Tagged: product

Transforming the Management of Identities

By AMAG Technology, President, Kurt Takahashi

Kurt Takahashi_photoAt first glance, access control systems may appear straightforward: built simply to lock and unlock a door. But delve deeper, and the administration of granting approval becomes extremely labor-intensive, and timely, in nature.

Email traffic between security teams and site managers or business owners becomes overwhelming, as requests for approvals must be granted and access taken away manually, and precious time is wasted generating reports.

While this in itself is problematic, it also leads to a rise in third-party compliance regulations. In the US, these can include everything from the Health Insurance Portability and Accountability Act for the healthcare sector to the North American Electric Reliability Corporation’s Critical Infrastructure Protection standards for utilities.

So, how do you efficiently manage the way that physical identities are requesting approval, and ensure that it is carried out correctly?

A self-contained solution

For many years there hasn’t been a solution to automate this process; one of the biggest problems with identity and access management – aside from technological developments – being the lack of knowledge around the benefits that it brings.

CONNECTLaptop.Coffee.9.17In response to this, AMAG Technology has developed Symmetry CONNECT, a policy-based identity management platform that addresses three fundamental areas – cost, compliance and risk – while streamlining and automating timely manual administration processes.

The platform is a simple-to-use self-service portal, where the user can log in and the system automatically identifies them, their role, location and the training and certifications that they possess – all the data contained within a company’s HR system.

Once the user has requested access to a particular site through the portal – a data center, for example – it sends a notification to the area owner, who can automatically see whether the user meets the criteria, and approve or deny the request.

There’s no intervention by anybody, with the system controlling both the policy and the actions. Because the entire transaction is self-contained, it can be reported on and audited against immediately, without the need for manual verification.

Equally, when onboarding new employees, the same methodology is in place. The system will use HR data to automatically grant access to a new employee, when needed, on one or multiple sites across the globe – and terminate access when the employee comes to leave the company.

Depending on the customer, requirements can be specified even further. As well as interfacing with our access control system, Symmetry, and a company’s own HR database, we can also draw upon other information. For example, CONNECT could acknowledge a company’s policy for international travelers, who may be required to sign a non-disclosure agreement before entering a building. Equally, the system could take background check information into account to manage access to a children’s hospital.

Reaping the rewards

With technology and innovation at its heart, CONNECT provides a completely unique solution to the market, and a lot of research and thought went into developing the system. We looked specifically at compliance requirements, because a lot of these have specific needs that are derived out of the access control system, which controls a site’s restricted areas.

Designed for any business working within a regulated market or that poses a high risk potential by allowing access to the wrong person – be it a bank granting incorrect access to a cash vault, or a utility company to a substation – the system has the potential to significantly improve a company’s bottom line.

CONNECT_laptop.9.17Alongside the compliance benefits, with the platform controlling the process and providing automatic vetting and reports, reducing the amount of manual reporting – across enterprises where thousands of people are often involved in approval processes – results in substantial cost savings. From a risk perspective, because it’s a policy-based system, the actions are controlled by the user from beginning to end. They can ensure that the right people have the right approvals every time, lowering the risk.

This three-pronged, automated approach is proving very successful with businesses worldwide. In fact, one customer has recently expanded its use from North America to Europe, the Middle East, Africa and Asia Pacific. We automate over a million audits a year for the business, which used to be performed manually, so the people, time and money savings are monumental.

Improved data consumption

While the platform works exclusively with the Symmetry Access Control system, CONNECT operates as an open application, which means it can integrate into most third-party databases to help consume any and all information that’s pertinent about a particular physical identity.

In the future, technological integration and automation will be paramount in the identity management and access control business. While continuing to enhance compliance, the immense amount of data collected about our people, where they’re going and how they’re going will feed into our vision of a risk-based, data-centric future.

This primary source of information feeds into a larger platform that will allow us to extract and present more intelligent data – not just around identities, but also activity and risk. This plays a pivotal part in forming a bigger picture moving forwards, a picture that will help us to better understand data, people and behavior, and their significance when it comes to security.

Enter your email address to follow this blog and receive notifications of new posts by email.


See our Unique Offerings at ASIS

Jody_Headshot_2017_croppedBy Jody Ross, Global Vice President of Sales and Business Development, AMAG Technology

Summer is winding down and football season is right around the corner. That must mean ASIS will be here soon!

This year, more than ever, I am excited about ASIS. After working closely with our customers and implementing features you suggested, we are proud to release the newest version of our policy-based identity management platform, Symmetry CONNECT.

Meeting compliance is at the forefront of today’s security concerns. We understand the importance of not falling out of compliance and encountering heavy fines along with potential other losses. Symmetry CONNECT can help you stay in compliance without adding costly staff. It eliminates manual processes, reduces costs, and automates your onboarding, offboarding and access provisioning.

Visit our booth 3823 to learn how CONNECT can manage the entire identity of your employees, contractors and visitors while saving you money and keeping your company in compliance.

BlueReadersWe are also featuring our new Symmetry Blue reader range. Imagine using your phone, something you carry with you all the time, to open doors and all you pay for are the readers? That’s what you get from AMAG. We offer our mobile app for FREE, while our competitors charge for it. Come check it out. I think universities and commercial entities will be the early adopters of this forward-thinking technology, but it’s useful in essentially all vertical markets.

We added new features to our SymmetryWEB web client. Drop by our booth 3823 and learn how you can easily manage alarms and cards in Symmetry Access Control from a tablet or smartphone.

I invite you to come visit us to see what’s new, say hello and ask questions. We want to hear from you. AMAG provides a unique offering unlike no other company. Where else can you get access control, video management, identity management and visitor management all from the same company? Stop by and give us the opportunity to learn your needs and figure out how we can help. Contact me at jody.ross@amag.com or my team to schedule a demo or just stop by our booth 3823 at ASIS.