AMAG Technology Unveils New Symmetry Retrofit Solution for Competitor End of Life Scenarios

AMAG Technology Unveils New Symmetry Retrofit Solution for Competitor End of Life Scenarios

AMAG Technology, an access control, IP video and intrusion detection solution provider, is now your source for retrofit solutions, with the introduction of their new Symmetry Retrofit (SR) Controllers, designed for new installations as well as for customers who are facing a security system limitation or end-of-life scenario with a competitor’s product. AMAG’s SR Controllers enable a customer to upgrade their aging or discontinued security management system easily and affordably, and protect their current infrastructure investment by reusing existing cards, readers and wiring.

The SR Controllers use a pluggable backplane architecture efficiently designed into a compact enclosure.  The controllers are fully interoperable with Symmetry’s multiNODE M2150 and EN series of controllers, so the ideal architecture can be used within a customer’s environment.  The SR Controllers support up to 16 card readers and easily expands, using plug-in door controller and I/O modules, allowing fast, cost effective installations or retrofits for any size system.  Each SR Controller has onboard memory for 200,000 card holders, but there is no limit to the number of card holders a Symmetry Security Management System can support. With Symmetry Security Management Software, the SR Controller range delivers a seamless security management system to protect small and large facilities, while leveraging the customer’s current infrastructure investment and providing a low total cost of ownership.

“Our Symmetry Retrofit Controllers offer end users an affordable alternative to completely ripping out competitor systems or investing in expensive upgrades,” said AMAG Technology, Executive Vice President of Sales and Marketing, Matt Barnette.  “End users can perform a technology refresh on their access control system with minimal cost, little to no system downtime and more importantly, be done with the distraction and uncertainty surrounding their current technology partner.  This is a ‘One and Done’ solution, meaning we convert the system over, and our customers can move on to more important business issues.”

When a customer upgrades using SR Controllers, a Symmetry software solution provides:

  • Integrated access control, IP video and intrusion detection functionality;
  • Minimal system downtime;
  • Assistance with migration planning for a successful transition to Symmetry technology;
  • Preservation of existing readers, device wiring, and terminations; and
  • Preservation of badge population and current investment.

Key features of the SR Controller include:

  • High-density solution for access control, especially retrofits;
  • Connects to Symmetry Security Management Software via LAN, WAN, RS232 or modem;
  • AES (128 or 256 bit) encrypted communications to Symmetry software;
  • Up to 16 doors and card readers per controller;
  • Retain existing smart card, proximity, or magstripe card readers;
  • Modular mix and match configuration using plug-in circuit boards; and
  • Support for serial-connected chains of up to 32 controllers – minimize consumption of network resources, retain existing wiring.

For more information, please visit http://www.amag.com/.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3