Ping Identity enables the modernization of legacy IAM systems

Ping Identity announced a new product and features designed to simplify the transition to its identity and access management (IAM) solution.

It’s a common complaint among organizations that many legacy IAM offerings are unable to support the modern applications, APIs and single-page applications that are needed to run an enterprise more efficiently.

Legacy IAMs lack integration with third party systems that provide threat intelligence and entitlement data, which limits assurance that an allowed user and device are accessing a protected resource. They do not support session management for all of today’s applications and resource types, such as SaaS and native mobile applications.

Without these key capabilities, outdated IAM systems cannot efficiently address the needs of a modern enterprise.

PingAccess, part of the Ping Identity Platform, is designed for the modern enterprise, with its capabilities to protect resources deployed in the cloud, secure RESTful services and APIs, and provide access to business partners and customers.

The latest version of PingAccess, provides enterprises a streamlined way to simplify migration from their legacy IAM system to a modern access management solution. New features include flexible resource matching and error handling, the ability to configure unprotected resources and more.

In addition, Ping is launching a new product, PingAccess Policy Migration, which enables enterprises to migrate off of dated systems.

Current State of the Market

The business landscape is evolving to support cloud-first deployments and the IoT. According to a recent McAfee Security report, “over 90% of organizations today are utilizing cloud services.”

This is in addition to data in a recent Gartner IoT report that shows “connected things are expected to reach 20.4 billion by 2020.”

With this business shift, enterprises must change how they provide their users access to an increasingly diverse set of resources deployed across their hybrid IT environments.

Many enterprises still have legacy web access management systems (WAM) in place to secure business applications. The result is a lack of capabilities to support modern applications, APIs and cloud-deployment models.

During migration, enterprises need a solution that can flexibly accommodate their existing infrastructures. Ping Identity’s newest product, PingAccess Policy Migration, and the latest version of PingAccess provide customers a way to ease the migration process to a modern access management solution.

Furthermore, Ping continues to add ways to integrate with existing IAM infrastructure and all of the applications your users require.

Introducing PingAccess Policy Migration

PingAccess Policy Migration removes processes involved in manually migrating hundreds of policies from your legacy WAM system to PingAccess. PingAccess Policy Migration allows you to maintain your existing network architecture with options to migrate to agent or proxy configurations.

During migration, this product also enables you to review corresponding import and export values to ensure accuracy, as well as troubleshoot common mapping and export errors. The features in PingAccess Policy Migration reduce an enterprise’s time, cost and errors when migrating complex policies from a legacy IAM system.

The combination of PingAccess with PingAccess Policy Migration enables enterprises to transform their access security environment and support today’s business needs.

Centralizing Access Management with New Features

PingAccess capabilities increase flexibility to match existing deployment architectures and incorporate data from API-enabled systems like mobile device management (MDM) solutions and threat detection systems to make better access decisions.

With the addition of single page application support, PingAccess continues to address the evolving needs of the modern enterprise.

Expression-based URL pattern matching and resource ordering. This expands the application paths and patterns that an enterprise can protect, ranging from legacy to modern applications. Flexible matching enables enterprises to map to their existing infrastructure and speeds up the WAM migration process by eliminating the need to rewrite applications or re-configure network connections.

Policy integration with external or third-party services. In today’s expansive security landscape, services such as MDMs and threat detection systems provide threat intelligence and fine-grained entitlement data. PingAccess integrates with these systems to enhance its access policy evaluation and enforcement decisions.

Configurable resource specific or global unprotected URLs. Today’s modern enterprises support hundreds, if not thousands of resources, and need a way to manage access at scale. PingAccess provides that solution by adding application deployment and management of large numbers of dispersed organizational resources (applications and APIs).

Enhanced support for single page applications (SPA). This capability enables enterprises to protect web and API resources within a single application, a common resource type deployed in today’s enterprises. This feature enables enterprises to provide a consistent, singular secure session managed across both web and API resources.

“This latest PingAccess release, coupled with the previous enhancements that introduced deployment automation on AWS and configuration of PingAccess from Azure AD, gives customers the confidence that they can transform their access control framework to support modern applications and service,” said Loren Russon, vice president, product management, Ping Identity.

“With its innovative advancements, PingAccess continues to makes it even easier for us to meet and exceed our evolving access management business requirements,” added Michael Strong, chief information security officer, GCI.

More about

Don't miss