Post on 11-Jan-2016
The Cloud Identity Security Leader
© 2012 Ping Identity Corporation
Nair the twain shall meet
EnterpriseEnterprise SocialSocial
MobileMobile
© 2012 Ping Identity Corporation
“Times they are a changin’”
Enterprise Architects
“What’s in is good and what’s out is
bad”
Enterprise Architects
“What’s in is good and what’s out is
bad”
© 2012 Ping Identity Corporation
Who would have thought it?
Marketing & Sales
“Customer corridor”
Marketing & Sales
“Customer corridor”
© 2012 Ping Identity Corporation
Thanks Steve!
The End User
“Necessity to do everything,
EVERYWHERE!”
The End User
“Necessity to do everything,
EVERYWHERE!”
© 2012 Ping Identity Corporation
Worlds colliding!
EnterpriseEnterprise SocialSocial
MobileMobile
© 2012 Ping Identity Corporation
Meet the new network parameter
© 2012 Ping Identity Corporation
Because the reality is……
© 2012 Ping Identity Corporation
The challenge
Enterprise SocialMobile
“How do I secure
all this so that we
can leverage it?”
“How do I secure
all this so that we
can leverage it?”
© 2012 Ping Identity Corporation
Why is it such a challenge?
Enterprise Firewall
© 2012 Ping Identity Corporation
Directory
Existing AAA
eBusiness
Portal
© 2012 Ping Identity Corporation
Ping Identity Addresses ALL of These
Internal SSO
Third-partyserviceaggregation
Externalbusinesspartners
Workforceto external
applications
Client-facingapplications
Consumer-facingapplications
© 2012 Ping Identity Corporation
Our customers
© 2012 Ping Identity Corporation
Secure the Cloud - Best Practices
• Do not proliferate passwords – Integrate identity at the application layer not the presentation layer to lower maintenance and avoid user involvement
• Adhere to secure and proven industry standards – leverage customer and cloud vendor adoption of trusted approaches to Cloud and Mobile SSidentity infrastructure – look for supported integrations and standards to avoid fragile, high maintenance identity architecture
• Avoid multiple purpose-built identity silos – design for flexibility and scale with a single identity architecture supporting different use cases
• Separate identity from applications – centralize IT control of identities and access11
• Eliminate passwords – don’t sync, replicate or hide them22
Adhere to standards – leverage secure and proven identity standards to maximize interoperability and scale33
Leverage existing identity infrastructure – look for supported integrations and standards to avoid costly, fragile or high maintenance architectures
44
• Avoid purpose-built identity silos – design a single identity architecture that supports all required use cases
55
© 2012 Ping Identity Corporation 14
Are they happy with the choice they made?
98% Customer Satisfaction
© 2012 Ping Identity Corporation
© 2012 Ping Identity Corporation
Who is Ping Identity?
• The Leader in internet identity security with the most Production deployments of any vendor
• 800+ customers (+30/Qtr)
• 42 of the Fortune 100
• Liberty Interoperable Certified with 12 Identity Federation Solutions
• HQ in Denver, offices in Boston, Vancouver, Istanbul
• Global customer base and Support
• Morgan Stanley Innovation Award Winner
Partners
• Over 130 SaaS Application Providers
• Google, Salesforce, Microsoft & SuccessFactors
Boston
Vancouver
Denver
© 2012 Ping Identity Corporation
Deploys in hours
Elegant, lightweight scalable
Standards-based
SAML, OpenID & WS Federation
OAuth, WS-Trust
Strong Auth…
30 Turn-Key Integrations
Anywhere, anytime, any device
800+ Enterprise and SaaS customers
98% customers willing to recommend Ping
42 of the Fortune 100
130+ Cloud SaaS
Highly scalable & performance tested
Support for all use cases
Passwords and identities never leave your control
Users only need one secure password
Eliminate the effects of password & policy change
Centralize policy and support for all cloud apps
Enable Cloud application de-provisioning
Cloud Identity Management