Traka, the key management specialist, can now integrate its systems with the Symmetry™ access control system from AMAG Technology. As a Certified Partner, the Traka32 software integrates with AMAG’s Symmetry v7.0.1 access control software. AMAG and Traka cooperatively tested and certified this integration.

The integration allows the functionality of the Traka32 software to be managed through Symmetry. The access control platform can now include key management along with its existing identity management, alarm management, video management and command and control functionality. Symmetry can be scaled up or down depending on the size of the business. Used by 30,000 organizations in 90 countries, Symmetry is an open security software that meets all typical IP networking and integration requirements.

Traka32’s curfew functionality ensures keys are checked out or returned in specific, defined time increments and fault logging can show a problem that occurred during an asset’s use and ensures that faulty items are automatically locked-in until fixed. Through Symmetry, it can also create a closed-loop system which means that if a key, particularly one that is sensitive to the security of the facility, is not returned it can prompt an alarm that allows the central administrator to automatically restrict access permissions. This means that individuals can be restricted from leaving the building if they have not returned a key.

Shae Taylor, Extended Business Solutions Program Manager for AMAG Technology said, “The integration between Traka key and asset management solutions and AMAG’s Symmetry access control solutions means that we can offer a more holistic solution. Physical assets and keys are often the weak link in a facility’s security process, as they often rely on creating manual records, leaving room for human error. Traka is a sophisticated solution that can tie key and asset management automatically into a wider, comprehensive access control system, like Symmetry.”

Stay ahead in the era of intelligent security systems powered by Artificial Intelligence with our special e-magazine on AI in security.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...