Ping Identity, Euro Cloud award entry Category: Best Cloud Offering Product: PingFederate 6.6 About Ping Identity Ping Identity is the cloud identity security leader, specialising in cloud identity, security, management, SAML, OAuth, OpenID, WS-Federation, WS-Trust and mobile authentication / authorisation. Ping Identity provides cloud identity security solutions to over 800 of the world's largest companies, government organisations and cloud businesses. With a 99% customer satisfaction rating, Ping Identity empowers 42 of the Fortune 100 to secure hundreds of millions of employees, customers, consumers and partners, using secure, open, standards like SAML, OpenID and OAuth. Businesses that depend on the Cloud rely on Ping Identity to deliver simple, proven, and secure cloud identity management through single sign-on, federated identity management, mobile identity security, API security, social media integration, and centralised access control. Recently honoured as a Red Herring Top 100 company, Ping Identity continues to demonstrate its ongoing commitment to providing the best cloud identity security solutions and service possible to its customers.
About PingFederate 6.6 The rise of the cloud is challenging enterprise IT and security professionals to simplify, control and secure employee, customer and partner identities across perimeter-less internet and cloud ID infrastructures. As enterprises attempt to exert more control over the cloud, they need more granularity in how they leverage existing knowledge of users. As such, having ability to access information about a user (attributes) from multiple data-sources within the enterprise is important. With PingFederate 6.6, businesses can connect and pull attributes into assertions from any number of databases or directories. Where they may have used a virtual directory or meta-directory to get the aggregated 360-degree view of a user in the past, PingFederate 6.6 allows them do this without the need for yet another layer of infrastructure. PingFederate 6.6 secures identities while connecting users and applications conveniently. It integrates with existing identity infrastructure and centralises cloud access control. In short, PingFederate s new adaptive federation features wrap around existing authentication policies and enable businesses to tap into multiple identity stores to pull user attributes for inclusion in federation and cloud single sign-on PingFederate was the first solution to support cloud Single Sign-On (SSO) for native mobile apps and enable API security via OAuth 2.0. It was the first commercial cloud identity management support for OAuth 2.0 which gave businesses more effective ways to secure identities while connecting users, partners customers and applications across cloud mobile and social networking platforms. PingFederate offers CloudDesktop, providing secure one-click access to enterprise and commercial applications. Unlike the competition, the implementation is quick and seamless and can be up and deployed within a few hours. With PingFederate 6.6, Ping Identity recognises that with so many systems being accessed by so many different types of individuals (employees, customers and partners) the one-size-fits-all authentication schema is no longer relevant. Enterprises need a more sophisticated method to leverage different authentication techniques for different users or types of transactions. This is where PingFederate 6.6 s new authentication rules and authentication chaining becomes so useful. It allows enterprises to create any number of different multi-factor authentication policies for use behind different single sign-on initiatives, all with the same product, and just a touch of configuration. For organisations that need to verify and manage access for customers, partners, and employees, PingFederate 6.6 bridges the gap. It allows organisations to collect identity attributes from any number of sources, making complex attribute requirements simple and supplying applications the information necessary for intelligent data access. PingFederate 6.6 strengthens security, intergrates with existing enterprise infrastructure including portals and Identity Management Systems. It simplifies password policy maintenance, centralises cloud access control and deploys in days rather than months, without demanding third party software, extensive custom coding or substantial upgrade projects.