Ping Identity is #6 in Top 10 Identity Management platforms

Ping Identity
Ping Identity offers secure single sign-on for your employees from any device and gives IT one dashboard to manage user access for all applications. Provisioning is available for popular apps such as Salesforce.com, Dropbox, Concur, WebEx, Box, Office 365 and more.

Positions in ratings


#6 in Top 10 Identity Management platforms

Alternatives


The best alternatives to Ping Identity are: OneLogin, Okta, Azure Active Directory, Auth0, SailPoint, ForgeRock, Keycloak



Latest news about Ping Identity


2015. Ping Identity adds authentication via Apple Watch



Identity management platform Ping Identity has introduced a new feature that allows users to obtain their second authentication factor using an Apple Watch. The platform's concept revolves around prioritizing identity within the security framework, empowering users, including employees, partners, and customers, to access applications seamlessly across various devices, based on their unique identities. With Ping Identity, after signing in, your Apple Watch will vibrate, prompting you to activate it and tap the sign-on card displayed on the Watch. This innovative utilization of the Apple Watch offers a convenient and effective approach to streamline security measures.




2014. Identity management service Ping Identity lands $35M



Cloud security startup Ping Identity has secured a $35 million investment, highlighting the company's focus on mobile integration within its identity management platform. By leveraging a user's smartphone, Ping Identity ensures that the appropriate individuals gain access to specific parts of the network, thereby enhancing security measures. The identity and access management sector has witnessed notable activity this summer, with Okta securing a $75 million investment in June, and Sailpoint receiving an undisclosed investment valued at several hundred million dollars. These startups operate under the shared belief that the cloud has introduced complexities for companies to monitor access to their intricate internal networks, while simultaneously safeguarding against potential threats and unauthorized access.