SecurityWorldMarket

28/12/2019

Ping Identity extends Zero Trust methodology

Denver, Co

Ping Identity is continuing its support for enterprises in developing a Zero Trust security infrastructure with new capabilities, practical guidance, and technology integrations. As organisations move away from a static perimeter-based security approach, they’re embracing strategies that require authentication and authorisation of every user, device, and network, as well as dynamic policies that factor in numerous risk signals, and intelligent data sources.

To support organisations in their Zero Trust efforts, the Ping Intelligent Identity platform now offers advanced Zero Trust features such as, Enhanced Passwordless Authentication Capabilities, ,which is enabled by support for the FIDO2 passwordless authentication flow, and an “Identifier First” adapter. Users are prompted for an identifier—such as a username—which triggers user verification via push notification, facial or fingerprint check, or another non-password authentication method.

The new Expanded Identity Intelligence feature is user-behavior based attack detection on APIs to block access if necessary, with the ability to evaluate whether two authentication requests from different locations are possible in the time elapsed between them (impossible travel velocity), and IP address reputation assessment before granting access.

Finally, Broadened Enterprise Coverage offers fine-grained control over who has access to user-related data to address data privacy challenges.

In addition, Ping Identity now offers new technology integrations, including the integration wit ID Dataweb, where the two companies have partnered to verify that users are who they say they are during device registration as part of step-up authentication and account recovery. 

The integration between Mobileiron and Ping Identity means that together they can offer greater context for device posture assessment and corresponding policy creation to allow or deny user access.

And finally the latest integration with Zscaler’s Zero Trust Network Access (ZTNA) service and Zscaler Private Access is designed to ensure that only authorised users can view and connect to authenticated private apps and data.


Tags


Product Suppliers
Back to top