EyeLock Becomes Certified Member of AMAG Technology's Symmetry Preferred Partner Program

AMAG Technology, a security solution provider specializing in access control, video detection, policy-based identity solutions and visitor management, announces EyeLock LLC as its newest certified partner of the Symmetry Preferred Partner Program.  As a certified partner, EyeLock’s iris biometric technology integrates with AMAG’s latest Symmetry Access Control software.  AMAG Technology and EyeLock cooperatively tested and certified this integration.

“We welcome EyeLock as a certified partner and look forward to a long relationship where we can provide state-of-the-art iris-biometric technology to our customers demanding a more secure environment,” said AMAG Technology, Vice President of Product Marketing, Dave Ella.

“We are excited to be a part of AMAG’s Symmetry Preferred Partner Program,” said Anthony Antolino, Chief Marketing and Business Development officer at EyeLock.  “The integration of EyeLock’s technology with AMAG’s Symmetry Access Control system will help accelerate the adoption of EyeLock’s product offering by simplifying the implementation of iris biometrics across access control environments.”

EyeLock’s nano NXT integrates with Symmetry Access Control through EyeLock’s Identity Suite (EIS), and can serve as part of a single factor or two-factor authentication process.  The combination of EIS and Symmetry has made it possible to enable and significantly accelerate the onboarding of iris-based identity authentication technology. The Eyelock software synchronizes with existing employee identities using the Symmetry XML Open Integration module, and when the system is in operation nano NXT communicates directly with Symmetry door controllers for a fast and secure solution.

The nano NXT authenticates up to 20 people per minute, in-motion and at-a-distance with unparalleled accuracy. nano NXT can be used in a variety of environments including commercial/enterprise, corrections, data centers, education, financial services, government, healthcare facilities and hospitality.

EyeLock LLC is a market leader of iris-based identity authentication solutions.  EyeLock’s technology provides an unprecedented level of convenience and security with unmatched biometric accuracy, making it the most proven way to authenticate identity aside from DNA. EyeLock’s proprietary iris authentication technology looks at more than 240 unique iris characteristics and provides a fast, user-friendly experience. EyeLock is one of the only biometric companies in the world to own and control the entire software and algorithm stack, providing dual-eye authentication, an unmatched security architecture and anti-spoofing technology.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.