AMAG Symmetry Enterprise access control software
Technical Specification
- Make: AMAG
- Model code: Symmetry Enterprise
- Reader Types: Card
- No of concurrent PC Operators: Unlimited operators
- Visitor Management: Yes
AMAG Symmetry Enterprise access control software uses Microsoft SQL Server on a dedicated server. The software is optimised for a very large number of card holders across a LAN or WAN. It supports clustered servers and virtualisation. The system employs user-interface design. Features such as customisable ribbon bars, wizards, icons, tree views and drag and drop techniques make the user interface intuitive and simple to use. Extensive online help gives instant information about the task that is being carried out.
Read moreMake | AMAG |
---|---|
Manufacturer | AMAG Technology, Inc. |
Category | Access Control>Access control software |
Model code | Symmetry Enterprise |
Reader Types | Card |
No of concurrent PC Operators | Unlimited operators |
Visitor Management | Yes |
Guard Tours | Yes |
Import/Export of Information | Yes |
Web-enabled software | Yes |
System Requirements | Operating System: Microsoft® Windows® |
Additional info | AMAG Symmetry Enterprise access control software uses Microsoft SQL Server on a dedicated server. The software is optimised for a very large number of card holders across a LAN or WAN. It supports clustered servers and virtualisation. The system employs user-interface design. Features such as customisable ribbon bars, wizards, icons, tree views and drag and drop techniques make the user interface intuitive and simple to use. Extensive online help gives instant information about the task that is being carried out. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
How analytics engines mitigate risk, ensure compliance and reduce cost
AMAG - Symmetry security management system saves energy and reduces cost
AMAG - Destination dispatch elevator integration
The key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadPhysical access control
DownloadHoneywell GARD USB threat report 2024
DownloadPalm vein recognition
Download