Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Distributed User Authentication in the Cloud

Ping Identity : 15 February, 2012  (New Product)
PingFederate has been extended to enable larger enterprises to manage user authentication within the cloud and to mobile users
Distributed User Authentication in the Cloud
Ping Identity has announced new adaptive federation capabilities in its PingFederate cloud identity management software that allow businesses to easily extend their existing security policies to the cloud.

Cloud, big data, social identities and personal mobile devices are forcing organisations to re-evaluate and reconstruct their existing identity security policies.  A recent Ernst & Young Survey of 1,700 information security executives found 80% are challenged to deliver IS initiatives for these new technologies.  48% say cloud computing implementations are difficult or very difficult, and just over half have not implemented any controls to mitigate the risks associated with cloud computing.

“Mobile devices and social identity access are compounding the problems around cloud security," said IDC Analyst Sally Hudson. “This is driving new requirements for solutions that enable enterprises to extend their existing authentication policies to the cloud.”

“Ping Identity understands enterprise security requirements for securing identity to the cloud. That is why we have partnered with them,” said Eric Uythoven, Seros vice president of security solutions.  “Our clients are asking us for a secure centralised architecture to verify and manage access for customers, business partners and employees.  Time to market for our clients is extremely important and PingFederate’s adaptive federation helps us respond quickly with a solution that’s simple, proven and secure.”

PingFederate 6.6’s adaptive federation capabilities, including authentication rules, authentication chaining, and attribute aggregation, make the cloud conform to existing identity security policies.  Enterprises can combine their existing user authentication methods and user profile data for a personalised, protected and compliant cloud.

Every business has its own rules governing customer, partner and employee access to resources and applications.  PingFederate 6.6 combines identity federation with policy-based authentication to centralise and strengthen access to all cloud apps.  With PingFederate 6.6, organisations can easily support their cloud SSO strategies with rules for remote users or sensitive data access.

Authentication policies must be flexible.  Whether an organisation requires a specific two-factor authentication scheme or failover authentication for secure access around the clock, PingFederate 6.6 allows organisations to mix and match authentication methods for customised cloud security.

For organisations that need to verify and manage access for customers, partners, and employees, PingFederate 6.6 bridges the gap. It allows organisations to collect identity attributes from any number of sources, making complex attribute requirements simple and supplying applications the information necessary for intelligent data access.

“Whether it’s combining strong auth with social identities for an improved customer experience that doesn’t compromise security, or giving employees remote access to applications while meeting compliance requirements, PingFederate’s adaptive federation features put the control where it belongs,” said Ping Identity director of product marketing Julie Smith.  “Enterprises gain control over cloud application access policies for any type of user.”
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo