The Hidden Power of Identity Management: AMAG’s Symmetry Connect Is Reshaping Physical Security

 

As organizations face increasing pressure to streamline operations and secure access to sensitive facilities, identity management solutions are becoming a critical focus in the physical security space. While traditional access control handles the “how” of gaining entry, identity management tackles the “who” and “why” — automating the full lifecycle of identity onboarding, change requests, and compliance checks. A recent example: one Symmetry Connect client completed over 400,000 access reviews in 20 days, achieving 99% compliance. That kind of operational leap is hard to ignore.

So, what’s driving the rise of identity management, and how exactly does it solve the business problems legacy systems can’t?

In this episode of AMAG Asks, host Kyle Gordon, EVP of Sales, Marketing and Commercial Excellence, sits down with Jeff LeBlanc, VP of Client Services at AMAG Technology, to explore the why and how behind Symmetry Connect, AMAG’s robust identity management solution.

In this episode, they cover:

  • What identity management really means, and how it expands beyond the traditional scope of access control systems.

  • The four key pillars of Symmetry Connect — onboarding/offboarding, identity change management, certifications, and audit automation — and how each solves a critical operational bottleneck.

  • How automation transforms security compliance, turning six-month manual audits into seamless, 30-day tasks requiring only a fraction of the resources.

Jeff LeBlanc is an experienced leader in client services and project management within the Corporate and Physical Security sector, with a strong background in guiding technical support and professional services teams. He currently oversees a team of 17 program managers and engineers at AMAG Technology, managing over 100 customer-facing projects for more than 70 clients. His 30+ year career includes leadership roles at G4S Technology and Bank of America, where he specialized in technical security and operations.

Recent Episodes

Artificial intelligence has already moved beyond the hype cycle and into the day-to-day reality of business operations. Companies across industries are rushing to integrate AI into their workflows, but many are running into the same challenge: it’s relatively easy to build something that works in a demo, and much harder to make it reliable…

Farming is under more pressure than it’s been in years. Costs are rising, prices are unpredictable, and every decision carries more weight than it used to. What many still think of as a traditional industry is quietly evolving, with more farmers turning to digital tools to manage risk and stay competitive. It’s not about chasing…

Artificial intelligence has moved from buzzword to boardroom priority at a staggering pace. Yet despite widespread adoption, many organizations are still struggling to turn experimentation into measurable business value—some estimates suggest the majority of enterprise AI initiatives fail to scale successfully. As AI becomes “table stakes” across industries, the real challenge is no longer…