In a universe where uncertainty is the only constant, trust has become both your greatest Challenge and your greatest opportunity.
Welcome to Ping Universe, where trust isn't just earned, It's engineered, where Identity isn't a barrier.
It's your gateway to resilience, Security, and growth.
This year's theme is resilient trust because in A digital landscape under siege by deep fakes, AI.
Threats and rising complexity, your ability to adapt, to evolve, Will define your future.
Discover how global leaders are redefining their identity and access management strategy With real world solutions that secure every identity, every interaction, Every innovation.
You'll learn to fortify identity, Build resilience, and thrive in uncertainty from AI-powered access control to password.
Authentication and decentralized identity.
This is your front row seat to the future of digital trust.
This is more than a conference.
This is a chance to rewrite the rules, to take back control, To turn trusts into your most powerful competitive edge.
This is Ping Universe 2025, and it starts now.
Ladies and gentlemen, please welcome to the stage André Durán.
For being here.
This is our largest universe ever.
Thank you.
All right, so this is stop 5, I think, Of a 7-city world tour, uh, and our first time We've got a remote audience, So I want to welcome all of our IG employees tuning in.
And we've got customers and partners from around the globe.
Anyway, we have a super exciting day and a half for you.
I'm excited to kick it off and, uh, and once again, thank you everyone for being here.
Uh, it's just an exciting time to be an identity right now.
It's also a super challenging time.
Uh, my prediction is that's not going to change.
We have more of everything right now to secure, and the attack surface is Growing, and it's growing in complexity, and it's, it's speeding up, Uh, and it certainly is gonna keep us all on our toes.
And so today is all about sharing what Ping is doing, our roadmap and our vision for the Future.
To keep us all safe at the end of the day.
This is our job to keep our digital economy and the trust that, that we built in our brands, the trust that we built in our products and the services and the Assets that we protect individuals; it is all about keeping that safe.
So our vision of, uh, enabling trust in every digital moment.
What does that actually mean?
Enabling trust in every digital moment, Every interaction that we do online, there is a certain amount of trust.
That that transaction is accurate, uh, that it represents, uh, The actors, if you will, that sit in between us and whatever we are attempting to do.
And now more than ever, there’s a lot of individual identities that sit between us and An outcome or result online.
And each one of those Identities, if you will, uh, is being attacked, and the trust that is embedded in society, and many times embedded in a lot of our systems now, It's being weaponized, and it's being abused.
Uh, and so trust in every digital moment now means more than ever.
Our society doesn't function.
If our digital systems aren't trustworthy.
We work awfully hard to be a trusted partner in critical infrastructure on behalf of the Services that all of you provide your employees and your customers and your partners, Um.
I wanted to highlight some of the ways in which We are working hard to continue to earn that trust.
I first wanted to, uh, stop and thank all of the Enterprises, Many of you in the room today, um, who do trust your critical infrastructure, Your identity controls to Ping.
Thank you for that.
Uh, also, uh, thank, Thankful for my team for, uh, showing up, uh, on a number of the analyst reports over the Last year.
In combination, Ping and ForgeRock over the Last couple of years showed up very well, uh, to the analysts that work on your behalf.
Evaluate independent solutions for every critical use case now for identity, Ping showed up number one last year in the Gartner Critical Capabilities.
So I'm super thankful for my team for the work that they did, Uh, with Gartner on that.
Today we protect about 8 billion accounts globally.
Now, obviously many of us have hundreds of accounts, but this does represent a good Portion of the world's economy, trillions and trillions of dollars, and assets move as a result of the integrity and trust that we enable in the identity Infrastructure that sits underneath all of our systems.
One of the things that we're doing to continue to, uh, earn that trust is we're investing Globally in our cloud infrastructure, all the markets that we serve, Uh, working with our partners, Google and Amazon, we are opening up new regions, If you will, for our single and multi-tenant services.
We've just announced two new regions, Singapore and, uh, DMA.
We have two new regions coming, Melbourne and Doha.
So expect to see the number of dots on the Globe increases, again, as we serve many Global customers internationally.
As well as US-based companies that have operations overseas.
So this is all about data residency.
In some cases, This is also about critical infrastructure and policy and regulation, Which is coming out that says critical infrastructure must be run in-country.
So just expect us to continue to do that.
We talked a little bit about, uh, trust.
I want to talk about resilient trust.
And this notion that it's hard-won and easy to lose, um.
The cost of breach isn't, you know, simply our downtime; it is a decay of trust.
And so what does it mean for us to build a resilient identity infrastructure?
Maybe more than ever in the last, I would say 6 months or so, My conversations with CIOs and CISOs pretty much begin with, Tell us what you're doing, tell us what the best practice is, Tell us what you would recommend to ensure that the authentication services that we provide Never go down.
Uh, and so that conversation has morphed into Things, for example, tell us what your plans are for multi-region Active Active.
Um, it's evolved in some extreme cases.
It was a conversation maybe a year ago, It's becoming real, companies saying.
We need multi-cloud, not just active-active, but we need multiple cloud providers in Multiple regions.
A number of companies have said, if my cloud services are unavailable, Is it possible for me to run an on-prem or self-managed version?
Uh, of the, of the critical authentication services.
So, the conversation around resilient trust.
I think, uh, resonates right now.
And there are two things that we're doing, Two inputs to this, and I wanted to organize, uh, my speech around these 21 is this notion of the Unified architecture.
What does that mean for us?
What does it mean for you?
Um, the silos that we have aren't just killers of agility.
They, they really do become enemies of security, and we've seen that in our environments where We have many systems, they're not all at the same level of either security or resilience.
And so there's a major effort from companies who are recognizing now the criticality of this To try to unify, if you will, the underlying technology, which is serving up all of these Critical Identity Services.
So unifying identity with a unified architecture is very thematic, Uh, for us.
Secondly, trust shouldn’t expire at login.
Uh, identity needs to be, it needs to be context-aware, It should be verified in real time.
And I'm gonna talk a lot about what we're doing, uh, by way of, Uh, Verified Trust.
So everything needs to be continually verified.
And so under the banner of Zero Trust, Don't trust the user, the network, or device by default; verify always or verify Continuously.
We need to take the notion of verification and essentially drive the cost down, Uh, the actual cost and the cost to user experience.
And so we're on a mission here at Ping to do exactly that, To provide high assurance with low friction.
We can't have high assurance at one moment of an identity interaction.
And then have a gap, and then low assurance, low friction at another.
So there's a lot of effort that we are going under to create high assurance for every Interaction, for every identity or node that Sits in between.
A user requesting something, or a service requesting something, and all the different actors that sit in between that.
We need to have an unbroken chain of trust, and where possible, Where we can afford it, we need to verify it.
So let me dive a little bit into the unified architecture here.
And I'll just start with, this is also very thematic, uh, In the name of simplicity, in the name of cost reduction.
I do think we are at the era in identity of platforms, essentially.
I wouldn't, I wouldn't want to be a startup today in the Identity space.
I think the value.
Of all of these identity controls, largely grown up through best of breed, In many cases siloed and mixed with custom and homegrown infrastructure, The value is now in the integration, horizontal integration across the services.
It's how do we connect all of these things, and we'll talk a lot about the things that we're Doing.
In our North Star, and our vision for the Future, in the name of simplicity, where do we have things that we are doing that are Redundant or outdated, and what is a modern approach that would allow us to move towards a Simpler, unified architecture in the future?
So it's not just about cost reduction or complexity reduction, It actually is an improvement in security.
We can't keep everything secure, So we will need to unify.
So I want to talk a little bit about our vision for the unified platform and do it in light of The four layers, and we don't often talk about this one, But for Ping it distinctly falls into these 4 layers.
And the first principle that we've had that ties to our vision of the future is that the Underlying infrastructure should be able to accommodate all identity types, Meaning the same infrastructure that secures our customers could be used with a different Configuration, because the mandates around security are a, A little bit different and User Experience, They do differ, But it should be usable by employees and by partners.
And so, one platform, all identity types, and about 25% of our customers use the same Underlying Ping technology or the Ping platform, and they create multiple instances that Services and secures these different identity types.
I actually think that this is an inevitability, and the reason is, I think there's a transformation that will occur at some point in the future.
I don't know if it's 3 years or 5 years or 10 years, but it's going to happen.
And that is that we treat our Identity systems.
As account holders for individuals.
So we are named individuals.
Moving through our digital world and interacting with IAM systems that are Segregated by account type.
You're an employee, let me set up a separate infrastructure; you're a customer, Let me set up a separate infrastructure.
Decentralized identity is going to make it possible that you as an individual don't show Up as unknown and anonymous, then have to go through a vetting process.
You will be able to show up as a trusted individual and go from low trust to high trust In milliseconds, because you will have digital proof of who you are, Who your employer is, whether or not you're a customer.
Whether or not you're a Loyalty Member, whether or not you have an Account, Whether or not you're assured insured.
That concept of decentralized identity will fundamentally make us question, Why do we have separate infrastructure to manage the same individual that is showing up As different personas?
That makes sense.
So there is an inevitable unification which will occur driven by the notion of decentralized identity and verifiable Credentials.
One more reason why we have conviction that one Platform should serve all identity types.
The next layer of UH convergence is this notion of our identity security Controls.
Being offered up by the same vendor.
And so Ping is now one of the vendors that offers multiple identity capabilities that Historically were best-of-breed companies or separate swim lanes, but are now coming together in the name of simplicity and better security, And fragments, uh, are a challenge to our security model.
So I'm gonna talk a little more about that later.
The 3rd level is this notion of convergence around fraud.
And fraud is not just now a moment in time of the transaction.
What's happened is the adversaries have realized that they need to shift left to Compromise the underlying identity controls.
In order to get access to the transactions subsequent.
So they've shifted left, and we now need to shift left.
And the signals that we need to use, the signals that we have access to, To maintain integrity in our identity infrastructure is not an afterthought now.
It needs to be woven into the fabric of how we secure our platforms.
Unfortunately, we have a growing number of signals, signals from endpoints, Signals from gateways of what we're actually using, signals from the Identity infrastructure, Signals from our behavioral and analytic systems that can determine or see intent or Not obvious behaviors or patterns that should be flagged.
And we can now run those through our authorization systems to make better decisions On Do we allow access.
So we're moving away from a moment in time Where identity.
And the roles and the permissions and the entitlements were, Call it more static.
And we're moving into a much more real-time, uh, dynamic threat landscape.
And as a result, our infrastructure needs to be designed in a manner in which it can respond in Real time.
In real time doesn't mean I was entitled to do Something.
6 months ago or a year ago, and I should still have access.
Access depends, it depends on all the real-time Signals.
So this threat protection and authorization Layer Coupled is a powerful weapon in a well-formed architecture for an identity Platform that needs to be included, not as an afterthought, but it needs to be integrated.
Lastly, this notion of identity assurance.
So Ping has been known, and we built our reputation on essentially access management from An authentication point of view.
If you can authenticate, you have a live session; you're granted tokens.
And you can access certain resources.
What's happened, as I said, is that the adversaries have shifted left, And they are now exposing weak processes, weak technology in the onboarding, Or the readmission when a user gets disconnected from their account through the Call center.
I'm gonna talk more about this.
They're exposing weaknesses.
So, identity is only as strong as its weakest link.
And right now one of the weak links is how sure are we?
That this is the individual that we are connecting their MobileIron phone as token of authentication in our Trust Framework.
And if there's any gap there, there's doubt.
And that gap represents trust, and that trust has been weaponized, And that is exactly where the adversaries are now hitting our identity systems.
So identity assurance, the ability to verify one time, Hopefully, and then re-verify through a very cost-efficient mechanism that we refer to as credentials or digital credentials or verifiable credentials.
Is now a new pattern for us that you are seeing P working on.
So we have this unified vision of all identities, one platform, Reduced complexity, handling employees, customers, and partners.
I wanted to introduce a new non-human identity type, which is Agents.
And we are gonna talk a lot about, uh, agents today.
I know all of you are being pressed to understand how agentic can be for digital workers, For frontline workers, for automation of certain things, to interface with customers that are coming in with personal agents, How are you going to secure all of this?
And we're gonna talk about how PingOne Platform is in an ideal position to do that.
So let me dive a little bit in and provide some updates into the identity security convergence Layer of access, governance, and privilege.
From an access point of view, we have been on a journey of maturity from standards-based single Sign-on to two-factor to MFA on everything, Centralizing the authentication service, And then adding strong authentication that all applications can inherit.
That has then evolved into contextual MFA or adaptive MFA where you use risk signals so that MFA is not presenting user friction everywhere.
One step beyond that is the notion of password lists.
Can we eliminate passwords?
Can we eliminate the exposure of stolen credentials, uh, Allowing a vector of attack against the MFA so it's not just.
Uh, it's not just a passwordless experience, is can we actually get to true passwordless.
There's another step here that we are introducing, which is this notion of verified Authentication.
Can we verify users' real identity in the Enrollment process when they're enrolling their phone into MFA?
We don't want any disconnect in ensuring the right individual is the one who is Authenticating to the account.
So there's a tremendous amount we are doing under the notion of verification, And we're essentially embedding it into the workflows, where authentication has been abused.
We're now adding the verification step.
From a governance point of view, uh, Ping really has now a very robust Identity-Governance-IGA Capability.
It has been built upon our Identity-Management-IDM Functionality.
And with that come a full set of controls that You have come to expect with an IGA or governance product.
Access reviews, access request workflows, certification capabilities, Uh, the campaign capabilities that go along with that, All of the reporting that is required by auditors to ensure that your access control Governance is in good shape.
And we're doing a lot around AI.
I'm gonna talk about that in a second.
In addition to that, like all of our technologies, I wanted to introduce the fact that this capability, where appropriate, where governance is required for Agentic or non-human identities, the workflows associated with the governance model of Agents, where they need to be identity managed and life cycle controlled.
Is now being, is now being added into our IGA capabilities.
We've added several new things that have, uh, been delivered that are pretty exciting, This notion of recommendations, AI recommendations.
So inline recommendations for Approvers and Certifiers, recommended access for end users to Help them discover what they need if they don't know that.
Um, IGA or governance for service accounts.
So discover rogue accounts.
Uh, and Service Accounts across the enterprise and associate those Service Accounts with humans Custodians for ownership.
So just a lot of great new capabilities being infused from our Helix AI Capabilities into our governance product.
You're gonna see that thematic throughout all Our capabilities.
So that speaks to access and governance.
But there has been a missing pillar to the convergence of identity security for Ping.
And so I am super excited to announce the acquisition.
Of Proseon.
And this is a company that we had been watching for several months and talking to about the new Patterns that we are seeing emerged around Where are the assets that we care most about or Moving to, that we need to provide an elevated level of control for.
And so Proseon is now becoming PingOne Privilege.
And this is a just-in-time, just enough, think real-time permissioning system.
It doesn't draw upon, uh, historical approaches to privilege, which was all about Secrets Management.
Of our legacy in on-prem infrastructure.
I'm not suggesting that's not important, But you have good solutions there.
This is focused on where the assets are moving to.
Into the cloud, and our DevOps engineers, what resources do they have access to?
What keys, metaphorically, have we given them to the infrastructure.
That all of our data and applications are now moving to.
Now, it's not limited to cloud resources, think Amazon, GCP, and Azure.
It will give you real-time privileged access to RDP and SSH.
Servers and databases as well.
We have some new capabilities I just saw demonstrated where the exact same concepts are Now being applied to data being accessed through MCP servers.
So developers that have access to MCP that are making requests to underlying data stores, Where the scoping of data is over-authorized through OAuth, Now all of a sudden there is a privileged approach, and an ability to audit and replay Everything that was done.
So super, super exciting.
Here's an example of one feature.
This is a discovery feature.
So if you don't know, and you don't have a complete inventory of what exactly does certain Users or certain services to have access to by way of resources, By cloud infrastructure, you can actually discover it.
It goes one step further.
It takes a look at all of the privileges, if you will, or access rights.
Runs it through its own algorithm of what it considers risky, And then can highlight remediation actions for you that you can then act upon.
Just one of the capabilities embedded in this new capability.
Now there's a new pattern that I hope you recognize with Ping, That actually plays to our historical heritage as a company.
This pattern is the notion that privilege is a universal service offered on our Multi-tenant platform PingOne.
And what I mean by universal service, is that, is that it is not bound simply to Ping as the IdP.
It can be layered on or used with any Third-party IdP and that is also consistent with every other service of PingOne.
So, if you are an Entra user, but you don't have an orchestration engine, You can layer PingOne DaVinci on top of Entra.
If you don't have Contextual or Adaptive MFA in your Microsoft ecosystem, You can add our PingOne Protect signals.
To do adaptive MFA orchestrated through DaVinci on Entra, For example, or on top of your custom or homegrown SIM system.
So each one of these services has two consumption models.
One consumption model is, you love PingOne, and you're kind of all in on PingOne.
PingOne is the IdP and you have all of these new services.
The second consumption model is the notion of universal services, And you can acquire just this capability and layer it on top of your existing IdP.
So very unique for an Identity platform provider to do this, But you shouldn't be surprised, it's very consistent with our heritage.
Ping started out 23 years ago, essentially adding standards-based federated single sign-on Sign-on to any IdP.
And we did that for the better part of 15 years before we started our own evolution as a Complete platform provider.
But Open Standards.
And vendor choice is part of our DNA.
Our goal is not to be the singular proprietary lock-in vendor for identity.
It never has been.
It's why we invest in open standards.
And my belief is, every core use case should be underpinned by an open standard.
We want to be a partner of choice that is trusted, not a vendor that duped anyone into Lock-in at any moment in time.
So this is consistent with that promise to the market.
OK, this notion of a unified identity, security, either Architecture or vision doesn't stop.
With the fact that we offer 3 independent capabilities that do access, Governance, and privilege.
It's not good enough.
Over time, all of these independent technologies are evolving.
And their evolution is starting to overlap increasingly over time.
We are moving towards real-time decisioning for access control.
Static entitlements will give way to real-time entitlement publishing.
The fact that a user might have a session.
Meaning they authenticated, and now they have a live session to kind of move about our Infrastructure doesn't mean that a new signal introduced in real time either shouldn't change The session privileges or kill it.
So, as a result of the fact that A, we want to simplify, we want to reduce cost.
We have to recognize today's limits and our existing infrastructure, Meaning many times we have to retrofit the identity controls into the reality of legacy.
I understand that, but as we move forward, we are looking to build a unified vision between These three.
And this is the Unified Vision Core I see.
Emerging.
It's the notion that's central to the Admin-UI, Think identity and access management or governance capabilities or the runtime, Think our authentication services, is underpinned centrally by these core services.
Underlying data, call it the data fabric.
On top of that, an Authorization engine or an Authorization fabric.
And to a certain extent infused with Gen AI capabilities or stitched Together using Orchestration Integration Capabilities.
So this, to me, is a North Star vision for Ping, where I've challenged our teams to think Through, how does this core underpin the future of identity security?
How do we leverage data?
How do we design policies in a Centralized, fine-grained authorization system that Increasingly over time.
Can create real-time ability to respond to threats in our environment.
Not just for the authentication, real-time side of the house, but also for the more traditional Admin-UI side of identity management and governance.
Another dimension of unified services here, uh, and investments, things that we promised, uh, a couple of years ago when we did the ForgeRock merger with Ping, Was that all of the things around Ping over time between our platforms would be unified.
And so I'm happy to report we've delivered on a lot of those promises.
Now, this is obviously ongoing, not all of these are 100%, But by and large, a unified developer portal, Unified docs, A unified Mobile app.
Um, an Integration Directory or marketplace that carries integrations across our platforms, Our SDK, our gateways, all of these things now, the teams have been unified under The premise that you ship your organization.
We understand that.
So we've unified the teams and we've given them instruction that we are looking to simplify how All of you consume our various capabilities.
So that was one dimension.
A second dimension.
Of this was unified design.
And we've delivered on a few of these, we have several more that are coming.
So the DockSite, Dev Portal, the Marketplace have all now been unified from a, From a user experience point of view.
Our new capability PingOne Privilege is put into PingOne.
So it will carry the Administration look and feel of all of our PingOne Universal Services, Our AI Assistant, our Directory, our Community and Support, All of these additional services that surround things that you interface daily are all being Unified.
Here's another promise that we made.
About a year and a half ago that we are fulfilling on and that is the notion that for Workforce use cases, think Workforce MFA, the application that we have in the App Stores.
With the Android, Google, or Apple, that the client.
That individuals would download to authenticate.
So think whether this is passkeys or biometrics, Think FO 2, or any of the other methods that we're going to unify the client, so we wouldn't Confuse users and have multiple workforce clients.
So, the ForgeRock-Authenticator has now been essentially embedded inside of PingOne and Ping ID will become the unified Client.
Now, this is super important.
Because this client is probably one of the areas where we have the most innovation Right now.
So it's very important that we bring our Innovation in line so that we could extend all of our customers into the VERI Verified Trust World.
I'll talk a little more about that later.
Another area of significant investment, probably the number one investment that we have Made this year, is everything related to customer experience and our post-sales Experience.
Every customer desires the same outcomes.
But we recognize every customer journey is different.
So our new customer engagement model, you're seeing it here, Um, who do I work with and when?
What should I expect through the post-sale?
Journey, if you will, of deployment.
What does success look like for me, and how do I connect the outcomes and the value that I Wanted to see up front before I started the journey?
How do we close the loop on that?
Just know PingOne has made tremendous investments, uh, and I believe many of you have seen the Results of that probably the last 2 or 3 months.
Expect a lot more as the months, uh, continue.
Another dimension of Unified is our walking arm in arm with our partners.
We are a Partner First company.
Moving identity is a big, complicated game.
And no matter how much Ping brings to bear, it will be insufficient ultimately to see that the Transformation of Identity that sits inside broader transformations within your Organizations can be successful without our partners.
And so we are just wholly committed to being the best identity platform company.
Walking hand in hand with our partners on behalf of your success.
And along those lines, we're making a number of investments to ensure that we show up the Same way with a unified voice in every engagement.
Ping's Well Architected Framework is an example of that.
So we are developing a well-architected framework that will become the foundation for which all engagements, new deployments, assessments in health of your existing Infrastructure that you might not have looked at for the last couple of years.
And it's been working great, but it's also been growing.
And there could be a moment in time where all of a sudden architectures for certain, Uh, you know, size of deployments worked 2 years ago.
But they're insufficient now as you kind of move forward.
So everything related to the best practices, how we assess maturity, All of that stuff is being invested in, is patterns that we will work with our partners And with you to deploy to ensure that you are always healthy.
OK, another dimension, as I said, 2nd dimension of enabling resilient trust in our Infrastructure is this notion of continuous verification.
So I wanted to highlight some of the things we're doing there, But look, I will start with a comment that I made, Uh, to the management team, and, and I think many of you probably see and feel what I'm Gonna say, but it, it certainly feels like the adversaries now have put a target.
On all the weak spots in the identity controls.
And almost industry by industry they're rolling through exploiting.
The back door, and the side door, and the things, the not-happy path stuff that we have Not focused as much on.
And every weakness in identity controls right now is going to be a door.
Of exploitation for our adversaries.
So just a tremendous amount going on here.
This notion of verified trust is the best Defense against what we're seeing.
With the scattered spider attacks right now.
I'll talk a little bit more about that.
But if you think about our fraud and assurance layer, they are designed to help you verify the Trust in the identity controls.
So this is so much more than just the basics now.
The basics were a well-formed, Centralized, standardized authentication service for all of Your products and business units, and/or a well-formed Identity Management Capability for all third parties accessing your system.
And now we are up into the tier where that was great, but it's insufficient for where we're Going.
So these trust services of the assurance and Fraud kind of really came into the focus, and this has been an area of investment for Ping For the last, you know, good, I'd say 5 to 7 years, right about now, It's starting to matter to many of our customers.
So, as I said before, the threat.
Uh, or where we kind of measured the threat of fraud is very transactionally focused.
But what's happened is the adversaries have shifted left.
They focus on weakness at every step of the identity journey.
And so we now need to take a look at what are we doing to protect every step in the journey.
Now, one of the things Ping has done is invested significantly in our PingOne Protect signals.
These signals, this capability, by the way, is our fastest growing capability in the last year.
It's kind of a no-brainer that the evolution of MFA.
Is to put MFA on everything and then make it disappear.
And that's exactly what the PingOne Protect signals do.
We've had customers eliminate 95% of the MFA prompts for their workers.
We've had other customers in the retail industry, so this is customer-facing.
Only log customers in one time a year.
The signals are running behind the scenes invisibly on every interaction.
We're checking.
The status of these signals to ensure that the Session hasn't been hijacked or the account hasn't been taken over.
When we can see intent through the behavior of the interaction with the APIs and we can Alert users, and we can run users through a different journey if the risk crosses certain Certain thresholds.
But what's happening here is that the number of Signals that we're ingesting and the decision making, the policies that go behind our Authentication policies, they're becoming more sophisticated.
And so to underpin this whole thing is this notion: where do we put it?
Decisioning in our infrastructure?
In our Centralized-UI identity infrastructure, we always called it Authentication-and-SSO and Authorization, but where was the authorization?
In terms of Central Control.
We spent 15 years cleaning up Authentication.
The next 15 years are going to be about cleaning up authorization.
And so what we're seeing now are the patterns, and we've been talking about this for several Years.
It's just been one of those technologies that is so complicated and so politically charged.
There's like, we'll avoid it at all costs until we can't avoid it anymore.
That's the authorization conversation.
The time has come.
Now, it's not gonna all happen all at once.
We're gonna find little use cases here and there that we're gonna decide, Hey, we're gonna start to Centralize that decision making to a fine-grained, Dynamic authorization system.
We have one, it's called Authorize.
It's available as a universal service in PingOne and it is available as software so you can Self-manage it.
So this notion that signals get ingested, Not just from us, but from your endpoints, your CrowdStrike, From your ZScaler, from your other SASE, from your gateways, From your API gateways, and Authorized Now is a place that you could make Policy-based decisions informed by real-time data on Do I Allow Access.
Initially, this was used in the financial sector as a way to control what data is shared In OpenBanking.
So our introduction to this came several years Ago when the UK introduced OpenBanking, and the bank said, If I capture consent to share account data with a third party, How do I control what that third party receives when they hit our APIs?
And they needed a fine-grained authorization system to do that.
Roll forward.
And now what's happening is in the financial Sector, the fraud and scams are so sophisticated and happening so fast.
That the release cycles of new websites and new mobile UIs apps is not fast enough.
So now we have companies taking all decisioning out of their channels, putting unauthorized and when they see fraud against their MobileIron or web app, They can change a policy and roll it out in 72 hours.
So I'm just giving you examples.
Roll forward now to Agentic.
An OAuth is a scoping mechanism for Agentic is too broad.
Once again, we need a place to put fine-grained decisioning into what things have access to.
Meaning what data do the agents have access to.
So super excited about that capability, the time is here.
Wanna talk a little bit about um scattered Spider right now.
And what is going on.
This is not rocket science, folks.
But it is incredibly effective.
They are hitting us in the weak spot, the soft underbelly of our organizations, The call centers REs that we've outsourced, responsible for resetting accounts.
And the verification processes that they are using are wholly insufficient.
And the notion that humans could be bribed in the call center to reset an account is an issue.
We have banks now saying the only way that verification can be trusted and secured in our Organization is if IT and security control it, and it's all self-service.
And they're probably right.
So the damage here is pretty significant if you guys are keeping Pace.
And really, my message is that we've spent a lot Of time protecting the front door, but the side doors now need to be fortified.
It's the doors of entry and the doors of re-entry.
How can I reset an account, if I need to reset an account?
So this is where our assurance capabilities, verification and credentials, Neo plays in.
How do we verify a user's real identity?
What signals and capabilities can we orchestrate to build a level of assurance that We're confident in?
What credentials can we issue to that individual that allow them to re-verify themselves at a low cost, low cost of friction, low cost monetarily.
So these two things go hand in glove.
We'd like to verify people on the way in, issue credentials, and use the credentials for high Assurance re-verification in every subsequent interaction.
Including when they call the Call Center and want to reset anything.
We're doing a lot in this space.
So I won't take you through all the Capabilities here, but I do invite you to take a look at this if you haven't, Because the time is now.
We've been talking about this for years.
But suffice it to say there's a lot of capabilities being embedded into this new Paradigm of decentralized identity and verified credentials, mobile Driver's License, Selfie mode, um, new identity data signals that we are bringing into your ability to build an Assurance level you're confident in.
All of that stuff is being embedded in PingID.
So when I said MFA is evolving and we wanted to unify our MFA capabilities between the ForgeRock Rock Authenticator and PingID, I really meant that.
And here's the reason.
The reason is PingID, meaning the app you would give to your employees, Or the SDK, the thing that you would embed in your own applications.
It's becoming a Super APP.
Not a generic super app, but a super identity app.
So embedding the wallet, so that you can issue credentials directly to PingID.
You don't have to build an application for your workforce; they just have PingID.
They're using it to authenticate today.
In the future, You could issue a digital credential.
That credential.
Could be bound to the initial verification, meaning when they go through the initial Verification of document check, and they do the selfie and the biometric compare, That biometric can be embedded in the credential.
So the credential could say, hey, we ran this User through a verification, They passed up to this assurance level.
Here's the biometric that was used at that moment; it's in the credential, And the only way you can use that credential is passing a liveness and deepfake detection test.
Now we have an unbroken chain of trust, resilient trust embedded in the onboarding, Initial onboarding, to every subsequent transaction, to include the re-verification.
The user loses their phone or does something like that.
So just tremendous number of things being embedded into the vision of Authentication.
And this really is the unification of verification, authentication, and in some ways, authorization.
They're all now being merged together around this notion of credentials.
So we have a lot of capabilities embedded in Verified.
A number of you are rolling this out.
Look, 5 years ago, especially through COVID, we went through a moment in time where it was like MFA on everything, especially when we sent all our workers home.
Roll forward to 2025.
If there's one message I want to send, it's like, verification is not optional.
Full stop.
All of you are targets.
And they're going to hit you where you're not looking.
And it's on the edges, it's on the tag, it's, it's the fragments right now that we haven't Paid as much attention to.
So this verification is super important.
We have a lot of new capabilities coming.
This notion of verified onboarding, very, very thematic.
So many of you now have experienced, someone who applies for a job is not the person who Shows up, or someone during the interview process, not the same person.
In certain industries, that statistic is as much as 15%, and some projects in certain industries, fraudulent applicants could equal 50%.
Forget it, even at 15%, this is a problem.
You cannot be hiring someone when you don't know who they are or what their intent actually Is.
So it's a wake-up call to the industry.
This is not someone else's problem; this is our problem.
And this is what Ping Identity is doing.
So this whole idea of tying verification with digital credentials.
Is a use case that we are orchestrating now with our capabilities, And we enable all of these capabilities for all of you.
This is also something that Ping is doing, internally as well.
So I've talked to a lot of companies, especially in the last 6 months, Who feel exposed here and they rightfully should feel exposed.
This is a technology, can I suggest you should not wait.
Until an incident happens.
And you rebuild your network, and you boot everyone off, and you've got one user on Network, and you need to re-onboard everybody else.
Under urgency, I advise you get this capability up and running now.
Whether you use it or not.
The ability to mass onboard is part of enabling resilience, Trust in the infrastructure.
And we shouldn't have the hubris to think that any of us are not vulnerable ultimately to some Weakness in controls that leads to an incident.
So this is part of the resilience story.
Another piece of, uh, kind of the security story, and this is just a little side intro, But just to make people aware, all of the software that Ping delivers, That is now being put into FedRAMP, so that's the US government's kind of controls, If you will, for security for SaaS, those secure containers are now being made available to all of our customers.
So any of our customers that are self-managing.
Their identity infrastructure using IG software, just know you're gonna have a version of that software.
Which is adhering to all of the secure container controls that underpin FedRAMP.
So we're just making that freely available to all of our customers.
All right, last section here.
I wanna talk about what, What's next, and I wanted to start with something that is on our mind about quantum res Resiliency, and what are we doing on that front.
So just know that we are marching towards an End of 27 timeline.
Now unless things change, things are changing awfully quick here.
But there are standards that Ping is involved in right now to ensure that our approach to This is actually going to be the right approach.
But just know that an inventory of all of the places where our SaaS and our software would be Vulnerable to a loss of secrets or security as a result of quantum has been evaluated, Inventoried, and essentially a plan.
Starting from the 2027 date backwards has been put in place.
So this will be kind of a rolling thunder set of announcements, Obviously, as we move forward.
Last section here, I want to talk about what we're doing with AI, and I want to start with what I shared last year, which was an announcement around Helix.
So Helix is the name of our generative AI capability embedded in the core of our Platform to enable AI features and automations in our own platform.
So I think if we're gonna roll out AI features, we're not gonna do it 10 different ways, We're gonna do it one way.
A highly secure way.
And so that's Helix, kind of leveraging the data embedded in our Platform to smartly enable Automations across the entire life cycle of identity.
But I wanna introduce this other concept that how is it that we are gonna secure, not agents built in our Platform, that would be inherently secured by our Platform, Meaning all the identity controls that we espouse would natively be embedded if built An agent on Helix.
What about the agents that are being developed outside of our Platform?
What are we doing about that?
And is there a uniform way in which we could Govern and secure those capabilities?
So before I get into that, I just wanted to highlight one thing that's coming out here very Shortly, this notion of an AI assistant.
This is coming out in PingOne.
I think it's eminent.
So, this is now, as you've become accustomed to, Think like a chatbot sidebar in Admin-UI capability of PingOne, And when you have a question, you just ask it.
And it's been fed with a tremendous amount of information, not just the documentation you have access to.
But it is designed to be your Admin co-pilot.
Does that make sense?
This will roll out to all of our platforms, By the way, we're just starting with PingOne, and like I said, I, I, I feel this is weeks away, but I hope I'm, I'm not speaking out of turn.
We're close.
Think Q4.
All right.
I'm gonna switch gears now and talk about Identity for AI and what we're doing on this front.
And look, this is a new world.
This is a really new world, the number of agents.
That are about to hit the infrastructure, possibly expose data to people it shouldn't Expose it to, and who knows what else Agents are thinking and doing.
Like, how are we going to rein this in, and is there a best pattern and a well-formed Architecture and a well-formed framework by which we could centralize the controls and Security posture for all of these agents?
Uh Ping is spending a lot of time here.
And there are a lot of use cases.
I think our team has come up with 5, what are called core patterns, If you will.
And different infrastructure would be used to Secure different patterns, meaning there's certain populations and certain use cases Cases where a privileged.
Approach is appropriate.
There are other scenarios where a governance Approach is probably appropriate, and in all scenarios, authenticated agents and authorized, Well scoped agents is going to apply to all of them.
But this notion that agents will be accessing our APPs and our data through MCP and A2A Services, um, humans will have personal agents that are interfacing with our infrastructure on Their behalf.
Agents obviously have to be well scoped in.
Terms of what do they have access to that they could divulge.
Agents are gonna talk to agents.
I'm gonna have a personal agent negotiating on my behalf through a commerce channel with some sort of customer agent on the other side of the equation, both sparring it out to achieve their Outcomes, if you will.
So this just looks like a whole new world.
Here's the other thing, We need to identify agents, which means we need to authenticate them, life cycle manage them, in many cases.
Oh guess what, those can now be compromised, I hate to say.
So we used to like worry about, is it a bot or Is it a human?
Connect the wheel.
Get the traffic light.
Now it's, it's an agent; we're sure of that.
Is it a good agent or a bad agent?
And we have a lot of ephemeral agents.
What's their intent?
Haven't seen them before; there's no reputation of those.
It's just a new world.
It's complicated.
One of the things we're working on in our PingOne Protect signals is not just discerning bots From humans, it's looking at the API behavior and looking at the intent behind it and Discerning, is that a good bot or a bad bot?
Is that a good agent or a bad agent?
Because all these agents are going to be built by our adversaries as well, and going to pound our systems.
What if the agent's been compromised?
What if it's a, Is a good agent, but somehow the agent's been compromised.
That whole notion that you can trust for a second is right on the money.
Like this Zero Trust world is not wrong.
Something can be good until the second it's not.
How do we recognize it the second it’s not, it’s not based upon a year of good behavior.
That's an indicator, but it's not a promise of the future.
So super important, this is our new normal.
And this is coming really, really fast.
So you're gonna hear and see a lot of what Ping is doing to make sure we're ahead of this for You.
And guess what, this whole agent world, It's always on.
It'll be bound by what people charge us at the end of the day, So thank goodness for that, but short of that, it's always on.
So the scale, Agentic Scale is gonna be a whole another ballgame for us.
So we'll break agents down into 3 rough categories, uh, For the remainder of the conference this notion of personal agents, Think you're ChatGPT or your Gemini or, you know, whatever, Whatever your personal assistant is, that's one class of agent.
There's a series of ManagedAgents.
Think frontline worker, The chatbot that sits on your website, or think digital worker, Some sort of process automation that you've done that was manual before that you can Automate with an agent that's Managed.
And so enabling trust in this agentic world with Ping infrastructure or Identity Infrastructure, it's gonna boil down to a few things, but as we simplify and break it down, And you think about where is the trust boundary, meaning, what do I see, Control and manage versus what do I not?
And there's a lot of patterns here.
This notion of personal agents hitting our APIs and our MCP servers, What are they allowed to do?
Do I recognize them?
If you extend the infrastructure out to these frontline agents, Again, think a chatbot on your website, connected to your data.
What can those chatbots see and do?
Uh, and then lastly, this notion of the digital worker.
So these are certain automations that you've built, agents for manual tasks.
And again, all of these now might be under the purview of the governance or the control of the Identity Platform authentication, authorization, governance, life cycle management, Consent management, when the agents have a Custodian.
Who's the custodian?
How do we manage that?
So, we'll break this down later in the day in more detail, But just know we are all over this on your behalf.
We view this as our mission.
Agentic, it's a new frontier, it is a new channel, it is a new world, It's coming on fast.
And if you thought cloud was a big disruptor to your infrastructure, Multiply times something to get.
The potential, both threat and opportunity, to all of our organizations.
As I tell my team, my organization, there's no 2nd place in this race, Which is a little bit unfortunate, and it's one of the reasons why we're running headfirst into The unknown here.
The potential for good and bad is so significant you can't ignore it.
So when you think of Ping, think about us developing a solution to help you secure Agentic, Agentic Channels, Personal Assistants.
Think about us as enabling this securely on your behalf.
And think about the ability to deliver identity controls now for these non-human identities we Call agents.
Let me go back one.
Let's roll a little video on what Ping is doing with Agentic.
AI agents are here, bringing incredible potential, but also real risks.
These Autonomous digital helpers handle tasks and make decisions without direct human Intervention.
So, can we extend trust to them?
At Ping Identity, we know digital trust must be earned and verified, Especially for artificial intelligence.
An AI agent should never impersonate a human, and a human should never give an agent.
Direct credentials.
That's why we're building a solution specifically for AI agents.
We help you identify and authorize only the right AI agents.
Each agent gets its own secure, traceable, and policy-based identity.
We ensure they have just the access they need, only when they need it.
With clear boundaries and expiration timers.
It's about empowering your AI while keeping you In control.
For critical tasks, human approval is essential.
Human in the loop authorization leverages built-in workflows to reduce risk, Ensure compliance, and provide trusted human oversight.
We also go beyond basic Good Bot, Bad Bot filtering.
We analyze intent and behavior to weed out legitimate AI agents from those with bad Intentions.
Ping Identity simplifies Genic AI management.
With automated setup, tailored access, and easy deactivation.
With continuous monitoring and detailed audits, we keep your AI agents functioning as intended and your organization secure.
Ping Identity empowers you to embrace the power of AI agents without constant worry and gives You the clarity and control you need, so your agents act with purpose and accountability, Not risk.
All right, a new world, a great vision.
And we are going to work with many of you, if not I hope all of you, To help secure this.
All right, so I want to come back, sorry about that.
Let me come back one slide, uh, last couple of slides, and I'm gonna wrap up.
Many of you have thought of paying as a Partner for Trusted Access or Secure Access.
And we appreciate the trust that you've given us in the journey over the course of the last couple of decades as we've co-developed and co-innovated with many of you through that Whole authentication journey.
I just invite you to think bigger now around this unified platform vision.
These are things that we've been investing in for many years.
This isn't new.
But if you thought about Ping as your trusted partner for access.
You now need to think of Ping, I would hope in a much larger context.
These are all the things that we have been doing and acquiring and innovating with many of You as we build the future together, and we're not done.
Next year, I'll probably come back.
There'll be other boxes on this, either developed or acquired, Many by the recommendations from you as you look to unify your partnership, Strategic partnership with us.
So, look, thank you for trusting us with your identity controls.
I hope this was informative.
I hope you get as excited about this as I do The Ping Team is.
Um, we certainly are very, very honored to serve all of you.
We take it super seriously.
We hope to earn your trust in the future.
Each one of these conferences is an opportunity for us to, For you to judge the say do ratio of Ping.
If we say it, We're going to do it.
We're very committed to that.
So once again, thank you all for being here, thanks to everyone who tuned in online.