4.4
696 Reviews (All time)
Review weighting

Browse Ping Identity Reviews

Ping Identity is present in 5 markets with 6 products. Ping Identity has 696 reviews with an overall average rating of 4.4.

Access Management

Gartner defines access management (AM) as platforms that include an identity provider (IdP) and establish, manage and enforce runtime access controls to at least cloud, modern standards-based web and classic web applications. AM’s purpose is to enable single sign-on (SSO) access for people (workforce, consumer and other users) and machines into protected applications in a streamlined and consistent way that enhances user experience. AM is also responsible for providing security controls to protect the user session in runtime, enforcing authentication (with multifactor authentication [MFA]) and authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools to enable identity-first security.

Ping Identity has 2 products in Access Management market

Decentralized Identity Solutions

Decentralized identity (DCI) leverages technologies such as blockchain or other distributed ledger technologies (DLTs) to allow an entity to create and control its own digital identity. Thus, it provides an alternative to centralized IAM architectures by establishing trust in identities and resilience within the overall system, with little reliance on centralized arbiters or identity stores. DCI solution providers provide services such as manage verifiable credentials for individuals and validate a Verified ID credential with their approval through their secure and encrypted digital wallet. Decentralized identity is important for confirming user identities and securely storing them. It offers numerous advantages separate of the greater identity autonomy it delivers to customers.

Ping Identity has 1 product in Decentralized Identity Solutions market

Identity Governance and Administration

Gartner defines IGA as the enterprise solution to manage digital identity life cycle and govern user access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data that is distributed throughout the IT landscape to enhance control over human and machine access. GA’s must-have capabilities: - Identity life cycle management - Access request process - Basic analytics and reporting

Ping Identity has 1 product in Identity Governance and Administration market

IoT Security

The amount of information being transmitted from things continues to rise. Much of this data originates outside of the enterprise. The scale of security risks in the Internet of Things (IoT) era is therefore much greater than in the pre-IoT environment, and the 'attack surface' is much larger. Most sensor-based things have minimal computing resources, and the opportunities for antivirus, encryption and other forms of protection within things are more restricted. Therefore, IoT security products with a variety of capabilities emerged to help dispel some of these challenges.

Ping Identity has 1 product in IoT Security market

User Authentication

Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. User authentication is foundational to and protects the value of other functions with an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD); audit (individual accountability); and identity analytics.

Ping Identity has 1 product in User Authentication market