Ping Identity Makes it Easy to Modernize Legacy IAM Systems

press release

Ping Identity Makes it Easy to Modernize Legacy IAM Systems

Company Launches New Solution and New Features Including Automated Policy Migration, Third-Party Policy Integration Support, and Single Page Application to Simplify Transition to Modern IAM Solution



Boston, MA

Ping Identity Booth #107


Denver and Boston, June 25, 2018 — Ping Identity, the leader in Identity Defined Security, today announced a new product and features designed to simplify the transition to its identity and access management (IAM) solution. It’s a common complaint among global organizations that many legacy IAM offerings are unable to support the modern applications, APIs and single-page applications that are needed to run an enterprise more efficiently.


Legacy IAMs lack integration with third party systems that provide critical threat intelligence and fine-grained entitlement data, which limits assurance that an allowed user and device are accessing a protected resource. They do not support session management for all of today’s applications and resource types, such as SaaS and native mobile applications. Without these key capabilities, outdated IAM systems cannot efficiently address the needs of a modern enterprise. PingAccess, part of the Ping Identity Platform, is designed for the modern enterprise, with its key capabilities to protect resources deployed in the cloud, secure RESTful services and APIs, and provide secure access to business partners and customers.


The latest version of PingAccess, available this month, provides enterprises a streamlined way to simplify migration from their legacy IAM system to a modern access management solution. New features include flexible resource matching and error handling, the ability to configure unprotected resources and more. In addition, Ping is launching a new product, PingAccess Policy Migration, which enables enterprises to quickly and efficiently migrate off of dated systems.


Current State of the Market
The business landscape is evolving to support cloud-first deployments and the IoT. According to a recent McAfee Security report, “over 90% of organizations today are utilizing cloud services.” This is in addition to data in a recent Gartner IoT report that shows “connected things are expected to reach 20.4 billion by 2020.”


With this significant business shift, enterprises must change how they provide their users secure access to an increasingly diverse set of resources deployed across their hybrid IT environments. Many enterprises still have legacy web access management systems (WAM) in place to secure business applications. The result is a lack of fundamental capabilities to support modern applications, APIs and cloud-deployment models.


During migration, enterprises need a solution that can flexibly accommodate their existing infrastructures. Ping Identity’s newest product, PingAccess Policy Migration, and the latest version of PingAccess provide customers a way to ease the migration process to a modern access management solution. Furthermore, Ping continues to add ways to integrate with existing IAM infrastructure and all of the applications your users require.


Introducing PingAccess Policy Migration
A new product from Ping Identity, PingAccess Policy Migration removes the burdensome and error-prone processes involved in manually migrating hundreds of policies from your legacy WAM system to PingAccess. PingAccess Policy Migration allows you to maintain your existing network architecture with options to migrate to agent or proxy configurations. During migration, this new product also enables you to review corresponding import and export values to ensure accuracy, as well as troubleshoot common mapping and export errors. The features in PingAccess Policy Migration greatly reduce an enterprise’s time, cost and errors when migrating complex policies from a legacy IAM system. The combination of PingAccess with PingAccess Policy Migration enables enterprises to transform their access security environment and support today’s business needs.


Centralizing Access Management with New Features
New PingAccess capabilities increase flexibility to match existing deployment architectures and incorporate data from API-enabled systems like mobile device management (MDM) solutions and threat detection systems to make better access decisions. With the addition of single page application support, PingAccess continues to address the evolving needs of the modern enterprise.


  • Expression-based URL pattern matching and resource ordering. This expands the application paths and patterns that an enterprise can protect, ranging from legacy to modern applications. Flexible matching enables enterprises to easily map to their existing infrastructure and speeds up the WAM migration process by eliminating the need to rewrite applications or re-configure network connections.

  • Policy integration with external or third-party services. In today's expansive security landscape, services such as MDMs and threat detection systems provide critical threat intelligence and fine-grained entitlement data. PingAccess now integrates with these systems to enhance its access policy evaluation and enforcement decisions.

  • Configurable resource specific or global unprotected URLs. Today’s modern enterprises support hundreds, if not thousands of resources, and need a way to efficiently manage access at scale. PingAccess provides that solution by adding simplified application deployment and management of large numbers of dispersed organizational resources (applications and APIs).

  • Enhanced support for single page applications (SPA). This new capability enables enterprises to protect web and API resources within a single application, a common resource type deployed in today’s enterprises. This feature enables enterprises to provide a consistent, singular secure session managed across both web and API resources.


“This latest PingAccess release, coupled with the previous enhancements that introduced deployment automation on AWS and configuration of PingAccess from Azure AD, gives customers the confidence that they can transform their access control framework to support modern applications and service,” said Loren Russon, vice president, product management, Ping Identity.


"With its innovative advancements, PingAccess continues to makes it even easier for us to meet and exceed our evolving access management business requirements," added Michael Strong, chief information security officer, GCI.


To learn how modernization benefits your entire organization, read the white paper titled “Modernizing Legacy Web Access Management” or visit for more information.


About Ping Identity

Ping Identity is pioneering Intelligent Identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity™ platform provides customers, employees, partners and, increasingly, IoT, with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Over half of the Fortune 100 choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft and Amazon. We provide flexible options to extend hybrid IT environments and accelerate digital business initiatives with multi-factor authentication, single sign-on, access management, intelligent API security, directory and data governance capabilities. Visit


Ping Identity Contacts

Ping Identity Corporation

Follow Us on Twitter: @PingIdentity

Join our LinkedIn Group: Ping Identity

Subscribe to our YouTube Channel: PingIdentityTV

Like Us on Facebook: PingIdentityPage

Ping Identity

Take the Next Step

See how Ping can help you stay ahead of the curve in a rapidly evolving digital world.