From Denver based identity and access management vendor Ping Identity comes this presentation explaining how financial services can benefit from identity management solutions.
17. REDUCE THE RISK OF BREACH
Authentication
• Multi-factor authentication
• Reduce password sprawl
with single sign-on
• Password policies
Access
• Centralized policy-driven
access controls
• Restrict people from
accessing apps with
sensitive data
• Context-sensitive access
control
Identity Data
• Encrypt identity data at
every stage
• Manage individual
privacy and consent
• Enforce regulatory
compliance
Ping can help you with many of these key requirements including:
Strong Authentication – we deliver contextual multi-factor authentication that provides an adaptive framework for ensuring your users are who they say they are
Access Security – we can centrally manage authorization capabilities and secure both your applications and APIs in any domain, for users in any location.
Secure Data Store – Our directory secures your data during capture, at rest and in transit and meets stringent security requirements from some of the world’s most demanding enterprises.
Consent and Privacy Management – We allow you to let your users self-manage their own privacy and consent profiles.
Data Access Governance – we provide centralized data access governance policies with fine-grained, attribute-by-attribute control
The Ping Identity Platform provides the basis for great customer experiences including:
A seamless federated single sign-on experience across internal and external applications and services.
A unified view of the customer with synchronization across disparate identity repositories
A way to govern and share identity data in a secure fashion.
The ability to scale to millions of users.
Identity can be that agile foundation by:
Speeding TTM – Apps access identity services and user data through REST APIs
Automating Integration
Federated SSO
Common identity services, scalability and security
Managing access to all apps
Includes managing partner access to those applications
An foundation of identity will allow them to win the race to innovate
Do it in a secure, scalable, compliant manner
We also have a great solution for end-to-end data security, (On Right)
It’s important secure and encrypt data at ever stage…
In transit…. at rest or when syncing, or backing up
Also to have to make logs tamper-proof
Need alert mechanism, separation of administrative duties
Limit access by admins
We include a whole host of other security best practices that meet the most stringent security standards out there.
This is why PingDirectory has become well known as the best Identity Data Store out there.
The Ping Identity Platform has centrally managed security, security best practices, directory and attribute-based access control
This enables Ping to support global banks, telcos, and tech companies that have extremely demanding security requirements.