{"id":4580,"date":"2026-04-29T10:47:12","date_gmt":"2026-04-29T02:47:12","guid":{"rendered":"https:\/\/www.timeteccloud.com\/blog\/?p=4580"},"modified":"2026-04-29T10:47:13","modified_gmt":"2026-04-29T02:47:13","slug":"the-visitor-profile-is-the-security-layer","status":"publish","type":"post","link":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/","title":{"rendered":"The Visitor Profile Is the Security Layer"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Why a Logbook Cannot See What Is Coming Back<\/h3>\n\n\n\n<p>Every JMB\/MC\/RA committee has a story. The food delivery rider who entered the wrong block twice in one week, both times waved through because his face looked familiar to a different guard. The contractor who arrived claiming to be a previous tenant collecting forgotten items, presenting an access card the system had never deactivated. The unfamiliar face who appeared three evenings in a row at the visitor lobby before someone in management asked the question nobody else had thought to ask: who is this person, and which unit is he actually visiting?<\/p>\n\n\n\n<p>In each case, the visitor was recorded. In each case, the logbook was complete. In each case, nothing was prevented.<\/p>\n\n\n\n<p>This is the problem that residential security has been quietly carrying for years. The visitor logbook, whether kept on paper or on a screen at the guardhouse, captures the present moment and forgets it the next day. It does not remember. It does not connect. It does not warn. And yet committees and residents trust it as if it does.<\/p>\n\n\n\n<p>The gap between recording a visit and protecting a community is wider than most committees recognize. A logbook documents that someone arrived. Real security requires knowing who has arrived before, what they were doing, whether they have ever been refused entry at any block or gate, and whether their pattern of visits resembles anything the community should be paying attention to. None of that is possible in a system designed only to capture today&#8217;s traffic.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Failure Looks Like in Practice<\/h3>\n\n\n\n<p>Three patterns repeat across both high-rise condominiums and landed gated communities, almost without exception.<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:35% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"447\" height=\"403\" src=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/recurring-stranger.png\" alt=\"\" class=\"wp-image-4593 size-full\" srcset=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/recurring-stranger.png 447w, https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/recurring-stranger-300x270.png 300w\" sizes=\"(max-width: 447px) 100vw, 447px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>The first is the recurring stranger. A visitor enters under one resident&#8217;s name in January, another resident&#8217;s name in March, and a third in April. Each entry is correctly logged. None of the three hosts knows the others have hosted the same person. By the time a security incident occurs, the trail exists in fragments across separate logbook entries that nobody has reason to assemble. Manual logs cannot connect what they were never designed to connect.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 35%\"><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p>The second is the silently lifted block. A visitor warned or banned after a previous incident arrives the next week and signs in without challenge. The ban exists in the chairman&#8217;s WhatsApp group, on a memo pinned in the guardhouse, perhaps in an email circulated to the management office. None of these are queried at the moment of entry, because the moment of entry is precisely when nobody has time to query them. A guard rotation, a different shift, or a different gate within the same development is all it takes to lift the block silently.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"484\" height=\"423\" src=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/silently-lifted-block.png\" alt=\"\" class=\"wp-image-4594 size-full\" srcset=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/silently-lifted-block.png 484w, https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/silently-lifted-block-300x262.png 300w\" sizes=\"(max-width: 484px) 100vw, 484px\" \/><\/figure><\/div>\n\n\n\n<p>The third is the contractor who never left the system. A renovation contractor completes the job, the contract closes, and the deposit is refunded. The contractor&#8217;s details, however, remain valid in the visitor records, often retaining the same recognition pattern established during the renovation period. He returns six months later for what he describes as a brief follow-up. The guard, finding his profile listed, lets him through. He is no longer authorized, but the system has no concept of authorization expiring at the visitor level. The structural weakness here connects directly to how contractor access is provisioned in the first place, an issue covered in <a href=\"https:\/\/timeteccloud.com\/blog\/managing-renovation-contractors-in-residential-developments\" target=\"_blank\" rel=\"noreferrer noopener\">Managing Renovation Contractors in Residential Developments<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"536\" height=\"178\" src=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/contractor-who-never-left-the-system-1.png\" alt=\"\" class=\"wp-image-4596\" style=\"width:450px\" srcset=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/contractor-who-never-left-the-system-1.png 536w, https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/contractor-who-never-left-the-system-1-300x100.png 300w\" sizes=\"(max-width: 536px) 100vw, 536px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">From Records to Profiles<\/h3>\n\n\n\n<p>The shift required is architectural, not procedural. A visitor record describes one event. A visitor profile describes a person. The difference may sound semantic, but it changes what security is structurally capable of doing.<\/p>\n\n\n\n<p>A profile accumulates. Every visit the same person makes, regardless of which resident they visited, which guard processed them, or which gate they entered, attaches to a single identity. Visit count, visit pattern, host history, vehicles used, and any incidents involved all tie to that one profile. Over time the system knows the visitor better than any individual guard ever could.<\/p>\n\n\n\n<p>A profile classifies. VIP, Regular, Frequent, Restricted, Consultant, Security Risk: these tags are not decorative. They change what happens at the gate. A Regular delivery rider arrives and the flow accelerates without the guard having to think about it. A Restricted profile arrives and the flow halts before any conversation begins.<\/p>\n\n\n\n<p>A profile blocks at the source. Blocking can be applied at the level of face, identification number, or vehicle plate, which means the block follows the person across blocks, across gates, across vehicles, and across time. The visitor cannot edit himself back into the community simply by signing in under a different name or arriving in a different car.<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:35% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/Mobile-Ui-with-space-683x1024.png\" alt=\"\" class=\"wp-image-4453 size-full\" srcset=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/Mobile-Ui-with-space-683x1024.png 683w, https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/Mobile-Ui-with-space-200x300.png 200w, https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/Mobile-Ui-with-space-768x1152.png 768w, https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/Mobile-Ui-with-space.png 1024w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This is the architecture <a href=\"https:\/\/i-neighbour.com\" target=\"_blank\" rel=\"noreferrer noopener\">iNeighbour<\/a> is built around in its current visitor management layer. Visitor profiles sit alongside the Flow Builder and live activity monitoring, so that when a guard processes someone at the iVizit guard app, the safety score, visit history, and any block flags appear on screen before access is granted. The decision is no longer made on the guard&#8217;s memory or the resident&#8217;s word. It is made on the community&#8217;s accumulated record.<\/p>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Why This Matters for the Committee<\/h3>\n\n\n\n<p>JMB, MC, and RA committees carry the responsibility for community security. For strata properties governed under the Strata Management Act 2013, by-laws can govern access, restriction, and enforcement, but those by-laws are only enforceable if they can be applied consistently and at speed. Landed gated communities operate under their own house rules and residents association resolutions, which face the same enforcement test. A rule that bars a former tenant or a previously warned visitor from re-entering communal areas is a paper rule unless the system at the gate recognizes that person on sight. The profile is what makes the rule executable.<\/p>\n\n\n\n<p>For management offices the benefit is operational. Fewer judgment calls at the gate. Fewer escalations to the chairman after the fact. Fewer late-night WhatsApp messages asking whether someone should have been let in. The system carries the institutional memory the guard rotation cannot.<\/p>\n\n\n\n<p>A community that cannot remember its visitors cannot protect its residents.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-green-background-color has-background wp-element-button\" href=\"https:\/\/bit.ly\/iNeighbourPMNews\" target=\"_blank\" rel=\"noreferrer noopener\">Subscribe to Our Newsletter<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Why a Logbook Cannot See What Is Coming Back Every JMB\/MC\/RA committee has a story. The food delivery rider who entered the wrong block twice [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4581,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[491],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Visitor Profile Is the Security Layer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Visitor Profile Is the Security Layer\" \/>\n<meta property=\"og:description\" content=\"Why a Logbook Cannot See What Is Coming Back Every JMB\/MC\/RA committee has a story. The food delivery rider who entered the wrong block twice [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-29T02:47:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T02:47:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/The-Visitor-Profile-Is-the-Security-Layer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/\"},\"author\":{\"name\":\"Marketing\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/4469f8b15a3de8e3006d742b01c97fd6\"},\"headline\":\"The Visitor Profile Is the Security Layer\",\"datePublished\":\"2026-04-29T02:47:12+00:00\",\"dateModified\":\"2026-04-29T02:47:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/\"},\"wordCount\":1016,\"publisher\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/The-Visitor-Profile-Is-the-Security-Layer.jpg\",\"articleSection\":[\"iNeighbour\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/\",\"name\":\"The Visitor Profile Is the Security Layer\",\"isPartOf\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/The-Visitor-Profile-Is-the-Security-Layer.jpg\",\"datePublished\":\"2026-04-29T02:47:12+00:00\",\"dateModified\":\"2026-04-29T02:47:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#primaryimage\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/The-Visitor-Profile-Is-the-Security-Layer.jpg\",\"contentUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/The-Visitor-Profile-Is-the-Security-Layer.jpg\",\"width\":1000,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.timeteccloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Visitor Profile Is the Security Layer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#website\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/\",\"name\":\"TimeTec\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.timeteccloud.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#organization\",\"name\":\"TimeTec\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png\",\"contentUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png\",\"width\":1000,\"height\":313,\"caption\":\"TimeTec\"},\"image\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/4469f8b15a3de8e3006d742b01c97fd6\",\"name\":\"Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/70f626d87ed718e3c9ecc8a4d78d7c4b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/70f626d87ed718e3c9ecc8a4d78d7c4b?s=96&d=mm&r=g\",\"caption\":\"Marketing\"},\"url\":\"https:\/\/www.timeteccloud.com\/blog\/author\/marketing\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Visitor Profile Is the Security Layer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/","og_locale":"en_US","og_type":"article","og_title":"The Visitor Profile Is the Security Layer","og_description":"Why a Logbook Cannot See What Is Coming Back Every JMB\/MC\/RA committee has a story. The food delivery rider who entered the wrong block twice [&hellip;]","og_url":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/","article_published_time":"2026-04-29T02:47:12+00:00","article_modified_time":"2026-04-29T02:47:13+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/The-Visitor-Profile-Is-the-Security-Layer.jpg","type":"image\/jpeg"}],"author":"Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marketing","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#article","isPartOf":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/"},"author":{"name":"Marketing","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/4469f8b15a3de8e3006d742b01c97fd6"},"headline":"The Visitor Profile Is the Security Layer","datePublished":"2026-04-29T02:47:12+00:00","dateModified":"2026-04-29T02:47:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/"},"wordCount":1016,"publisher":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/The-Visitor-Profile-Is-the-Security-Layer.jpg","articleSection":["iNeighbour"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/","url":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/","name":"The Visitor Profile Is the Security Layer","isPartOf":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#primaryimage"},"image":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/The-Visitor-Profile-Is-the-Security-Layer.jpg","datePublished":"2026-04-29T02:47:12+00:00","dateModified":"2026-04-29T02:47:13+00:00","breadcrumb":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#primaryimage","url":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/The-Visitor-Profile-Is-the-Security-Layer.jpg","contentUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2026\/04\/The-Visitor-Profile-Is-the-Security-Layer.jpg","width":1000,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.timeteccloud.com\/blog\/the-visitor-profile-is-the-security-layer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.timeteccloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Visitor Profile Is the Security Layer"}]},{"@type":"WebSite","@id":"https:\/\/www.timeteccloud.com\/blog\/#website","url":"https:\/\/www.timeteccloud.com\/blog\/","name":"TimeTec","description":"","publisher":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.timeteccloud.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.timeteccloud.com\/blog\/#organization","name":"TimeTec","url":"https:\/\/www.timeteccloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png","contentUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png","width":1000,"height":313,"caption":"TimeTec"},"image":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/4469f8b15a3de8e3006d742b01c97fd6","name":"Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/70f626d87ed718e3c9ecc8a4d78d7c4b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/70f626d87ed718e3c9ecc8a4d78d7c4b?s=96&d=mm&r=g","caption":"Marketing"},"url":"https:\/\/www.timeteccloud.com\/blog\/author\/marketing\/"}]}},"_links":{"self":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts\/4580"}],"collection":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/comments?post=4580"}],"version-history":[{"count":8,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts\/4580\/revisions"}],"predecessor-version":[{"id":4600,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts\/4580\/revisions\/4600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/media\/4581"}],"wp:attachment":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/media?parent=4580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/categories?post=4580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/tags?post=4580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}