sb-eu logo
Story image

Ping Identity releases capabilities framework for zero trust deployments

11 Jun 2019

Ping Identity today announced its capabilities framework and practical guidance for adopting a zero trust security strategy.

This framework provides a reliable direction to companies in any stage of the Zero Trust maturity process to help enable a broad range of use cases and technology integrations.

It also includes innovative ways to support secure access to anything, by anyone, from anywhere on any device. 
 
A Zero Trust framework designed for the enterprise

The Ping Identity model provides numerous starting points for architecting Zero Trust security within the realms of strong authentication, endpoint security, network security, workload security, data security and transaction security.

In addition, Ping offers guidance ranging from advising security leaders on the transition process to Zero Trust, to providing security practitioners paths to configure key Zero Trust elements, starting with strong identification and authentication.

Ping has established multiple partnerships to support its Zero Trust framework and continues to develop this network of technology partners to serve the security needs of enterprise digital transformation projects, such as multi-cloud deployments, secure partner access and API first initiatives.

Some of the companies that Ping Identity has partnered with to establish Zero Trust include ID DataWeb, iovation, a TransUnion company, and MobileIron.

“Zero Trust is all about verifying that your users are who they say they are – both upfront and on an ongoing basis,” says ID DataWeb product and operations VP Matt Cochran.

“The key to adoption is taking an approach that does not sacrifice user experience by finding the right balance of strong upfront identity verification, passive environmental risk analysis and adaptive MFA challenges. Ping Identity and ID DataWeb’s combined solution allows companies to establish a strong Zero Trust foundation on top of their existing identity investments, which is key for success.”

When done right, Zero Trust security can minimise both risk and friction for good customers, and that’s just what the partnership between Ping Identity and iovation accomplishes,” says iovation corporate development EVP and co-founder Jon Karl.

“Our joint customers have the ability to leverage thousands of attributes to accurately recognise devices and assess their trustworthiness while also watching for mismatches and high-risk activity from specific time zones, regions and IP addresses.”

“Our partnership with Ping Identity allows us to augment the single sign-on experience in a mobile-friendly way that brings Zero Trust security to all devices,” says MobileIron product management SVP Brian Foster.

“This mitigates the risk of corporate resources being accessed from mobile and desktop devices and ensures that all devices, applications, users and networks meet compliance requirements through zero trust principles.

Story image
Average cost of insider attack $2 million - Bitglass
A report has found 61% of companies had an insider attack in past year.More
Story image
High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020
The COVID-19 crisis has unleashed a wave of sophisticated and disruptive ransomware attacks, and the onus is on businesses to ramp up their security measures if they’re to avoid falling victim, writes Attivo Networks regional director for A/NZ Jim Cook.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Story image
Kaspersky releases new report on consumer’s approach to digital services
COVID-19 related restrictions and the necessity to stay indoors has influenced the way people approach digital services, making them more aware of how securely both they, and their housemates, use the internet.More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Story image
BT Security shakes up roster of vendors after 'largest ever' partner review
BT says the decision to review their security partner base was driven by the recognition that many customers find it difficult to navigate today’s complex security landscape, as well as customers’ desire to have a ‘leaner set of partners’.More