EyeLock Becomes Certified Member of AMAG Technology's Symmetry Preferred Partner Program

AMAG Technology, a security solution provider specializing in access control, video detection, policy-based identity solutions and visitor management, announces EyeLock LLC as its newest certified partner of the Symmetry Preferred Partner Program.  As a certified partner, EyeLock’s iris biometric technology integrates with AMAG’s latest Symmetry Access Control software.  AMAG Technology and EyeLock cooperatively tested and certified this integration.

“We welcome EyeLock as a certified partner and look forward to a long relationship where we can provide state-of-the-art iris-biometric technology to our customers demanding a more secure environment,” said AMAG Technology, Vice President of Product Marketing, Dave Ella.

“We are excited to be a part of AMAG’s Symmetry Preferred Partner Program,” said Anthony Antolino, Chief Marketing and Business Development officer at EyeLock.  “The integration of EyeLock’s technology with AMAG’s Symmetry Access Control system will help accelerate the adoption of EyeLock’s product offering by simplifying the implementation of iris biometrics across access control environments.”

EyeLock’s nano NXT integrates with Symmetry Access Control through EyeLock’s Identity Suite (EIS), and can serve as part of a single factor or two-factor authentication process.  The combination of EIS and Symmetry has made it possible to enable and significantly accelerate the onboarding of iris-based identity authentication technology. The Eyelock software synchronizes with existing employee identities using the Symmetry XML Open Integration module, and when the system is in operation nano NXT communicates directly with Symmetry door controllers for a fast and secure solution.

The nano NXT authenticates up to 20 people per minute, in-motion and at-a-distance with unparalleled accuracy. nano NXT can be used in a variety of environments including commercial/enterprise, corrections, data centers, education, financial services, government, healthcare facilities and hospitality.

EyeLock LLC is a market leader of iris-based identity authentication solutions.  EyeLock’s technology provides an unprecedented level of convenience and security with unmatched biometric accuracy, making it the most proven way to authenticate identity aside from DNA. EyeLock’s proprietary iris authentication technology looks at more than 240 unique iris characteristics and provides a fast, user-friendly experience. EyeLock is one of the only biometric companies in the world to own and control the entire software and algorithm stack, providing dual-eye authentication, an unmatched security architecture and anti-spoofing technology.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West: Day 2

    What a great show ISC West 2024 has been so far. The second day on Thursday was as busy or even more hectic than the first. Remember to keep tabs on our Live From ISC West page for news and updates from the show floor at the Sands Expo, because there’s more news coming out than anyone could be expected to keep track of. Read Now

    • Industry Events
    • ISC West
  • A Unique Perspective on ISC West 2024

    Navigating a tradeshow post-knee surgery can be quite the endeavor, but utilizing an electric scooter adds an interesting twist to the experience. While it may initially feel like a limitation, it actually provides a unique perspective on traversing through the bustling crowds and expansive exhibition halls. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3