Symmetry Business Intelligence analyzes how a person’s access activity is tracked and patterns established based on a risk score methodology. Anomalous behavior may raise a person’s score, and high-risk identities are flagged in a dashboard.

Identify the employees

Dashboards within Symmetry Business Intelligence provide the security team with an at-a-glance look at identities with the highest risk scores. Scores are generated based on the reader location, time of day and a user’s access patterns. Symmetry Business Intelligence helps to easily identify the employees, contractors and other identities that may pose the highest risk to a company.

Symmetry Business Intelligence highlights anomalous behavior, helping organizations discover unauthorized access patterns and possible threats worthy of further investigation,” said AMAG Technology, COO, Howard Johnson. “It’s a natural extension of any security program.”

Easily integrate with other systems

Keeping in line with AMAG’s commitment to providing open solutions, Symmetry Business Intelligence has been designed from the ground up to easily integrate with other systems. Over the past five years, AMAG has released Symmetry CONNECT identity management, Symmetry GUEST visitor management and Symmetry incident management, all open, cloud-based security systems designed to provide more flexibility and options for the end-user.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...