MAX objective

Security word cloud

The objective of MAX is to protect people and assets while meeting security protocols. MAX uses information gathered through vetting each person to help make an organization safer. Protecting the perimeter doesn’t help if you let the bad guys in through the front door. Relentless Verification with maximum efficiency.

KEY AREAS THAT SET OUR PRODUCTS APART:

Reliability

Reliability of a visitor management system can be a major concern. TARGE has been able to develop easy to use, reliable, and stable systems. MAX is capable of handling a large amount of data quickly and efficiently.

MAX has an average uptime that better than 99.97% (that equates to being off-line about 15 minutes a year.)  Some Customers have had MAX running for over 10 years without an unplanned system outage.

TARGE understands the importance of reliability, uptime, and ease of use.  It is important that your visitor management and your facilities security can be safe, secure, and available 24/7/365.

Scalability

MAX is designed to support a single site location or multiple site locations, commonly referred to as ‘Enterprise Wide.’  An enterprise system can connect and support any number of facilities anywhere in the world.  MAX was created for use by any number of locations and any number of users.

Single Sites configuration of MAX enables one facility to easily manage visitor and credential data for multiple departments or divisions within the organization.

The MAX platform has a proven history of high performance when installed and configured to operate across large and geographically diverse enterprises, which sets it apart from other systems available on the market today.  Unlike other Visitor Management Systems, MAX was initially designed and built to service entire enterprises with 100’s or 1,000’s of users and at 100’s of geographic locations. MAX provides a more well-rounded solution that gives our clients the ability to deploy optional components in the future.

Configuring the system for an enterprise magnifies the effectiveness of a security team exponentially.  The changes made to a single site may be implemented enterprise-wide. These changes take into account, and recognize, specific authority in accordance with your business hierarchy. Some people may be given roles for only a single site while some may be given roles for multiple sites.  A few are given roles for the whole enterprise.

Data can be managed and shared throughout the whole organization at the speed of light, foregoing the need to wait for reports from remote locations. Also, the watchlist is instantly updated.  A person is instantly flagged at all entrances and at all locations.  When a contractor has staff that works at one location and they need to move to another, their ID can be quickly updated without delaying productivity.

The system can be integrated with physical access control systems (PACS) so security is seamless as staff enters and leaves each restricted area. MAX creates one system of record.  The benefit is that the data will be maintained in a single system.  If temporary access cards are managed through MAX for enrollment, the same web-based feature set that is available for visitor and contractor badges is available for access badges.  Once the credential has been approved and issued, the information is then sent seamlessly to the facility PACS.

VVMS has designed an ACS (Access Control System) hub that can be added to the MAX subscription.  With this MAX, can communicate with a variety of PACS systems.  This is especially useful for an enterprise that might have different access systems or hardware depending on the location.  Different and large amount of locations that might make it cost probative to change or local leadership has authority to choose what PACS best fits that location’s specific needs, whatever the reason a single MAX System can be configured to work with one or several types of PACS.

Flexibility

MAX does not require modifications to run on a variety of devices.  Therefore, the MAX software and hardware has a high level of compatibility across most systems.

There is a need for hardware-agnostic solutions because of the extensive variety of hardware devices and increasing IT consumerism.  Hardware agnostic is beneficial for cloud computing and storage systems, as some storage systems are moving towards hardware agnostic information architecture for efficiency.

Over the years TARGE has learned that no two facilities have exactly the same security needs.  Even within the same branch of the military, there are slight differences in how policies are enforced based on the differences in the specific mission.

Physical security requirements are going to vary, so shouldn’t you expect the solution to vary?  For this reason, TARGE has avoided creating any solution that requires proprietary hardware.  Our experts have tested a wide range of devices that can augment your existing practices. These could include touch screen computers, scanners, cameras, biometric devices, handheld devices, and customized kiosks.  The system has been deployed with computer, kiosk, mobile phone, and other hardware configurations.

The TARGE approach will ensure that the MAX Visitor Management System can meet all the specific requirements requested by a customer. MAX is highly configurable and it should be able to be fully integrated with any information or future enhancements that a customer may require. Please contact TARGE to discuss a visitor management solution that is appropriate for your organization.

You can license the software only or the software with the associated hardware.  The system can be licensed in two ways:

  1. Annual Renewable License-  This is the required license for an on-premise installation.  This model requires all add-ons and customized features to be paid at the beginning and a lower annual fee is assessed for system maintenance and updates.
  2. Software as a Service (SaaS)-  SaaS licensing enables organizations to have a lower levelized cost over time.

TARGE works with the wants and needs of its clients.

Manageability

MAX was originally created to be installed to run on an internal secure network.  All TARGE systems are certified for the federal government when choosing Internal Hosting. The MAX System is connectable through the use of web-based services.  This makes it possible to see the same information at any facility located anywhere around the world that is connected to the network. An advantage to being web-based is the ability to add facilities with little effort.  MAX allows additional web-based applications to added to its web menu system. Access Anywhere: Capable of managing personnel and visitor information from any computer connected to the facility network and the right credentials of the user.

Although, MAX was originally created to be installed to run over a secure network, the affordability of Cloud Solutions has made visitor and credential management practical to all types of businesses.  There are countless incentives to migrate systems to the cloud. Now that secure cloud environments are so much more affordable, MAX in the cloud has become is a great secure way to lower the price of a visitor management system. A cloud solution is making secure access to visitor data practically unlimited.

The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. TARGE’s FedRAMP Compliant cloud meets all the requirements and can be used at a lower cost than an on-premise system.

Cloud environments are secure and meet all Risk Management Framework (RMF) requirements.  Cloud hosting meets the highest federal government standards (i.e. FISMA for civilian, DIACAP for the military, or the new federal government-wide Risk Management Framework known as RMF).

System integration streamlines workflows and improves security.  For example, the vetting modules can be used to:

  • Verify that a person is presenting a valid ID (e.g. checking a driver’s license with white, infrared and ultraviolet lights to assure it has not been tampered with).
  • Perform background checks on new employees, contractors, visitors, and others.
  • Schedule to have background checks redone on a set schedule.
  • Alert appropriate managers whenever there has been a change in someone’s background record.
  • Provide an audit trail of background checks.

Similarly, the badging modules can be used to:

  • Generate an ID
    • The ID can contain biometrics including pictures and other Personally Identifiable Information (PII) (e.g. fingerprints, iris scans, etc.).
    • The ID can limit access to particular areas in a particular facility or authorize access across facilities.
    • The ID can designate if the holder can authorize visitors, escort visitors, etc.
    • The ID can have a secure overlay for additional security.

In addition to a number of canned reports, the end-user may define custom reports using the ReportBuilder tool that is delivered with the system.  All of the data may be exported as a CSV file for use in other applications. All of this can be done without the intervention of TARGE.

Common reporting includes:

  • Numbers of badges issued to individuals (e.g. employees, contractors, visitors, etc.);
  • Numbers by facility, if there is more than one;
  • Number and reasons individuals were denied access;
  • When and how long badges have been in use;
  • When each person entered and exited the facility and any relevant restricted areas;
  • Numbers and lists of individuals with access to each restricted area; and
  • Audit attestation.

TARGE will configure all of the canned reports required by the customer.  Additionally, the MAX system includes a ReportBuilder that will allow the customer to build its own custom reports without the intervention of TARGE.  End-user support will be able to assist with building custom reports using ReportBuilder if necessary.

All data is the property of the customer.  The customer may access this data at any time.  All data is stored is a single database that is designed to facilitate management reporting.

Security

the word security with computer code in the backgroundAll  data is AES-256 encrypted – the same encryption used by the defense and Intelligence Services (i.e. the federal government AES 256 standard).

All data is encrypted in transit (as it moves across the network, and while it is at rest (residing in the database).  The data is encrypted to the AES-256, which is adequate for “top-secret” information used by the Department of Defense.  The application has been awarded accreditation at the DIACAP level by the Department of Defense which is defined by NIST SP-800 Rev 3.  The system was tested on approximately 800 different security points. A copy of the Authority to Operate granted by the DoD is available on request by U.S. military personnel.

MAX is very secure as it adheres to the NIST SP 800-53 Rev 3 publication.  MAX had to pass approximately 800 different security requirements in order to earn its DIACAP certification, which it has done a number of times.  MAX protects data at the same encryption level as does the Department of Defense for “Top Secret” information. Data is protected both while at rest and in transit across the network.

Have a Question?

For more information about the services offered through Visitor Vetting and Management Systems please click the contact us button

Call Now ButtonClick to Call