The Hidden Power of Identity Management: AMAG’s Symmetry Connect Is Reshaping Physical Security

 

As organizations face increasing pressure to streamline operations and secure access to sensitive facilities, identity management solutions are becoming a critical focus in the physical security space. While traditional access control handles the “how” of gaining entry, identity management tackles the “who” and “why” — automating the full lifecycle of identity onboarding, change requests, and compliance checks. A recent example: one Symmetry Connect client completed over 400,000 access reviews in 20 days, achieving 99% compliance. That kind of operational leap is hard to ignore.

So, what’s driving the rise of identity management, and how exactly does it solve the business problems legacy systems can’t?

In this episode of AMAG Asks, host Kyle Gordon, EVP of Sales, Marketing and Commercial Excellence, sits down with Jeff LeBlanc, VP of Client Services at AMAG Technology, to explore the why and how behind Symmetry Connect, AMAG’s robust identity management solution.

In this episode, they cover:

  • What identity management really means, and how it expands beyond the traditional scope of access control systems.

  • The four key pillars of Symmetry Connect — onboarding/offboarding, identity change management, certifications, and audit automation — and how each solves a critical operational bottleneck.

  • How automation transforms security compliance, turning six-month manual audits into seamless, 30-day tasks requiring only a fraction of the resources.

Jeff LeBlanc is an experienced leader in client services and project management within the Corporate and Physical Security sector, with a strong background in guiding technical support and professional services teams. He currently oversees a team of 17 program managers and engineers at AMAG Technology, managing over 100 customer-facing projects for more than 70 clients. His 30+ year career includes leadership roles at G4S Technology and Bank of America, where he specialized in technical security and operations.

Recent Episodes

Today’s digital landscape isn’t just shaped by code—it’s shaped by how deeply companies listen. Whether in retail, software, or AI, brands that center their design around real user behavior are pulling ahead. Intuit’s “Follow Me Home” approach exemplifies this mindset, encouraging teams to observe customers in their daily environments to uncover real needs. This…

Technology disruption continues to reshape how we work, learn, and connect. From bookstores to browsers, the leap from physical to digital has transformed not only industries, but expectations. According to McKinsey & Company, generative AI alone could add up to $4.4 trillion annually to the global economy, making it vital to understand how curiosity,…

As baggage handling professionals, we speak a language all our own. Merge logic, tracking mechanisms, and baggage reconciliation. While the traveling public sees only their suitcase appear on the carousel, we understand the sophisticated symphony that makes it all happen. That’s exactly why the International Association of Baggage System Companies (IABSC) exists. Our secret sauce…