Advancing Your Identity Security Strategy with BeyondTrust and Ping Identity

Mar 28, 2025
-minute read
Headshot of Amrit Sokhal
Director, Technology Alliances Integrations, Beyond Trust

Continuing Collaboration in Service of Real-World Customer Challenges

With the rapid expansion of cloud technologies and an overwhelming amount of security and identity data to analyze, organizations are now focused on finding effective ways to harness resources securely. The biggest challenge is trying to secure their environments without adding complexity or unnecessary decision-making burdens.

 

BeyondTrust and Ping Identity have been partnering to deliver seamless integrations that advance identity security and governance for over five years. Now we are excited to introduce several new BeyondTrust - Ping integrations that further expand on our current strategic partnership to provide our customers with powerful visibility, management, and control:

  • BeyondTrust Identity Security Insights and Ping Identity Platform
  • BeyondTrust Identity Security Insights and Ping DaVinci
  • BeyondTrust Password Safe and Ping Advanced Identity Cloud

By enhancing our customers’ ability to continuously assess their identity security posture across endpoints, servers, cloud services, DevOps systems, and identity providers, we are better equipping them to manage and secure their expanding identity estates.

 

Read on to learn more about these exciting new integrations and how they can help advance your identity security strategy.

BeyondTrust Identity Security Insights and Ping Identity Platform

What is BeyondTrust Identity Security Insights?

Identity Security Insights is a data-driven solution then enables organizations to see and understand the identity landscape from the lens of an attacker. It leverages a modern data lake, graph theory, and machine learning and AI capabilities to deliver comprehensive visibility and context across the complex identity landscape—not just for BeyondTrust products, but across the entire identity fabric, too.

 

How does this integration work?

Identity Security Insights connectors allow customers to integrate third- and first-party identity and account information with your Identity Security Insights console. The platform uses this data to build identity analytics, detect identity security threats, and make security recommendations. Once configured, Identity Security Insights automatically schedules and pulls data from Ping through the connector, updates the console's dashboards, and reports with new or changed recommendations and detections.

 

Why is this integration strategic for our customers?

This integration provides enhanced visibility into:

  • Risk Identification and Mitigation—Using Identity Security Insights recommendations, customers quickly gain an understanding of the analyzed Paths to Privilege™ in their organization, allowing them to proactively identify potential privilege escalation threats, and then enable Ping to mitigate these risks before they are exploited.
  • Improved Access Security—By combining the real-time analysis from BeyondTrust with PingOne's secure customer identity management, customers can better protect sensitive information and ensure that only authorized users can access privileged accounts.
  • Streamlined Compliance—Customers achieve and maintain compliance with stringent identity security regulations by providing detailed insights and controls over identity and access management across the enterprise.

 

BeyondTrust and Ping Identitys EndtoEnd Identity Security

BeyondTrust and Ping Identity have launched new integrations across their portfolios.

BeyondTrust Identity Security Insights and PingOne DaVinci

What is PingOne DaVinci?

PingOne DaVinci is an open interface cloud orchestration service that creates user journeys across various applications and identity ecosystems via a drag-and-drop interface. Organizations can easily design their own workflows or refine one of the workflow templates to customize any journey. The workflows can also be optimized easily using A/B testing with the changes being deployed in quick succession.

 

How does this integration work?

Identity Security Insights’ webhook integration with PingOne DaVinci allows customers to connect third-party security information and event management tools to their BeyondTrust Identity Security Insights console. Once an integration is configured, Identity Security Insights automatically sends information regarding new detections and recommendations to the provided endpoint.

 

Why is this integration strategic for our customers?

This integration provides improved identity management—it effectively reduces friction by combining identity orchestration with third-party remote access, creating a personalized, seamless experience for users. Additionally, the Identity Security Insights integration provides real-time results, which can be sent to the BeyondTrust solution to terminate or lock an active session based on certain parameters of the identity’s access, as well as any ticketing system with an available third-party ITSM connector.

BeyondTrust Password Safe and Ping Advanced Identity Cloud

What is PingOne Advanced Identity Cloud?

PingOne Advanced Identity Cloud, formerly ForgeRock Identity Cloud, raises the bar with security architecture that is purpose-built for enterprise. By enabling advanced IAM capabilities without added complexity, it allows customers to serve all identities and applications, fully integrated across a hybrid infrastructure. All capabilities are centralized within a cloud-native identity governance, lifecycle, and relationship management platform.

 

What is BeyondTrust Password Safe?

BeyondTrust Password Safe combines privileged account and session management (PASM) and secrets management capabilities into one solution. The solution allows customers to:

  • Protect human and machine identities against account hijacking, credential re-use attacks, exposed hardcoded passwords, lateral movement, privilege escalation attacks, and more.
  • Minimize the risks associated with privileged credential compromise by onboarding privileged accounts and credentials, thereby safeguarding access to privileged account passwords and DevOps secrets, including certificates, API keys, tokens, and SSH keys.
  • Gain full control over system and application access through live session management. Administrators can record, lock, and document suspicious behavior, with the ability to lock or terminate sessions.

 

How does this integration work?

ForgeRock Identity Governance is now part of the PingOne Advanced Identity Cloud Platform. The integration between BeyondTrust Password Safe and Ping Identity Governance provides the controls for managing, securing, and auditing privileged access while ensuring identity governance at an enterprise level. BeyondTrust Password Safe automates the discovery, management, and control of privileged credentials, ensuring that access is secure to your most critical systems. In tandem, Ping Identity Governance offers a comprehensive approach to managing user access rights, roles, and privileges, enabling you to secure your digital assets while maintaining compliance.

 

Why is this integration strategic for our customers?

With this integration, our customers benefit from an advanced, centralized identity governance platform. These combined solutions allow them to enforce security controls and mitigate risks by identifying and addressing potential privilege escalation pathways. Ping Identity Governance strengthens the identity lifecycle management, while BeyondTrust Password Safe ensures the proper management of privileged credentials, making it easier to track and control who has access to sensitive systems and data.

What are the benefits of our expanded partnership?

By broadening our current strategic partnership with Ping Identity, organizations can unlock new use cases and features, extending their solutions even further through efficient automation, workflows, and process flows. Our extended technical collaboration will help security administrators to:

  • Secure user access to sensitive resources
  • Automate threat detection and remediation, reducing response times and effectively minimizing the blast radius for any in-progress attacks. This is possible because of the extensive API capabilities built into Identity Security Insights, which enable a quicker time-to-value, increased operational efficiencies, and help customers achieve a greater ROI on their security investments.
  • Quickly discover the vulnerable paths to privilege within their identity infrastructure, identifying risk patterns and potential threats by analyzing privilege escalation opportunities that attackers seek.
  • Secure the full lifecycle of identities, providing holistic visibility into identity security gaps while maintaining control over who can access critical systems and data.

As we look to the future, integration possibilities are endless, thanks to the BeyondTrust platform’s comprehensive APIs that allows us to unlock new features and advanced use cases. Together, we help customers achieve their identity security goals and take full advantage of existing investments made across our product portfolios.

Ready to start benefiting from BeyondTrust and Ping Identity's latest partnership?

If you would like to learn more about how BeyondTrust and Ping Identity work together to secure identity and privileged access across increasingly complex infrastructures and changing business applications, click here.

 

 

Share this Article:
Related Resources