KuppingerCole Report
By John Tolbert

Ping Identity solutions for Customer Identity and Access Management

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing Ping Identity’s solutions for CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty.

Commissioned by Ping Identity

1 Executive Summary

Customer Identity and Access Management (CIAM) is the fastest growing specialty in Identity and Access Management (IAM) that has emerged in the last f ...

Login Get full Access

2 Highlights

  • Creating new ways to engage customers online is a mandatory business strategy.
  • Customers want a pleasant, consistent digital experience when inter ...
Login Get full Access

3 Consumer Identity Management Business Drivers

Digital transformation is an objective that many organizations have on their agendas today. Businesses are finding that they need to learn more about ...

Login Get full Access

3.1 “One IAM” / SSO

Let’s use a hypothetical scenario to illustrate the need for a coherent identity management solution for customers. Acme is a financial institution ...

Login Get full Access

3.2 Know Your Customer (KYC)

Knowing your customer is an e-commerce imperative. Companies that gather and utilize information about their customers are able to offer discounts, t ...

Login Get full Access

3.3 Revised Directive on Payment Services (PSD2)

Within 2 years of 25 November 2015, the Revised Directive on Payment Services (PSD2) comes into effect across the EU1. PSD2 defines the business ent ...

Login Get full Access

3.4 Consent Management

Through registration to CIAM systems and subsequent usage of sites, customers create a lot of data. While the information processed by these systems i ...

Login Get full Access

4 Consumer Identity Management Challenges

Customer identity management solutions can help solve real business problems. However, there can also be challenges associated with procuring, archite ...

Login Get full Access

4.1 IAM and CIAM: When both are needed

Traditional IAM systems are designed to provision, authenticate, authorize, and store information about workforce users. User accounts are defined; us ...

Login Get full Access

4.2 IT Modernization

During the planning stage, or even as late as the implementation stage, some organizations find that their current on-premise IT infrastructure is in ...

Login Get full Access

4.3 Architecture

There are two major entry points to consider from an architectural perspective: on-premise or cloud. Your organization may favor an on-premise install ...

Login Get full Access

5 The Ping Identity approach to Consumer Identity and Access Management

Ping Identity offers a rich and robust set of services to corporate tenants and encompasses all the necessary features of a CIAM solution, such as sel ...

Login Get full Access

5.1 PingFederate for SSO

PingFederate was Ping Identity’s original flagship product for SSO. For identity federation, it supports all the relevant protocols, including SAML, ...

Login Get full Access

5.2 PingID for Multi-Factor Authentication

PingID provides a large number of MFA options. Administrators can choose to implement the following authenticators:

  • Mobile apps for Android and iO ...
Login Get full Access

5.3 PingDirectory for customer profile management

PingDirectory is the identity repository, and can scale to handle millions of identities, billions of attributes associated with those identities, and ...

Login Get full Access

5.4 PingDataGovernance for administering policy-based access control to resources

PingDataGovernance works with PingDirectory to manage customer profiles, secure access to customer profiles, enforce customer preferences, and enforce ...

Login Get full Access

5.5 PingAccess for enforcing policy-based access control to resources

PingAccess can work in conjunction with WAM systems, as a policy-based access control gateway (proxy or agent architecture) within or between federate ...

Login Get full Access

6 Recommendation

Customer Identity management has become a fast-growing market segment. It has evolved to meet specific requirements that businesses are encountering i ...

Login Get full Access

6.1 Recommendations for those contemplating a CIAM technology insertion

  • IT teams should welcome the opportunity to work with Sales and Marketing to transform IT into a revenue producing service.
  • Inventory existing IAM ...
Login Get full Access

6.2 Recommendations for current CIAM tenants and operators

  • Utilize APIs and 3rd party tools to extend functionality where needed.
  • For financial services businesses, use CIAM tools to KYC, comply with AM ...
Login Get full Access


©2021 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.