Cloud, big data, social identities and personal mobile devices are forcing organizations to re-evaluate and reconstruct their existing identity security policies. A recent Ernst & Young Survey of 1,700 information security executives found 80% are challenged to deliver IS initiatives for these new technologies. 48% say cloud computing implementations are difficult or very difficult, and just over half have not implemented any controls to mitigate the risks associated with cloud computing.*
“Mobile devices and social identity access are compounding the problems around Cloud security," said IDC Analyst Sally Hudson. “This is driving new requirements for solutions that enable enterprises to extend their existing authentication policies to the Cloud.”
“Ping Identity understands enterprise security requirements for securing identity to the Cloud. That is why we have partnered with them,” said Eric Uythoven, Seros Vice President of Security Solutions. “Our clients are asking us for a secure centralized architecture to verify and manage access for customers, business partners and employees. Time to market for our clients is extremely important and PingFederate’s adaptive federation helps us respond quickly with a solution that’s simple, proven and secure.”
PingFederate 6.6’s adaptive federation capabilities, including Authentication Rules, Authentication Chaining, and Attribute Aggregation, make the Cloud conform to existing identity security policies. Enterprises can combine their existing user authentication methods and user profile data for a personalized, protected and compliant cloud.
New Authentication Rules Extend Existing Enterprise Policies to the Cloud
Every business has its own rules governing customer, partner and employee access to resources and applications. PingFederate 6.6 combines identity federation with policy-based authentication to centralize and strengthen access to all Cloud apps. With PingFederate 6.6, organizations can easily support their Cloud SSO strategies with rules for remote users or sensitive data access..
New Custom Multi-factor Authentication Chaining
Authentication policies must be flexible. Whether an organization requires a specific two-factor authentication scheme or failover authentication for secure access around the clock, PingFederate 6.6 allows organizations to mix and match authentication methods for customized cloud security.
Easier Attribute Management with New Identity Attribute Aggregation
For organizations that need to verify and manage access for customers, partners, and employees, PingFederate 6.6 bridges the gap. It allows organizations to collect identity attributes from any number of sources, making complex attribute requirements simple and supplying applications the information necessary for intelligent data access.
“Whether it’s combining strong auth with social identities for an improved customer experience that doesn’t compromise security, or giving employees remote access to applications while meeting compliance requirements, PingFederate’s adaptive federation features put the control where it belongs,” said Ping Identity Director of Product Marketing Julie Smith. “Enterprises gain control over cloud application access policies for any type of user.”
Existing customers can upgrade to PingFederate 6.6 free of charge. New customers can call sales at 1.877.898.2905 or email [email protected] to schedule a proof of concept or to learn more.
Learn more about PingFederate 6.6
· Download the PingFederate 6.6 Data Sheet
· View the PingFederate 6.6 Video
· Register for the PingFederate 6.6 Webinar
· Read PingFederate 6.6 Use Cases
· Download the PingFederate 6.6 Product Guide
About Ping Identity | The Cloud Identity Security Leader
Ping Identity provides cloud identity security solutions to more than 800 of the world's largest companies, government organizations and cloud businesses. With a 99% customer satisfaction rating, Ping Identity empowers more than 42 of the Fortune 100 to secure hundreds of millions of employees, customers, consumers and partners using secure, open standards like SAML, OpenID and OAuth. Businesses that depend on the Cloud rely on Ping Identity to deliver simple, proven and secure cloud identity management through single sign-on, federated identity management, mobile identity security, API security, social media integration, and centralized access control. Visit pingidentity.com for more information.