AMAG Launches Wallet-Enabled Ecosystem for Seamless Mobile Credentialing

 

As mobile credentials increasingly replace traditional keys and cards, organizations are grappling with how to streamline access across a diverse user base. With technologies like NFC and digital wallets gaining traction, the conversation is shifting from “if” mobile access is the future to “how” it should be delivered. According to Juniper Research, digital wallet users are expected to exceed 5.2 billion globally by 2026, making it clear that the wallet-based ecosystem is becoming the new standard for digital identity and access management.

So, as more companies roll out wallet-compatible credentials, one question looms large: What makes a wallet-enabled access ecosystem work for users, for integrators, and at scale?

In this episode of AMAG Asks, host Kyle Gordon sits down with Matt MacIntosh, Product Manager for Hosted Solutions at AMAG Technology, to explore the launch of AMAG’s wallet credential and the broader shift toward an appless, mobile-first access control ecosystem.

In this episode:

  • Why NFC-based wallet credentials are gaining adoption over Bluetooth-based mobile credentials

  • How AMAG’s approach to appless provisioning reduces friction for end users and integrators alike

  • What sets AMAG’s wallet-enabled ecosystem apart in terms of scalability and integration with identity management tools

Matthew MacIntosh is a seasoned product manager with over nine years at AMAG Technology, where he leads hosted solutions for enterprise security systems, including mobile credentials and physical identity management. He brings deep experience in customer advocacy, software development, and cross-functional collaboration, supported by an MBA in Information Technology. Throughout his career—from software development at Sybase and SAP to R&D leadership at Conworx—he has consistently driven product innovation, lifecycle management, and integration for complex enterprise solutions.

Recent Episodes

Despite growing gender diversity in many industries, the security field continues to be largely male-dominated. However, that landscape is evolving as more women in security step into leadership roles, challenge long-standing norms, and contribute to a more inclusive culture. Through mentorship, development programs, and increased visibility, this shift is not only empowering individuals but…

From AI-driven surveillance to dynamic mobile guarding, the way we secure commercial real estate, corporate campuses, and critical infrastructure is undergoing a major transformation. As high-value assets face increasingly complex threats, security is no longer just about cameras and guards—it’s about predictive insights, global awareness, and resilience planning. According to a Securitas discussion,…

As global reliance on data centers surges, so do the demands for highly trained security personnel to protect these mission-critical infrastructures. The complexity of modern data centers—ranging from physical access requirements to AI-integrated systems—requires a new caliber of officer. According to Uptime Institute, 60% of data center outages cost more than $100,000, emphasizing the…