Ping Identity Rolls Out New Tools For Its Identity-as-a-Service Line

June 08, 2016

By Steve Anderson - Contributing Writer

With an increasingly mobile workforce turning to cloud-based tools as a means to keep connected, active, and productive, it becomes important for businesses to not only supply the cloud-based systems involved, but also to protect these. That's a tall order, but one that needs filled. That's where Ping Identity comes in with its identity-as-a-service (IDaaS) tools, and is planning new demonstrations for its Ping Identity Platform IDaaS system to show off its impact.

The new platform comes with several valuable features, including a consistent experience across several types of mobile device to improve usability, as well as privileged access support, support for Windows Remote Desktop through PingID, as well as support for virtual private networks (VPNs), Secure Shell systems, both cloud-based and on-premises applications and more. There's even a new PingOne user interface that offers a simpler, more seamless experience for users. That in turn means faster upscaling, as it's easier to learn the system.

Ping Identity builds its systems around a set of key rules, designed to offer both protection and usability in one package. While it allows for a huge variety of applications—”say 'yes' to any application” is a key rule—as well as identities, it also focuses on planning for the future, making speedy integrations, and improving security as part of normal operations.

Andre Durand, founder and CEO of Ping Identity, commented “In today’s mobile-centric world, user experience is everything, and identity can make or break it. Mobility, combined with unrelenting phishing attacks, has caused multi-factor authentication to evolve from a ‘nice-to-have’ to a ‘must have,’ but it can’t come at the cost of the seamless experience people have come to expect. Today’s announcement ensures that enterprises can create trusted mobile experiences with very little friction, while also supporting IT’s need to move quickly without compromising quality.”

Cloud-based systems require the ability for multiple users outside the system to access, and that means a lot of potential points of failure as far as security goes. A system like Ping Identity's could be a very valuable tool to have on hand, but no security is foolproof. Thus, also using encryption on internal data helps ensure that data is not only protected, but also useless should it be stolen. Yet Ping Identity has the right idea here, making security not only strong enough to withstand potential incursion but also simple enough to use that the temptation to circumvent it is minimal on its user's part, an important combination. With human error and negligence out of the equation, many potential failure points are removed outright.

While Ping Identity's systems are powerful, such systems can only be part of an overall security package. Still, Ping Identity has made a system that's as easy to use as it is strong, and that makes for a system that's hard to pass up.

Edited by Maurice Nagle