Ping Identity, Euro Cloud award entry



Similar documents
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Connecting Users with Identity as a Service

Flexible Identity Federation

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

Extend and Enhance AD FS

Increase the Security of Your Box Account With Single Sign-On

Identity. Provide. ...to Office 365 & Beyond

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

The Top 5 Federated Single Sign-On Scenarios

Pick Your Identity Bridge

BYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity

NCSU SSO. Case Study

OPENIAM ACCESS MANAGER. Web Access Management made Easy

CA Single Sign-On Migration Guide

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

managing SSO with shared credentials

Securing Cloud Applications Using Windows Azure Access Control

Glinda Cummings World Wide Tivoli Security Product Manager

Secure Your Enterprise with Usher Mobile Identity

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

EXECUTIVE VIEW. EmpowerID KuppingerCole Report. By Peter Cummings October By Peter Cummings

The Primer: Nuts and Bolts of Federated Identity Management

SAML SSO Configuration

pingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA

HOL9449 Access Management: Secure web, mobile and cloud access

Enable Your Applications for CAC and PIV Smart Cards

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

Introduction to SAML

Cloud SSO and Federated Identity Management Solutions and Services

Customer Identity and Access Management (CIAM) Buyer s Guide

White paper December Addressing single sign-on inside, outside, and between organizations

UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL SS. Single Sign-On (SSO) Solution

Google Identity Services for work

USING FEDERATED AUTHENTICATION WITH M-FILES

A Standards-based Mobile Application IdM Architecture

How to Extend Identity Security to Your APIs

Single Sign On. SSO & ID Management for Web and Mobile Applications

IBM Tivoli Federated Identity Manager

Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps

Simple Cloud Identity Management (SCIM)

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment

An Overview of Samsung KNOX Active Directory-based Single Sign-On

Box: Redefining Security for the Cloud

The Role of Identity Enabled Web Services in Cloud Computing

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper

Speeding Office 365 Implementation Using Identity-as-a-Service

SAML 101. Executive Overview WHITE PAPER

Cloud Security/Access Control and Identity Management. Patrick McLaughlin, Oracle Fellow SAOUG: 14 November, 2011

Cloud Security: Is It Safe To Go In Yet?

MY1LOGIN SOLUTION BRIEF: PROVISIONING. Automated Provisioning of Users Access to Apps

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Getting Started with AD/LDAP SSO

Building Secure Applications. James Tedrick

SINGLE & SAME SIGN-ON ASPECTS

HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM)

SECUREAUTH IDP AND OFFICE 365

Enabling SSO for native applications

People-Focused Access Management. Software Consulting Support Services

CA Technologies Empowers Employees with Better Access to Applications via OneAccess Mobile App

The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs

Flexible Identity Federation

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

OpenLogin: PTA, SAML, and OAuth/OpenID

Protect Everything: Networks, Applications and Cloud Services

IDDY. Case Study: Rearden Commerce Delivers SaaS Via Federation WINNER

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

API-Security Gateway Dirk Krafzig

Securing Content: The Core Currency of Your Business. Brian Davis President, Net Generation

Configuring user provisioning for Amazon Web Services (Amazon Specific)

CA Federation Manager

Introduction and overview view of Citrix ShareFile provisioning. Preparing your Citrix ShareFile account for provisioning

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Overview of products, services and capabilities

Simplify and Secure Cloud Access to Critical Business Data

CLAIMS-BASED IDENTITY FOR WINDOWS

How To Use Salesforce Identity Features

Bringing Cloud Security Down to Earth. Andreas M Antonopoulos Senior Vice President & Founding Partner

Configuring Salesforce

Security Services. Benefits. The CA Advantage. Overview

OpenID Connect 1.0 for Enterprise

Quest One Identity Solution. Simplifying Identity and Access Management

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Integrating Single Sign-on Across the Cloud By David Strom

expanding web single sign-on to cloud and mobile environments agility made possible

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

Internet Information Services Integration Kit. Version 2.4. User Guide

Copyright Pivotal Software Inc, of 10

Service Updates and Enhancements

Adobe unlocks creative velocity.

MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

The Primer: Nuts and Bolts of Federated Identity Management

Getting Started with Clearlogin A Guide for Administrators V1.01

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

OFFICE 365 & SALESFORCE

Transcription:

Ping Identity, Euro Cloud award entry Category: Best Cloud Offering Product: PingFederate 6.6 About Ping Identity Ping Identity is the cloud identity security leader, specialising in cloud identity, security, management, SAML, OAuth, OpenID, WS-Federation, WS-Trust and mobile authentication / authorisation. Ping Identity provides cloud identity security solutions to over 800 of the world's largest companies, government organisations and cloud businesses. With a 99% customer satisfaction rating, Ping Identity empowers 42 of the Fortune 100 to secure hundreds of millions of employees, customers, consumers and partners, using secure, open, standards like SAML, OpenID and OAuth. Businesses that depend on the Cloud rely on Ping Identity to deliver simple, proven, and secure cloud identity management through single sign-on, federated identity management, mobile identity security, API security, social media integration, and centralised access control. Recently honoured as a Red Herring Top 100 company, Ping Identity continues to demonstrate its ongoing commitment to providing the best cloud identity security solutions and service possible to its customers.

About PingFederate 6.6 The rise of the cloud is challenging enterprise IT and security professionals to simplify, control and secure employee, customer and partner identities across perimeter-less internet and cloud ID infrastructures. As enterprises attempt to exert more control over the cloud, they need more granularity in how they leverage existing knowledge of users. As such, having ability to access information about a user (attributes) from multiple data-sources within the enterprise is important. With PingFederate 6.6, businesses can connect and pull attributes into assertions from any number of databases or directories. Where they may have used a virtual directory or meta-directory to get the aggregated 360-degree view of a user in the past, PingFederate 6.6 allows them do this without the need for yet another layer of infrastructure. PingFederate 6.6 secures identities while connecting users and applications conveniently. It integrates with existing identity infrastructure and centralises cloud access control. In short, PingFederate s new adaptive federation features wrap around existing authentication policies and enable businesses to tap into multiple identity stores to pull user attributes for inclusion in federation and cloud single sign-on PingFederate was the first solution to support cloud Single Sign-On (SSO) for native mobile apps and enable API security via OAuth 2.0. It was the first commercial cloud identity management support for OAuth 2.0 which gave businesses more effective ways to secure identities while connecting users, partners customers and applications across cloud mobile and social networking platforms. PingFederate offers CloudDesktop, providing secure one-click access to enterprise and commercial applications. Unlike the competition, the implementation is quick and seamless and can be up and deployed within a few hours. With PingFederate 6.6, Ping Identity recognises that with so many systems being accessed by so many different types of individuals (employees, customers and partners) the one-size-fits-all authentication schema is no longer relevant. Enterprises need a more sophisticated method to leverage different authentication techniques for different users or types of transactions. This is where PingFederate 6.6 s new authentication rules and authentication chaining becomes so useful. It allows enterprises to create any number of different multi-factor authentication policies for use behind different single sign-on initiatives, all with the same product, and just a touch of configuration. For organisations that need to verify and manage access for customers, partners, and employees, PingFederate 6.6 bridges the gap. It allows organisations to collect identity attributes from any number of sources, making complex attribute requirements simple and supplying applications the information necessary for intelligent data access. PingFederate 6.6 strengthens security, intergrates with existing enterprise infrastructure including portals and Identity Management Systems. It simplifies password policy maintenance, centralises cloud access control and deploys in days rather than months, without demanding third party software, extensive custom coding or substantial upgrade projects.