KuppingerCole Report
Whitepaper
By John Tolbert

Ping Identity solutions for Customer Identity and Access Management

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing Ping Identity’s solutions for CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty.

Commissioned by Ping Identity

1 Executive Summary

Customer Identity and Access Management (CIAM) is the fastest growing specialty in Identity and Access Management (IAM) that has emerged in the last f ...

Login Free 30-day Select Access Get full Access

2 Highlights

  • Creating new ways to engage customers online is a mandatory business strategy.
  • Customers want a pleasant, consistent digital experience when inter ...
Login Free 30-day Select Access Get full Access

3 Consumer Identity Management Business Drivers

Digital transformation is an objective that many organizations have on their agendas today. Businesses are finding that they need to learn more about ...

Login Free 30-day Select Access Get full Access

3.1 “One IAM” / SSO

Let’s use a hypothetical scenario to illustrate the need for a coherent identity management solution for customers. Acme is a financial institution ...

Login Free 30-day Select Access Get full Access

3.2 Know Your Customer (KYC)

Knowing your customer is an e-commerce imperative. Companies that gather and utilize information about their customers are able to offer discounts, t ...

Login Free 30-day Select Access Get full Access

3.3 Revised Directive on Payment Services (PSD2)

Within 2 years of 25 November 2015, the Revised Directive on Payment Services (PSD2) comes into effect across the EU1. PSD2 defines the business ent ...

Login Free 30-day Select Access Get full Access

3.4 Consent Management

Through registration to CIAM systems and subsequent usage of sites, customers create a lot of data. While the information processed by these systems i ...

Login Free 30-day Select Access Get full Access

4 Consumer Identity Management Challenges

Customer identity management solutions can help solve real business problems. However, there can also be challenges associated with procuring, archite ...

Login Free 30-day Select Access Get full Access

4.1 IAM and CIAM: When both are needed

Traditional IAM systems are designed to provision, authenticate, authorize, and store information about workforce users. User accounts are defined; us ...

Login Free 30-day Select Access Get full Access

4.2 IT Modernization

During the planning stage, or even as late as the implementation stage, some organizations find that their current on-premise IT infrastructure is in ...

Login Free 30-day Select Access Get full Access

4.3 Architecture

There are two major entry points to consider from an architectural perspective: on-premise or cloud. Your organization may favor an on-premise install ...

Login Free 30-day Select Access Get full Access

5 The Ping Identity approach to Consumer Identity and Access Management

Ping Identity offers a rich and robust set of services to corporate tenants and encompasses all the necessary features of a CIAM solution, such as sel ...

Login Free 30-day Select Access Get full Access

5.1 PingFederate for SSO

PingFederate was Ping Identity’s original flagship product for SSO. For identity federation, it supports all the relevant protocols, including SAML, ...

Login Free 30-day Select Access Get full Access

5.2 PingID for Multi-Factor Authentication

PingID provides a large number of MFA options. Administrators can choose to implement the following authenticators:

  • Mobile apps for Android and iO ...
Login Free 30-day Select Access Get full Access

5.3 PingDirectory for customer profile management

PingDirectory is the identity repository, and can scale to handle millions of identities, billions of attributes associated with those identities, and ...

Login Free 30-day Select Access Get full Access

5.4 PingDataGovernance for administering policy-based access control to resources

PingDataGovernance works with PingDirectory to manage customer profiles, secure access to customer profiles, enforce customer preferences, and enforce ...

Login Free 30-day Select Access Get full Access

5.5 PingAccess for enforcing policy-based access control to resources

PingAccess can work in conjunction with WAM systems, as a policy-based access control gateway (proxy or agent architecture) within or between federate ...

Login Free 30-day Select Access Get full Access

6 Recommendation

Customer Identity management has become a fast-growing market segment. It has evolved to meet specific requirements that businesses are encountering i ...

Login Free 30-day Select Access Get full Access

6.1 Recommendations for those contemplating a CIAM technology insertion

  • IT teams should welcome the opportunity to work with Sales and Marketing to transform IT into a revenue producing service.
  • Inventory existing IAM ...
Login Free 30-day Select Access Get full Access

6.2 Recommendations for current CIAM tenants and operators

  • Utilize APIs and 3rd party tools to extend functionality where needed.
  • For financial services businesses, use CIAM tools to KYC, comply with AM ...
Login Free 30-day Select Access Get full Access

Copyright

©2020 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top