Hi [[ session.user.profile.firstName ]]

Ping Identity

  • Date
  • Rating
  • Views
  • Why IAM Built on Open-Standards is the Key to Open Banking
    Why IAM Built on Open-Standards is the Key to Open Banking
    Rob Otto, EMEA Field CTO, Ping Identity; Barry O'Donohoe, Senior Partner, RaiDiAM Recorded: Jun 13 2018 60 mins
    Security, Compliance and User Experience - Why Identity Access Management Built on Open-Standards is the Key to Open Banking

    Learn how identity & access management (IAM) solutions, built on open standards, can help meet the technical requirements of PSD2 and Open Banking, including secure XS2A (access to accounts), Strong Customer Authentication (SCA), Dynamic Linking, and Consent Management, all while providing a seamless user experience and distinct competitive advantage.
  • Digital Identity Authorities - The Key to Enterprise Cloud Transformation
    Digital Identity Authorities - The Key to Enterprise Cloud Transformation
    Loren Russon, VP of Product Management, Ping Identity Recorded: May 24 2018 49 mins
    Managing digital identities and access control for users, applications and things remains one of the greatest challenges facing cloud computing today. This has led to a new cloud security service paradigm that requires your organization to reevaluate the criteria for designing and implementing identity and access management (IAM) services across data centers, and private and public cloud infrastructure. This new criteria addresses the continued transformation to the cloud, mobile and internet of things (IoT), and the increased demand for open business balanced by user data security found in initiatives such as GDPR, Open Banking and PSD2.

    In this webinar, you will learn about key requirements and design principles required for modern IAM systems, and how to effectively drive digital transformation, address user data security regulations and ensure you successfully manage your company’s transformation to the cloud.
  • You Can't Spell Enterprise Security Without MFA
    You Can't Spell Enterprise Security Without MFA
    Paul Madsen, CTO Office, Ping Identity Recorded: Mar 1 2016 47 mins
    Sure, you can spell enterprise security without the letters M-F-A, but the modern digital enterprise isn't as cyber secure without a strong multi-factor authentication (MFA) strategy.

    Enterprises are under attack, and credentials are a primary target. According to the 2015 Verizon DBIR, 95% of all web app hacks involve credentials that were harvested from customer devices. Many leading enterprises are enhancing their security and control with MFA, allowing them to move away from a high-risk, password based security approach and to give their employees, partners, and customers a better user experience.

    Join Paul Madsen from the CTO office of Ping Identity as he covers:

    - Authentication 101

    - Choosing the right authentication mechanisms for your environment

    - Applying a risk based model to step-up MFA

    - Best practices in step-up MFA including: risk analysis, self-service, native applications, multiple touch points/channels, and more
  • Going Mobile? The Shifting Native SSO Landscape
    Going Mobile? The Shifting Native SSO Landscape
    Paul Madsen, Principal Technical Architect, Ping Identity Recorded: Aug 12 2015 42 mins
    Delivering a Single SignOn (SSO) experience to users of native applications is becoming more and more critical as the number of such applications grows. We'll cover the best practice for native applications authenticating to restful APIs, the different models for enabling SSO across such applications, and how recent enhancements to the mobile OSs promise to offer to a nice balance between usability, security, and deployment ease.
  • Securing Identity in the Cloud
    Securing Identity in the Cloud
    Hans Zandbelt, Senior Technical Architect, Ping Identity Recorded: May 12 2015 46 mins
    - How to extend your IAM infrastructure to support Cloud based apps
    - The check list you need to get started
    - How to provide web single sign-on and API security for customers, partners, and employees
  • After Passwords, What's Next? Securing Identities in the Cloud & Mobile Era
    After Passwords, What's Next? Securing Identities in the Cloud & Mobile Era
    Hans Zandbelt, Senior Technical Architect, Ping Identity Recorded: Nov 4 2014 42 mins
    Join this thought provoking webinar for a discussion of the security and scalability challenges that cloud & mobile era brings along. Specifically, we will cover:

    - A description of how token-based systems and multi-factor authentication can replace password based systems and the associated benefits of that
    - A description of next generation identity protocols OAuth 2.0 and OpenID Connect and how they fit the bill
    - An overview of a scalable and next-generation identity infrastructure that will secure the cloud and mobile
  • Federated Access Management
    Federated Access Management
    David Gorton & Scott Tomlinson Recorded: Sep 23 2014 56 mins
    Learn how Next Gen Identity Management unlocks Business in the Cloud
  • Simplifier – Faciliter – Sécuriser l’accès aux applications dans le cloud
    Simplifier – Faciliter – Sécuriser l’accès aux applications dans le cloud
    Philippe Dubuc, Regional Solutions Architect, Ping Identity France Recorded: Jun 26 2014 45 mins
    30 mn pour découvrir comment les solutions de Single Sign-On fédérées de Ping Identity soutiennent votre stratégie Cloud
  • Semplificare l'accesso ad applicazioni cloud - le soluzioni di Ping Identity
    Semplificare l'accesso ad applicazioni cloud - le soluzioni di Ping Identity
    Federico Carbone, Regional Soution Architect, Ping Identity Recorded: Jun 25 2014 47 mins
    Con la crescente adozione di applicazioni cloud (Software As a Service) le aziende si trovano a fronteggiare il problema di garantire l'accesso dei propri dipendenti a tali applicazioni. Durante il Webinar verrà discusso come gli attuali standard di federazione indirizzano tale tematica e come le soluzioni di Ping Identity aiutino le aziende a garantire che gli accessi alle applicazioni cloud avvengano in modo sicuro e allo stesso con una buona "user experience"
  • Heartbleed and Covert Redirect: How IAM has your back!
    Heartbleed and Covert Redirect: How IAM has your back!
    Hans Zandbelt, CTO - Senior Architect, Ping Identity Recorded: Jun 17 2014 45 mins
    Tune into this insightful webinar with Ping Identity CTO Hans Zandbelt on how best practice Identity & Access Management has your back!

Embed in website or blog