/ Case Study
High security industry
It's not just tense geopolitical conditions that are forcing us to increase security. There have always been industries in which transparency is a no-go - even familiar faces are put through their paces on a daily basis. The best example, alongside pharmaceuticals and the security industry, is the defence industry. And precisely because this industry harbours such highly sensitive data, nothing works here without strict rules.
High security industry
Security industry
Defence industry
Government and administration
Energy and critical infrastructure
Research and development
Pharmaceutical industry
Initial situation
- Time-consuming registration of external persons due to safety regulations and the need to establish their identity.
- Audit regulations must be fulfilled and verified.
- Security incidents: sabotage and outflow of company expertise.
- Manual comparison with sanctions lists takes a lot of time and is prone to errors.
- Fines or prison sentences are possible if there are no controls and documentation in place.
- Human risk factor: Security risk due to human error and social engineering.
Objective
- Against this background, the registration of these visitors is time-consuming and must follow fixed rules.
- The identity of a visitor must be established with 100% certainty in order to protect people and material in high-security areas.
- In addition, those responsible need a quick and reliable overview of whether a visitor is on a sanctions list.
- Only checks and documentation can provide the necessary legal certainty for inspectors and therefore companies and prevent fines or custodial sentences.
Problem solving
- Each visit follows an automated approval workflow that begins with the registration.
- The intensity/individuality of the authorisation workflow is tailored to each company.
- Every access application is automatically linked to the submission of documents to verify identity.
- Which documents these are can be defined by the customer and are communicated to the visitor via an automated invitation.
- Access is only granted once all documents have been technically checked for authenticity.
- The recorded data is simultaneously transferred to a sanctions list system, where it is also checked.
- After a successful check and completion of the approval workflow, personalised access documents are generated.
- If a visitor/country of origin is on a sanctions list, a warning is issued.
- The entire process is archived in an audit-proof manner.
Customer benefits
Areas and buildings can be individually and zonally secured against unauthorised access. Access is only granted to those who are not on a sanctions list and who have gone through the entire authorisation workflow defined for this zone, including an identity check. The security standard is thus massively increased and guaranteed. All data (authoriser, visitor identity, location and time of stay including movement patterns) is archived. Process times and costs are reduced; customer experience shows that up to 80% of the required logon time can be saved.
Do you have similar challenges and would like us to advise you?
Contact us for a consultation with an expert.