Story image

Gartner names Ping Identity leader in access management

23 Aug 2019
Twitter
Facebook

Identity-defined security provider Ping Identity has announced that it has been named a Leader by Gartner in the Magic Quadrant for access management for the third consecutive year.

The Magic Quadrant is designed to help companies evaluate technology providers’ completeness of vision and ability to execute. 

The organisation offers a cloud-based PingOne for Customers solution, a developer-friendly API platform that helps enable organisations to easily embed secure identity services—user registration, multi-factor authentication (MFA), self-service profile management and more - into their applications. 

PingIntelligence for APIs, which can apply artificial intelligence and machine learning to continuously inspect, report and act on all API activity, also contributed to Ping’s leadership position.

Identity security done right

The Ping Intelligent Identity platform delivers a unified, standards-based identity and access management (IAM) solution that provides secure and seamless user experiences for customers, employees, and partners.

The solution includes authentication and single sign-on, MFA, access security, directory, intelligent API security and data governance capabilities that work together to enable a secure, connected and agile enterprise.

Ping Identity COO Kris Nagel says, “Enterprises need a modern, agile identity solution to keep pace with their digital business initiatives, improve customer engagement, drive user productivity, and keep everyone secure.”

“Ping Identity is proud to once again be recognised as a Leader in Gartner’s Magic Quadrant for Access Management.” 

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.

Gartner research publications consist of the opinions of Gartner's research organisation and should not be construed as statements of fact.

Ping Identity envisions a digital world powered by intelligent identity.

It helps enterprises achieve Zero Trust identity-defined security and more personalised, streamlined user experiences.

The Ping Intelligent Identity platform provides customers, employees and partners with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale.

Over half of the Fortune 100 choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft, Amazon and Google.

We provide flexible options to extend hybrid IT environments and accelerate digital business initiatives with multi-factor authentication, single sign-on, access management, intelligent API security, directory and data governance capabilities.

Download image
The true extent of cloud inertia’s effect on your organisation
The report dives into the importance of expertise to an organisation’s cloud evolution and the impact the current technical skills gap is having on businesses.More
Story image
19 Sep
Veritas and Pure Storage team up to reduce downtime for applications and services
Three new integrations just announced extend the collaboration across the Veritas Enterprise Data Services platform providing Veritas and Pure Storage customers with business continuity.More
Download image
Whitepaper: How businesses are navigating the competing needs for innovation and security
Given the importance organisations place on digitisation to transform operations, resolving the tension between innovation and security is critical to their long-term success.More
Story image
19 Sep
Zscaler and CrowdStrike partner on cloud and endpoint protection
CrowdStrike’s AI-powered Threat Graph will integrate with Zscaler’s cloud security platform to provide customers with real-time threat detection and automated policy enforcement.More
Story image
19 Sep
IoT devices lacking basic security assessments
Research firm Independent Security Evaluators (ISE) found 125 vulnerabilities in 13 IoT devices, reaffirming an industry-wide problem of a lack of basic security diligence.More
Download image
Beyond deployment: Making AWS work for your use case
If you’re a business that wants to understand how to save time with your technology, AWS actively seeks those optimisations and gets your technology to work in ways it couldn’t work before.More