Yesterday, we released PingFederate 6.6, which introduces a number of new controls that should have security architects smiling. PingFederate’s adaptive federation features put the control where it belongs; enterprises gain control over cloud application access policies for any type of user. That includes combining strong auth with social identities for an improved customer experience that doesn’t compromise security, or giving employees remote access to applications while meeting compliance requirements.
I’d say more, but perhaps it is said best by one of our customers, Eric Uythoven, vice president of security solutions at Seros:
“Ping Identity understands enterprise security requirements for securing identity to the Cloud. That is why we have partnered with them. Our clients are asking us for a secure centralized architecture to verify and manage access for customers, business partners and employees. Time to market for our clients is extremely important and PingFederate’s adaptive federation helps us respond quickly with a solution that’s simple, proven and secure."
We have collected all the fundamentals you need to know in the list below.
- Launch Press Release
- Ernst and Young Report referenced in the Press Release, Into the Cloud, Out of the Fog; 2011 Global Information Security Survey
- PingFederate 6.6 Announce Landing Page - Everything you need to know about PingFederate 6.6.
- PingFederate 6.6 Video - Features and use cases for Adaptive Federation
- PingFederate 6.6 Webinar Registration - Make sure your customers and prospect registered for the Webinar exploring Adaptive Federation
- PingFederate Web Page
- PingFederate Datasheet
- PingFederate Product Guide
Maybe that should be 10 links; here are two stories from the tech press:
ReadWriteWeb: It's PingFederate 6.6 vs. "Identity as a Service"