Check out our special report on casino security
AMAG Symmetry Enterprise access control software
Technical Specification
- Make: AMAG
- Model code: Symmetry Enterprise
- Reader Types: Card
- No of concurrent PC Operators: Unlimited operators
- Visitor Management: Yes
AMAG Symmetry Enterprise access control software uses Microsoft SQL Server on a dedicated server. The software is optimised for a very large number of card holders across a LAN or WAN. It supports clustered servers and virtualisation. The system employs user-interface design. Features such as customisable ribbon bars, wizards, icons, tree views and drag and drop techniques make the user interface intuitive and simple to use. Extensive online help gives instant information about the task that is being carried out.
Read more| Make | AMAG |
|---|---|
| Manufacturer | AMAG Technology, Inc. |
| Category | Access Control>Access control software |
| Model code | Symmetry Enterprise |
| Reader Types | Card |
| No of concurrent PC Operators | Unlimited operators |
| Visitor Management | Yes |
| Guard Tours | Yes |
| Import/Export of Information | Yes |
| Web-enabled software | Yes |
| System Requirements | Operating System: Microsoft® Windows® |
| Additional info | AMAG Symmetry Enterprise access control software uses Microsoft SQL Server on a dedicated server. The software is optimised for a very large number of card holders across a LAN or WAN. It supports clustered servers and virtualisation. The system employs user-interface design. Features such as customisable ribbon bars, wizards, icons, tree views and drag and drop techniques make the user interface intuitive and simple to use. Extensive online help gives instant information about the task that is being carried out. |
You might be interested in these products
Related Whitepapers
How analytics engines mitigate risk, ensure compliance and reduce cost
AMAG - Symmetry security management system saves energy and reduces cost
AMAG - Destination dispatch elevator integration
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download

