Create security checkpoints to control entry and exit points, restricted areas, and more. Set up checkpoints to manage events, site areas, workstations and assign access specific to each individual. Use photo identification matching to confirm or reject access and to track scans from unknown badge IDs.