Story image

Ping Identity releases self-service IAM solution

03 Oct 2019
Twitter
Facebook

Identity and access solutions provider Ping Identity has announced the release of PingCentral, a self-service delegated administration and converged operating portal for enterprise identity and access management (IAM).

The solution addresses common tasks across the Ping Intelligent Identity platform with simple, self-service workflows and standardised templates that can be delegated to business users and application teams that don’t have IAM expertise.
Dedicated IAM administrators often struggle to manage the high volume of requests required to keep application teams functioning.

An example of this is adding a connection for an application or API, or handling minor changes like updating configurations, security certificates and more.

Meanwhile, business application teams generally have limited IAM knowledge and ability to make these modifications on their own.

The result can be IAM changes that take up to several weeks of back and forth activities between IAM administrators and business application teams, including multiple requests, emails and meetings.

This leaves little time for identity security teams to focus on value-add activities like enhancing security posture and improving end-user productivity.

PingCentral accelerates workflows with self-service capabilities
PingCentral streamlines IAM processes and helps enterprises leverage IAM services as a business driver for digital transformation.

In doing so, it helps enable business application teams to rapidly onboard their own resources through delegated administration.

This extends and increases the value of IAM teams, so they can do more with less, serve the business faster, and achieve widespread adoption and usage of centralised identity services.
PingCentral puts IAM teams and application teams on the same page by providing the following capabilities:

  • Delegated Administration Portal: Contains a self-service, user-friendly interface and template workflow that allows IAM administrators to create, update and deploy standard templates for single sign-on (SSO) and authentication.
     
  • Orchestration Engine: Automates promotions across the application development and deployment lifecycle by maintaining configuration across environments, and allows IAM administrators to designate protected environments that require approval to reduce risk.
     
  • Central Monitoring System: Provides visibility of application connections, clients and environment tiers from a single screen, and permits IAM and business application administrators to assign and/or update resource ownership.
     
  • Lifecycle Management: Supplies an audit trail across the lifecycle of client configuration changes and promotions so administrators always know who has done what and when to a connection and/or client and allows for easy reversion back to previous configurations as needed.

“Ping Identity is dedicated to providing implicit value to our customers through our IAM solutions, helping enterprises to achieve their digital transformation goals,” says Ping Identity product management vice president Loren Russon.

“By simplifying fundamental IAM processes and enabling non-technical business teams to manage standard administrative tasks, PingCentral helps enable organisations to save time and resources while strengthening their overall security posture.”

PingCentral is now generally available.

Story image
24 Oct
Rackspace selects Armor to deliver security for hybrid cloud environments
Armor’s cloud security platform, Armor Anywhere, will be integrated into Rackspace’s portfolio of security services for all major private and hyperscale public clouds.More
Story image
05 Nov
Microsoft's new security innovations at Ignite 2019
Microsoft 365 and Security corporate vice president Kirk Koenigsbauer outlined 10 major security announcements across Azure, Microsoft 365, Office, and Microsoft Defender ATP. More
Story image
22 Oct
Education prime target for cyber attacks, report finds
"Students use an increasing number of devices - on campus, at home and on the go - connecting endpoints to both secure and unknown networks."More
Story image
31 Oct
F5 integrates BIG-IQ into Venafi Machine Identity Protection Platform
The integration allows network operations to orchestrate the lifecycle of SSL/TLS certificates and ensure security policies are enforced across devices.More
Story image
21 Oct
Trustwave introduces dashboard to manage security testing
Through point-and-click navigation, users can scan business-critical applications to search for unpatched vulnerabilities, exploitable code or evidence of malicious activity. More
Story image
29 Oct
Securing the unknown with visibility and control
What’s getting in the way of an organisation’s security health and what needs to happen to secure those vulnerabilities? What assets does an organisation own? How does an organisation gain visibility? Where do the assets live? Who has access to those assets?More