CA SiteMinder vs Ping Identity
Last updated: June 09, 2015
CA SiteMinder Secure SSO & Flexible Access Management can provide your organization enterprise-class secure single sign-on (SSO) and flexible identity access management so that your organization can authenticate users and control access to Web applications and portals. Across Internet, intranet and cloud applications, it helps enable the secure delivery of essential information and applications to your employees, partners, suppliers and customers via secure single sign-on.
Ping Identity offers secure single sign-on for your employees from any device and gives IT one dashboard to manage user access for all applications. Provisioning is available for popular apps such as Salesforce.com, Dropbox, Concur, WebEx, Box, Office 365 and more.
CA SiteMinder vs Ping Identity in our news:
2015 - Ping Identity adds authentication via Apple Watch
Identity management platform Ping Identity adds the ability to get your second authentication factor using an Apple Watch. The idea behind the platform is to put identity at the center of the security model and enable users — whether employees, partners or customers — to have access to applications, regardless of the device, based on who they are. You sign on to Ping, then your watch buzzes. You activate it and tap the sign on card on your Watch. It’s a clever way of using the Watch in a useful way to simplify security.
2014 - Identity management service Ping Identity lands $35M
Cloud security startup Ping Identity gets $35 million investment. Ping Identity emphasizes mobile for its identity management platform by hooking into a user’s smart phone as a means to ensure that the right person is accessing the right part of the network. The identity and access management space has been heating up this summer with Okta grabbing $75 million in June, and Sailpoint taking in an unspecified investment that’s supposedly valued at around several hundred million dollars. All of these startups operate under the premise that the cloud has made it difficult for companies to keep track of who can access their often-times complex internal networks while keeping damage-causing miscreants out of their systems.