Inndoor KLS Sample Screens

Audit Trail

A comprehensive audit trail that records all operations performed on the system. This is useful for security management and can easily tracks any entry and exit of doors, records users cutting keys, tracks all financial transactions postings by users including guests checkin, checkout and room moves. All operations are also flagged with an audit state of either Stable or Attention.  A range of search criteria provides easy and flexible useful query of any operations that occur in the system. An audit trail  monitor screen allows security to monitor events at real time.

Click to enlarge

Device Status

The device status report displays current status of all devices that are used in the key locking system for easy management of the hotel security and doors control. Any physical hardware problems on the key locking system can be easily diagnosed and fixed.

Click to enlarge

Door Status

Provide a useful door status information of the network key locking system intended for technical support staff. Hardware or electrical wiring faults on doors or authorised doors openings can be easily detected, identified and rectified.

Click to enlarge

Access Map

With a powerful and flexible access map feature, staff and guest access to rooms, lifts and public rooms can be easily controlled.  Further access to paid facilities can be easily granted. Guest safety and security is further enhanced by Inndoor allowing continuous monitoring of the status of each room.

Click to enlarge

 Employee and Guest Access Security

Together with a powerful and flexible access map feature, the support for staff and security access to only authorized areas made Inndoor an attractive tool for hotel security management. Reported lost or stolen guest's belongings in guest room can be easily investigated with the audit trail of door activities to the guest room. Previous staff access to hotel doors can be easily disable once the staff is no longer in employment.

 

Click to enlarge

User Profile

The profile feature allows the user to customized menus for different users. This ensure that appropriate users can perform certain tasks on the system thus restricting unauthorized user from performing tasks that they are not trained or unauthorized.

Click to enlarge