The Cloud Identity Security Leader
© 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile
© 2012 Ping Identity Corporation “Times they are a changin’” Enterprise Architects “What’s in is good and what’s out is bad” Enterprise Architects “What’s in is good and what’s out is bad”
© 2012 Ping Identity Corporation Who would have thought it? Marketing & Sales “Customer corridor” Marketing & Sales “Customer corridor”
© 2012 Ping Identity Corporation Thanks Steve! The End User “Necessity to do everything, EVERYWHERE!” The End User “Necessity to do everything, EVERYWHERE!”
© 2012 Ping Identity Corporation Worlds colliding! Enterprise Social Mobile
© 2012 Ping Identity Corporation Meet the new network parameter
© 2012 Ping Identity Corporation Because the reality is……
© 2012 Ping Identity Corporation The challenge Enterprise Social Mobile “How do I secure all this so that we can leverage it?”
© 2012 Ping Identity Corporation Why is it such a challenge? Enterprise Firewall © 2012 Ping Identity Corporation Directory Existing AAA eBusiness Portal
© 2012 Ping Identity Corporation Ping Identity Addresses ALL of These Internal SSO Third-party service aggregation External business partners Workforce to external applications Client-facing applications Consumer-facing applications
© 2012 Ping Identity Corporation Our customers Over 800 enterprises, government agencies and services providers worldwide trust Ping Identity for secure Internet SSO – including more than 42 of the Fortune 100. FinanceHealthcareConsumerGovernmentTelecom
© 2012 Ping Identity Corporation Secure the Cloud - Best Practices Do not proliferate passwords – Integrate identity at the application layer not the presentation layer to lower maintenance and avoid user involvement Adhere to secure and proven industry standards – leverage customer and cloud vendor adoption of trusted approaches to Cloud and Mobile SSidentity infrastructure – look for supported integrations and standards to avoid fragile, high maintenance identity architecture Avoid multiple purpose-built identity silos – design for flexibility and scale with a single identity architecture supporting different use cases Separate identity from applications – centralize IT control of identities and access 1 1 Eliminate passwords – don’t sync, replicate or hide them 2 2 Adhere to standards – leverage secure and proven identity standards to maximize interoperability and scale 3 3 Leverage existing identity infrastructure – look for supported integrations and standards to avoid costly, fragile or high maintenance architectures 4 4 Avoid purpose-built identity silos – design a single identity architecture that supports all required use cases 5 5
© 2012 Ping Identity Corporation 14 Are they happy with the choice they made? 98% Customer Satisfaction © 2012 Ping Identity Corporation
Who is Ping Identity? The Leader in internet identity security with the most Production deployments of any vendor 800+ customers (+30/Qtr) 42 of the Fortune 100 Liberty Interoperable Certified with 12 Identity Federation Solutions HQ in Denver, offices in Boston, Vancouver, Istanbul Global customer base and Support Morgan Stanley Innovation Award Winner Partners Over 130 SaaS Application Providers Google, Salesforce, Microsoft & SuccessFactors Boston Vancouver Denver
© 2012 Ping Identity Corporation Deploys in hours Elegant, lightweight scalable Standards-based SAML, OpenID & WS Federation OAuth, WS-Trust Strong Auth… 30 Turn-Key Integrations Anywhere, anytime, any device 800+ Enterprise and SaaS customers 98% customers willing to recommend Ping 42 of the Fortune 100 130+ Cloud SaaS Highly scalable & performance tested Support for all use cases Passwords and identities never leave your control Users only need one secure password Eliminate the effects of password & policy change Centralize policy and support for all cloud apps Enable Cloud application de- provisioning Cloud Identity Management