Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations //

Identity & Access Management

6/8/2015
02:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Ping Identity Announces Enhanced Partner Program to Strengthen Security in a Borderless World

Program Offers Partners Opportunity to Capitalize on Rapid Growth of Predicted $18 Billion Identity Access Management Market

SAN DIEGO — June 8, 2015 — Ping Identity®, the leader of Identity Defined Security, today announced an enhanced partner program at the annual Cloud Identity Summit. The PingPartner Network strengthens security for customers through a vibrant, global partner ecosystem, enabling faster growth, increased market differentiation and an improved bottom line for all partners. The Identity Access Management market is predicted to reach $18.3 billion by 2019. The program gives partners the opportunity to capitalize on this market growth by providing access to Ping’s Identity Defined Security Platform - the only Identity and Access Management (IAM) platform that takes an agnostic approach to identity - including hybrid, cloud and on premises offerings.

Ping Identity enables organizations to ensure that only trusted employees, partners and customers can seamlessly access the right applications using any trusted device by applying an adaptive, risk-driven model for access control. Only Ping Identity solves the complex enterprise challenges imposed by cloud, API, and mobility for workforce, customer, and partner identity security. Putting identity at the center of the security paradigm enables organizations to provide secure, seamless access to applications by continuous evaluation of authentication and authorization factors, instead of relying on antiquated firewalls as a defensive barrier.   

The PingPartner Network offers new partnership options and clearly defined benefits and requirements for prospective partners in three distinct programs: Channel, Managed Service Providers (MSPs) and Alliances.

“Ping Identity has a long history of strong partnerships across the globe that have contributed significantly to our growth,” said Andre Durand, CEO at Ping Identity. “Our partners are a valuable extension of our own expertise -- bringing their capabilities into play and bringing Ping in where they can because we have the most flexible, proven identity solution. Today’s announcement solidifies our partnership network as a more explicit program that benefits all of the organizations we work with and offers great opportunity for those we may partner with in the future.”

 

Channel Program

Partners can qualify for the Platinum, Gold or Referral programs for different levels of support and benefits, including in person pre-sales training, web-based trainings, certifications and competitive margins.

“Our premier partnerships with leading technology providers such as Ping Identity are critical to the success of our business,” said Bryan Wiese, VP, IAM at Accuvant and FishNet Security, becoming Optiv Security. “We need technologies like Ping’s Identity Defined Security Platform in our arsenal of the industry’s most comprehensive solutions and services that help our enterprise clients solve their increasingly complex security challenges.”

 

Managed Service Providers (MSPs) Program

The MSP Program is a single-level program with a variety of benefits, including on location technical support training, pre-sales and post-sale support training, implementation training at Ping Identity, resale and referral margins, a dedicated Ping Identity partner manager and access to sales and marketing tools.

“We are excited to partner with Ping Identity, leveraging their federation platform to deliver IDaaS (Identity as a Service) solutions to our customers. Their ability to easily onboard on-premises as well as SaaS services creates a seamless experience for customers," said Hidemune Sugahara, SVP, head of applications and content at NTT Communications, one of the world's leading cloud services providers. "We are focused on strengthening this partnership, and believe that it will help us realize high quality solutions to the Identity Access Management (IAM) market.”

“The federation and single sign-on offerings from Ping Identity are ideal for our business customers," said Kim Green-Kerr, regional vice-president for Sprint. "With Ping, our customers can securely access cloud applications, including Google Apps for Work, from any device while meeting our IT department’s stringent security and access requirements. We look forward to continuing our work together to build a more secure and accessible work environment for modern enterprises.”

 

Alliance Program

The Alliance Program caters to SaaS providers and technology partners. Current SaaS provider members include Netskope, ServiceNow, Box and Concur and current technology partner members include UnboundID and Radiant Logic. Depending on an organization’s partner level, benefits of the Alliance program include web-based sales and pre-sales training as needed, free implementation training on all products, referral margins, a dedicated account manager, testing environments, access to Ping products, as well as access to sales and co-marketing investment.

"BYOD-friendly policies and an increasing acceptance of shadow IT as the new normal have driven a massive increase in the number of cloud apps used in enterprises,” said Sanjay Beri, CEO at Netskope, a Ping Alliance Partner. “Netskope's goal is to enable safe cloud app usage, be it from the growing adoption of apps like Microsoft Office 365 or the hundreds of unsanctioned apps across the enterprise. Securing access to these apps is an essential component of any organization’s security strategy, and our partnership with Ping provides a comprehensive SSO option for our customers who require a secure way to roll out cloud apps to their employees.”

 

New Developer and Community Portals

To support the PingPartner Network, the company also launched two new online communities to encourage best practice sharing and provide direct access to Ping’s tools and resources. The community portal gives partners and customers a direct line of access to Ping products, best practices, tips, feedback and questions. The developer portalprovides access to software development kits, documentation and code samples to enable developers to bring Identity Defined Security into their applications by leveraging Ping products and open standards, including support for OpenID connect.

For more information on the PingPartner Network’s program options, and to find out more about becoming a Ping Identity partner, please visit: https://www.pingidentity.com/en/partner-network.html

 

About Ping Identity | The Identity Security Company

Ping Identity is the leader in Identity Defined Security for the borderless enterprise, allowing employees, customers and partners access to the applications they need. Protecting over one billion identities worldwide, the company ensures the right people access the right things, securely and seamlessly. More than half of the Fortune 100, including Boeing, Cisco, Disney, GE, Kraft Foods, TIAA-CREF and Walgreens, trust Ping Identity to solve modern enterprise security challenges created by their use of cloud, mobile, APIs and IoT. Visit www.pingidentity.com.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
The Data-Centric Path to Zero Trust
Altaz Valani, Director of Insights Research, Security Compass,  1/13/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).