Ping Identity Announces New ZDNet Blog Addresses Why “Identity Matters”
Ping Identity Evangelist John Fontana Tackles the Identity, Privacy and Security Issues Impacting Today’s Enterprise
DENVER, Colo. — January 20, 2012 — Fueled by cloud adoption, mobile computing, privacy, security and similar trends, identity and access management emerged as one of the fastest growing markets in 2011 – a trend that will continue through 2012 and beyond. To address the growing identity issues that will shape tomorrow’s enterprise, John Fontana, identity evangelist for Ping Identity, has launched “Identity Matters,” a new blog on the ZDNet platform.
“Identity and access management is a technology and issues area that has heated up significantly over the past 12 to 14 months, mostly fueled by enterprise cloud, compliance, audit, privacy, mobile computing, API integration and security concerns,” said Fontana. “The Identity Matters blog will look at identity and access management from a holistic perspective – covering the significant issues, trends, adopters and players that are using identity to secure their computing futures.”
Through Identity Matters, Fontana will expose the identity stories that traditionally go uncovered. Some of the primary topics will include:
- The Identity Hybrid – As businesses continue to adopt cloud, mobile and other disruptive technologies, enterprises need integration among existing identity and access management systems, corporate initiatives and the cloud. This will enable greater tracking of who is on their network and what they’re doing, while securing user access to mobile devices and applications.
- The Cloud Identity Build-out – As major vendors build comprehensive identity suites, start-ups and second-tier providers are filling niches with cloud-based identity services. Stirring the identity pot are the Googles and Facebooks of the world – who are fighting to standardize their identity infrastructures to become one of a handful of social identity providers.
- Public/Private Identity Approach – The federal government is developing an identity framework called the National Strategy for Trusted Identities in Cyberspace (NSTIC). This relies on the private sector to build out the identity infrastructure and will require the IETF to ratify important Web-based protocols so businesses can support identity-based access to resources and web services.
John Fontana is currently the identity evangelist for Ping Identity, managing and editing the Ping Talk/Blog. Prior to joining the company as an embedded journalist, Fontana spent 15 years as a senior reporter for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google, among other enterprise vendors. His work has also appeared in The New York Times, CNN, CIO and Mashable.
About Ping Identity | The Cloud Identity Security Leader
Ping Identity provides cloud identity security solutions to more than 800 of the world's largest companies, government organizations and cloud businesses. With a 99% customer satisfaction rating, Ping Identity empowers more than 42 of the Fortune 100 to secure hundreds of millions of employees, customers, consumers and partners using secure, open standards like SAML, OpenID and OAuth. Businesses that depend on the Cloud rely on Ping Identity to deliver simple, proven and secure cloud identity management through single sign-on, federated identity management, mobile identity security, API security, social media integration, and centralized access control. Visit pingidentity.com for more information.
Ping Identity Contacts
Ping Identity Corporation
303.468.2884 (Direct) – 303.913.1650 (Mobile)
Follow Us on Twitter:
Join our LinkedIn Group: Ping Identity Cloud
Subscribe to our YouTube Channel: PingIdentityTV