SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Ping Identity unveils PingOne cloud-based Identity-as-a-Service solution for application developers

4 Dec 2018

Ping Identity unveils PingOne cloud-based Identity-as-a-Service solution for application developers
Contact company
Contact Ping Identity
icon Add as a preferred source Download PDF version
Related Links
  • Ping Identity's PingIntelligence provides AI-Driven API security against cyber attacks
  • Ping Identity wins 2018 API Award for AI-driven PingIntelligence cybersecurity solution
  • Ping's Intelligent Identity Platform powers the HP Identity management ecosystem

Ping Identity, the provider of Identity Defined Security, announced the public preview of PingOne for Customers. The cloud-based Identity as a Service (IDaaS) offering is built for the developer community and provides API-based identity services for customer-facing applications.

It can help large enterprises launch apps faster, replace custom identity services that are difficult to maintain, and facilitate the transition from on-premises deployments to cloud-hosted services. By making it easy to securely authenticate end users, PingOne for Customers frees up developers’ time to focus on delivering business value faster.

PingOne for Customers is designed to make it faster and easier to embed registration, login, profile management, multi-factor authentication (MFA) and other cloud-based identity services directly into customer-facing applications. The solution offers developer-friendly APIs, extensive documentation, and a dedicated community to help ensure ease of use as developer teams get up and running.

PingOne for Customers includes broad support for identity standards such as OAuth, OpenID Connect, and SAML

Support for identity standards

Organisations are embarking on a broader range of cloud-first digital business initiatives yet struggle with the integration and support of new cloud and SaaS offerings with their existing identity infrastructures. PingOne for Customers addresses these needs and includes broad support for identity standards such as OAuth, OpenID Connect, and SAML.

It also offers hybrid IT capabilities, delegated administration, and addresses other enterprise requirements at the onset to provide diverse implementation and deployment options. Integrations across the broader Ping Intelligent Identity Platform will help current enterprise customers maintain a seamless path to the Cloud.

Integrating identity and access management services

“The developer community wants to build applications and just leverage a service for securing login and registration, versus creating the capabilities themselves in their app,” said Steve Shoaff, chief product officer, Ping Identity.

Speed time to market by leveraging the APIs in PingOne for Customers to embed identity services directly into an application

“PingOne for Customers saves time and valuable resources by greatly simplifying how developers integrate identity and access management services into their application development process. By providing easy to integrate identity services, developers can focus on other high-value work and their enterprise customers can rest assured their applications are secure.”

Capabilities and benefits of PingOne

PingOne for Customers provides the following additional capabilities and benefits:

  • Flexible application integration: Speed time to market by leveraging the APIs in PingOne for Customers to embed identity services directly into an application.
  • Tenant-in-tenant architecture: Create multiple development, staging and production environments for apps to support DevOps, agile development and delegated administration.
  • Secure and reliable CIAM platform in the cloud: With support for identity standards (OAuth, OpenID Connect, and SAML), a cloud-based MFA solution, a secure place to store users in the cloud, centralised policies and authentication flows, and much more.
  • IDaaS to on-premises: Connect with existing on-premises infrastructure to provide access management, single sign-on, and data synchronisation across hybrid IT environments.

According to Forrester Research, "The IDaaS model provides a much faster deployment model by eliminating the need for security and risk pros to purchase and deploy."

PingOne for Customers is now available for public preview. Stop by the Ping Identity booth #324 at the Gartner IAM Summit taking place in Las Vegas this week to learn more about the offering.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security management
  • Security access systems
  • Identity management
  • Security service
  • Integration software
  • Internet of Things (IoT)
  • Data Security
  • Cloud security
  • Related links
  • Issuance and identification system Access control software
  • Related categories
  • Access control software
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec