AMAG Symmetry Business Intelligence data analytics application
Technical Specification
- Make: AMAG
- Model code: Symmetry Business Intelligence
Symmetry Business Intelligence delivers critical information through data analysis to help identify the employees, contractors and other identities that may pose the highest risk to the organization. Each person’s access history and patterns are analyzed and a risk score is assigned and updated over time. Anomalous behavior is flagged, helping identify potential threats, better control access and prevent data theft. Identifying potentially risky behavior, allows earlier detection of potential threats, thereby mitigating risk and reducing the potential cost of an incident. Dynamic - Dashboards provide a real-time visual representation of the movement and trends of people. See a summary of the identities with the highest risk scores as well as more detailed activity each hour of the week. Risk Score - Risk scores provide early insight into potential risks when a score rises. Scores are generated based on the reader location, time of day and a user’s access patterns. Operate Efficiently - Critical alarms are flagged saving time and prioritizing identities with anomalous behavior. Use Existing Data - The cloud-based system integrates with and collects data from Symmetry Access Control and Symmetry CONNECT Identity Management to evaluate the risk landscape. Policy-Driven - Define risky areas and times to determine the weight of each behavior towards the overall risk score. Make Informed Decisions - Evaluate an employee or contractor’s risk score and past activity to determine if access should be granted to sensitive areas.
Read moreMake | AMAG |
---|---|
Manufacturer | AMAG Technology, Inc. |
Category | Access Control>Access control software |
Model code | Symmetry Business Intelligence |
Additional info |
Symmetry Business Intelligence delivers critical information through data analysis to help identify the employees, contractors and other identities that may pose the highest risk to the organization. Each person’s access history and patterns are analyzed and a risk score is assigned and updated over time. Anomalous behavior is flagged, helping identify potential threats, better control access and prevent data theft. Identifying potentially risky behavior, allows earlier detection of potential threats, thereby mitigating risk and reducing the potential cost of an incident.
|
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
How analytics engines mitigate risk, ensure compliance and reduce cost
AMAG - Symmetry security management system saves energy and reduces cost
AMAG - Destination dispatch elevator integration
Palm vein recognition
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
Download