AMAG Technology hosted its Security Engineering Symposium in San Antonio, Texas, February 17-20, 2017 at the La Cantera Resort and Spa. The theme for the event was ‘Where Collaboration Meets Success,’ which encouraged more than 80 consultants/engineers, end users, and integrators attending to network and engage in security related discussions about technologies, challenges, and trends.

Symmetry GUEST visitor management system

AMAG Technology President, Kurt Takahashi spoke about company direction and how it is working to deliver a unified solution to not only provide the best access control solution, but to help end users mitigate risk, meet compliance, and save money. Attendees heard from Chief Operations Officer, Howard Johnson about AMAG’s product roadmap and future direction. AMAG breakout sessions educated attendees on the Symmetry Access Control line, Symmetry CONNECT identity management system, Symmetry Blue Bluetooth mobile reader and Symmetry GUEST visitor management system.

Yale University, Director of Public Safety and Chief of Police, Ronnell Higgins delivered a keynote address about Yale’s security story and how they overcame challenges to provide a safer environment for students by embedding IT with public safety.

Building trusted partnerships

“The collaboration between the end users, technology partners, resellers and consultants provided lively discussion throughout the weekend,” said AMAG Technology, Vice President of Global Sales and Business Development, Jody Ross. “All attendees left with a wealth of knowledge about new technologies available to help their business. End users, resellers and consultants alike shared ideas and the challenges they face with today’s security requirements.”

“Learning about Symmetry CONNECT and how your technology partners can help us remain in compliance and reduce risk was valuable to me”

“The SES allows me to understand and see the partnerships that AMAG has built with relevant technologies, which I find tremendously valuable as an AMAG customer,” said Red Hat, Global Security Coordinator, Jimmy McLeod. “I learn what’s coming, what’s available now and what I may want to apply at Red Hat. Networking with others who have similar challenges is a great way to leave with new ideas. The SES is very valuable.”

Risk mitigation

“This is my first SES and I was uncertain what value I would find in the event. Our data centre operations have a wide variety of customers, from financial to retail, that depend on us to meet or exceed our promises in the areas of compliance and risk mitigation. Making the daily operations simple and clean for the site security staff is key to our success and the AMAG products and partners help us achieve that,” said Digital Realty, Director, Global Security Operations, Diane Hines. “Learning about Symmetry CONNECT and how your technology partners can help us remain in compliance and reduce risk was valuable to me. The one on one time gave me the opportunity to express what our needs are and learn more about what is available to help my business.”

Technology partners demonstrated their solutions throughout the weekend. Nine partners presented in small, breakout sessions. The breakout sessions were designed to be intimate, allowing for interaction and questions.  The technology partners included: ASSA ABLOY, Vingtor Stentofon by Zenitel, Barco, Inc., FST Biometrics, Gunnebo Entrance Controls, HID Global, Hikvision USA Inc., NEC Corporation, RISK360, Winsted, BioConnect, CodeLynx and Seneca.

“The level of interactivity and engagement is fantastic, and it’s been a great experience”

Asset management

“I just love the concept of the Security Engineering Symposium. The bread and butter of the event is the rotating breakout sessions. The groups are the right size, and there is a mix of audiences- integrators, consultants and end users, so you get all perspectives,” said Barco, Vice President Strategic Marketing, Industrial & Government, Hans Dekeyser. “The level of interactivity and engagement is fantastic, and it’s been a great experience.”

“With incidents happening every day impacting security, facilities, human resources, legal, safety and more, end users need to have information and resources readily available to make difficult decisions on how to best protect their business, assets, brand, and, most importantly, their people,”
said G4S North America & Technology, Vice President of Managed Services, Allison Whitley Maffei. “Integrating RISK360 with Symmetry allows end users to respond to customer needs quickly, providing an accurate record of the alarm in Symmetry to capture incidents and produce actionable data for better overall security.”

“What has been really superior about your Symposium is that we could mix designers, security consultants, integrators, and end users into one forum so you get to see all aspects of the security business when most events organised by manufacturers usually will not have that dimension,” said Extravision, President, Andre Fiset. “The format provides better exposure to requirements and a better understanding of how everything interacts together.”

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?