Download PDF version Contact company

AMAG Technology recently released version 1.2 of Symmetry Business Intelligence, the new data analytics application used to track anomalous access control activity and flag cardholders who present the highest potential risk to an organisation.

New features

The latest release introduces several important new features including:

  • Suspicious Activity: A new dashboard shows unusual or suspicious events which require additional scrutiny by security. A good example of suspicious activity is where the same card is used in two geographically separated regions (e.g. New York and San Francisco) within an unreasonable short amount of time. The system will flag this activity as a possible cloned card, prompting the security team to take action.  
  • Building Occupancy: The analytics solution now provides a detailed analysis of facility occupancy and traffic, allowing the organisation to see daily trends such as what times of the day certain areas have a high traffic flow and when people are entering a building. Understanding the usage of a facility allows an organisation to make better decisions regarding cleaning schedules and building management functions such as HVAC usage.
Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?