Download PDF version Contact company

AMAG Technology, a leading provider of access control, video management and end-to-end security management solutions, announces the release of Symmetry CONNECT™, a policy-based platform providing safety, security and risk management capabilities for organizations demanding a process and policy based approach to managing all their enterprise security functions. Symmetry CONNECT allows organizations to build sustainable policies and automate manual disjointed procedures reducing errors and minimizing risks. In addition, Symmetry CONNECT helps ensure compliance by meeting industry specific audit reporting requirements and by providing a platform that eliminates mistakes and delivers an end-to-end solution. Five modules provide an effective solution to help users operationalise their business.

“Symmetry CONNECT combines solutions for access control, video management, compliance and monitoring and offers a modular approach to meeting those challenges,” said AMAG Technology, President Matt Barnette. “You don’t have to address all challenges at once. Maybe today you just need to address a legacy access control system, but next year you can begin addressing your security compliance and operational needs. Symmetry CONNECT helps you bring together disparate systems, disjointed processes and data on your timeline to meet your security needs.”

Symmetry CONNECT is an enterprise-wide software platform which helps large multi-site organizations to operate more effectively and security personnel to respond more efficiently. Symmetry CONNECT offers additional software modules for Identity Management, Visitor Management, Emergency Preparedness as well as Risk and Vulnerability Assessments that can be applied at any stage of a system’s development.

Download PDF version Download PDF version

In case you missed it

How Can The Security Industry Contribute To Protecting The Environment?
How Can The Security Industry Contribute To Protecting The Environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...