Secure workloads requires context aware authorization from Ping and application layer security from web application firewalls like Akamai and F5, as well as API gateways like Apigee, Mulesoft, CA, IBM, Axway and more.
Endpoint security provides device context to Ping’s authentication and authorization solutions, with device management integrations from MobileIron, Airwatch and Intune, device reputation from iovation and endpoint detection and response from Cylance, McAfee and Symantec.
Zero Trust security at the data layer combines encryption and data loss prevention from vendors like Symantec and McAfee with fine grained authorization for data
access from Ping.
Strong authentication includes identity verification from vendors like IDDataWeb and iovation, integrated with centralized authentication and adaptive MFA from Ping.
Transaction level security requires seamless communication between web applications and Ping’s authentication APIs, in addition to integrations with API gateways like Apigee, Mulesoft, CA, IBM, Axway and more.
Integrating strong authentication from Ping with network security vendors like NGNIX, F5 and Zscaler augments software defined perimeters with user and device context, only establishing network connections when access criteria is met.