Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.

Similar presentations


Presentation on theme: "The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile."— Presentation transcript:

1 The Cloud Identity Security Leader

2 © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

3 © 2012 Ping Identity Corporation “Times they are a changin’” Enterprise Architects “What’s in is good and what’s out is bad” Enterprise Architects “What’s in is good and what’s out is bad”

4 © 2012 Ping Identity Corporation Who would have thought it? Marketing & Sales “Customer corridor” Marketing & Sales “Customer corridor”

5 © 2012 Ping Identity Corporation Thanks Steve! The End User “Necessity to do everything, EVERYWHERE!” The End User “Necessity to do everything, EVERYWHERE!”

6 © 2012 Ping Identity Corporation Worlds colliding! Enterprise Social Mobile

7 © 2012 Ping Identity Corporation Meet the new network parameter

8 © 2012 Ping Identity Corporation Because the reality is……

9 © 2012 Ping Identity Corporation The challenge Enterprise Social Mobile “How do I secure all this so that we can leverage it?”

10 © 2012 Ping Identity Corporation Why is it such a challenge? Enterprise Firewall © 2012 Ping Identity Corporation Directory Existing AAA eBusiness Portal

11 © 2012 Ping Identity Corporation Ping Identity Addresses ALL of These Internal SSO Third-party service aggregation External business partners Workforce to external applications Client-facing applications Consumer-facing applications

12 © 2012 Ping Identity Corporation Our customers Over 800 enterprises, government agencies and services providers worldwide trust Ping Identity for secure Internet SSO – including more than 42 of the Fortune 100. FinanceHealthcareConsumerGovernmentTelecom

13 © 2012 Ping Identity Corporation Secure the Cloud - Best Practices Do not proliferate passwords – Integrate identity at the application layer not the presentation layer to lower maintenance and avoid user involvement Adhere to secure and proven industry standards – leverage customer and cloud vendor adoption of trusted approaches to Cloud and Mobile SSidentity infrastructure – look for supported integrations and standards to avoid fragile, high maintenance identity architecture Avoid multiple purpose-built identity silos – design for flexibility and scale with a single identity architecture supporting different use cases Separate identity from applications – centralize IT control of identities and access 1 1 Eliminate passwords – don’t sync, replicate or hide them 2 2 Adhere to standards – leverage secure and proven identity standards to maximize interoperability and scale 3 3 Leverage existing identity infrastructure – look for supported integrations and standards to avoid costly, fragile or high maintenance architectures 4 4 Avoid purpose-built identity silos – design a single identity architecture that supports all required use cases 5 5

14 © 2012 Ping Identity Corporation 14 Are they happy with the choice they made? 98% Customer Satisfaction © 2012 Ping Identity Corporation

15 Who is Ping Identity? The Leader in internet identity security with the most Production deployments of any vendor 800+ customers (+30/Qtr) 42 of the Fortune 100 Liberty Interoperable Certified with 12 Identity Federation Solutions HQ in Denver, offices in Boston, Vancouver, Istanbul Global customer base and Support Morgan Stanley Innovation Award Winner Partners Over 130 SaaS Application Providers Google, Salesforce, Microsoft & SuccessFactors Boston Vancouver Denver

16 © 2012 Ping Identity Corporation  Deploys in hours  Elegant, lightweight scalable  Standards-based  SAML, OpenID & WS Federation  OAuth, WS-Trust  Strong Auth…  30 Turn-Key Integrations  Anywhere, anytime, any device  800+ Enterprise and SaaS customers  98% customers willing to recommend Ping  42 of the Fortune 100  130+ Cloud SaaS  Highly scalable & performance tested  Support for all use cases  Passwords and identities never leave your control  Users only need one secure password  Eliminate the effects of password & policy change  Centralize policy and support for all cloud apps  Enable Cloud application de- provisioning Cloud Identity Management


Download ppt "The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile."

Similar presentations


Ads by Google