AMAG Technology recently released version 1.2 of Symmetry Business Intelligence, the new data analytics application used to track anomalous access control activity and flag cardholders who present the highest potential risk to an organization.

New features

The latest release introduces several important new features including:

  • Suspicious Activity: A new dashboard shows unusual or suspicious events which require additional scrutiny by security. A good example of suspicious activity is where the same card is used in two geographically separated regions (e.g. New York and San Francisco) within an unreasonable short amount of time. The system will flag this activity as a possible cloned card, prompting the security team to take action.  
  • Building Occupancy: The analytics solution now provides a detailed analysis of facility occupancy and traffic, allowing the organization to see daily trends such as what times of the day certain areas have a high traffic flow and when people are entering a building. Understanding the usage of a facility allows an organization to make better decisions regarding cleaning schedules and building management functions such as HVAC usage.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...