AMAG Symmetry Business Intelligence Data Analytics Application

Technical Specification

Features:
  • Make: AMAG
  • Model code: Symmetry Business Intelligence
Additional info:

Symmetry Business Intelligence delivers critical information through data analysis to help identify the employees, contractors and other identities that may pose the highest risk to the organization. Each person’s access history and patterns are analyzed and a risk score is assigned and updated over time. Anomalous behavior is flagged, helping identify potential threats, better control access and prevent data theft. Identifying potentially risky behavior, allows earlier detection of potential threats, thereby mitigating risk and reducing the potential cost of an incident.    Dynamic - Dashboards provide a real-time visual representation of the movement and trends of people. See a summary of the identities with the highest risk scores as well as more detailed activity each hour of the week. Risk Score - Risk scores provide early insight into potential risks when a score rises. Scores are generated based on the reader location, time of day and a user’s access patterns. Operate Efficiently - Critical alarms are flagged saving time and prioritizing identities with anomalous behavior. Use Existing Data - The cloud-based system integrates with and collects data from Symmetry Access Control and Symmetry CONNECT Identity Management to evaluate the risk landscape. Policy-Driven - Define risky areas and times to determine the weight of each behavior towards the overall risk score. Make Informed Decisions - Evaluate an employee or contractor’s risk score and past activity to determine if access should be granted to sensitive areas.

Read more
Make AMAG
Manufacturer AMAG Technology, Inc.
Model code Symmetry Business Intelligence
Additional info
Symmetry Business Intelligence delivers critical information through data analysis to help identify the employees, contractors and other identities that may pose the highest risk to the organization. Each person’s access history and patterns are analyzed and a risk score is assigned and updated over time. Anomalous behavior is flagged, helping identify potential threats, better control access and prevent data theft. Identifying potentially risky behavior, allows earlier detection of potential threats, thereby mitigating risk and reducing the potential cost of an incident. 
 
  • Dynamic - Dashboards provide a real-time visual representation of the movement and trends of people. See a summary of the identities with the highest risk scores as well as more detailed activity each hour of the week.
  • Risk Score - Risk scores provide early insight into potential risks when a score rises. Scores are generated based on the reader location, time of day and a user’s access patterns.
  • Operate Efficiently - Critical alarms are flagged saving time and prioritizing identities with anomalous behavior.
  • Use Existing Data - The cloud-based system integrates with and collects data from Symmetry Access Control and Symmetry CONNECT Identity Management to evaluate the risk landscape.
  • Policy-Driven - Define risky areas and times to determine the weight of each behavior towards the overall risk score.
  • Make Informed Decisions - Evaluate an employee or contractor’s risk score and past activity to determine if access should be granted to sensitive areas.
Download PDF version Download PDF version

Related Whitepapers

Migrating To Symmetry From Legacy Casi-Rusco Access Control Systems

5 Ways RFID Readers Can Secure Your Workplace

School Security Moves to the Cloud