Blog Post Archives - AMAG https://www.amag.com/category/blog-post/ Fri, 28 Jun 2024 17:06:13 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://amag.com/wp-content/uploads/2023/06/cropped-favicon-1-32x32.png Blog Post Archives - AMAG https://www.amag.com/category/blog-post/ 32 32 The Future of Visitor Management: Symmetry™ GUEST  https://amag.com/future-vm-symmetry-guest/ Fri, 28 Jun 2024 17:05:40 +0000 https://www.amag.com/?p=6008 A visitor is the least vetted person to enter a facility, which is why organizations must act to prevent security nightmares. The future of visitor management is here: Symmetry GUEST, an innovative solution from AMAG Technology™. Designed to streamline and enhance the visitor experience while bolstering security, Symmetry GUEST helps facilities know exactly who is ... Read more

The post The Future of Visitor Management: Symmetry™ GUEST  appeared first on AMAG.

]]>
A visitor is the least vetted person to enter a facility, which is why organizations must act to prevent security nightmares. The future of visitor management is here: Symmetry GUEST, an innovative solution from AMAG Technology™. Designed to streamline and enhance the visitor experience while bolstering security, Symmetry GUEST helps facilities know exactly who is in their building. 

Current Challenges in Visitor Management 

Many organizations manage visitors using paper logbooks. While this may have been satisfactory 20+ years ago, today’s security challenges have proven ineffective. Modern challenges have amplified the issues which include: 

  • Security Concerns: Ensuring that only authorized individuals gain access to facilities while maintaining a welcoming environment.  
  • Manual Processes: As mentioned, many organizations still rely on paper logs or outdated systems, leading to inefficiencies and security gaps. 
  • Compliance Requirements: Adhering to regulatory requirements for data protection and visitor tracking is increasingly important and often challenging (or non-existent) with traditional systems. 
  • Visitor Experience: A cumbersome check-in process can leave a negative impression, impacting the overall visitor experience and the organization’s reputation. 

How Symmetry GUEST Addresses These Challenges 

Symmetry GUEST is a robust visitor management solution designed to tackle these challenges head-on, easily and efficiently. Here is how it makes a difference: 

  • Enhanced Security: Symmetry GUEST integrates seamlessly with access control systems, ensuring that only pre-authorized visitors can enter specific areas. It allows for real-time tracking and monitoring, providing a higher level of security oversight. 
  • Streamlined Processes: The solution digitizes the entire visitor management process. Visitors receive a welcome email prior to their visit and scan a QR code upon arrival, reducing wait times and the administrative burden at the front desk. 
  • Compliance Made Easy: Symmetry GUEST helps organizations stay compliant by securely storing visitor information and providing detailed audit reports. 
  • Improved Visitor Experience: Self-service kiosks and auto check-ins enhance the visitor experience, making it smoother and more professional.  
  • Reduce Operating Costs: Symmetry™ GUEST automates all processes associated with the lifecycle of a visitor, streamlining the journey through the reception area. 

Request a Demo 

Are you ready to ditch the clipboard and stay ahead of the curve? Experience the future of visitor management with Symmetry GUEST. Contact AMAG Technology today to request a demo and see firsthand how Symmetry GUEST can transform your organization’s visitor management processes. 

Embrace the future with Symmetry GUEST – where security, efficiency, and visitor experience converge. 

The post The Future of Visitor Management: Symmetry™ GUEST  appeared first on AMAG.

]]>
AMAG Technology Releases Symmetry CONNECT and Symmetry GUEST V1.82.50 https://amag.com/connect-and-guest-v18100-2/ Mon, 24 Jun 2024 21:40:24 +0000 https://www.amag.com/?p=5977 Get Your Hosted Solutions Tech Update By Matt MacIntosh, Product Manager Hosted Solutions, AMAG Technology The newest Symmetry GUEST Visitor Management version adds additional text messaging capabilities for visitors.   New Visitor Management Text Messages  In addition to emails, Symmetry GUEST can notify visitors of scheduled visits by text message.  With this enhancement, the administrator can ... Read more

The post AMAG Technology Releases Symmetry CONNECT and Symmetry GUEST V1.82.50 appeared first on AMAG.

]]>
Get Your Hosted Solutions Tech Update
By Matt MacIntosh, Product Manager Hosted Solutions, AMAG Technology

The newest Symmetry GUEST Visitor Management version adds additional text messaging capabilities for visitors.  

New Visitor Management Text Messages 

In addition to emails, Symmetry GUEST can notify visitors of scheduled visits by text message.  With this enhancement, the administrator can now configure the ability to text the visitor when a new visit is registered, updated, or canceled. This enhancement improves the options that users must communicate with their visitors.  

When registering for a visit, hosts and host delegates can enable text notifications for a visitor.  When enabled, the visitor will be sent a message to opt in to receive additional messages. From that point forward, any configured messages will be sent to visitors. At any point, the visitor can opt out of receiving future messages via text.  

Additional Enhancements: 

  • A confirmation dialog was added when attempting to delete notes from identities in CONNECT to prevent notes from being accidentally deleted. 
  • Added the ability for administrators to set the password strength settings for web-user’s passwords. 
  • Update the Access Control Integration page to display when an integration has lost its connection to Symmetry CONNECT. With this enhancement, the status of the integration client will change to Lost Connection after three consecutive health checks are not received or after 30 minutes. The status will be updated to Connected once it receives a successful health check. 

In addition, the following issues have been addressed: 

  • Resolved an issue of color not displaying correctly when theming is enabled. 
  • Resolved an issue causing user defined fields not appearing on the visitor badge. 
  • Resolved an issue that caused a visitor to require multiple phone numbers added when registering. 
  • Resolved an issue where credentials suspended by the credential suspension rule was logging an event in the Symmetry CONNECT Activity Report for every day they are suspended. 
  • Resolved an issue where the default card type entered in Symmetry for placeholder cards was not updating. 
  • Resolved an issue with Temporary Badge assigned via Symmetry GUEST where it was not setting the activation date\time in the correct time zone. 
  • Resolved an issue where the access code update in Symmetry was not updated in Symmetry CONNECT. 
  • Resolved an issue with the No Assigned Credential message displaying incorrectly on identities with an assigned credential. 
  • Resolved an issue causing the Credential Suspension Email Notification not to be sent. 
  • Resolved an issue preventing some visitors from being checked in via the Self Registration kiosk. 

Coming Soon… 

  • Ability to assign Wallet Credentials from Symmetry CONNECT. 
  • Ability to assign user roles via rules.
  • Ability to dynamically assign access codes via Symmetry GUEST. 

Watch for these enhancements in the next blog.

To learn more about Symmetry GUEST or Symmetry CONNECT, please call 1-800-889-9138.

The post AMAG Technology Releases Symmetry CONNECT and Symmetry GUEST V1.82.50 appeared first on AMAG.

]]>
AMAG Technology™ Introduces Financial Services Program https://amag.com/financial-services-program/ Mon, 29 Apr 2024 15:49:16 +0000 https://www.amag.com/?p=5724 AMAG Technology™, an Allied Universal Company®, announces the launch of AMAG Technology Financial Services, a groundbreaking initiative designed to provide channel partners with flexible leasing alternatives for their customers. This program offers a strategic resource for channel partners, allowing them to offer customers the choice between purchasing products and services outright or leasing them for ... Read more

The post AMAG Technology™ Introduces Financial Services Program appeared first on AMAG.

]]>
AMAG Technology™, an Allied Universal Company®, announces the launch of AMAG Technology Financial Services, a groundbreaking initiative designed to provide channel partners with flexible leasing alternatives for their customers. This program offers a strategic resource for channel partners, allowing them to offer customers the choice between purchasing products and services outright or leasing them for an agreed-upon term.

AMAG Technology Financial Services offers customized, flexible leasing solutions via a strategic partnership with Vantage Financial.

“We are excited to introduce AMAG Technology Financial Services as a strategic resource for our valued channel partners,” said AMAG Technology President, David Sullivan. “Our partnership with Vantage allows us to provide tailored leasing solutions that meet the unique needs of our channel partners and their customers, ultimately enhancing their ability to finalize sales and drive business growth.”

AMAG Technology’s channel partners will experience improved cash flow, shortened sales cycles, improved margins and more repeat business.

Their end users can preserve cash, eliminate budget constraints, have flexible terms and payment structures, combine multiple purchases into one payment, bundle equipment, and lower their total cost of ownership.

“It’s a win for all involved,” said Sullivan. “It helps channel partners drive business growth and eliminates budget constraints for end users.”

To learn more about AMAG Technology Financial Services, visit https://amag.com/financial-services/.

About AMAG Technology
AMAG Technology, an Allied Universal® Company, is a world leader in unified security solutions that help organizations mitigate risk, ensure compliance and provide peace of mind. AMAG manufactures open solutions under the brand of Symmetry™ that include access control, visitor management, identity management, video management, analytics, mobile and intrusion management. AMAG is headquartered in Hawthorne, California with sales and support located throughout the Americas, EMEA and APAC.

The post AMAG Technology™ Introduces Financial Services Program appeared first on AMAG.

]]>
Designing and Bidding a U.S. Government Project https://amag.com/designing-bidding-us-government-project/ Fri, 26 Apr 2024 15:07:34 +0000 https://www.amag.com/?p=5694 By Senior Application Engineer, Tom Horgan FICAM   HSPD-12   FIPS 201-1   FIPS 201-2   FIPS 201-3   TWIC  NIST 800-116 AMAG Technology’s Symmetry SMS platform is fully approved for use when GSA mandated compliance is required. Designing or bidding access control for US Government facilities can be daunting. There are multiple GSA compliance-related details and terms that need ... Read more

The post Designing and Bidding a U.S. Government Project appeared first on AMAG.

]]>
By Senior Application Engineer, Tom Horgan

FICAM   HSPD-12   FIPS 201-1   FIPS 201-2   FIPS 201-3   TWIC  NIST 800-116

AMAG Technology’s Symmetry SMS platform is fully approved for use when GSA mandated compliance is required.

Designing or bidding access control for US Government facilities can be daunting. There are multiple GSA compliance-related details and terms that need to be completely understood, and applied, both during your conversations / RFI correspondence with the customer and as you work through the project details to prepare your proposal. The AMAG Technology Concept Solution team is a no-cost resource you can use on any project, for design assistance and recommendations.

AMAG Technology offers system design assistance at no cost to Symmetry Authorized Resellers. If you wish to pursue a project involving GSA compliance, or any other project, an AMAG Technology Concept Solutions engineer will work with you through the project proposal life cycle, from receipt of the initial RFQ / RFP, Request for Information submittals and creation of an accurate bill of materials meeting the published requirements. Please consider the AMAG Technology Concept Solutions team as your Subject Matter Expert resource for any projects you are pursuing. Offering this service is in the best interest of both AMAG Technology and the integrator, as it helps ensure project quotes meet the end-user documented requirements.

AMAG Technology’s SMEs can also assist the end-user in the creation of the RFQ / RFP documentation. An AMAG Technology Concept Solutions Engineer will work closely with you to fully understand the desired end results, and make sure your released project documentation correctly identifies all hardware and software to meet your goals. Once you receive the RFQ / RFP responses, the engineer can provide a technical review of each response, verifying the proposal meets your intended specifications. For any technical review of RFQ responses, AMAG Technology requires the proposed cost and submitting company information to be redacted.

AMAG Technology also offers a technical training class specifically for deploying Symmetry as a GSA compliant solution. This class is designed to provide hands-on instruction on all aspects of the approved software and hardware, with specific attention to GSA-required configuration options.

Your AMAG Technology Federal subject matter experts:

Tom Horgan, CSEIP
Senior Application Engineer
Tom.horgan@amag.com

Eric Gillet
Application Engineer
eric.gillet@amag.com

Should you have any questions, or require system design assistance, please contact your Sales Representative or the AMAG Technology Concept Solutions team.

Our job is to help you help your customers.

FICAM Training Program

 

The post Designing and Bidding a U.S. Government Project appeared first on AMAG.

]]>
AMAG Technology Releases Symmetry CONNECT and Symmetry GUEST V1.81.00 https://amag.com/connect-and-guest-v18100/ Wed, 27 Mar 2024 23:04:07 +0000 https://www.amag.com/?p=5524 Get Your Hosted Solutions Tech Update By Matt MacIntosh, Product Manager Hosted Solutions, AMAG Technology The newest Symmetry CONNECT Identity Management version improves the transparency of access requests done on behalf of other identities. Access Request Enhancements The process of requesting access on behalf of another identity has been made more transparent for all parties ... Read more

The post AMAG Technology Releases Symmetry CONNECT and Symmetry GUEST V1.81.00 appeared first on AMAG.

]]>
Get Your Hosted Solutions Tech Update
By Matt MacIntosh, Product Manager Hosted Solutions, AMAG Technology

The newest Symmetry CONNECT Identity Management version improves the transparency of access requests done on behalf of other identities.

Access Request Enhancements
The process of requesting access on behalf of another identity has been made more transparent for all parties involved. Access control representatives can now view and filter the requests by the requester and requestee, ensuring better management of the requests. Additionally, both the requester and the requestee will receive notifications related to the request, allowing for clear communication and keeping everyone informed.

Termination with Lock
A new option has been introduced to allow a lock to be placed on identities terminated status. This option helps address scenarios where an identity needs to be immediately terminated from the access control system, but those changes will not be updated in the HR feed for a period of time. Enabling the lock option will prevent the HR Feed integration from reactivating the identity if its status has not been updated, by first requiring the identity to be set to terminate before it can be set to active.

Coming Soon…
Additional SMS Notifications for Symmetry GUEST
Native iOS and Android apps for Self-Registration Kiosk

Watch for these enhancements in the next blog.

To learn more about Symmetry GUEST or Symmetry CONNECT, please call 1-800-889-9138.

The post AMAG Technology Releases Symmetry CONNECT and Symmetry GUEST V1.81.00 appeared first on AMAG.

]]>
AMAG Technology Unveils New Website https://amag.com/new-website/ Sun, 03 Mar 2024 19:46:07 +0000 https://www.amag.com/?p=5452 AMAG Technology is excited to announce its brand new website designed with new tools and improved functionality to help customers and users easily navigate the site. Enhanced Customer Support in the Utility Bar Recognizing the importance of responsive customer support, the website introduces an upgraded utility bar, prominently featuring the Support section for a smoother ... Read more

The post AMAG Technology Unveils New Website appeared first on AMAG.

]]>
Amag site mock-up on macbookAMAG Technology is excited to announce its brand new website designed with new tools and improved functionality to help customers and users easily navigate the site.

Enhanced Customer Support in the Utility Bar
Recognizing the importance of responsive customer support, the website introduces an upgraded utility bar, prominently featuring the Support section for a smoother customer experience. Customers can easily access support resources, including contact information, technical support, training, customer service, RMA information and the Partner Portal.

Resource Library
The new comprehensive Resource Library provides a curated collection of articles, whitepapers, brochures, videos, case studies, and datasheets and serves as a valuable repository for industry insights, best practices, and in-depth product information. Customers can drill down with a few clicks to retrieve the exact information needed to make informed decisions.

Technology Partners
The newly revamped Technology Partner page showcases integrations with trusted technology partners, offering customers a one-stop destination to explore the expanded capabilities of AMAG Technology’s Symmetry solutions. Similar to the Resource Library, users can click on the product and technology to quickly see which companies integrate with Symmetry Access Control, Symmetry GUEST and Symmetry CONNECT.

What We Do
Instantly access information about the technologies and products available at AMAG Technology. Users can request a demonstration or fill out a form to learn more.

“We are thrilled to unveil our new design, improved navigation and many enhancements to our website, www.amag.com, as part of our ongoing commitment to customer success,” said Kim Rahfaldt, Director, Marketing and Public Relations at AMAG Technology. “The Resource Library, Technology Partner Page, and streamlined Support features are designed to empower our customers with the tools they need to work with AMAG Technology and thrive in today’s dynamic business environment.”

Visit www.amag.com today to explore the new features and discover how AMAG Technology is dedicated to providing innovative solutions and unparalleled support for its valued customers.

The post AMAG Technology Unveils New Website appeared first on AMAG.

]]>
Considerations when Selecting Access Control for Data Centers https://amag.com/access-control-data-centers/ Sun, 03 Mar 2024 15:38:58 +0000 https://www.amag.com/?p=5446 By Philip Verner, Strategic Sales Manager, EMEA for AMAG Technology Data Centers play a crucial role in today’s digital age, serving as the backbone for storing and processing massive amounts of data. With the ever-increasing need for data security, physical security requirements for Data Centers have become more important. In this blog, we will explore ... Read more

The post Considerations when Selecting Access Control for Data Centers appeared first on AMAG.

]]>
Headshot of Philip VernerBy Philip Verner, Strategic Sales Manager, EMEA for AMAG Technology

Data Centers play a crucial role in today’s digital age, serving as the backbone for storing and processing massive amounts of data. With the ever-increasing need for data security, physical security requirements for Data Centers have become more important.

In this blog, we will explore the physical security requirements, challenges, and solutions available for Data Centers with a specific focus on access control deployment throughout the Data Center facility.

Data Center security is often looked at in multiple layers with each layer having specific requirements to secure the facility from its outer periphery areas to the inner core. I’ve heard it referred to as ‘like peeling an onion’ with each layer having a different security requirement until you reach the core.

From the outer perimeter area where Fences, ANPR and Video would be deployed to the inner data entre floor containing the IT racks and cabinets, physical security such as access control can be the system that ties the full security solution together.

Below are some key physical security challenges and requirements that Data Centers need to consider.

An Integrated Approach

Integrations are key to making the overall solution work across the various layers of the Data Center. Deploying access control systems that integrate to a wide variety of technologies is essential to reduce security gaps. Access Control and Video integrations are the obvious examples widely deployed but also having integrations with ANPR, Visitor Management, Lock systems, Intercom and much more ensures that all the systems work together to maintain the security and operations of the Data Center throughout all the security layers.

Area Access

Implementing the right level of access to each area is critical. A basic tenet of access control is giving permission to areas and it is important this is part of the onboarding process and ongoing card management to ensure cardholders only have access to the areas needed.

Utilizing an Identity Management System such as Symmetry™ CONNECT ensures that cardholders only get access to the right areas with authorizations from various departments (HR, IT, Security, etc) in a digitized and integrated manner. Any access permission changes and offboarding when cardholders leave the facility is also managed by the Identity Management system as per pre-set processes as per the facilities requirements. This ensures the various departments are not working in silos and the chances of human error, for example, when a cardholder leaves but their card and access is not properly offboarded from the access control system, is prevented by using an Identity Management system and workflow.

Tailgating

Starting with the entrance area, adding turnstiles to prevent tailgating and facial or fingerprint biometrics for two-factor (card plus biometric) authentication ensures those entering the facility have the relevant access permissions.Within the facility further processes can be implemented to prevent tailgating such as using the access control system to provide airlocks to control movement into higher security areas ensuring only authorized people gain access.

Installing readers on Server racks in the inner Data Center floor can also be linked to the cardholder first using their card at the entrance area ensuring relevant check-in procedures have been followed.

Management of Visitors and Contractors

Data Centers will have various visitors to their sites whether it be staff from other locations, clients or potential clients and contractors who require access to the facility. A visitor management system such as Symmetry™ GUEST will improve the visitor experience, and it will greatly enhance overall security by managing all visitor access to meet onsite security requirements and policies. Visitor details can be tailored by location providing visit information, requesting pre-visit information to be completed, running background checks and much more. An integration to the onsite access control system ensures all data is captured for future reporting and the visitors’ access permissions are managed in the required way.

Insider Threats

One of the biggest security challenges a Data Center faces, whether it’s a Tier 1 or Tier 4, is insider threats. This can be caused through accidental or malicious activity and physical access control systems can play an important part in managing this threat.

Implementing systems with Analytics that can build a risk profile of cardholders and track their movement to report on anomalous activity and movements can assist the physical and cyber security teams to prevent data breaches as part of a wider security plan including audits and staff training to prevent insider issues.

Multi-Site Access Management

Data Center companies often deploy across multi-site campuses and as an organization grows across many countries many are deploying worldwide. Having a standardized approach to their security solutions can ensure an easier deployment on new sites and ongoing operational support.

Working with suppliers that have a global reach with certified partners that can assist to deliver the solution and importantly provide ongoing support and maintenance of the software and hardware is an important aspect of deploying the right systems for their global solutions.

In conclusion, Data Centers must implement the right physical security system as part of a wider security strategy to protect sensitive information and maintain the integrity of their operations. By implementing an integrated security approach with access control, video surveillance and other security solutions, Data Centers can address their physical security requirements across their facility. However, challenges like insider threats and cyber-attacks require continuous monitoring and proactive measures to ensure the security and availability of the Data Center infrastructure.

AMAG Technology supplies its solutions to some of the world’s largest Data Center clients for their global sites. Contact us if you would like to further discuss Data Center security requirements and how we can assist.

The post Considerations when Selecting Access Control for Data Centers appeared first on AMAG.

]]>
AMAG Technology Releases Symmetry CONNECT Identity Management and Symmetry GUEST Visitor Management System V1.79.00 https://amag.com/amag-technology-releases-symmetry-connect-identity-management-and-symmetry-guest-visitor-management-system-v1-79-00/ Mon, 26 Feb 2024 14:01:50 +0000 https://www.amag.com/?p=5396 Get Your Hosted Solutions Tech Update By Matt MacIntosh, Product Manager Hosted Solutions, AMAG Technology The newest Symmetry CONNECT Identity Management version enhances the GUEST self-registration kiosk, adds past check-out notifications, and brings CONNECT more in line with Symmetry ACS by adding support for credential expiry times. Credential Expiry Time: CONNECT has been updated with ... Read more

The post AMAG Technology Releases Symmetry CONNECT Identity Management and Symmetry GUEST Visitor Management System V1.79.00 appeared first on AMAG.

]]>
Get Your Hosted Solutions Tech Update
By Matt MacIntosh, Product Manager Hosted Solutions, AMAG Technology

The newest Symmetry CONNECT Identity Management version enhances the GUEST self-registration kiosk, adds past check-out notifications, and brings CONNECT more in line with Symmetry ACS by adding support for credential expiry times.

Credential Expiry Time:
CONNECT has been updated with a new feature that enables card administrators and technicians to set the exact time when a credential will expire, in addition to the date. The credential expiry time will be set to midnight by default and will be synchronized with the Credential Inactive Time in Symmetry. This enhancement will allow for a credential to be deactivated at a specific time, which can be useful in various situations. For example, a credential can be deactivated at the end of a shift or immediately in the case of a termination.

Past Check-Out Notifications:
Guests now have the ability to flag and send notifications for visits that have exceeded their departure time. This feature, when enabled, highlights any visit that has gone past its checkout time in red on the receptionist page. It also allows notifications to be sent to Security Managers, Building Managers, and Admins. The grace period for the notifications can be configured to show the number of minutes past the departure time. These enhancements provide visibility into who is still in the building after their visit has ended.

Ability to Check-Out via the Self-Registration Kiosk:
Visitors can now bypass the receptionist and use the Self-Registration Kiosk to check out. This new feature will enable visitors to easily locate their visit using standard methods and check out of their visit if they are checked in. By offering this option, the self-registration kiosk will help to alleviate the workload of receptionists in the building’s lobby.

Coming Soon…
Self-Registration Kiosk Enhancements
Additional SMS Notifications for Symmetry GUEST
Access Request Enahcements to display who made the request

Watch for these enhancements in the next blog.

To learn more about Symmetry GUEST or Symmetry CONNECT, please call 1-800-889-9138.

The post AMAG Technology Releases Symmetry CONNECT Identity Management and Symmetry GUEST Visitor Management System V1.79.00 appeared first on AMAG.

]]>
AMAG Releases Symmetry CONNECT Identity Management and GUEST Visitor Management System V1.76.00 https://amag.com/symmetry-connect-guest-v1-76-00/ Wed, 06 Dec 2023 18:37:50 +0000 https://www.amag.com/?p=5007   Get Your Hosted Solutions Tech Update By Matt MacIntosh, Product Manager Hosted Solutions, AMAG Technology   The newest Symmetry CONNECT Identity Management version enhances the request management functionality and expands the filter capabilities of select reports in CONNECT. Request Approvers by Role, not Identity: This update allows access requests and visit approvals to be ... Read more

The post AMAG Releases Symmetry CONNECT Identity Management and GUEST Visitor Management System V1.76.00 appeared first on AMAG.

]]>
 

Get Your Hosted Solutions Tech Update
By Matt MacIntosh, Product Manager Hosted Solutions, AMAG Technology

 

The newest Symmetry CONNECT Identity Management version enhances the request management functionality and expands the filter capabilities of select reports in CONNECT.

Request Approvers by Role, not Identity:
This update allows access requests and visit approvals to be approved by any identity that holds the role required for the current step while the request is valid. This allows for requests to be automatically transferred between identities and new identities to a role to start handling the current requests immediately.

Building Filter for CONNECT Reports:
This update adds a building filter for the Access Group Reader Report, Access Report, and Card Activity Report in CONNECT. This filter allows users to run reports for access groups that are associated with one or more buildings, preventing the need to select multiple access groups to produce the same results.

Issues Resolved:

  • Validation messages are now consistent when creating Identities with duplicate information through the Public API.
  • Building Managers can now edit Identities within their respective buildings.
  • We have addressed an issue where the GET Building command from the Public API was not returning the property of ‘Country.’
  • Onboarding a specific Integration will no longer pull in Unknown Cardholders from other Integrations and create them as Identities.
  • The filter within the ‘Edit ACRM’ filter within the ACRM Role Management now supports special characters.
  • Unknown error no longer pops up when using the check-in and print badge function for a visitor with a photo.
  • We have addressed an issue where a temporary employee credential was not revoked on Check-Out.
  • ACRM can no longer proxy to other ACRMs.
  • IDM uploads will now process an update if the Email and the Employee number match different identities.

Coming Soon…

  • Self-Registration Kiosk Enhancements
  • Support for Credential Expiry Times in Symmetry CONNECT
  • Additional SMS Notifications for Symmetry GUEST
  • Watch for these enhancements in the next blog.

To learn more about Symmetry GUEST or Symmetry CONNECT, please call 1-800-889-9138.

The post AMAG Releases Symmetry CONNECT Identity Management and GUEST Visitor Management System V1.76.00 appeared first on AMAG.

]]>
Securing Knowledge: Access Control Considerations for Universities https://amag.com/securing-knowledge-access-control-considerations-for-universities/ Fri, 10 Nov 2023 00:22:21 +0000 https://www.amag.com/securing-knowledge-access-control-considerations-for-universities/ Universities require unique considerations for physical access control.

The post Securing Knowledge: Access Control Considerations for Universities appeared first on AMAG.

]]>

By Philip Verner, Strategic Sales Manager, EMEA for AMAG Technology

 

Universities are bustling hubs of knowledge, with diverse populations and valuable resources.

Philip Verner, Strategic Sales Manager

 

In this blog, we look at the unique characteristics of universities and the features a security management system needs to meet these requirements. We will specifically delve into the importance of access control in universities and discuss key considerations that can help safeguard students, faculty, staff, and sensitive information.

 

The University Environment

Universities can be comprised of many buildings for teaching, research, administrative offices, student accommodation and social areas. This can be a campus setup or many buildings situated within city areas and often in historic and protected buildings. Prioritizing access control based on the sensitivity of the space is needed to allocate resources effectively.

 

Universities also comprise a mixed group of cardholders including admin and faculty staff, students, contractors and visitors. Large universities will have tens of thousands of cardholders with variable access times throughout the year allowing for term time, exam time and holiday periods.

 

Managing access control across the entire campus can therefore be complex and the systems deployed must take into consideration these unique requirements.

 

Let’s look at some examples…

 

1. Cardholder Administration

Managing a large population of cardholders such as students, staff and contractors at universities can be both costly and time-consuming. Using an Identity Management System such as AMAG’s Symmetry CONNECT can streamline the whole process from on-boarding to off-boarding cardholders when they leave, reducing administration time and the chance of processes not being followed, which can create issues such as cards not being expired or returned when students or cardholders leave. Deploying an Identity Management system can digitise the process reducing administration costs and reducing the chance of errors and enhancing security.

 

With a student’s time at university typically being three to four years, there is a large yearly change in cardholders with new students starting and graduating students leaving, which can also mean a high yearly cost spent on access cards.

 

With these ongoing administrative costs and often a high number of lost cards amongst the student group, there is a move to consider credentials held on Mobile phones instead of traditional access cards, which can provide an easy-to-use option for the student or worker and provide considerable savings for the university. AMAG provides readers with the ability to read traditional access cards and mobile credentials and the Symmetry Mobile platform provides other benefits such as the ability to upload photos via the phone app allowing student photos to be captured and a credential issued prior to arriving onsite.

 

2. Visitor Management Systems

Universities often welcome visitors, including prospective students, guest lecturers, or the local community for functions and conferences. Using a visitor management system, such as Symmetry GUEST, allows for efficient registration, tracking, and monitoring of visitors on campus. This ensures that visitors are given sufficient upfront information in their invitation and are granted appropriate access while maintaining the overall security of the university.

 

3. Implementing Multi-Factor Authentication

Areas such as research labs, data centers and offices that require a higher level of security should consider deploying multi-factor authentication using biometric devices that provide an extra layer of security and reduce the risk of unauthorized access. Universities can also deploy biometric devices for student access to minimize the impact of lost or stolen cards for areas such as classrooms or exam halls.

 

4. Access Control System Integration

Enterprise access control systems that can be integrated with other security systems, such as video cameras, intrusion detection, intercom and more are essential for securing the unique university environment. With many buildings and differing requirements, all sites must have a solution to meet their requirements. An example is when securing old and historic buildings, that might have protected status, and not easy to run new cables for traditional card readers. In such scenarios, wireless or offline locks can provide a secure solution integrated back into the access control system.

 

Such integration allows for a comprehensive security approach, enabling real-time monitoring and rapid response to any potential security breaches or incidents.

 

5. Securing Remote Areas

Providing sufficient security for students throughout the university campus including at their residential areas is essential for promoting a safe and inclusive environment. Installing Intercom systems with integration to the access control system provides a quick way to raise an alarm and speak with security and gives reassurance should any incident occur.

 

Additionally, the access control system should support portable ‘handheld’ card readers for guards to carry for use in open and remote areas. These readers allow guards to check the access permissions and stored images in the access control system, allowing them to do spot checks on anyone suspicious to confirm if they should be in the area. These readers can also provide flexibility for other functions such as quickly checking people into buildings during conventions or other events rather than queuing to swipe on door readers.

 

6. Managing Increasing or Changing Risk

Having an integrated solution that can quickly adapt to changing security situations is essential for the university environment. Threats could be anything as serious as active shooters or threats to students in accommodation areas. Deploying an access control system with a Threat Level application allows guards to quickly change the system status to meet the ongoing threat assisting evacuation or lockdown of the sites.

 

Additionally, as universities are often used for conferences and events hosting VIPs the Threat Level application can also be used as a way to manage the access requirements onsite for the specific period of the event. For example, to remove access permissions for certain cardholder groups, enabling or disabling the need for card plus PIN at readers and much more. This can be done system-wide or by area with a single selection then easily changed after the event has finished without needing a major reconfiguration of the system and devices affected.

 

7. Training and Awareness

While the university and student environment needs to be an enjoyable experience, awareness of security and potential issues is important. Educating the university community about the importance of access control and best practices is vital. Students, staff, and faculty members should receive a level of training on using access control systems correctly, reporting suspicious activities, and following security protocols.

 

Within the deployed access control system there should also be features that assist in following procedures and correct usage. This can include examples like having Workflow capability for guards managing alarms so they follow pre-configured steps and actions on how to manage any type of alarm to take the appropriate actions to handle the situation. The system should also have features that encourage card usage and prevent tailgating to ensure proper reporting of who is in any area. This can be achieved by requiring card usage at designated entrance readers to enable the card to work at doors in other areas.

 

Conclusion

Access control is an essential component of a comprehensive security strategy for universities. By implementing robust access control measures, universities can mitigate risks, safeguard sensitive areas, and protect valuable resources. Managing the large number and different types of cardholders, integrating systems, and fostering a security-conscious culture are vital steps toward creating a safe and secure environment for all.

 

Contact me or visit AMAG Technology if you would like to discuss our solutions available to meet the security requirements of Universities.

The post Securing Knowledge: Access Control Considerations for Universities appeared first on AMAG.

]]>