essentry platform - a single source for the entire cycle of visitor operations.
With our three modules, you can fully automate your visitor management. We have bundled all services conveniently and centrally for you in just one place, our essentry platform.
Visitor Manager
The essentry Visitor Manager helps you orchestrate each visit from a single source, starting with the invitation and ending with the check-out. It helps you maintain control over your site at all times and allows you to fit essentry to your needs.
Self check-in and check-out
Intuitive check-in process enables fast and easy self check-in and check-out of your guest.
Customization
Use the Visitor Manager to tailor essentry precisely to your needs. Design individual check-in and compliance workflows.

Compliance Manager
Comply with regulatory and data privacy standards at all times. Build compliance workflows and ensure granular roles and permission classifications.
Privacy settings
Our features enable our customers to maintain a highly efficient visitor management system while complying with GDPR-standards.
Audit settings
essentry offers specific features that help you to create audit trails and be prepared for compliance or insurance-related requests.

Integration Manager
Let us support you to fully integrate essentry into your existing processes and IT systems – from access control systems and active directories to the appropriate notification software.

System Security
Platform Security
essentry is built on best-in-class cloud services. These services are configured by cloud experts, which ensures an extremely high level of security and minimizes the risk of configuration errors.
Platform Architecture
Highly secure, enterprise-grade infrastructure
Enterprise-grade infrastructure.
essentry is ISO 27001 certified on the basis of BSI IT-Grundschutz (BSI-IGZ-0459-2021).
essentry servers are hosted in SOC 2 Type II and ISO 27001 certified facilities in the Frankfurt (Germany) region.
Our data center facilities are secured with a perimeter of multi-level security zones, 24/7 manned security forces and CCTV video surveillance. They are secured by multi-factor identification with biometric access control, physical locks and alarm systems in case of security breaches.
High availability.
essentry offers a highly available service. Should an incident occur, we have comprehensive incident response and customer notification procedures in place. We have a 24/7 service center and offer an onsite service for hardware-related issues with a 24x7x4 hour availability.
Data encryption.
The communication between the user and the essentry servers is encrypted according to industry best practices: HTTPS and Transport Layer Security (TLS) over public networks. Qualys’ SSL labs have rated our servers Level A+. In addition, when using our Windows kiosk, the total network traffic is routed via our IPSec VPN. The hard drives of all servers are encrypted according to AES-256.
Third-party penetration testing.
In addition to our extensive internal scanning and testing program, penetration tests are performed by selected service providers. essentry contracts third-party security experts to conduct a thorough annual penetration test for the entire essentry service offering.
Privacy-by-Design
Compliance standards
At essentry, data privacy is a priority. We value our customers’ trust and will ensure their visitor data is protected. We demonstrate our commitment to privacy preservation in both our processes and technical application design. We pursue a systematic privacy-by-design strategy.
Established and often manual processes
Insufficient verification of the identity document (ID)
Typically, humans are not able to verify IDs from all different countries and check whether the ID contains all the important security features. Additionally, it is not a welcoming user experience to have to hand over one’s own identity card to another person for verification purposes.
Manual face match
The human eye performing face matches has proven to be significantly more error-prone than face matches conducted by computer-based algorithms.
Manual data processing and non-transparent retention policies
Typically, visitor data is stored and shared in multiple systems or paper logbooks, to which multiple people have access. Retention and deletion policies of these systems are often neither transparent nor are they enforced.
Non-transparent privacy policy and user consent
If displayed at all, privacy policies are typically only shown on paper (small font and/or back of page) and user consent is not centrally stored and, as a result, is not retraceable (e.g., for audits).
What essentry does
Verification of the identity document (ID) locally
The essentry kiosk verifies the ID by taking images of the document, using three different light sources to check if the document has all security features. The images are immediately deleted after the verification.
1:1 face match
essentry matches the person’s photo on the ID with the photo of the person in front of the kiosk only. To achieve this match with the highest accuracy, we rely on enterprise-grade algorithms.
Advanced privacy rights and transparent retention policies
essentry is tailored to its customers’ needs with advanced privacy rights that only allow designated people to have access to necessary information. essentry’s platform provides a transparent overview of the retention periods and deletion rules at all times.
Clear privacy policy and user consent
essentry clearly points its users to the customer-specific privacy policy on multiple occasions throughout the process. For example, the invitation email includes a link to the privacy policy and the terminal also asks for user consent before processing any sensitive data.
What essentry does not do
Verification of the identity document (ID) in the cloud
essentry never stores images of the full ID in its records – neither locally nor in the cloud. The verification of the ID only takes place locally. If required, only the person’s picture on the ID is matched with the picture of the person in front of the kiosk.
1:n facial recognition
essentry never matches a photo against a larger database to verify photos and identities.
Same privacy rights for everyone and infinite data retention
With essentry, limited access to necessary information is based on permissions and what designated individuals are allowed to see. essentry strictly follows GDPR data protection regulations, including transparent retention policies.
Processing sensitive data without given consent
essentry does not process sensitive data at any time prior to consent. Only after the user has accepted the privacy policy and given their consent, will we initiate the verification process.
How can we help you? If you have any questions, do not hesitate to reach out to us today.