Visitor Management
Read more about Visitor Management
Lend & Lease Management
Read more about Lend & Lease Management
Mailroom Management
Read more about Mailroom Management
Because compliance, adherence to ISO standards, safety, and documentation are of the utmost importance.
July 9, 2025
Every day, external personnel access and egress critical areas within utility enterprises, often without prior acknowledgment of security regulations and policies. Concurrently, the organization's visibility into external actors on-site is inadequate. This operational reality positions visitor registration as a pivotal security layer within utility enterprises.
Utility companies operate some of society’s most critical functions - energy, water, heating, and waste management.
Operations depend on a constant flow of external parties, including contractors, technicians, consultants, suppliers, and government agencies.
This means one thing: People without permanent access move in and out of production areas, technical rooms, and other critical facilities on a daily basis. These are areas that typically have unmanned entry and exit points.
This places high demands on oversight and control.
Visitor registration therefore not merely an administrative formality. It is a key security measure and a concrete part of the effort to comply with the CER and NIS2 directives.
Every utility company should be able to answer the following at any time:
BmyGuest Visitor Management is designed to answer all three questions - quickly, with a paper trail, and without creating extra work.
In many industries, visitors are synonymous with meeting participants. That is not the case in the utilities sector.
Here, visitor access is closely linked to work on technical facilities. This requires a solution capable of handling different visitor profiles.
Different types of guests require different levels of supervision, for example:
A digital solution centralizes all data into a single log, thereby documenting that the organization actively governs visitor access, rather than merely recording their names.
Many organizations have their employees under control, while visitors are often an overlooked blind spot in security efforts.
Especially when registration is done via:
The result is a lack of clarity and gaps in the documentation.
When a problem arises, the question is often: “Which external person had access to the control room on November 15 at 2:30 p.m.?”
If the answer requires manual investigation or cannot be found, you face a real security and compliance risk.
In a world of increasing regulatory requirements, it is important to have processes and documentation in place. Responsibility and ownership typically lie with the IT or security department, and the documentation must be:
A modern solution like BmyGuest Visitor Management offers:
This is the type of documentation that authorities expect to see during audits, incidents, and investigations.
Modern visitor registration is not merely about names and timestamps. It is about documented accountability.
Before being granted access, visitors must digitally confirm that they have understood and agree to, e.g.:
This provides both legal documentation and fosters a clear safety culture in which responsibilities are clearly defined - before the door is opened.
Visitor registration achieves its full potential when seamlessly integrated into the organization's comprehensive security framework.
BmyGuest Visitor Management is designed for integration, not to create new silos, and supports, among other things:
The result is straightforward: A system that enhances your existing capabilities.
When registration is directly linked to access control, it ensures that visitors only move within the zones they are authorized to enter.
A repair technician is not allowed access to the executive corridor. An auditor is not allowed access to technical areas.
Modern visitor registration solutions are much more than just a digital logbook.
They play an active role in physical security and support, among other things:
Visitor registration the most complex IT system in a utility company’s IT arsenal. But it is often the first - and most important - checkpoint when outsiders enter the organization.
When properly implemented, it generates value across the organization while ensuring the company manages visitors in compliance with GDPR, NIS2, and CER directives:
In an industry where security is non-negotiable, access control is not just a nice-to-have.
It’s a requirement. And that’s exactly what BmyGuest is designed to address.
We will get back to you as soon as possible.
We use cookies and similar technologies to ensure the functionality of the website, improve the user experience, compile statistics, and for marketing purposes. You can read more about how we use cookies and similar technologies, as well as how we process your personal data, in our cookie policy.
If you have any questions about our data processing or your rights, you are always welcome to contact our Data Protection Officer.
Service
BmyGuest Cookie Information
Privacy Policy
See privacy policy
Name
BMGCookieConsent
Purpose
Records and documents the user's consent choices in accordance with applicable data protection and ePrivacy regulations.
Expiration
Up to 12 months
Cloudflare (security and bot protection)
radar_sn_shradar_sn_sgradar_sn_rsradar_sn_pedradar_sn_de
Protects the website from automated abuse, bot traffic, and unauthorized attacks.
Session or short-term storage
Weglot
WG_CHOOSE_ORIGINALweglot_allow_private
Saves the user's language selection and ensures correct display of translated or original content.
WordPress (consent management)
wp_consent_functionalwp_consent_marketingwp_consent_preferenceswp_consent_statisticswp_consent_statistics-anonymous
Saves the user's choices regarding cookie categories and controls which scripts may be activated.
WordPress (login & security)
wordpress_logged_in_*wordpress_sec_*wordpress_test_cookie
Handles login, session management, and protects against unauthorized access.
Session lasting approx. 14 days
WordPress (administration)
wp-settings-*wp-settings-time-*
Stores backend settings such as layout and display options.
Up to 1 year
Mouseflow
mf_usermf_*
Analyzes user behavior such as clicks, scrolling, and navigation.
Google Analytics (Google LLC)
_ga_ga_EQDN3BWDSD_ga_BCZ3DEJXBW
Collects statistical information about the use of the website.
Up to 24 months
Google
g_state
Handles session state in connection with Google integrations.
Up to 6 months
LinkedIn (LinkedIn Corporation)
bcookieli_gclidc
Supports LinkedIn Insight Tag and campaign measurement.
1 day to 12 months depending on the cookie
Snitcher
snitcher_device_idsnitcher_device_id_expiressnitcher_sessionsnitcher_session_expires
Identifies and analyzes company visits and user journeys.
Session up to 12 months depending on cookie
What is a cookie?
A cookie is a small text file that is stored on your computer, tablet, or mobile phone when you visit a website. Cookies are widely used to make websites work, improve the user experience, and provide the website owner with information about how the site is used. A cookie is not a program and cannot contain viruses or other malicious code.
Use of cookies on the website
We use cookies to ensure that the website functions correctly and to improve your user experience. Cookies can be used, among other things, to remember your choices, such as language settings, consent choices, and technical preferences.
In addition, we use statistical cookies to analyze how the website is used, so that we can optimize its functionality, structure, and content. In some cases, cookies are also used for business-related communication and campaign measurement.
You can see a detailed overview of the cookies we use, including their purpose and expiration time, under the categories: Necessary, Functional, Statistical, and Marketing.
How long are cookies stored?
How long a cookie is stored on your device depends on the individual cookie. Some cookies are automatically deleted when you close your browser (session cookies), while others are stored for a longer period of time.
The lifetime of each cookie is specified in our cookie overview. The storage period is calculated from your most recent visit to the website.
How to reject or delete cookies
You can change or withdraw your consent at any time by clicking on the cookie icon or the link at the bottom of the website.
You can also block or delete cookies via your browser settings. Please note, however, that if you reject necessary cookies, certain features on the website may not function properly.
If you wish to opt out of Google Analytics specifically, you can do so here: Opt out of Google Analytics
How to delete cookies in your browser
Cookies that you have previously accepted can be deleted via your browser settings. The procedure depends on which browser and device you are using.
Changing your consent
You can change or withdraw your consent at any time by reopening the cookie settings via the link or icon at the bottom of the website.
Do you have any questions?
If you have any questions about our use of cookies or processing of personal data, please feel free to contact us at [email protected].