securing a borderless world through identity€¦ · to manage in the cloud, whether they like it...
TRANSCRIPT
Securing a borderless worldthrough identity
Times Have Changed.SO SHOULD SECURITY.
Not long ago, the Internet was a place of anonymity. Security wasn’t based on identity. So to protect users, data
and applications, corporations had to isolate their networks and place everything of value behind firewalls.
Only good, known and trusted items were placed in a ‘green zone’ inside the corporate network, separate
from the unknown, untrusted outside world.
This worked for a while. But the world changed.
Fast forward to today. The cloud boom is moving corporate applications outside the enterprise firewall. More
users are embracing smartphone and tablet technology, taking their mobile devices and company-controlled
devices off the corporate network. IT cost reductions and mass availability of cloud infrastructures such
as Amazon Web Services and Microsoft Azure are driving enterprises to turn down their data centers. As
corporations save billions, the old paradigm of security has essentially become obsolete. The firewall has
become an abandoned artifact of the cold war era in cybersecurity.
Since we opened our doors in 2002, we’ve had
a singular vision to enable our customers to
thrive in this new borderless world by securing
it through identity. We’ve worked tirelessly to
establish identity as the unifying paradigm of
control, securing all of our customers’ users,
devices, networks and applications through
open identity standards.
In today’s cloud and mobile world, our customers
and industry experts alike recognize Ping as the
leading provider of Identity Defined Security —
the next generation of identity and access
management. Our solutions secure over 1.3
billion identities and protect the most critical
assets for some of the world’s largest enterprises.
Our customers are enabled to secure access to
any application from any device.
Our customers will testify that no one matches
our depth of identity expertise. Built of the
highest quality with open standards, our
solutions simplify the immense complexities of
the modern enterprise.
Ping Identity Secures This New World
Our MissionEnable the right people
to access the right things,seamlessly and securely.
We believe any well architected identity system should provide solutions for all identities. Not just some of
them. You may be focused on one use case today, but embracing a solution that can accommodate all of
your identities over time is simply smart. At Ping, we meet these challenges head on with our leading
Identity Defined Security platform, solving three primary use cases across the enterprise.
We Solve the Most ComplexIDENTITY SECURITY CHALLENGESfor the World’s Largest Enterprises
CUSTOMERS demand a more
fluid user experience that’s
balanced with secure
multi-channel access from
anywhere to all apps and APIs.
PARTNERS need simple access to
your partner portal while being
empowered to easily manage
their own user identities, which
improves security and minimizes
your overhead.
EMPLOYEES need secure
enterprise access to a wide
variety of apps from any location,
using any device. But it needs to
be efficient to maximize adoption
and improve productivity.
Today’s enterprise environment is growing in complexity and risk of breach. As a result, many leading enterprises like GE,
Cisco, Walmart, eBay, Chevron, and Netflix are rethinking how they secure their workforces. They rely on our Identity
Defined Security platform to give their employees simple and secure one-click access to all of the web and mobile
applications they need to get the job done.
Leveraging core Federated Access Management capabilities, our platform provides:
• Contextual Authentication - Use a simple multi-factor authentication solution that leverages your employees’ mobile devices so that you can move beyond the reliance on passwords alone.
• Federated Sign-On - Your employees have a secure single sign-on to Office 365, Google Apps and all the SaaS and internal apps they use every day, all while vastly improving your cloud security.
• Access Security - Simplify your access management through a single platform with centralized access policies for your web resources, mobile applications and APIs.
THE COMPANY DEMANDS
EMPLOYEES DESERVE
SECURITY
USABILITY
Workforce Identity Solutions
The global economy is driven by partnerships that span across supply chains and sales and distribution channels. Giving your
partners seamless access to the applications they need is critical to your business, but managing all of those user IDs and
passwords is a financial drain and a serious security risk to your organization. Many world-class enterprises like Walmart, GE
and Cisco trust our Identity Defined Security platform to solve their most complex partner challenges.
Leveraging our Federated Access Management capabilities as well as our cloud identity
and directory services, our platform provides:
• Federated Sign-On - Give all of your parters seamless single sign-on access to all the internal and third-party apps they need through a cloud IAM solution that’s simple to setup and use.
• User Management - Meet the needs of all of your partners big and small, from full cloud directory and SSO services to an Active Directory connection to advanced SAML connections.
• Contextual Authentication - Add another level of security to your partner portal by using a simple multi-factor authentication solution that leverages your partners’ mobile devices.
IN TODAY’S WORLD,
BY WORKING ALONEYOU DON’T WIN
Partner Identity Solutions
Organizations are interacting with their customers through multiple access points such as partner websites, mobile
applications, social channels, web portals, coupon sites and so much more. To optimize their experience across all devices
and channels, Fortune 500 companies like Bank of America and Starbucks depend on Ping. Our Identity Defined Security
platform ensures a simple, secure and seamless access to all of the internal and third-party applications and services they
use to interact with your organization.
• Federated Sign-On - Give your customers single sign-on access to all of your websites and services, leveraging social, mobile and other non-obtrusive data to ensure a fluid experience across all web, mobile and third-party applications.
• Contextual Authentication - Using contextual mobile data, build multi-factor authentication right into your mobile app, ensuring the highest level of security and a trusted brand experience.
• Access Security - Centralize your access control policies for all web, mobile and API resources so the right people only have access to the right things.
CUSTOMERS EXPECT
CAN YOU DELIVER?
Customer Identity Solutions
ONE SIGN-ON FOR EVERYTHING
The effectiveness of our Identity Defined Security platform stems from a set of capabilities that work
together to address the two challenges of modern enterprise security. Federated Access Management
is used to secure real-time identity access control, while Federated Identity Administration is used to
manage the configuration and administration of identity.
Identity Defined SecurityThe Next Generation of Identity and Access Management
Our vision is to enable dynamic access control. This means that real-time authentication and access management work simultaneously for all users, devices and resources. By analyzing a constant stream of contextual data, split-second decisions can be made about user identities and permissions.
ContextualAuthentication
FederatedSign-On
AccessSecurity
Authenticate users leveraging any mobile device and contextual
mobile data.
Enable secure single sign-on to any application from
anywhere on any device.
Authorize access to only the web, mobile and API resources
users need.
Enterprise Access Securityfor a Cloud and Mobile World
Dynamically control access with Federated Access ManagementWe make this possible through continuous mobile-based strong authentication, which is leveraged wherever it’s needed through federated single sign-on. This is combined with a new generation of access control, allowing the management of real-time security by identity in a distributed, heterogeneous environment.
Identity Defined Security
Identity Defined Security
The bulk of today’s employee, customer and partner identities are stored and managed on-premises in Active Directory, LDAP and databases. What’s more, SaaS applications create new identity stores for the enterprise to manage in the cloud, whether they like it or not. Add in the fact that Office 365 and Gmail create yet another identity store for your workforce via Azure AD and Google Cloud Directory, and you can easily see how the future enterprise promises many challenges in managing user attributes, provisioning, privacy and access governance.
Automate identity governance with Federated Identity Administration
UserManagement
FederatedProvisioning
Manage user identities in our cloud directory or bridge to identity providers
like Google and Active Directory.
Synchronize identity permissions across all user stores and applications.
The answer? We’ve created a simplified and centralized identity management tier in the cloud. You can manage user identities in our cloud directory, bridge identities from Active Directory or Google, leverage SCIM standards or adopt one of our many SaaS provisioners. And you can connect these identities to any application running anywhere, even Amazon Web Services. At Ping, we continue to evolve identity management to simplify your ability to see, control and manage identity, attributes and provisioning across your entire infrastructure of on-premise and cloud applications.
Modern Identity Managementfor Complete Visibility and Control
Automate identity governance with Federated Identity Administration
Identity Defined Security
The enterprise is no longer a silo. To enable the cloud, integrate your supply chain and create a seamless customer experience, we must think about identity architectures differently. This is why we’ve built our Identity Defined Security platform on six foundational design principles. They guide our philosophy and product development, and they are required for the success of any modern identity project.
Federated ArchitectureAny connections between users, devices,
applications and the identity platform
use Internet-grade identity protocols
to ensure security even outside of your
network perimeter.
All IdentitiesEvery type of identity is covered in all
communities, including employees,
customers and partners, as well as all
identities of devices, clients and resources.
Internet ScaleTrusted connections have the capability
to grow into the millions and beyond
through homogeneous protocol
interactions and automated registration
and maintenance where possible.
Flexible Deployment:IDaaS or SoftwareDeploy with flexibility and
configurability using any combination
of software installed on-premises or
in a private or public cloud.
Built on StandardsWe require vendors and services to comply
with identity standards, which increases
interoperability and adoption while
reducing the cost of application integration
and maintenance.
Web, Mobile, APIBoth browser and software-based
environments are protected using the
same protocols for web, mobile and API
resources, which also accommodates
future resource variants such as the
Internet of things.
Drive Our Innovation6 DESIGN PRINCIPLES
Over 1,500 Customers and Counting
We Currently Serve:
We’re proud to serve some of the world’s most demanding enterprises, including over half of the Fortune 100 and a fourth of the Fortune 500. Having obsessed over the success of customers at this scale just goes to show that we
can solve the largest and most complex enterprise challenges.
Backed by the BestOur investors comprise some of the world’s strongest venture capital and equity firms that focus on technologies that promise to lead innovation and transform industries.
8 10OF THE
largest biopharmacompanies
largest healthcareplan providers
largest banksin the U.S.
4 36 5OF THE
OF THE