#1 Complete Campus Engagement Tool

    Resulting in a Safe and Secure Campus

IDentifyED Campus Safety and Security Application UX

1 Most Compelling User Engagement

2 Mission Focused

3 User Identity, User profiles, and User Data

4 The Most Complete integrated Campus Security Solution.

5 Create the most efficient and effective campuses.

Plus, Save money, by implementing a modern tool!


It’s not easy to be the most complete campus engagement, security and safety solution in the world today!

We work to make certain that no one can even think about catching up. We are always developing new technology solutions and tying them to our existing platforms.

We always have to explain ourselves to our customers when they ask: “Why do I need this? — The other guys can’t/don’t do it?”.

Our answer is simple. We don’t compromise, and you should not have to either.

We provide all our information out to our customers and prospective customers without hesitation, without marketing mumbo jumbo, and without the requirements of a sales meeting.

Why? Watch the video, find out what we have to offer, and why we are not worried about the competition.

Campus Safety and Security Alternatives

Supposed to help you discover problems before they happen. But they rely on good people (who aren’t in the know). As well as, others (that won’t talk for fear that they will be involved)—little information that is preventative.

911 Calls

Emergency tip line or Police. Used when it is often too late, don’t always know the proper location (died in trunk, too drunk to tell (or poor description (“near the big tree”)–no location tracking.

Campus Security and Safety

Don’t always know the troubled areas (can’t predict issues—no analytics), insufficient tools to do their job.  This makes it hard to help students if they don’t cooperate.

How do you engage “this” non-connected brain

—“What were they thinking.”

Notifies—but can cause panic, or worse rolled eyes and complacency.  Does not instruct where to go, what to do, because emergency broadcasts can be too general, sent to too many people and used too often.

“Dumb” IDs

Organization’s ID Cards, School IDs, or newer “Smart Cards” – Not so smart. Don’t tell you if the user is who they say they are, where the user is, and can be left behind (useless). Plus, issuing 30,000 on day-one, and administering is a massive job. Not to mention replacing at least 19% (based upon research) of them over the school year.

Many Tools don’t work because no one wants to think about it, understands consequences, or can remember to use them.

Go ahead tell someone in your campus whether it’s a 5th grader, sophomore in high school or college, a doctor in a hospital, or an employee sitting at a desk that they should be worried about security. Go ahead, we dare you. You know better, right? People don’t understand the consequences of their actions or want to spend time worrying about what they should be afraid of. Almost all of them don’t. That’s just not how we are wired. Now, tell them they can share a calendar event with their friends, check out a chat between friends or send an interesting piece of hot gossip about “The Housewives of East Toledo” over a message board, well then you got’ed.

No analytics

Flying blind—nothing preventative, no insights (manual is often too tedious or too late). All your systems do not connect, so forget about any real reports.

You Should Consider IDentifyED

Campus Engagement, this is new… So, how does your campus safety and security system engage users to fulfill your campuses mission while helping to mitigate campus emergencies, or even basic accidents in advance? As well as, report them accurately when they occur, warn students and faculty of critical emergencies, resolve them quickly.  All while using new approaches (since old ones are grossly inadequate—and most don’t know how it could be)—quickly and affordably?

Perhaps you should consider….

IDentifyED Campus Safety and Security Logo

Campus Safety and Security Problem

Unfortunately, the #1 problem is existing campus safety and security systems is they are not  used (not ALL the time)—so when you need them, well…

The second issue is that most security tools are simple point solutions so they don’t work together at all.

The third issue is that getting intelligence, real information about what is going on in your campus has very little to do with any security system, but a great deal to do with your campus community.

Campus Safety and Security ALTERNATIVES

911 Calls.

A 911 call to a dispatch center does not always provide good information about the person (especially if panicked).  As well as, the location or the issue can be confusing (near the big tree on campus).

It also does not create any data, any process, metrics, nor does it integrate into a process to respond.

IDentification Cards

are a lot of work to take pictures of everyone, and deploy. IDs often get lost or stolen and are not easily revoked.

The process of deploying and maintaining IDentification Cards (Organization IDs, School IDs, or ID badges) is resource dependent, painful and expensive to not only deploy but to maintain.

Campus Safety and Security.

It is hard to secure people when they don’t always cooperate—especially.

Putting solutions together that the people adopt and use daily allows campus security to build better procedures, policies, process, and metrics.

Smart cards

are a lot of work to deploy, often get lost or stolen and are not easily revoked.

The process of deploying and maintaining smartcards is resource intensive, painfully mundane, and expensive to not only deploy but to maintain.

Solid analytics, so a campus can predict, prevent and plan for probable issues based upon historic data is nearly impossible.


IDentifyED Campus Safety and Security Logo

Used by over 4,000 schools

140 different countries – 14 languages

Ten Fastest Growing Education Solution Providers – Insights Success

Ten Hottest LMS Companies – Education Technology Insights

Winner – EdStart Award

Best Solution for Campus Safety and Security

There are FIVE main reasons to consider IDentifyED

1 Most complete and compelling User Engagement

2 Mission Focused

3 BEST User Identity, User profiles and User data

4 BEST Complete Security Integrated Solution.

5 Create the most efficient and effective campus!

Plus, it is the price performance leader

Let’s take a look at each of these reasons in detail

1BEST User Engagement – Users love our app!

Managing your life

We are not just a communication tool. We are a tool that allows people to organize their lives.

We are not just their calendar, but every calendar for every group, every course, every resource, and everyone. We provide todos. We allow the ability to get information from a group, a course and individual.

We provide a central repository for files, policies and procedures along with file repositories for course, groups and people. We know we are not the only system you will use but we are probably the first one, so we provide a “custom app” that allows campuses to direct people to all the systems that they have invested in so that people can get to key resources.

Each group, each course and each person has a portfolio that allows them to share communicate and organize.

Our systems help fill out forms, register cars, manage parking, pay invoices, buy lunch, open a door, take out a library book and open a dorm room.

We are the user’s workhorse the go to app, because we help them get things done.

Managing your social network.

So, imagine if Facebook, Twitter, Snapchat or any of the other social networks actually helped you get things done, really communicated, could ask a question of a classmate, a group project team, or simply someone, anyone who can actually help.

Imagine if those message boards were actually helpful libraries that organized information. Provided more than just simple post but provided supporting files, calendar events, images, other resources and were organized to gain real team work and actual expertise. Imagine if those groups could actually respond to an issue, organize around an event or develop a calendar and keep people communicating the whole time.

Imagine if all of that was available for your campus, but no one had to worry about their data or their privacy.

You don’t have to imagine it, we can just show you.

Interacting and leveraging campus resources.

So, think about the list of things you have to do on a college campus the first week of school, yikes, it’s a big list, we hope your electric scooter is charged up. The list and questions you might have as a new employee on campus. The concerns and questions you might have as you drop your kid off at school for the first time.

Now imagine if there were simple straight forward ways that you can simply do most of these things online, in a system that allows you to access real campus resources, without waiting in a line that stretches half way across the campus.

We can help you do more with a few clicks that you might be able to get done in a week. Here’ s few things: Check out a course and get all the info. Check out a group get all the info and  sign-up. Check out the campus marketplace and get some items you might need. Get your ID, and your smart Card online. Register your car online. Fill out all the forms and disclosures that are required that are sitting in your forms inbox (yes, that’s a thing). Volunteer for any one of hundreds of volunteer opportunities in the volunteer marketplace. Check out and communicate with a specific department or specific person. Learn the policy or procedure that you need for a certain thing. Get access to parking, an event or buy a ticket to pretty much anything. Reserve something, anything. Get a burger at the lunch room or a book at the library.

Imagine how much you could improve life on campus by automating a few simple things. We have an reward out for anyone who can give us a vital process that we can automate, contact us we love to hear how we can help.

2Mission Focused — Campus Leaders love our system

Is your security solution focused on helping with course attendance and graduation rates? Does your emergency broadcast have the ability to send calendar invites to the parents of the volleyball team, or wallet passes for the game? Does your form tool provide database updates, manage completion of the forms, provide a form inbox and create wallet passes and user flags based upon answers? Can you tell what the course attendance is for a specific student, or find them during the day? Do you work to help your students understand how to communicate in a modern world and work as a team? Real tools, for real campuses that make a big place feel like home.

Create a Community

Every piece of your campus experience can be directed, captured and communicated with IDentifyED. We promote group solutions  and help people communicate inside and outside your campus. We create a secure private communications network that allows you to control and monitor the communication.

Know your campus member

We provide you with mission critical information about people so that you can provide services for them. We provide key information that they can get to information that makes them part of your community. When they need help or when they just need to register their car you have simple online services that make it easy and that allows you to collect information about everything your campus members need. Oh, that’s Joey’s car, he should be in class in Building 6, but it shows that he had an allergy attack and we brought him to the infirmary.

The centralized system can easily manage multiple campuses, so you can provide services to many people, many families at many campuses.

Know your campus

Everything that happens on campus should result from a person, group, or course. Every location, event, transport, camera, course, and person can check-in to one of them. They can share their locations with friends, family and the group. They can publish events,and have them show up on our campus calendar, campus map, sell tickets on the campus marketplace, issue wallet passes to group members, and discuss plans on the group portfolio.  They can manage issues with self service portals that now only get the job done but provide you with insight into your campus. Do you know what happened and when on St Patrick’s day last year on campus? If you were using IDentifyED you would.

BEST User Profiles – Know your customers!

So, just how useful is that plastic ID that you hope everyone will wear?

We take identity to the next level. Our IDs are apps, (they can be plastic). IDs can be distributed online, quicker, faster and better than you can. Why? We can do a full internet user verification, we can validate a user’s driver’s license and compare it to a user’s selfie. Can you do that or is the only verification you do prior to hitting print is “Smile”. We can then do a full criminal record look-up and verify that you don’t have any concerns, without any person actually having to introduce privacy concerns/liability for your organization.

We ask for and receive critical information about the user, sometimes simple stuff like, who is there emergency contact, which we pack into our App ID QR code, that can be read from our app, or read on a smartphone providing critical contact information in seconds. We have tons of critical information about the users’ calendar, events, groups, courses, you name it, we can get you in seconds the type of information that might take you a week and 10 different systems to access. We know the users’ car, we store the user’s facial recognition information and can verify or do a 1:Many look-up to tell you just who exactly is this. We know so much more, so much quicker.

We make you so much more effective, efficient and are able to provide so many services so much better. Identity and check-in becomes part of not only location but attendance, time cards, access to shared resources and verification for payment systems. n

Yes, we distribute an HID soft card for access control, yes we can issue wallet passes based upon information that a user provides you in a form or as part of a group. When we talk about identity it is a whole other ball game.

Can you do an emergency broadcast to the football team  that is traveling in Paris, France?  Broadcast a calendar invite and send them a wallet pass for the event that only they can store in their digital wallets. Can you then use that wallet pass to authenticate and check team members into and out of an event? If you can, How do you like our system?

Oh, and one other simple thing, our IDs are never lost, never stolen and can be revoked in seconds. No more need to have an office attended by security personnel whose only job is saying smile, and hitting print. How do you like that plastic ID now?

User ID App

We redefine identity. Making an ID as an App, is not redefining an identity.

The world that we created Kornukopia, automates, integrates, and provides a virtual world over a physical one.

All of that including the ID, User Profiles, user data, facial recognition, automobile registration, user verification, user document validation, criminal record checks, smart cards, intelligent QR codes, wallet passes, invoice boxes, forms that update user profiles that initiate wallet passes and create user flags.

Speaking of wallet passes, we can deploy a user ID and a user smart card to a campus members smartphone’s digital wallet. You don’t even have to open our app to open that door or present your user ID, just click on the fast access digital wallet, or in the case of the smart card, just hold it up to the reader, like you were paying with Apple Pay!

Just how many man hours do you spend creating, distributing and replacing plastic cards? With our solution all that work is no longer necessary. Free up valuable staff to actually do security not card administration.

User portfolios that allow users to manage their posts, messages, chats, pictures, calendars, files, images and relationships.

Groups and courses that provide and collect information from the users.  As well as all the campus operations that provides online services that would normally be administered and collected by incongruent system.

IDentityED’s ability to provide the  user’s virtual world and automates and streamlines the physical campus along with self service campus portals that catalyze services and opportunities that would not exist forms the user’s identity.

Oh, we can print a plastic ID… If that’s important.

User Profiles

So, the user builds their profile. It’s more than just a simple table in a database with name address and phone number. It’s not just 5-10 tabs of data that is displayed when you look up and administer a user.

It’s not just a series of access controls over the user’s profile so that specific people with specific roles can gain access to information about the user.

Our user profiles are a record of usage, they are a record of what that user does during the day, where they are, who they talk to, what courses they take and with whom, as well as their groups, messages, chats, images, events, and well basically their whole campus life.

It’s a great deal of info. You own the data, you control the audits and the narrative. No one gets the data accept your campus. You provide the profile along with the privacy. Your users’

are not for sale, they are protected by your campus and IDentifyED.

User Intelligence and User Data

So, data equals reports, and reports with AI equals intelligence. Without data forget about it.

Do you have campus intelligence or do you have millions of hours of video and a log of who went through a door.

Because it’s just data, it’s not the interactions, it’s not the locations, or the experiences.

Most of our competitors may or may not be able to mail your users’ a letter, many can not even do that.

So, how do you have a campus engagement tool, a campus security tool that knows nothing about the one thing you are trying to protect.

No, you are not protecting the campus, you are protecting the people on the campus.

So, if you are looking for a security infrastructure tool that will provide you with insight, you will more than likely be stuck with 1,000 cameras that will report to you on a windy day that some of the trees are moving.

You might be able to tell who went into a building at a specific time and when they left with your access control system, but you won’t be able to know why (we know their courses, groups and calendars).

We work with the infrastructure we can take alarms from devices and create incidents and trigger notifications. We can take check-ins and identity checks and verify who that is. We can take all of that with calendars, events, groups, and courses and give you “context” so that you may actually have intelligence.

Knowing your users is way more effective way to protect them than adding another 1,000 unmonitored cameras. We are working on intelligent kiosks that provide real tools, real data, and real user information. If you want more cameras, send us the pictures so that we can identify who is coming down the hallway on the camera no one is watching.

Most Complete Campus Security Solution. — Security Pros love our system!

We admit it, it’s not fair! We are not like other companies.

We did not get created by combining a large number of incongruent solutions. We did not spend our time creating a single point solution. We intentionally built a campus tool that was a complete enterprise solution. We started with the user and the campuses’ mission in mind. We did not just throw a simple product together and see if anyone would buy it. We also did not allow investors or stockholders create financial milestones that interfered with complete quality work. So, in Silicon Valley speak, we screwed up.

Why don’t others do what we did? Well, it costs a lot of money, it takes a lot of time and investors want a proof of concept immediately, not a complete solution that engages campus members, does a comprehensive job at securing a campus and allows campuses to work efficiently and effectively.

We know it’s not fair, we are old and have seen a lot of other solutions miss the mark, get integrated only to lose all their value or end up looking like a platypus because they were designed by a committee with limited tools and only the ability to use the companies that they could acquire.

So, when we say we are the most integrated COMPLETE campus security solution on the market today, we are right. Please don’t do a feature by feature comparison, we  crush the competition it’s not even fair ( competitive feature matrix here: https://campussafetyandsecurity.com/wp-content/uploads/2022/06/Compare-Kornukopia-IDentifyED.xlsx, (sorry we don’t play fair)).

However, it takes more than features to provide a complete solution. It takes intention, strategy, design from the beginning from both the bottom up and the top down so that you not only can provide amazing intelligent insightful reports, but so those reports are actually the result of user data. User data comes when the value of the solution makes sense to the user, so they use it, and then  and only then do you get real data.

Step 1: is finding out, really finding out what campuses need, and making a big list.

Step 2: is evaluating what the users want both top-down and bottom-up, so that you can get and then present the best possible information and the most engaging services.

Step 3: is building it step by step, losing sleep, sweating out the details, holding your breath to see if this and that will work.

Step 4: is waiting until you truly have an  amazing complete solution.

Step 5: is waiting some more because it does not make sense to release a physical campus solution in the middle of a pandemic.

Step 6: is knuckling down and taking your systems features and modules from versions 1.0 of all the modules to version 2, and then 3 and as the features and capabilities grow, starting to realize the amazing things that campuses can do when they have many sophisticated modules working together.

Step 7: is realizing that the sum of the parts creates something much more than the whole, that the unintended consequences of planning, design and vision is synergy and insight, that could not be possible any other way.


So, here is a short list of our security modules/features. If you want real detail you can check out the brochure.

Real User ID

Our App and Wallet Pass ID (that can be printed if you want), is truly authenticated with start of the art KYC technology that is able to verify the user. We are then able to request documents either driver’s licenses or passports, we can verify those as authentic and verify the picture with a selfie to confirm that the ID is actually them. We can then do a criminal record look and give you an answer to whether their criminal record is within your campuses criteria (all without any human being having toe compromise anyone’s security. Our IDs have Facial Recognition Selfies, QR Codes the display 3.0 Vcards (packed with data) and can deploy with an HID Smart Card, both of which can be stored on the user’s digital wallet. This is just the ID.

Real User Profiles and Data

We provide real live up to the second information on your users’. Where did they check-in last. How did they use the app? Do they need help? Are they in class or in a meeting? and so much more information. Many solution only focus on the visitors or they can send a dumb broadcast out to a phone number (who they may or may not even know is someones. We have a full and complete user profile. User’s are able to provide health concerns, provide emergency contacts, have people on campus be assigned as special care assistants, and fill out forms that in which they can provide you with all the information you need.

Those forms, which can be forms that you use today, not only manage the completion of the form, but populate the user profile with specific answers, can create user flags, and can issue wallet passes. Simple things that you may want/need to keep track of like, are you Covid-19 Vaccinated? When and with what vaccine. All within the profile, all automatically surveyed and input by our forms solution. We have so much more info about a user, we would need another website to show you all of it.

Campus User Verification, Document Verification and Criminal Record Checks

So much has been done to get a simple bank account or verify a tenant for a lease. Why isn’t anyone using these capabilities to screen people before they step foot on your campus? Well, we can. We can verify that the user is who they say they are by their cell phone, email and OTP. We can verify their legal ID documents; Driver’s License, State ID, or Passport. We can collect and verify their face against the ID and store the face image not only for the ID, but for facial recognition solutions. We can then do a criminal record check, and upload the record, or simply verify the criminal records against your criteria.

We can do this two ways; 1) as part of your onboarding IDentifyED solution, 2) You can require all visitors, employees, and campus members to get Visitor Fit certified. Visitor Fit is way to ask the user to verify that they are who they say they are and that they fit your criminal record requirements. Visitor Fit is able to put the process into the hands of the user, they pay for the criminal records check, the system validates them, and you don’t have to do anything except allow Visitor Fit Members access to your systems and campus.

Campus Incident Response

For our solution Incident Response is the back-end dispatch capability of the proper resources to address and issue. You can create any help request you like. You can tie that help request to a specific group of individuals. That incident alert is sent to that group of responders with locations, date/time stamps, user details, user images, closest camera, and other key pieces of information. Have an issue with bathroom leaks or unclean? Create a help request for Bathroom issue.

Create a responder group of maintenance or janitorial staff who see that there is an issue and can respond immediately. (we get it silly example, but the other guys do the obvious stuff (which of course we do too). Our Incident response system allows for status update, notes, and closing details and metrics. Every incident is also capable of being documented in our Incident Management System (that system is on this page too).

Adaptive Help Requests

Usually help requests are simple easy and static requests. Simple stuff like: “Help”, Injured”, and “Gun”.

Our adaptive help requests can be changed at any time. We even let you create templates for specific situations. Why? Imagine a hurricane, now imagine the issues that your campus would deal with before the hurricane (evacuation), during the hurricane (rescue), and after the hurricane (clean-up). The same can be said for any natural disaster or a mass shooting.

You can create special help requests and put all of them in a help request template. Those templates can be ready when you need them and you can switch them over at any time, online.

Ya see, our help requests are much more than just a simple help, our system can help you crowd source specific issues (like tree down after a hurricane), and provide an organized list to a response task force for that specific issue.

The cool thing about this is you get the complete eyes and ears of the campus. You get to put the right resources on the right problem. Not every issue needs a law enforcement officer.

SOC, Distributed and Networked Incident Responders and campus notification.

So, our system can manage a single campus, multiple campuses, multiple schools/organizations, and create a complete system of campuses and schools.

You get it if you have more than one campus, one organization or one school. For the most part each campus will be independent, because you want local responders to initiate responses. We also give you the ability to monitor and broadcast to multiple campuses, or organizations. So, this makes it easy and capable for you to create one central security operations center or create a distributed security operation network that allows you to take advantage of local campus resources to support remote campuses in a situation where they are needed.

Like when? Well imagine if a campus is in the middle of a mass shooting. Local law enforcement and responders are dealing with more local critical things. your operations center can coordinate response, broadcast out instructions to responders, groups or the entire campus, and possibly monitor alerts and cameras.

Our capability also allows you to broadcast a single message to many locations at the exact same time. Like When? Ah… Snow Day!

Emergency Broadcast

Emergency Broadcast for most to the world’s campuses is simple and dumb. Basically they can send out text to the entire campus.

Of course we do it differently (better). Yes we can send out a text to everyone. That is a great way for people to get annoyed by texts and information overload associated with information that does not apply to them. Sound familiar?

First we are a complete social network, with courses and groups. So we can broadcast to a specific campus, a specific group or groups, a specific course, we can create a group and broadcast to them. Since we have an App, we can also not just text them but we can send a notification to their device. Why? Let’s say the volleyball team is in France and there is a terrorist attack and you need to get in touch with them. We can do that.

Our apps and our HTML interface can be configured to send out “canned” messages in case of an emergency or news/updates in case a more specific message is required. We can send out clery reports, and log them. We can update social networks like facebook and twitter. We can also create different templates for different situations so that you can load up a new library of canned broadcasts based upon a specific issue. Why? Hurricane (before, during after).

We can even broadcast out calendar invites, wallet passes or both. Why? Graduation. Big Campus Meeting. Big Campus Event.

We use Amazon’s text and notification services. Why? 1) It is blazing fast (spooky even it’s so fast). 2) It is global we can send to anyone anywhere. 3) it is incredibly scalable, it can handle any load we put on it.

Incident Management

As a help request is pushed into our incident response system, the incident is worked to the point where the crisis has been averted. At this point, it’s time to document the incident in our incident management system. Not all incident responses merit a full documentation in the incident management system, and not all incidents have to have an incident response to be documented. For example: A law enforcement officer could come across a fallen tree, at this point he/she could create an help request or they could simply document the incident in the incident management system.

We can document an injury, auto accident, property damage, discipline issue, and referrals to other parties (law enforcement, hospital, mental health). The system is quick and easy to document any items you want to document.



Threat Assessment Management

If there was a “cutting edge movement” in campus security it’s threat assessment. This is based upon the one recurring theme in campus shootings: “We all knew he might do it!”.  Yes, it may be clear after the event that someone was capable of shooting a campus, killing people. Even though the professionals say there is not any specific determining factors that makes a mass shooter, there are many factors that they may share in common.

The question with Threat Assessment is: “Can we address an issue with a person that we identify  may be a threat and work with them to deescalate the threat or protect the community from them?”

The issue that most professionals come to agreement on is that a threat assessment team should be a multi-discipline team. This team can include staff, managers, social workers, mental health professionals, human resources, law enforcement, guidance counselors, and other experts. As part of the initial assessments interviews with the subject, sometimes parents/guardians, friends, family, teachers, managers, employees, social workers, and mental health professionals are done. We provide a templated question/survey and answer format so that interviews can be collected, the team can review them and report on.

Often there may be “interested parties” like parents/guardians, staff,  victims, whistleblowers, and others, who may have a vested interest or may have concerns for their  safety, so identifying them in the process, and interviewing them may be necessary as well. Our system allows you to update them with logged secure communications, along with logging any and all written communications to any member of the team, any interviewee or any person who is contacted. Our system has an authenticated and encrypted messaging system that allows for privacy and confidentiality of all messages, and the log shows the team and any else looking at the assessment who, when and what message was sent.

These assessments can follow any number of best practices, and organization can use templates from any best practice they choose, or they can create, add, edit or delete questions specific to their preferences. Our software helps direct and collect all information from every interview, and provide a report for the interview.

We provide a dashboard to monitor the assessments progress, this includes overviews of the whole process, status of interviews, and a log of any mitigation steps that are taken and their effectiveness. We have a section so that files can be secured. We have a section that allows every step, interview, status change and any other item done within the system to be logged. We have an area where prior incidents can be referred to.

Anonymous Reporting

Alright you are probably getting tired of hearing this, but we do this differently too.

We provide an anonymous reporting tool along with an incident reporting tool (not anonymous). Our anonymous tool sits outside of the system so that users’ don’t login and know that it is truly anonymous (if it’s not people won’t use it).

Our Anonymous reporting tool allows people to report on all types of things, not just criminal suspicion items. Does someone have issues at home? Does someone have food insecurity issues? Has someone done something really great that they should be recognized for? Is there something that needs to be improved upon? We believe if you make the system only for one purpose, and that purpose can be risky, scary and uncertain, that creates a stigmatism within the community culture  that can back fire on the results and usage.

You can direct anonymous reporting items by classification to specific responders just like you can do that for help requests. Our anonymous reporting tool reports to our incident response tool, so that every report is tracked, status and assigned. We hear that many other anonymous reporting tools send items to a “blackhole” never to be read or acted upon. We also hear that anonymous reporting tools that only go directly to law enforcement used as often and easily accepted in a campus community.

Clery Reporting

If you are a college you know what this is. It is a federal law that requires college campuses to report issues associated with sexual assault, crimes, and fires (more complicated than that). Colleges need to provide this report annually. Our Incident Management system allows the author of the incident to fill out as  part of the incident simple point and click items that make Clery reporting easy at the end of the year. It’s all part of the Incident Management System. Clery Act also requires that notice is sent to the college campus if there are specific crimes or occurrences that the public should be aware of. Our Emergency Broadcast system logs all Clery notices.

IOT Alert Reporting

If a tree falls in the woods… you get the rest. So, if an IOT device and your campus is adding thousands of them, creates an alert, how many alert systems do you have to monitor? Our system is set-up to add IOT alerts. We think you need one incident response system (not dozens), and if you have one you can do a good job of routing alerts to specific responders. That makes sense right?

We work with a number of vendors, if we don’t work with one that you need, tell us so that we can create a process that will capture alerts and route them to where they need to go. Also, our incident response and alerting system has what we call triggers, so that we can initiate other actions like an lockdown emergency broadcast.

Visitor Management

Is your visitor management system a sticker printer? If you spend a little more it might read a driver’s license reader. Most of the time the driver’s license reader only captures the users’ basic information and the sticker falls off as you leave the front desk. So, is visitor management really a security function. We think it should be.

We do 3 main things, 1) we actually screen, verify, identify and classify  a visitor, 2) we manage a visitors visit and 3) we protect a visitor on your campus.

Here is how we do it:

  1. Visitors can register online prior to visiting campus.
  2. Visitors when they register, can get online approval in the VM system from the person they are visiting.
  3. Visitors register their license plate and auto make, model and color, so that your LPR system knows who they are.
  4. Visitors can be required to do Covid-19 health check, and if they fail it, we create an incident response.
  5. Our add-on system Visitor Fit can verify the user is who they say they are, verify their driver’s license, verify that the selfie we make them take is the same as on their driver’s license and we can do a criminal record check based upon specific criteria like felony, misdemeanors, open warrants, and how long ago. The visitor pays for this service.
  6. Visitor Management can capture and verifies the user’s driver’s license and selfie, and stores this information.
  7. Visitor Management can add the visitor’s selfie to our facial recognition system so that you can identify them.
  8. Visitor Management can do a sex offender look-up.
  9. Visitor management can issue a visitor badge via our VM app, a wallet pass sent to the smart phone or if you really want, a sticker (boo).
  10. Our App can tell anyone on campus but mostly SROs, and staff who is in the online-app visitor log, and show them a picture.
  11. Our facial recognition system can recognize registered visitors.
  12. You can flag a visitor (or if this is a repeat unwelcome guest), create an incident response.
  13. You can flag a visitor’s car (or if this is a repeat unwelcome guest), create an incident response.
  14. Our VM App displays the visitor’s picture, a QR code with complete 3.0 Vcard, Qr codes can be used to check visitors in to events or locations.
  15. Our VM App can receive notifications, do a check-in at a specific location or event and do a help request for a visitor.
  16. Our Emergency Broadcast system can text, or app notify all visitors, and visitors can be included in an emergency broadcast.

Now, Visitor Management is a security tool.

Visitor Fit: Criminal Record Validation

So, Visitor Fit is simple, but cutting edge.

Visitor Fit is one of our services that can be used with or without IDentifyED.

A Visitor Fit member can user their membership at any Visitor Fit campus.

Visitor Fit membership is paid for by the user, not the campus.

Visitor Fit uses KYC technology used in many AML applications to identify that they user is who they say they are.

Visitor Fit then captures their driver’s license or passport and verifies authenticity.

Visitor Fit then asks for a live person selfie and compares the selfie with the driver’s license.

Visitor Fit then based upon permission pulls a criminal record for the user and verifies that they meet a standard criteria.

Visitor Fit then issues a Visitor Fit App/Identity that tells campuses that they are verified and that they meet specific criminal record criteria.

If you use IDentifyED’s Visitor Management system or any Visitor Fit alliance partner’s visitor management platform, Visitor fit will authenticate the VF credentials and provide the user information to the VM system.

HID Smart Software Cards

Based upon our relationship with HID and our development efforts we can provide through our system an HID smart credential.

This credential can be stored and initiated within our IDentifyED app, and/or we can place it in the user’s digital Apple wallet.

These credentials can be used with any HID access card reader that meets the HID standard.,

Credentials can be deployed, revoked and redeployed within a few clicks by any IDentifyED Administrator.

Our system can deploy a card based upon onboarding or an administrator can issue 1,000s of them at a time and they will be distributed via our APP.

Campus Mapping and Tracking

Where is everyone? Our campus solution provides calendars for every course, every group, and from there all group and course events are scheduled. As people check-in to specific locations, you know where people are. Attendance helps you track people. Our system can show you what events are where and when. We can also show you want events were where and when last St. Patrick’s day.

As we provide check-in information for busses, patrol cars, events, and other groups your maps show you where you should place your resources.

As incidents come in we provider you with the exact location, where the camera is and where everyone else might be.

Our check-ins can be very specific; Building 6, floor 2, men’s bathroom. While other solutions simple roll out a longitude and latitude we tell the floor and the room.

You can build maps for different purposes, and distribute them or control access depending upon what you are publishing.

We deal with a constantly changing campus and events are based upon time, you can literally track your campus map and the changes over time.

Check-in and Check-out

So, how can you protect people when you don’t know where they are?

User’s can check-in and out of specific locations or a device like a POS terminal, access card reader, LPR Camera, facial recognition camera can check people in. You can also have staff or security check people in,  for example a big assembly, a dance or a game as people walk in and walk out they can be checked in. Our wallet passes (tickets are also designed be check people in.

A Locations can be: places, events, groups, courses, transport, groups, parking,  card readers, facial recognition cameras, lpr cameras, surveillance cameras, POS terminals, Users, user defined locations and  IOT devices, some devices can be simply viewed while others can actually check a user in and out of a specific location.

For example as a user stops by the cafeteria the POS terminal can report their check-in,  they might stop by their dorm on the way to class and the access controller checks them,  they then go to class and attendance reports their check-in, and then it might be basketball practice where they all check-in and then a ticket/wallet pass to the big dance that initiates a check-in. You are able to find each other based upon the many ways you check-in.

Your campus can also create different locations check-ins templates in case of an emergency you can ask everyone to check-in to a very abbreviated list, or add locations. We also have different campus “Modes” that can change the templates of not only the locations, but help requests, campus custom app, and emergency broadcast. So you could create 3 modes before a hurricane, 1) Before Hurricane, 2) During Hurricane, and 3) After Hurricane. As you move from shelter, to rescue to clean-up you are able to dynamically change the locations, help requests, custom campus app, and the emergency broadcasts!

Reports, Wallet Passes, User Flags

We call them “reports”, in many instances they might be called: “registrations”, “disclosures”, “consent forms”, “surveys” “orders” and “sign-ups”.

You can create them all. You can add any field you like to the report, or create a new field for user’s profiles, and then add it to a form.

You can draw information from the User’s profile to use it in the report. You can put signatures and initial into the form as you like.

You can distribute a form to the entire campus, or just send it to one group. Forms are sent to every person’s forms inbox, so they know what they have to fill out and when.

Forms can not only input key information into the user’s profile, but based upon an answer they can generate a wallet pass, or flag a user.

Forms administrator allows you as the admin to determine who has filled out the form and who needs a reminder! The Administration dashboard allows you to send people reminders based upon specific status and answers.


So, when you need a consent, issue a disclosure or ask for some information forms gives you a tool that you can use.

For example: Let’s say you need to know everyone’s covid vaccine status. You can create a report where you get the name and address of the user into the form, you then ask 3 questions 1) Are you vaccinated?, 2) What vaccine did you get? and 3) When did you get the vaccine? (we can even ask to upload a vaccine card, and drop that in the profile). You can create a fields in the user profile for vaccinated-Y-N, Vaccine-type, and Vaccine-date.

When the user answers the questions those fields are then automatically populated from the form. You can also create actions on the answers for example if they say Yes, I am vaccinated you can flag them with a Green Flag and issue them a “Vaccinated” Wallet pass. if they say no: you can flag them with a red flag and issue them an “unvaccinated wallet pass”.

If you wanted to and you had a few forms like at the beginning of the year, or when you onboard an employee you can actually create form packages that hold many forms.

It’s all super quick, super easy, all the work is done for you, and you can monitor completion, while the user has little excuse as the form is sitting right in their forms inbox.


Automobile Management

One task that seems like one of the jobs that security dreads is automobile registration. We do this, online with the user. There is absolutely no need for anyone to assist in this. We also provide the ability manage parking by lot and slot.

Our system comes with both an invoicing system and a marketplace. Users can purchase a parking pass, auto registration, pay for parking or pay a ticket on our system. Our system allows any group with permissions to create a “product”, price a product, associate a wallet pass/ticket with a product and then you can simply place it on your marketplace, or if it is more on an invoice, or a fine, you can send the invoice to the user directly and it goes into their invoice inbox.

Our marketplace allows every group (department, business unit, or Group/affiliation) to create a market, and this market can be associated with their own group’s stripe account, which in turn can be associated with their own bank account. So, if the accounting department wants to account your department to account for all the fees, fines, and other revenue you can simply do it this way. Or you can use a general stripe account as well.

License Plate Recognition.

Campus Members and Visitors are required to register their car on campus, and this happens automatically with the system.

Only the exceptions need to have their autos registered. Once registered either as a campus member or visitor our system saves them.

License Plate Recognition can be used in a static location environment like at a gate entrance or a gate exit or in a parking lot.

You can also use our App to identify a license plate and it’s owner, and issue a ticket if necessary.

Each time a License Plate read is registered in our system we check-in the person associated with the car.

LPR allows security personnel to identify every car on the lot and what car is registered to what person.

Our system works with many of the License Plate Reader companies.

Why is this important? Most of the LPR companies, only read the license plate, they don’t know who the car belongs to. We do!

When we get what we call is an LPR Check-in we can look it up and determine whether it is a campus member, a visitor or an unknown registered vehicle.

We can also allow you to create triggers on flagged automobiles, flagged people who have an automobile or automobiles that enter your campus or parking lot at a certain time.

These flags can initiate a trigger that can create an incident or an emergency broadcast.

We also know who is on campus and who is off campus and when they entered or exited because each is a check-in/check-out on their personal profile.

Facial Recognition

So, when a user registers with our system whether they register as a visitor or as a campus member we register their face with a part of our app that makes certain we have a live face that is usable for facial recognition. The first step to being able to do facial recognition is getting a quality picture of the person initially, we do that.

We do user verification and document verification at that time. So, we know who that face belongs to, not sure of many systems that can make that claim.

Once we have the face that face becomes the face on their ID app. It also get stored in the user profile, and in a repository that we set-up for your organization to do facial recognition.

Most cameras, most video cameras and almost all tablet/smart phone cameras can detect a face. That’s the technology that puts a square box around a face.

Face detection does not tell you who’s face it is, only that it is a face. We can do 2 things with that face.

  1. If you provide us with a persons’ identity for example a person’s name, QR code, User ID, or a login, we can compare the face on file with the face we are capturing and confirm identity, 1:1 comparison. Is this Bob? Yes, it is Bob!
  2. If you provide us with a face and ask us to do a look-up not knowing the person identity, we can do a 1:Many look-up and identify the person’s face that is closest to being identical to the faces on your campus repository. Who is this? This is Bob!

Whats’ cool about facial recognition? Well it’s not that you can do it, it’s that we provide you with an application associated with why you would do it.

That application is simple it’s Check-in and Check-out!  What are the applications for check-in check-out? Attendance, Time-clock, User event check-in, user transportation check-in, user group check-in, user place check-in (or for all these of course check-out). We can also use this along with our qr code or login as a means of authentication.

Oh, and one other thing, we can “flag” users on check-in and create triggers. For example we can flag a persons  as “threat” and when facial recognition does a check-in we can trigger an incident and broadcast a lockdown. If a person is flagged VIP, we can trigger an incident to the president of the campus and they can great the visitor.

Surveillance Cameras

We are not a VMS, we work with many VMSs. VMSs are very distinct devices that work to control and record cameras.

We work with LPR Cameras and Facial Recognition Cameras that feed us images, that we process into data, and then provide actionable steps based upon the data.

For simple surveillance cameras we integrate them into the incident response. How?

We provide locations, these locations can be check-ins, and each location can have an associated camera.

How is that helpful? Well when someone needs help they send in a help request with a location and a longitude and latitude.

Our system associates a location with a camera. As the incident comes through the incident response system both the SOC and the local responder can click on the associated cameras internal or external IP address to view the area where the user has requested help. Sounds pretty simple, but within a click you can have a camera pointed at the user that needs help.


Reunification is simply stated getting the people who are members of the community back to their homes after a critical event  as safely and with as much respect for the incident as is possible.  People could be students, employees, administration, visitors, vendors, or anyone else present during the disaster.

Sounds simple until you add during the worst possible day of their lives, when your community is completely torn up, and you are likely dealing with people who are injured and killed.

In a tragedy, whether it’s a school shooting, a devastating fire, tornado, flood or other “act of nature” or even some unimagined event, the task goals are the same:

  • Get people home safely to their family in a way that we can account for the fact that they were delivered to the custody of a parent if they are a child.
  • Professionally and immediately deal with managing the injured, account for what hospitals they are getting care, keep a status on their care and route their parents or loved ones to the hospital where they are being cared for.
  • Account for everyone. In the chaos of an event people are taught to run, hide and fight. We need to know where everyone is or we cannot finish the process of reunification. Dealing with those who are “unaccounted for” is one of the biggest tasks associated with Reunification.
  • Finally, identifying casualties with precision and notifying as soon as possible the loved ones with the most care, professionalism, dignity and privacy possible.

With Reunification we start with 5 basic concepts/systems that need to be embraced.

  • Custody management and custody exchange is a concept and a practice that should happen every day of the year, we will go over this within this document. Think: bus stops, carlines, attendance, field trips, athletic trips, events (dances, games, plays and assemblies), and location sharing.
  • Identification is a key component of any campus’s security. Identification for us goes much further than a simple ID piece of plastic. How are you able to reunify anyone without knowing who anyone is, and key critical information about them?
  • Incident response when designed properly is another key system that allows a campus to care for people who need help and manage their specific status and issues with up to the second information. A strong incident response system is not a help request; it is a well structure communication infrastructure, with the ability to be centrally managed.
  • Communications is key to any strong campus. Having tools that not only broadcast out commands, but that create modern ways to share group communications, chat with impromptu groups, manage files, policies and procedures, direct people to online resources and even manage calendars.
  • Finally, it’s not enough to have these items without having them work together. Reunification is hard, but using a tool that does not integrate all these components is going to make it harder.

Reunification is complicated and critical. No one does it like we do, no one. If you believe reunification is imperative, like we do get more information at the menu and come ask us questions.  We have a whitepaper here.

Communication Privacy and Control

When you use a public social network solution, you give up all your data, all your privacy to the social networking provider.

As the campus, we allow you to protect the privacy of the users, because your campus owns the data, you control who sees it, you control who has access and you control how it is maintained.

We are not a social networking company, we are a software as a service company, in our terms of agreement we state clearly that the data is yours, not ours, that you have full ownership and full access.

You can monitor, filter and audit communications as you deem necessary.

Custom Apps and Custom Folders

Our App does many things, but from the home screen (the ID Screen) swipe to the left and you will be put into our custom app screen.

What are most custom apps, they are expensive static colorful apps that are almost allows static that direct campus members to specific online campus resources.

That’s exactly what ours is, only it can be created by the campus, by themselves, in less than an hour, is included in our system and can change on the fly.

Our custom apps can have templates so that the custom app can be changed on the fly, or in the case of a specific situation go into specific “modes”.

For example let’s you have 8 templates: 1) standard, 2) Before hurricane, 3) During hurricane, 4) After hurricane, 5) During Shooting, 6) Reunification, 7) After Shooting, 8) End of year/semester.

Each template can be associated with as many “MODES”. Modes  not only change the template for custom campus, but for locations, help requests and emergency broadcasts, these templates and modes can be set-up before hand and can be changed in seconds on the fly!

Now swipe down on our ID home page and you will see files and folders that are ready for all your policies, critical information and procedures. All those three ring binders now have a home online!

We create solutions that allow you to prepare and then act when you need it.

Access Control

We deploy smart cards. These cards are downloaded to the App of the user from the HID system.

We are in the midst of providing these functions through your access controller, access manager or cloud solution. We will help you build it.

  1. Lockdown mode sent to the access manager initiated with an incident trigger or an emergency broadcast.
  2. Ability if you like to send an access credential to an HID card printer for a physical card.
  3. Ability to receive access user logs at access controllers so that we can use access controllers as check-in devices.

Fees, Fines, and reports

Our incident management system in conjunction with our campus marketplace and invoicing system allows you to document issues.

Document a discipline step or issue a fine/fee for inappropriate driving or behavior. This fine or fee can be dropped into the campus member’s invoice ibnox with a reminder in their message inbox. They need only click on the invoice provide the credit card information and the invoice is paid.

5Most effective and efficient campuses. –Campus Pros love our system!

Imagine delighting the campus and implementing tools that make your life and your staff’s life easier!

What if you could free your staff from some of the mundane tasks and actually allow them to focus on more impactful solutions.

Imagine building and supporting a community where you provide services in the cloud that allow many things to happen… “Automagically!”

What if you could check a dozen accomplishments off your list this year?

While Campus Engagement and Campus Security may only be part of your job, or someone else’s — what if these solution allowed you to get more things done?

Fear not, for we have come to help! We are relieving you of many burdens and making your life easier.

How many of your vendors can say that?

Campus Social Network

Building a community is hard. Tools make it easier, communications make it possible.

In social networking your are either the dog or the tail. If you don’t control your own social networking tools, you are the tail.

Communications and the ability to understand what is going on and who needs your services or at least an explanation of how to get a service makes the job that much easier and much more efficient and effective.

Our social networks are not just a posting, they are a social networking powerhouse we allow your users to share posts, message users, create chat groups, share calendars, share locations, share files, and control all of that with fine-grained privacy controls.

Our Social networking portfolios manage all of this for users, groups, departments, organizations, campus, and courses.

You are providing powerful tools that improve your campuses communication, build community and provide insight into your campus.

Campus Marketplace and Invoicing

We provide the ability for different organizations to create their own marketplace. Market products or services, sell them, account and collect their own money. Invoice those who should be invoiced.

We have run into campuses that have over 1,000 campus groups, and just as many departments. The reality is that a common marketplace, that can be managed by a specific group, marketed to group members, or be available beyond the group makes self-service at a distributed campus level a reality.

We have the ability (you control) to allow different groups to have their own stripe account and collect money that gets deposited to their own account, without any effort from you.

We provide the ability to not only sell physical products but issue wallet pass tickets for events or services. This is a game changer.

Campus Calendar

Who doesn’t have a campus calendar? Am I right?

Does each department, team, group and course have their own calendar or schedule of events? We are sure they do.

You of course have access to all these calendars right?  You know who is doing what, when, right? What’s that a “no”?

Of course your calendars that get created and updated from all people, teams, departments and groups organically, right? What’s that a “no”?

Or course, your calendars provide a user with calendar automatic updates associated with their calendars, any group, team or department they are associated with and any course they are taking and any task or assignment? Again, no?

Every team, event, group department and any other calendar event automagically updates your campus map so that you can plan, organize and implement? Again, no?

Of course if there was an issue on campus, like a snow storm, hurricane or something even worse your campus group, departments, events, and courses could simply update their calendars to inform everyone of what is going to change. Still no? Huh…

Sorry for the sarcasm, but, when we talk about calendars everyone takes theirs for granted and their eyes gloss over, when there is a better way.

User Profiles and Data

If your campus has gone to a user-centric service model, like most campuses have. You are missing probably only one thing. User information. Imagine how much better your services could be is if you were able actually collect, consolidate and provide the user with the ability to update user information.

We also do one thing that you may not completely appreciate until we describe it. We validate and verify your campus members and tell you if there are any criminal history that you need to be aware of. So, this is the question: “Could I lie about who I am and become a member of your campus?”

We use sophisticated KYC solutions that financial institutions and other high trust systems use to manage and deter money laundering, we verify user driver’s licenses, state IDs, and passports, and validate them against a person’s selfie. We do criteria based criminal records checks without anyone having to put your campus in any issues with privacy and FCRA.

We help you create extremely sophisticated user profiles and user identities with self-service auto-magic as the foundation of all this. We work very hard to create solutions so that you and your campus members don’t have to work very hard.

We are an enterprise campus solution, we provide dozens of services on top of a very complete user profile, this makes everything simple and easy.

Stored Value

We work with the stored value vendors to integrate their stored value into our app. Many of you already have a stored value vendor.

Spoiler alert… What they do is manage a user’s balance and make sure it gets paid. We can connect and provide identity without interfering with those “back-end” processes.

Why? We do a heck of a lot more than stored value for you and your users. Along with the simple strategy that we want to engage your users in one app.

Forms Management

So, how many forms does a new campus member have to fill out when they start? We are guessing, a lot.

How do you know if they actually filled out the form? Just a guess, it involves paper files and “paper cuts”.

How do you get them to fill out the forms? Does it involve them waiting in a line? We hope not.

How do you remind them and make sure they have the forms that you need filled out? How many staff members does it take?

If someone does not fill out a form, do you only know it when you have to refer to that form?

What happens if part of the information has to be input into a user profile? Who does that?

What happens when you have to create a new form?

What happens when a signature is involved?

What happens if you get an answer and need to issue a wallet pass or flag a user’s profile?

Don’t worry we resolve all of this in our system. User’s get their own forms inbox. We monitor what they complete.

Based upon answers we can flag, send a wallet pass or populate a field in the user’s profile. We provide an forms administration dashboard that allows you to monitor, communicate and distribute updated forms.

Yup, check that off your list.

Group Management

In our system a group can be pretty much any collection of users’. Some examples are: Team, Club, Course, Department, Class of X, a role type, or any other thing you can think of including a mixed group of responders.

Our Group management can provide: Message boards, shared calendar, messaging, shared files, shared images, group roster, group administrator, group emergency broadcast and notifications, group marketplace, group invoicing, group wallet passes, and group event planning.

Your campus can provide public groups, private groups, hidden groups, groups that are invite only, and groups that are for a specific role.

Our group management allows you to keep a group safe.

Our group management allows you to create a group that can respond to specific issues, like: an injury, property damage, plumbing issue, mental health issues, disaster clean-up and really any items you want to respond to. These groups can be dispatched via our incident response system and can share and update the incident between themselves.

Wallet Passes

While wallet passes are a cool newish technology, from an operations point of view they can be a game changer. Here’s is what we can do with a wallet pass:

  1. A wallet pass can be a user’s ID.
  2. We can store an HID soft credential in Apple’s wallet.
  3. We can create a wallet pass as a form of group membership, or authority.
  4. We can create a wallet pass as a ticket to an event, mix identity with event access.
  5. We can create a wallet pass as a result of a form, Like a covid vaccine form creating a “vaccinated wallet pass”.
  6. We can create a wallet pass associated with a “Flag” on the user’s profile. Maybe a “VIP wallet pass

As a campus professional having identity tied to a credential whether it’s being a part of a department, having a vaccine, having a credential or having a ticket to an event gives you the ability to manage who, when and where.

It all gives you the ability to check people in and out of an event to keep track of attendance and access.

Operations Incident Response

How many security officers does it take to fix a light bulb? None.

As a campus pro you know that not every incident requires law enforcement.

Our incident response system can provide help requests for literally ANYTHING!

You can create a help request for maintenance, one for tree down after a hurricane, or one for tutoring.

That’s right our incident response system allows you to create a help request for almost anything, create a group or groups of people who can respond to it,

The incident response system tracks the incident, allows responders to status, location, long/lat,, provide notes and create a completed status.

Incident dispatch can provide all of that along with any messages from an IOT device and any associated camera’s internal or external IP address.

Our Help Request solution can allow the user to provide notes, and send a picture, they can also have the app initiate a phone call to any number you assign.

Phone call help requests still initiate an incident.

Our help requests can have different templates so that you can change help requests on the fly and can be associated with a “Mode” that allows you to change not only the help request, but the custom app, the locations and the emergency broadcasts.

One other “cool thing”, after an incident for example after a hurricane, you can literally crowdsource your clean-up effort by creating help requests specific to what needs to be done. Like: tree down, water damage, electric concern, and unsafe condition; and route each one of those incidents to a crew that is responsible for addressing the issues.


Visitor Management

Does your visitor management solution and strategy go beyond printing a sticker?

As a campus operations professional visitor management is more than just a security solution.

Visitor management is a means by which you know who is on your campus. Why they are on your campus.

Who they met on your campus. You also need so see them as much less of a threat and more of a person you have to protect.

It’s also a way to invite them to your campus, and manage their visit. Whether they are a job candidate, customer, prospective student, vendor or who knows what.

You want to provide them with a top notch visit. You want to manage that visit. You want to be able log aspects of their visit.

Where they are, who they met with. Our visitor management system is as much of a campus security solution as it is a visitor relationship management system.

Just how will a sticker do that?

Volunteer Management

So, many things that need to be done. People willing to volunteer to do them.

So, how do you create a marketplace for volunteers so that they can find opportunities to volunteer?

How do you track their contribution and give them credits of the hours they give.

Who will be accountable for managing their visit? Where will these people go on campus.

Some systems track hours, some register volunteers, and few manage the visit. We do all three.

Parent/Alumni/Vendor Management

Text here

Distributed Communications and Notification

We have one of the most sophisticated communications infrastructure available for campuses.

Not only do we have a full suite of social networking capability with group management, message boards, chat and group chat, file sharing, custom campus apps, image sharing, shared calendars, and campus maps, we have the most powerful broadcast system in the industry today.

We can broadcast to texts, social channels, our app notification service, emails, and CAP (displays, etc).

We can broadcast to a group or groups of people. we can broadcast out not only notices, and canned notices to a specific group.

We can broadcast out calendar invites, wallet passes and both!

Most “emergency broadcast” system only really work for that “snow day”, or they are overused, so users don’t pay any attention.

Our tool is a true communication instrument and not the only way to communicate with people in your campus.

Location Management, Custody Exchange, Attendance, and Custody Management

What if you knew where people were on campus. Would that help to plan? Would that help to manage facilities?

What that help to manage resources? Yes.

What if you could manage “custody” of your students or your employees so that you knew where they were.

Would you be able to manage employee resources, and people safety? yes.

What if you managed attendance either for a Job or a Classroom, would that help you achieve better and more effective means to achieving your mission?

We do all that. We have event turned Check-in into a social networking enticement, so that users in their portfolio can actually share their location.

Campus Maps

We are sure you have some online maps. Are your maps static or do they adapt based upon social and crowd sourcing events?

Do your maps tell you where and when events are? Do they change based upon group and department calendaring and input?

Can they give you historical information so that you can plan events based upon last year, or the year before?

Can they give you access to who is where? Can they provide you with mapping on cameras, license plate readers, facial recognition cameras, IOT devices, Point of sale devices and many other items?

As people check-in to a specific event or out of one can you tell who is where and when?

How could all this information make your campus more efficient and more effective?

We expect that you can only imagine, because when something this simple but this sophisticated is implemented, it’s a game changer.

So what’s Holding You Back?

Now that you can see some of the advantages of IDentifyED, what’s holding you back?

Following are common campus safety and security questions:

Can we implement some of the system, not all of it?

Yes, Kornukopia is modular so you can implement the features and modules you like.

Can we implement some of the system, not all of it?

So some modules are included, others may require another license and can be easily turned on.

Do you think our users will use the system?

Yes. In fact, the more modules you implement, the more compelling and “sticky” it becomes.

How easy is the implementation?

Depending on the size of your organization, it usually only takes a couple of hours (this includes importing your data). Furthermore, It helps that the system can integrate into your user directories, human resource or ERP systems.  As well as for schools and colleges we support Clever, One Roster and Pinwheel DME.

How easy is it to setup the security operations center?

Easy–open a browser and you are ready to monitor specific reports.

How secure is the system?

IDentifyed follows the industry’s strictest security protocols. Please see the LIST that shows the comprehensive security features.

How is it paid for–who pays?

It can be licensed to the school, purchase licenses for each user, or there can be a mix.  So the school covers the nominal cost for the back-end. Furthermore, the rest is covered by the students—providing extremely flexible options is one of the reasons for the product’s success.