The Hidden Power of Identity Management: AMAG’s Symmetry Connect Is Reshaping Physical Security
As organizations face increasing pressure to streamline operations and secure access to sensitive facilities, identity management solutions are becoming a critical focus in the physical security space. While traditional access control handles the “how” of gaining entry, identity management tackles the “who” and “why” — automating the full lifecycle of identity onboarding, change requests, and compliance checks. A recent example: one Symmetry Connect client completed over 400,000 access reviews in 20 days, achieving 99% compliance. That kind of operational leap is hard to ignore.
So, what’s driving the rise of identity management, and how exactly does it solve the business problems legacy systems can’t?
In this episode of AMAG Asks, host Kyle Gordon, EVP of Sales, Marketing and Commercial Excellence, sits down with Jeff LeBlanc, VP of Client Services at AMAG Technology, to explore the why and how behind Symmetry Connect, AMAG’s robust identity management solution.
In this episode, they cover:
-
What identity management really means, and how it expands beyond the traditional scope of access control systems.
-
The four key pillars of Symmetry Connect — onboarding/offboarding, identity change management, certifications, and audit automation — and how each solves a critical operational bottleneck.
-
How automation transforms security compliance, turning six-month manual audits into seamless, 30-day tasks requiring only a fraction of the resources.
Jeff LeBlanc is an experienced leader in client services and project management within the Corporate and Physical Security sector, with a strong background in guiding technical support and professional services teams. He currently oversees a team of 17 program managers and engineers at AMAG Technology, managing over 100 customer-facing projects for more than 70 clients. His 30+ year career includes leadership roles at G4S Technology and Bank of America, where he specialized in technical security and operations.