The Hidden Power of Identity Management: AMAG’s Symmetry Connect Is Reshaping Physical Security

 

As organizations face increasing pressure to streamline operations and secure access to sensitive facilities, identity management solutions are becoming a critical focus in the physical security space. While traditional access control handles the “how” of gaining entry, identity management tackles the “who” and “why” — automating the full lifecycle of identity onboarding, change requests, and compliance checks. A recent example: one Symmetry Connect client completed over 400,000 access reviews in 20 days, achieving 99% compliance. That kind of operational leap is hard to ignore.

So, what’s driving the rise of identity management, and how exactly does it solve the business problems legacy systems can’t?

In this episode of AMAG Asks, host Kyle Gordon, EVP of Sales, Marketing and Commercial Excellence, sits down with Jeff LeBlanc, VP of Client Services at AMAG Technology, to explore the why and how behind Symmetry Connect, AMAG’s robust identity management solution.

In this episode, they cover:

  • What identity management really means, and how it expands beyond the traditional scope of access control systems.

  • The four key pillars of Symmetry Connect — onboarding/offboarding, identity change management, certifications, and audit automation — and how each solves a critical operational bottleneck.

  • How automation transforms security compliance, turning six-month manual audits into seamless, 30-day tasks requiring only a fraction of the resources.

Jeff LeBlanc is an experienced leader in client services and project management within the Corporate and Physical Security sector, with a strong background in guiding technical support and professional services teams. He currently oversees a team of 17 program managers and engineers at AMAG Technology, managing over 100 customer-facing projects for more than 70 clients. His 30+ year career includes leadership roles at G4S Technology and Bank of America, where he specialized in technical security and operations.

Recent Episodes

As marketing teams adapt to tighter privacy regulations, the decline of traditional ad tracking, and the rise of social commerce, the profession is navigating a period of rapid transformation. Generative AI, automation, and data-driven personalization are reshaping how brands communicate and compete. Amid these shifts, marketers and educators alike are reexamining the skills and values…

In an age where experiences mean more than possessions, the rise of “active entertainment” has transformed how people unwind and connect. From axe-throwing to rage rooms, the thrill of safe destruction offers a therapeutic escape from daily stress. Yet behind the chaos of shattered glass and flying axes lies a precise operation — one…

In today’s creator economy, small businesses are being built on platforms as accessible as the smartphones in our pockets. From photographers to filmmakers, entrepreneurs are redefining what it means to “go into business” — often without traditional storefronts or investors, but with creativity, collaboration, and digital tools that make scaling possible. For many, payment…