation questionnaires or consent forms and use their mobile credential to access secure areas.
  2. Wellness Attestation: Electronic wellness attestation or other consent forms can be required prior to check-in with results stored in the system’s audit logs.
  3. Temperature Checks: Temperature readings can be recorded as part of the check-in process when using Invixium’s Titan readers at entry points. A visitor with an elevated temperature can be denied access with alerts sent to proper authorities.
  4. Visitor Tracking and Reporting: All visitor activity is stored in system audit logs. As such, visitors can be included in People Proximity reports if exposure to/from a visitor is suspected.