Screen Every Visitor.
Before They Enter.
Real-time screening against sex offender registries, custom watchlists, and BOLO lists. Flagged visitors are stopped at the door — not after they're inside.
Real-time screening · Under 2 seconds · Configurable workflows
Screening Sources
Multi-Layer Background Screening
Four levels of screening run simultaneously during every check-in.
National Sex Offender Registry
Every visitor is screened against the National Sex Offender Public Website (NSOPW) database, which aggregates data from all 50 states, DC, and US territories. Flagged matches trigger instant alerts before entry is granted.
Required by law for schools in many states. Essential for any facility with minors present.
Custom BOLO / Watchlists
Create your own Be On the Lookout lists for banned visitors, terminated employees, restraining order subjects, or any individual your organization wants flagged. Unlimited entries with notes and reason codes.
Commonly used by healthcare facilities for patient safety and by corporate offices for terminated employee tracking.
Global Watchlist Screening
Screen visitors against international sanctions lists, denied persons lists, and government watchlists. Essential for organizations with ITAR, EAR, or C-TPAT compliance requirements.
Defense contractors, aerospace companies, and logistics firms use this for export control compliance.
Custom Database Integration
Connect your own databases via API for organization-specific screening. Screen against internal HR records, vendor blacklists, or industry-specific registries.
Healthcare organizations screen against OIG exclusion lists. Financial firms screen against OFAC SDN lists.
Response Workflows
You Decide What Happens Next
Configure different responses for different screening sources. One size doesn't fit all.
Instant Deny
Visitor is matched on a screening list → entry is automatically denied → front desk is alerted → visitor sees a generic "please see the front desk" message (no indication of why).
Best for: Sex offender registry matches for schools and facilities with children.
Alert & Review
Visitor is matched on a screening list → front desk/security receives an alert with match details → staff reviews the match and decides to approve or deny → visitor waits.
Best for: Custom BOLO lists where matches may need human judgment (e.g., common names).
Log & Allow
Visitor is matched on a screening list → match is logged for audit purposes → visitor is allowed to proceed → security/compliance team is notified for later review.
Best for: Low-risk watchlists where awareness is important but immediate denial isn't necessary.
How It Works
Screening in Action
ID Scanned
Visitor's name, DOB, and ID data are captured from driver's license barcode or manual entry.
Instant Screening
All configured databases are queried simultaneously. Results return in under 2 seconds.
Action Taken
Based on your workflow rules: auto-deny, alert for review, or log and allow. Everything is recorded.
Compliance
Meet Regulatory Requirements
Background screening helps satisfy requirements across multiple compliance frameworks.
FERPA
Schools must protect student records. Visitor screening ensures only authorized individuals enter the building.
HIPAA
Healthcare visitor screening helps control access to patient areas and protect PHI.
ITAR
Defense contractors must screen visitors against denied persons lists before granting facility access.
C-TPAT
Supply chain security requires screening all visitors to manufacturing and warehouse facilities.
SOC 2
Visitor screening and access logging are key controls for SOC 2 physical security requirements.
Alyssa's Law
Multiple states require panic alarms and enhanced security measures in schools, including visitor screening.
Security & Privacy Safeguards
Encrypted Data
All screening results encrypted at rest and in transit.
Role-Based Access
Only authorized users can view match details and override denials.
Discreet Alerts
Visitors never see why they're flagged. Alerts go to staff only.
Audit Trail
Every screening action is logged with timestamp and decision maker.
"In our first month, KyberAccess flagged a registered sex offender who had been signing in with a paper log for months. That alone made the entire investment worthwhile. Our parents and staff have peace of mind now."
Dr. Patricia Morales
Superintendent, Greenfield Unified School District
FAQ
Screening Questions
Don't let dangerous visitors walk in unchecked
Start screening every visitor today. Setup takes 5 minutes. The peace of mind lasts forever.