Hi [[ session.user.profile.firstName ]]

Ping Identity

  • Date
  • Rating
  • Views
  • GoodBye 2FA. Hello Modern Authentication.
    GoodBye 2FA. Hello Modern Authentication.
    Matt Klassen - Director of Product Marketing, Ping Identity Recorded: Jan 31 2019 52 mins
    Any usage of multi-factor authentication (MFA) is better than securing the enterprise with passwords alone, but adaptive and risk-based MFA delivers more secure, usable and cost-effective authentication. Adaptive authentication leverages contextual mechanisms, such as geolocation, time of day, IP address and device identifiers, to determine whether a user should be given access or asked for additional factors.

    While adaptive authentication is the most secure way to protect the enterprise, most solutions are much too rigid for administrators to manage and also create a painful user experience for partners, customers and employees alike. Ping Identity's MFA solution gives users a seamless experience which improving enterprise security.

    In this webinar, Ping Identity’s Director of Product Marketing, Matt Klassen, will cover:
    - Why 2FA still isn’t enough
    - How adaptive MFA increases security and enhances the user experience
    - Demonstration of the PingID solution
  • MFA Everywhere: Requirements For Rapid Adoption
    MFA Everywhere: Requirements For Rapid Adoption
    Andrew Goodman, Ping Identity Recorded: Jan 23 2019 43 mins
    “First, identify the applications which handle your most sensitive data.”

    In 2019, this bad yet often repeated advice for implementing multi-factor authentication (MFA) should no longer apply in the enterprise, where compromised credentials continue to represent the #1 attack vector.

    You need MFA everywhere - on every app, API, VPN and even when logging into corporate devices. But implementing MFA everywhere isn’t easy, and surprising roadblocks can appear along the way.

    Join Andrew Goodman, Ping Marketing Manager, to learn the requirements for rapid adoption and implementation of MFA everywhere.
  • Securing Your APIs like the Pros: A Panel Discussion
    Securing Your APIs like the Pros: A Panel Discussion
    Bernard Harguindeguy, Kin Lane, and James Higginbotham Recorded: Dec 19 2018 64 mins
    APIs are presenting new opportunities for hackers to reach into data and systems, and predefined rules, policies and attack signatures can’t keep up with this evolving threat landscape.

    Join us for a panel discussion surrounding today’s API threat landscape, and how enterprises are combining access control with advanced API cybersecurity for comprehensive API protection.

    The panel will feature discussion from nationally recognized thought leaders in the API space listed below, as well as open dialog and Q&A.

    - Bernard Harguindeguy, VP of Intelligence, Ping Identity
    - Kin Lane, The API Evangelist
    - James Higginbotham, API Consultant, LaunchAny
  • Why IAM Built on Open-Standards is the Key to Open Banking
    Why IAM Built on Open-Standards is the Key to Open Banking
    Rob Otto, EMEA Field CTO, Ping Identity; Barry O'Donohoe, Senior Partner, RaiDiAM Recorded: Jun 13 2018 60 mins
    Security, Compliance and User Experience - Why Identity Access Management Built on Open-Standards is the Key to Open Banking

    Learn how identity & access management (IAM) solutions, built on open standards, can help meet the technical requirements of PSD2 and Open Banking, including secure XS2A (access to accounts), Strong Customer Authentication (SCA), Dynamic Linking, and Consent Management, all while providing a seamless user experience and distinct competitive advantage.
  • Digital Identity Authorities - The Key to Enterprise Cloud Transformation
    Digital Identity Authorities - The Key to Enterprise Cloud Transformation
    Loren Russon, VP of Product Management, Ping Identity Recorded: May 24 2018 49 mins
    Managing digital identities and access control for users, applications and things remains one of the greatest challenges facing cloud computing today. This has led to a new cloud security service paradigm that requires your organization to reevaluate the criteria for designing and implementing identity and access management (IAM) services across data centers, and private and public cloud infrastructure. This new criteria addresses the continued transformation to the cloud, mobile and internet of things (IoT), and the increased demand for open business balanced by user data security found in initiatives such as GDPR, Open Banking and PSD2.

    In this webinar, you will learn about key requirements and design principles required for modern IAM systems, and how to effectively drive digital transformation, address user data security regulations and ensure you successfully manage your company’s transformation to the cloud.
  • You Can't Spell Enterprise Security Without MFA
    You Can't Spell Enterprise Security Without MFA
    Paul Madsen, CTO Office, Ping Identity Recorded: Mar 1 2016 47 mins
    Sure, you can spell enterprise security without the letters M-F-A, but the modern digital enterprise isn't as cyber secure without a strong multi-factor authentication (MFA) strategy.

    Enterprises are under attack, and credentials are a primary target. According to the 2015 Verizon DBIR, 95% of all web app hacks involve credentials that were harvested from customer devices. Many leading enterprises are enhancing their security and control with MFA, allowing them to move away from a high-risk, password based security approach and to give their employees, partners, and customers a better user experience.

    Join Paul Madsen from the CTO office of Ping Identity as he covers:

    - Authentication 101

    - Choosing the right authentication mechanisms for your environment

    - Applying a risk based model to step-up MFA

    - Best practices in step-up MFA including: risk analysis, self-service, native applications, multiple touch points/channels, and more
  • Going Mobile? The Shifting Native SSO Landscape
    Going Mobile? The Shifting Native SSO Landscape
    Paul Madsen, Principal Technical Architect, Ping Identity Recorded: Aug 12 2015 42 mins
    Delivering a Single SignOn (SSO) experience to users of native applications is becoming more and more critical as the number of such applications grows. We'll cover the best practice for native applications authenticating to restful APIs, the different models for enabling SSO across such applications, and how recent enhancements to the mobile OSs promise to offer to a nice balance between usability, security, and deployment ease.
  • Securing Identity in the Cloud
    Securing Identity in the Cloud
    Hans Zandbelt, Senior Technical Architect, Ping Identity Recorded: May 12 2015 46 mins
    - How to extend your IAM infrastructure to support Cloud based apps
    - The check list you need to get started
    - How to provide web single sign-on and API security for customers, partners, and employees
  • After Passwords, What's Next? Securing Identities in the Cloud & Mobile Era
    After Passwords, What's Next? Securing Identities in the Cloud & Mobile Era
    Hans Zandbelt, Senior Technical Architect, Ping Identity Recorded: Nov 4 2014 42 mins
    Join this thought provoking webinar for a discussion of the security and scalability challenges that cloud & mobile era brings along. Specifically, we will cover:

    - A description of how token-based systems and multi-factor authentication can replace password based systems and the associated benefits of that
    - A description of next generation identity protocols OAuth 2.0 and OpenID Connect and how they fit the bill
    - An overview of a scalable and next-generation identity infrastructure that will secure the cloud and mobile
  • Federated Access Management
    Federated Access Management
    David Gorton & Scott Tomlinson Recorded: Sep 23 2014 56 mins
    Learn how Next Gen Identity Management unlocks Business in the Cloud

Embed in website or blog