Secure Visitor Screening
The REDTAIL Security Visitor Screening module allows facilities, large and small, to easily check-in/out, monitor, and log visitors. For secure facilities, the Secure Visitor Screening module performs instant checks against state and county court records, sex offender records, and for authorized facilities also integrates to the patented GREENLIGHT® technology which can be configured to run instant checks against FBI criminal data sources.
REDTAIL offers credentialing services that can be tailored for individual industries. Vendors/contractors can pre-enroll, and even make payments, at an easy-to-use and secure pre-enrollment website.
Training & Certification
REDTAIL offers the ability for organizations to employ custom training and certification programs for applicants who may need to undergo training and/or become certified in some way.
Validate an applicant or visitor’s identification through REDTAIL, which verifies identity utilizing several techniques including SSN & Address Verification and state/local county court records.
Risk Mitigation & Compliance
REDTAIL is 100% compliant with FCRA and EEOC requirements.
REDTAIL background screening can be tailored to suit your needs. Background checks can include Federal and State Criminal History, FBI Fingerprint-Based Checks, FBI Identity History, DMV Records, Sex Offender, and more. Also, REDTAIL verifies background checks against the court or county of conviction.
Instant Visitor Screening
The REDTAIL program provides real-time access to court records, sex offender records, global watchlists, government records such as SAM and OFAC. For authorized facilities, REDTAIL integrates to the patented GREENLIGHT® technology for real-time access to FBI and State criminal records.
The REDTAIL Mobile App includes geolocation services, emergency tracking/notification, visitor check-in/tracking, and digital badge/proximity reader capability. The REDTAIL App communicates with the REDTAIL Command Center module for Facilities and Vendor Company management.
Powerful analytic and reporting tools help you identify vulnerabilities, evaluate risks, and ensure efficiency.