The Hidden Power of Identity Management: AMAG’s Symmetry Connect Is Reshaping Physical Security

 

As organizations face increasing pressure to streamline operations and secure access to sensitive facilities, identity management solutions are becoming a critical focus in the physical security space. While traditional access control handles the “how” of gaining entry, identity management tackles the “who” and “why” — automating the full lifecycle of identity onboarding, change requests, and compliance checks. A recent example: one Symmetry Connect client completed over 400,000 access reviews in 20 days, achieving 99% compliance. That kind of operational leap is hard to ignore.

So, what’s driving the rise of identity management, and how exactly does it solve the business problems legacy systems can’t?

In this episode of AMAG Asks, host Kyle Gordon, EVP of Sales, Marketing and Commercial Excellence, sits down with Jeff LeBlanc, VP of Client Services at AMAG Technology, to explore the why and how behind Symmetry Connect, AMAG’s robust identity management solution.

In this episode, they cover:

  • What identity management really means, and how it expands beyond the traditional scope of access control systems.

  • The four key pillars of Symmetry Connect — onboarding/offboarding, identity change management, certifications, and audit automation — and how each solves a critical operational bottleneck.

  • How automation transforms security compliance, turning six-month manual audits into seamless, 30-day tasks requiring only a fraction of the resources.

Jeff LeBlanc is an experienced leader in client services and project management within the Corporate and Physical Security sector, with a strong background in guiding technical support and professional services teams. He currently oversees a team of 17 program managers and engineers at AMAG Technology, managing over 100 customer-facing projects for more than 70 clients. His 30+ year career includes leadership roles at G4S Technology and Bank of America, where he specialized in technical security and operations.

Recent Episodes

 In today’s rapidly evolving business landscape, B2B customers expect more than just reliable services—they want proactive partners who deliver personalized value. A Deloitte study found that 62% of B2B customers made additional purchases after a positive customer service experience, underscoring how deeply customer satisfaction influences growth and retention. For security firms, this reinforces…

Despite growing gender diversity in many industries, the security field continues to be largely male-dominated. However, that landscape is evolving as more women in security step into leadership roles, challenge long-standing norms, and contribute to a more inclusive culture. Through mentorship, development programs, and increased visibility, this shift is not only empowering individuals but…

From AI-driven surveillance to dynamic mobile guarding, the way we secure commercial real estate, corporate campuses, and critical infrastructure is undergoing a major transformation. As high-value assets face increasingly complex threats, security is no longer just about cameras and guards—it’s about predictive insights, global awareness, and resilience planning. According to a Securitas discussion,…