& App Marketplace.
Leverage visitor data, simplify your processes and configure workflows by connecting Sign In Enterprise with your technology ecosystem.
Automatically upload employees as hosts with Active Directory. Once connected, visitors can instantly notify the right people of their arrival.
Leverage Guest Connect to integrate Sign In Enterprise with Airtable, so that data can be added to or recalled from a spreadsheet. Use the power of Airtable as a middle layer to trigger actions, notifications and flows.
Leverage Guest Connect to integrate with BlueJay Denied Party Screening, by sending guest info to BluJay for screening and validation. Based on the outcome, BluJay sends the notifications, updating 3rd party native watchlist status.
Find the right space for your workday with Sign In Enterprise's visitor management system and Condeco’s workplace scheduling software.
Leverage Guest Connect to integrate with Cisco ISE to enable Sign In Enterprise visitor or employee info to be sent to ISE. Wifi credentials are created and then returned to the iPad and the Sign In Enterprise platform.
Integrate with your DocuSign account and capture a visitor’s e-signature on legal documents as part of the sign-in process.
Leverage Guest Connect to integrate Sign In Enterprise with FedCheck, reduce risk and ensure compliance by running an instant background check with nothing more than a quick scan of an ID.
Reduce risk and ensure compliance by screening visitors against lists of individuals affiliated with money laundering and terrorist financing activity.
Gallagher's integrated access control, intruder alarm, and perimeter security solutions is a flexible access control system for site management that meets security and business requirements. Efficiently and reliably manage multiple access points to control risk, improve efficiency and ensure business continuity.
Manage and store completed visitor documents in Google Drive. Easily access files whenever you need them.
Screen your customers and suppliers against 350+ global lists for restricted persons, embargoed countries, and companies that are owned by these denied entities.
Leverage Guest Connect to integrate with Sign In Enterprise, verifying the grade of a contractor and notifying a member of the team if the contractor is not allowed to work. ** Requires AirTable for Notifications.
ISONAS offers a wide range of access control technology and solutions, including keypads, keycard readers and wireless access. ISONAS delivers a proven access control solution that eliminates the need for cumbersome control panels at each access point.
Scan visitors against the free consolidated screening lists by the International Trade Administration (ITA).
Automatically upload employees as hosts with Okta. Once connected, visitors can instantly notify the right people of their arrival.
Openpath is a keyless door access control system that is smarter and an easier cloud-based mobile solution. The door access system is touchless, with integrated badges, smartphone capabilities, and keycards that are reliable, scalable, and flexible to meet your growing business needs.
Use Microsoft Power Automate to automate tasks using events and triggers in Sign In Enterprise with other Flow connector applications.
*Requires Office 365 subscription
Integrate with Proxy’s digital identity platform to create fully touchless lobby experience, enabling people to use their smartphones and wearables as their IDs and Visitor Passes and enjoy zero-touch access to buildings and check-ins.
Automatically upload employees as hosts with SAML 2.0. Once connected, visitors can instantly notify the right people of their arrival.
Deliver visitor arrival notifications directly to your employees using Slack.
Leverage Guest Connect to activate Philips Hue, Nanoleaf, Lifx lights based on watchlist or visitor data.
ThreatSwitch delivers a secure, easy-to-use security compliance platform for CUI, CFR, and NIST by centralizing relevant information, facilitating clear recordkeeping and categorization, managing required training, automating key workflows, and providing the documentation and analytics required to execute, monitor, and assess your Security program.