Advanced Zero Trust Features
To support organizations in their Zero Trust efforts, the Ping Intelligent Identity™ platform offers:
- Enhanced Passwordless Authentication Capabilities: Enabled by support for the FIDO2 passwordless authentication flow, and an “Identifier First” adapter, users are prompted for an identifier—such as a username—which triggers user verification via push notification, facial or fingerprint check, or another non-password authentication method.
- Expanded Identity Intelligence: User-behavior based attack detection on APIs to block access if necessary, the ability to evaluate whether two authentication requests from different locations are possible in the time elapsed between them (impossible travel velocity), and IP address reputation assessment before granting access.
- Broadened Enterprise Coverage: Fine-grained control over who has access to user-related data to address data privacy challenges.
New Technology Integrations
- ID DataWeb and Ping Identity partner to verify that users are who they say they are during device registration as part of step-up authentication and account recovery. “Continuous identity verification is an essential security component,” states Matt Cochran, VP of Product and Operations, ID DataWeb. “Our customers need to instantly verify three aspects of their users—who they are, their physical context and their relationships. The result is that they can drive decisions for account opening, authentication or sensitive transactions.”
- MobileIron and Ping Identity together offer greater context for device posture assessment and corresponding policy creation to allow or deny user access. “With modern work increasingly taking place on mobile devices, organizations need a solution that establishes complete control over business data and supports worker productivity,” said Brian Foster, SVP of Product Management, MobileIron. “Ping Identity provides an authentication authority, which when combined with our unified endpoint management software allows for heightened security based on a range of device attributes. The result is a more secure mobile work experience and increased productivity.”
- Zscaler’s Zero Trust Network Access (ZTNA) service, Zscaler Private Access™, and Ping Identity partner to ensure that only authorized users can view and connect to authenticated private apps and data. New integrations take this one step further, allowing IT teams to benefit from automatic termination of a user session in the event of potential security risk. “To protect the business, security must be invisible to users and omnipresent. Traditional security methods that treat users as an IP address and rely on firewall appliances hosted in a datacenter are antiquated in today’s mobile cloud-driven workplace,” says Punit Minocha, SVP of Business and Corporate Development, Zscaler. “We are happy to be working with Ping Identity to help protect enterprise data and enable cloud transformation by bringing together two Zero Trust ecosystem leaders built with user experience and scalability in mind.”
Interested in gaining practical guidance on Zero Trust? Watch the webinar recording “Implementing the Identity and Device Security Principles of Zero Trust” or visit www.pingidentity.com.
About Ping Identity
Ping Identity is pioneering Intelligent Identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity™ platform provides customers, employees, partners and, increasingly, IoT, with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Over half of the Fortune 100 choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft and Amazon. We provide flexible options to extend hybrid IT environments and accelerate digital business initiatives with multi-factor authentication, single sign-on, access management, intelligent API security, directory and data governance capabilities. Visit www.pingidentity.com.
Ping Identity Contact
Ping Identity Media Relations
BIO-key adds Technology Transfer Institute of Africa to its Channel Alliance Program; Bolstering Sales Reach in Large, High-Growth African Market
WALL, N.J. and OWERRI, Nigeria, Nov. 04, 2019 -- BIO-key International, Inc. (NASDAQ: BKYI), an innovative provider of biometric authentication and security solutions, today announced that the company has added Technology Transfer Institute of Africa (TTI) as a Channel Alliance Partner (CAP).
Ipsidy Expands Its Mobile Biometric Solutions Full Support for Both iOS13 With NFC and Android Platforms
LONG BEACH, New York, Oct. 28, 2019 /PRNewswire/ -- Ipsidy Inc., a provider of an Identity as a Service (IDaaS) platform and a suite of secure, mobile, biometric identity solutions, available to any vertical, today announced that it has expanded its offerings across
September 10, 2019 - SAN FRANCISCO--Coalition, the leading cyber insurance company for small and midsize businesses, today announced a new incentive program to reward policyholders who implement Multi-Factor Authentication (MFA, also commonly known as 2FA) on their business email accounts.
DENVER — August 5, 2019 — Ping Identity, the leader in Identity Defined Security, today announced the release of PingCloud Private Tenant, a private cloud identity solution for the enterprise. PingCloud Private Tenant provides cloud identity and access management (IAM) by combining
PALO ALTO, CA and STOCKHOLM, SWEDEN – August 20, 2019 – Yubico, the leading provider of hardware authentication security keys, today announced the general availability of the YubiKey 5Ci, the world’s first security key designed with both USB-C and Lightning connectors on
CHICAGO – CyberArk Impact Americas Conference–– July 17, 2019 – CyberArk (NASDAQ: CYBR), the global leader in privileged access security, today fortified its long-standing relationship with Microsoft by joining the Microsoft Intelligent Security Association to help customers secure infrastructure against privilege-related attacks. This marks the latest