AMAG and Key Systems cooperatively tested and certified this integration
Key Systems has certified its GFMS integrator software with AMAG’s Symmetry V8 security management system

AMAG Technology, an access control, IP video and intrusion detection (IDS) solution provider, is pleased to announce that Key Systems, Inc. is now a member of the Symmetry™ Extended Business Solutions Program as a Certified Partner. Key Systems has certified its Global Facilities Management System (GFMS) Integrator software with AMAG’s Symmetry™ V8 Security Management System, which provides two-way data sharing between GFMS and AMAG’s newest version of Symmetry access control software. AMAG and Key Systems cooperatively tested and certified this integration.

“We are happy to welcome Key Systems to the Symmetry Extended Business Solutions Program and offer end users more product options for their access control needs,” said Symmetry Extended Business Solutions Program Manager, Adam Shane. “Symmetry access control and GFMS Integrator software share data to better manage physical assets.”

"We're excited to partner with Symmetry. It’s a product we know from experience helps our customers reach the high standard in physical security they expect. We've had successful integrations in the field for years and we're excited to continue and extend that with Symmetry V8," said Key Systems Inc.’s Integration Manager, Ben Morley.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...