a good thing!
Ping Identity Makes it Easy to Modernize Legacy IAM Systems
Ping Identity Booth #107
Denver and Boston, June 25, 2018 — Ping Identity, the leader in Identity Defined Security, today announced a new product and features designed to simplify the transition to its identity and access management (IAM) solution. It’s a common complaint among global organizations that many legacy IAM offerings are unable to support the modern applications, APIs and single-page applications that are needed to run an enterprise more efficiently.
Legacy IAMs lack integration with third party systems that provide critical threat intelligence and fine-grained entitlement data, which limits assurance that an allowed user and device are accessing a protected resource. They do not support session management for all of today’s applications and resource types, such as SaaS and native mobile applications. Without these key capabilities, outdated IAM systems cannot efficiently address the needs of a modern enterprise. PingAccess, part of the Ping Identity Platform, is designed for the modern enterprise, with its key capabilities to protect resources deployed in the cloud, secure RESTful services and APIs, and provide secure access to business partners and customers.
The latest version of PingAccess, available this month, provides enterprises a streamlined way to simplify migration from their legacy IAM system to a modern access management solution. New features include flexible resource matching and error handling, the ability to configure unprotected resources and more. In addition, Ping is launching a new product, PingAccess Policy Migration, which enables enterprises to quickly and efficiently migrate off of dated systems.
Current State of the Market
The business landscape is evolving to support cloud-first deployments and the IoT. According to a recent McAfee Security report, “over 90% of organizations today are utilizing cloud services.” This is in addition to data in a recent Gartner IoT report that shows “connected things are expected to reach 20.4 billion by 2020.”
With this significant business shift, enterprises must change how they provide their users secure access to an increasingly diverse set of resources deployed across their hybrid IT environments. Many enterprises still have legacy web access management systems (WAM) in place to secure business applications. The result is a lack of fundamental capabilities to support modern applications, APIs and cloud-deployment models.
During migration, enterprises need a solution that can flexibly accommodate their existing infrastructures. Ping Identity’s newest product, PingAccess Policy Migration, and the latest version of PingAccess provide customers a way to ease the migration process to a modern access management solution. Furthermore, Ping continues to add ways to integrate with existing IAM infrastructure and all of the applications your users require.
Introducing PingAccess Policy Migration
A new product from Ping Identity, PingAccess Policy Migration removes the burdensome and error-prone processes involved in manually migrating hundreds of policies from your legacy WAM system to PingAccess. PingAccess Policy Migration allows you to maintain your existing network architecture with options to migrate to agent or proxy configurations. During migration, this new product also enables you to review corresponding import and export values to ensure accuracy, as well as troubleshoot common mapping and export errors. The features in PingAccess Policy Migration greatly reduce an enterprise’s time, cost and errors when migrating complex policies from a legacy IAM system. The combination of PingAccess with PingAccess Policy Migration enables enterprises to transform their access security environment and support today’s business needs.
Centralizing Access Management with New Features
New PingAccess capabilities increase flexibility to match existing deployment architectures and incorporate data from API-enabled systems like mobile device management (MDM) solutions and threat detection systems to make better access decisions. With the addition of single page application support, PingAccess continues to address the evolving needs of the modern enterprise.
“This latest PingAccess release, coupled with the previous enhancements that introduced deployment automation on AWS and configuration of PingAccess from Azure AD, gives customers the confidence that they can transform their access control framework to support modern applications and service,” said Loren Russon, vice president, product management, Ping Identity.
"With its innovative advancements, PingAccess continues to makes it even easier for us to meet and exceed our evolving access management business requirements," added Michael Strong, chief information security officer, GCI.
About Ping Identity
At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom. We let enterprises combine our best-in-class identity solutions with third-party services they already use to remove passwords, prevent fraud, support Zero Trust, or anything in between. This can be accomplished through a simple drag-and-drop canvas. That’s why more than half of the Fortune 100 choose Ping Identity to protect digital interactions from their users while making experiences frictionless. Learn more at www.pingidentity.com.
Ping Identity Media Relations
+1 (757) 635-2807
Follow Us on Twitter: @PingIdentity
Join us on LinkedIn: Ping Identity
Subscribe to our YouTube Channel: PingIdentityTV
Like Us on Facebook: PingIdentityPage