Military and Governement

Military and Government

Military and Government facilities have specific requirements for determining fitness for access.  Vetting requirements for the military do differ from those of federal and state government agencies.  These requirements are also constantly evolving. However, there are more similarities than non-governmental organizations.

Banking and Finance

In order to safeguard against money laundering and other financial crimes banks and financial institutions are required to screen individuals and business entities against OFAC and other watchlists as part of a Risk Mitigation Plan. the Enterprise Sanction Investigator provides tools to automate this process.

Critical Infrastructure

Critical Infrastrucure

Securing critical infrastructure in the private sector brings specific challenges.  This can include energy generation and transmission, Aerospace, or hi-tech manufacturing. Properly vetting individuals can increase workplace safety and public safety. Ensures compliance with ITAR, AM&E, and OFAC regulations.


Essential to any facility security plan is to fully understand what makes an individual fit for access, authorized personnel must have the ability to screen people and determine if they are suitable for admission.  There are industry-specific requirements when considering who is approved to enter a facility.  TARGE offers custom configurations for industry and site-specific vetting requirements.  Below are general screening and vetting features included with a TargeVisitor subscription. xxxxx


Relentless Verification is paramount to an effective security solution. TARGE is offering that solution. Watchlist Investigator is a proprietary vetting engine that can be used as an integrated module of the TargeVisitor Visitor Management System or as a stand-alone SaaS application.  TARGE provides the proper tools for an organization to vet visitors, contractors, and employees that will ensure the use of best practices while complying with an organization’s security rules.

The Watchlist Investigator is a TARGE-developed software system that provides a superior authentication and validation process by downloading and merging several published watchlists into a common format.

The Watchlist Investigator eliminates the time-consuming process of screening and vetting each visitor through a series of name and background checks. Through an automated process, the Watchlist Aggregator enables the rapid vetting of every single visitor as soon as a name is submitted for approval.

Below are other methods of verification incorporated into the TargeVisitor Visitor Management System to enable thorough screening vetting of each person entering a facility.


An effective visitor screening process gives security personnel the information and tools needed to ensure the identity of all visitors.  TargeVisitor provides options to authenticated photos on driver’s licenses and passports. It is easy to capture a photo from a driver’s license and passport and upload that photo into the TargeVisitor Visitor Management System.  This process also makes it easier to compare the photo on the credential to the visitor, by displaying the photo in a larger format. If the credential does not match the current style or look of the visitor, TargeVisitor can easily capture a current photo to use in the organization’s database.  This ensures that an organization has the most up-to-date information on each visitor.


The purpose of a local Barrment Roster is to enable security personnel to prevent individuals from entering any location. People may be barred perpetually or for a limited time. The Barrment Roster permits a person to be barred that does not otherwise have negative information in any data source. The Barrment Roster allows for the reason for the barrment to be entered. Any denial of entry caused by an entry in the Barrment Roster may be overridden by a security manager with the proper authority.

TargeVisitor includes a local Barrment Roster.  This enables security personnel to build a list of all persons to be barred from some or all access privileges.  Customers can configure status fields to indicate the level of restriction applied. When a person is barred, no pass or badge can be issued to the person.  This applies to all gates and all locations. This prevents those who pose a risk from slipping in past guards that might not otherwise be aware. When this feature is paired with TargeMobile, our handheld option, guards can check a person’s status at any time from anywhere on an installation or facility.


ID card verification

After spending the time and effort to screen and approve potential visitors and badge holders security personnel want to ensure that the person who shows up is the person they claim to be. It is problematic to determine the authenticity of identification cards only by a visual inspection. Document Authenticators prevent the use of forged identification cards. Document Authenticators check credentials against the most current library of templates to ensure the ID is authentic and has not been forged or altered in any way.

Authenticators use three different forms of light to determine the ID’s authenticity (This includes checking the expiration date on the ID).

  • Ultra Violet
  • White
  • Infra-Red

Information from the ID can be extracted and uploaded onto the system automatically (photo, information, and signature).  If the ID fails the scan, a warning flag will pop-up to inform the security guard that the ID presented is a forgery. Document Authenticators can improve security by saving an organization time, money, and eases the resources on security personnel to have the authentication process automated.  Contact TARGE to discuss available ID libraries available for your organization.


NCIC-III data is only available to trained law enforcement officers and investigators with an ORI.  The MAX NCIC bridge forms an interface between MAX and the FBI’s National Crime Information Center.  

TARGE’s proprietary NCIC bridge is the first system that allows non-law enforcement officers the ability to easily and economically screen each visitor or vehicle against NCIC without viewing actual data.

The NCIC bridge is an added technology to MAX vetting and visitor management system.  Visitor data becomes an active asset by giving administrators access to queries and custom reports.

  • Visitors in a hallway of a large office buildingFully integrates with MAX –
  • Usable only by non-law enforcement officers
  • Automates background checks on all processed visitors
  • Enables more effective use of law enforcement resources
  • Checks every processed visitor
  • Uses current NCIC data
  • Allows for focused investigation efforts

TARGE is able to provide a solution that enables organizations required to complete NCIC-III criminal history checks a method to automatically check 100% of visitors and credential holders before access is granted.

To learn more about how the NCIC bridge can help make an enterprise more secure please contact TARGE.


The Watchlist Investigator is a TARGE developed software system that provides a superior authentication and validation process by downloading and merging several published watchlists into a common format.

The Watchlist Investigator eliminates the time-consuming process of vetting each visitor through a series of background checks. Through an automated process, the Watchlist Aggregator allows for rapid vetting of every single visitor as soon as a name is submitted for approval.


Completing a criminal history background check used to a tedious and time-consuming task.  

Organizations often have trouble keeping track of which visitors’ badge and pass holders need a credential and criminal recheck.  Now with TargeVisitor it is no longer an inconvenience to security personnel.

TargeVisitor can be configured to recheck every person whenever an organizations security guideline dictates.  Need to check contractors and visitors at every entry? Every month? Or even every night? TargeVisitor can automatically re-run a background check periodically and email alerts to security managers anytime a new record is found.  

Do not wait for visitors to self-report issues with their background validation.  TargeVisitor is the solution for your organization to be proactive in verifying all guests are properly and currently vetted.  Please contact TARGE to find out how TargeVisitor can keep your organization secure with credential rechecks.


Vetting can also come in another form of checking a vehicle history by capturing the license plate number and state of issue using a License Plate Recognition camera (LPR).  This is sometimes paired with an under-vehicle scanner when security requires a more thorough inspection. While vehicle information can be manually entered into MAX at the time of arrival, the option to automatically read a plate adds an extra level security for both manned and unmanned gates.  This eliminates user error and makes the task of data collection easier on guard staff.

When the vehicle information is collected the vehicle can be vetted against both internal and external data sources to determine if there is a potential risk associated with that vehicle.  The vehicle may have been associated with a crime and therefore would match a record on the vehicle of interest file. Possibly this vehicle was associated with an incident on site and security needs to be alerted of the driver’s return.  There are many reasons a vehicle’s information may be needed to solicit an alert in MAX.

LPR cameras may be placed at various locations around a facility not just at gates.  In some cases, repeatedly passing a specific place may be cause for alarm. Perhaps placing LPR cameras at the start of entrance roads will give security enough time to respond to an alert before the vehicle arrives at the visitor center.  Please contact us and a representative will be happy to discuss how utilizing LPR technology will benefit your installation.

Have a Question?

For more information about the services offered through TARGE please click the contact us button

Click to Call