a good thing!
The Identity Defined Security Alliance Releases New Integration Framework to Help CISOs Rapidly Build Identity-Centered Security Solutions; Welcomes Two New Technology Members
New Orleans, LA — June 7, 2016
At the Cloud Identity Summit (CIS), the Identity Defined Security Alliance supported by founding members Ping Identity, the leader of Identity Defined Security™, and Optiv Security, a market-leading provider of end-to-end cyber security solutions, today announced the release of a new identity integration framework. Alliance members jointly created the framework, which showcases the capabilities and specific best-of-breed technologies necessary for CISOs to implement comprehensive, next generation solutions that securely place identity at the center of security. The Alliance also welcomed Exabeam and Lieberman Software to its ecosystem of leading technology providers that will help the Alliance continue developing integrated, identity-centered solutions.
“The Identity Defined Security Alliance is quickly becoming a powerful force in our industry for delivering proven, transformational, quick-to-market solutions that help solve critical security requirements,” said Andre Durand, CEO of Ping Identity. “Customers are the big winners, relying on the experience, integration and best practices of these technology leaders who all understand that identity should be at the core of security.”
Building Identity-Centered Security Solutions
The Alliance’s new integration framework maps out the capabilities and technologies that help organizations build integrated, identity-centered security solutions. The framework illustrates a comprehensive approach to protecting identity at the core through access management, identity governance and administration, and identity directory services. These core components are surrounded by the following capabilities and technology categories: security operations – security incident and event management (SIEM), user and entity behavioral analytics (UEBA), service management, and fraud and risk; risk management – privileged access management (PAM), governance, risk and compliance (GRC), and network security; and data protection – data governance, enterprise mobility management (EMM), data loss prevention, and cloud access security brokers (CASB).
The initial iteration of the formula notes six of the possible 14 best-of-breed vendor offerings that organizations can integrate together on their journey to implementing a more comprehensive identity-centered security solution. The Alliance’s founding technology members are included as the following components: Ping Identity (identity and access management), Netskope (CASB), ThreatMetrix (fraud and risk) and VMWare/AirWatch (EMM). Also included are the new Alliance members: Exabeam (UEBA) and Lieberman Software (PAM). The Alliance plans to announce the technology providers for the remaining components of the formula in the coming months.
Since becoming the Alliance’s premier solution provider partner, Optiv has focused on evolving the Alliance’s mission and leveraging its client lab to demonstrate the value of identity data across other areas of cyber security while creating packaged integration solutions and service bundles. Optiv has played a critical role in developing the Alliance’s new framework and best practices for successfully implementing the identified vendor offerings.
“Cyber security continues to be a top concern for executives and boards of directors, and CISOs are feeling the pressure to ensure their organizations stay secure while meeting business objectives,” said Robert Block, vice president of client solutions – IAM for Optiv. “To be successful, security leaders need a holistic strategy and program that include the right mix of people, process and technology with identity positioned at the heart of everything. Optiv is proud to help the Identity Defined Security Alliance develop and execute a plan for companies to better integrate next generation identity solutions into their environments.”
“Identity is a key component of effective analytics, given the prevalence of credential-based attacks,” said Ted Plumis, vice president, alliances for Exabeam. “By leveraging the strengths of our partners in the IDSA, Exabeam provides customers with a detailed picture of threats and risk, tied to specific identities – even when the data isn’t perfect.”
"Lieberman Software is honored to join the IDSA and this industry recognition as a 'best-of-breed' privileged access and cyber security vendor," said Richard A Weeks, vice president, channel and business development for Lieberman. "The Rapid Enterprise Defense delivered via our Adaptive Privileged Services platform, enables automation at scale and integration of privilege management with identity provisioning, ID governance, access control, SIEM, analytics, vulnerability and threat management. We look forward to participating in IDSA and our role in the development of the identity integration framework."
The Alliance at CIS
The Alliance members work collaboratively to define a complete architecture, integrate solutions and document best practices and use cases to streamline the implementation patterns. The first round of integrated demonstrations and documentation that describes the benefits of the joint solutions from Ping Identity, Netskope, ThreatMetrix and VMWare/AirWatch will be highlighted at the Ping Identity and Optiv booths at CIS, in addition to multiple sessions at the conference.
At CIS, the Alliance is offering several opportunities to learn more. On Wednesday, June 8, the members will host a ‘meet the experts’ session with solution demonstrations, from noon – 1 p.m. CST at the Ping booth; Ron Miller of TechCrunch will moderate a panel with multiple Alliance members at 5:30 p.m. CST, and several Alliance members will hold exhibition space at the conference.
The Identity Defined Security Alliance was created to help CISOs implement security solutions with best-of-breed, integrated technologies to ensure customers, partners and employees can access the right data using the right applications on the right devices – all while reducing implementation complexity. Ping Identity launched the Alliance in late 2015 to address the growing frustration expressed by CISOs regarding too many solutions in silos.
About Optiv Security
Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. A Blackstone (NYSE: BX) portfolio company, Optiv maintains premium partnerships with more than 300 of the leading security technology manufacturers. For more information, visit www.optiv.com or follow us at www.twitter.com/optiv, www.facebook.com/optivinc and www.linkedin.com/company/optiv-inc.
About Ping Identity | The Identity Defined Security Company
Ping Identity is the leader in Identity Defined Security for the borderless enterprise, allowing the right people to access the right things, securely and seamlessly. More than half of the Fortune 100, including Boeing, Cisco, Disney, GE, Kraft Foods, TIAA-CREF and Walgreens, trust Ping Identity to accelerate their move to the cloud, deliver a killer customer experience and quickly onboard partners as part of their digital transformation. Protecting over 1.3 billion identities from data centers around the globe, Ping allows employees, customers and partners the freedom to access the Cloud and on-premise applications they need with an enterprise IDaaS solution that includes multi-factor authentication, single sign-on and access security. Visit www.pingidentity.com.
For more information about the Identity Defined Security Alliance, visit Ping Identity’s website at https://www.pingidentity.com/en/lp/ids-alliance.html or Optiv’s website at https://www.optiv.com/idsa.
Ping Identity Contacts
Ping Identity Corporation
Follow Us on Twitter: @PingIdentity
Join our LinkedIn Group: Ping Identity Cloud
Subscribe to our YouTube Channel: PingIdentityTV
Like Us on Facebook: PingIdentityPage