Most visitors are largely unknown and have not been vetted prior to their arrival, and different types of visitors, such as contractors, vendors and customers all pose different risk levels to the organization. Managing those identities from check-in to departure is critical to a comprehensive security program. Paper logbooks are inaccurate, do not provide an … Read more

Matthew Macintosh - Product Manager - Hosted Solutions

  Get Your Hosted Solutions Tech Update By Matt MacIntosh, Product Manager Hosted Solutions, AMAG Technology   The newest Symmetry CONNECT Identity Management version enhances the request management functionality and expands the filter capabilities of select reports in CONNECT. Request Approvers by Role, not Identity: This update allows access requests and visit approvals to be … Read more