Download PDF version Contact company

AMAG Technology is proud to announce the expansion of its product line to include Symmetry CONNECT™. The enterprise-wide software platform helps large multi-site organisations to operate more efficiently – mitigating risk, increasing safety, and reducing operating costs. AMAG Technology is an access control, video management and end-to-end security management system provider.

Building sustainable policies

Symmetry CONNECT offers multi-site organisations an easy to use software solution that automates process so companies more efficiently use their security system to secure their facility and meet industry specific compliance and audit requirements. Symmetry CONNECT allows organisations to build sustainable policies and automate manual disjointed procedures reducing manual errors and labour intensive processes. Users can be up and running the same day with the hosted solution, and there are no long term contracts or commitments to make. The flexible policy-based software platform easily expands or contracts as business needs dictate.

“Businesses are suffering from rapid global growth and consolidation which means more disparate security systems, data and manual disjointed growth while striving to meet regulatory and compliance requirements,” said AMAG Technology, President Matt Barnette.  “Symmetry CONNECT automates manual processes thereby eliminating errors, streamlining data, minimising risk and reducing cost to help companies meet audit and compliance requirements and provide a more secure environment.”

Credential authentication and compliance

Symmetry CONNECT ties together different security systems, streamlines the administration of access rights and consolidates disparate data into one centralised location that is available to anyone with authorised access. 

Symmetry CONNECT ensures compliance through proven automated levels of enforcement that include notifications and escalations. Credential Authentication and Compliance reduces costs and labour intensive manual processes by automating the following:

  • Data driven on and off boarding of employees and contractors
  • Rule and policy based access assignment and removal
  • Quarterly reviews of users and their access by the area owners
  • Ad-hoc and canned reporting to meet compliance requirements
  • Request access process

When used in tandem with the Symmetry access control system or Casi Rusco Picture Perfect system, Symmetry CONNECT can bring all facilities’ security management systems together to seamlessly manage access rights and disparate databases. It offers a large potential savings in administration costs and provides a way to demonstrate compliance to all relevant regulatory agencies.

Visitor management

Symmetry CONNECT Visitor Management automates and tracks the entire life cycle of a visitor request starting with the web based pre-registration of visitors by the host, check-in and badging at the reception lobby, and continuing through checkout. The Visitor Management module automatically checks each individual visitor against a “watch list” and notifies hosts of their guest’s arrival via email or text.  Visitors can self-register on a tablet, smartphone or kiosk and securely admit themselves into a facility without any manpower intervention.

Additional features include:

  • Full smartphone / tablet capabilities
  • Major web browsers supported (IE, Chrome, Firefox, iOS…)
  • Watch list
  • NDA / Policy upload
  • Signature capture
  • Visitor self-registration
  • License / Passport / Business Card scanning
  • Robust reporting
  • Integrated with Symmetry
  • Customised visitor badge design
  • QR code capability
  • Email and text notifications
  • Policy and Rule configuration

Adding visitor management to Symmetry CONNECT requires no further installation, and it is easy to expand and add additional sites as business grows. The low cost per visitor processing makes this an affordable option and simple solution to mitigate risk.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 security
Comprehensive K12 security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing the right fingerprint capture technology
Choosing the right fingerprint capture technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How do new security technologies transform retail and loss prevention?
How do new security technologies transform retail and loss prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...