Proof of visit

For over 40 years deister electronic has been providing robust and reliable systems which meet the requirements of both commercial and industrial applications. They are used globally not only for manned guarding operations but also many other applications such as cleaning, maintenance and quality control checks along with many more applications where a mobile worker’s attendance at a given location needs to be verified.

deister’s market leading proof of visit system allows you to place checkpoints strategically around your site.  Your staff then record their presence at a checkpoint using the data collector and at the end of their route return to download the information enabling you to produce a full audit trail.

Our proof of visit system allows a better use of staff, improves efficiency and provides accurate and fast audit information on work carried out.  Most importantly they highlight any checks that were missed so that appropriate action can be taken.

Ideal to determine that a worker such as a cleaner or a member of the maintenance staff has visited a location on their route enabling you to determine that all required locations have been visited. Event cards can be used to record extra information on the location whether that is simply that a certain job that has been done or if there is an issue to report.  All will be clearly displayed in the audit trail once the information has been downloaded.


Why deister proof of visit

Maintenance free

deister checkpoints use RFID technology and do not contain batteries or hard wiring. The checkpoints are also suitable for use internally or externally in all weather conditions.

Easy to use

Simply hold the data collector close to the checkpoint, that’s it. No buttons to press or apps to open.

Long battery life

Best in class operational time with the guardiX II being able to read up to 500,000 checkpoints from a pair of AA batteries. With no recharging necessary the collector is always ready to use.

Connected systems

Our proof of visit system works with other deister systems to allow events to be combined within common reports across different systems.

Robust & reliable

The guardiX II is IP67 classified and has no buttons, switches or other external moving parts that could be prone to failure.

Backwards compatible

GuardiX II data collectors are backwards compatible with all deister RFID checkpoints which have been in the field for many years.

Maintenance free and reliable data collection

deister’s proof of visit systems use RFID technology for checkpoints and data collectors. This ensures that the checkpoints are able to be installed in the harshest environments without the need for any maintenance or power supply.  This technology is perfectly suited for use in outdoor areas, which need to be checked regularly.

Our products are contactless and the checkpoints are read simply by holding the data collector in proximity to the front of the checkpoint. Since checkpoints require no physical contact they can be painted over or installed in walls, woodwork or masonry.

Event cards for additonal information


Event cards allow you to report additional events which may need to be highlighted during the route or confirming certain tasks have been done. For example; window open, toilet leaking, maintenance required. The event cards can be carried with the data collector and when an event needs to be recorded simply hold the corresponding card in front of the data collector, the time and event will be logged.

You can choose the events you would like to report on depending on the environment or to address health and safety requirements.

Intrinsically safe EX certified

For use in potentially explosive environments

Designed for use in potentially hazardous environments, the guardiX II EX is the ideal solution for chemical and petrochemical applications.  With no buttons or moving parts our intrinsically safe guardiX II EX meets the requirements of the EU ATEX directive and is water resistant.

guardiX II – the robust collector


The deister guardiX II data collector has no buttons, switches or other external moving parts that could be prone to failure.  Its clever design also means that there is no need for a hole for a sounder, instead the data collector vibrates when a checkpoint is read making it near silent in operation.  An LED and vibration provide haptic feedback making it ideal for patrols or checks that need to be carried out in places such as in hospitals, prisons and hotels or in a noisy manufacturing environment where a sounder would not be heard by the user.

When a checkpoint is read its identification number along with the time and date are stored in the data collector for transmission and processing.  The guardiX II does not require charging and is able to read up to 500,000 checkpoints from a pair of AA batteries, enabling 24/7 availability thereby minimising downtime.

The guardiX II collector has environmental protection of IP67 and has a wide operational temperature range.  It is also available as a special ATEX version for hazardous environments.

Checkpoints – robust and reliable

The RFID checkpoints are maintenance free and do not require any power. The small, inconspicuous checkpoints can either be glued or securely mounted using a special security screw.

The RFID checkpoints are resistant to temperature, weather and other environmental factors.

guardTrans – data transfer unit


The guardTrans is the data transfer unit for the guardiX II USB collectors. It is connected to a PC or laptop via the USB port and transfers the date when the collector is inserted. To guarantee maximum accuracy, the real-time clock in the guardiX II data collector is synchronized during the download operation.

LED and vibration provide haptic feedback when the data has been correctly downloaded.

guardiX Connect – remote collection of data

guardiX Connect transmits data immediately after completing each tour, without the need for a data transfer unit. Data is transmitted via the GSM network and securely encrypted via the deister Cloud.

This allows independence of any local infrastructure. The data remains securely encrypted at all times and is only decoded by your system.