SlideShare a Scribd company logo
1 of 2
Download to read offline
Customer Success

ZS Associates Drives Client Growth
Using Ping Identity for Single Sign-On
Environment
■■ IdM suite: Internal solution

The Challenge
Anticipating client needs and developing innovative solutions that transform sales and marketing

■■ Existing SSO: Internal solution

from an art to a science have been the hallmark of global business services firm ZS Associates

■■ Directory: LDAP, Microsoft Active
Directory

for over 30 years. So in 2008, it was no surprise that the company recognized that single sign-

■■ SaaS provider role: Javelin™
software suite (24 applications)
and ZS ARTiS™ BI Solution

applications.

on (SSO) was an essential component in developing its JavelinTM software-as-a-service (SaaS)

For many companies, success hinges on the effectiveness of their sales and marketing operations.
Since 1983, this has been ZS’s focus. The firm works with hundreds of the world’s top corporations
to address critical sales-force effectiveness issues and optimize their sales and marketing efforts.

Challenge

“Early on we recognized the potential value of the SaaS model to the clients we serve,” said Chris

Back in 2008, the need to get ahead

Weathers, SaaS Operations manager and director of SSO activities. “We planned to get ahead

of the SSO adoption curve and better

of the SSO adoption curve and provide centralized authentication for our clients who didn’t yet

support its growing SaaS client base
led ZS Associates to Ping Identity.

realize they needed this capability.”
Weathers said ZS wanted to be ready when clients started requesting SSO services from the
company.

Solution
■■ PingFederate®

Results
■■ Leverage PingFederate for
external clients and internal
users
■■ 20,000+ external SSO users

“We implemented our solution in 2009, and then helped our clients adopt SSO to access our SaaS
applications. Two years later, clients began listing identity federation, specifically SAML-based,
capabilities regularly as a standard requirement” said Weathers. “We felt extremely prepared.”

The Solution
ZS chose the on-premises PingFederate identity bridge to power its standards-based SSO
solution to the SaaS applications it offers customers. But the company didn’t stop there. ZS’s IT
organization also found benefit in implementing SSO to support their own business needs. ZS
began using PingFederate internally to enable secure SSO access to numerous cloud applications.

■■ 2,000+ internal SSO users

“Not only did we need to enable a full-featured SSO solution for our cloud-based services, but

■■ Secure browser-based web and
mobile access for Javelin™ and
BI applications

our internal IT group also wanted to begin moving our enterprise applications to the cloud,” said

■■ Zero delay in deprovisioning
client users

Weathers. “PingFederate is a secure, robust solution that we can use both ways.”
PingFederate enables federated SSO, secure mobile access, API security, social identity
integration and automated user provisioning. It integrates easily with existing IT infrastructure
and supports workforce, customer, partner and consumer identity use cases.
ZS is also setting up mobile access to many of its SaaS applications. PingFederate enables secure
access from tablets, smartphones and other mobile devices. Web and native mobile apps leverage
OAuth and OpenID Connect protocols.

1
Customer Success

“

Scott Ewell, SaaS operations manager at ZS, remarked in the coming year, the company will
Because of Ping’s reliance on

explore other features PingFederate offers, such as dynamic user provisioning. PingFederate
supports the lightweight, automated SCIM standard for inbound and outbound user provisioning

SAML and other vetted industry-

to corporate directories and SaaS providers.

standard protocols, our security-

Benefits

minded clients don’t question how
we handle SSO.

”

Chris Weathers
QA Manager,
ZS Associates

ZS serves clients across a variety of highly regulated industries including financial services,
healthcare, high-tech, insurance and others, so providing a secure, reliable SSO connection to
the company’s SaaS applications is critical. Ping Identity’s decade-long track record as a proven
identity and access management (IAM) solution is a significant benefit to ZS’s IT team.
Weathers said, “Our selection of PingFederate has paid off. Our clients rarely question how we
handle SSO. Because Ping Identity relies exclusively on industry-vetted standards and protocols,
our clients are confident our solution will meet the security requirements of their company and
their users.”
Weathers continued, “How our clients interact with us is changing. Their interest in SaaS
applications is growing dramatically. To keep our clients long term, we need solutions that
consistently perform. We can count on PingFederate to deliver the reliability our clients expect.”
The immediacy of deprovisioning users is something ZS’s clients particularly value. “There’s no
delay between when a user leaves the company and when that user’s access to our apps is cut off,”
said Weathers. “Due to the proprietary and sensitive nature of the information our applications
might handle, the risk of any unauthorized access is nil.”

About ZS Associates
ZS Associates is a global leader in sales and marketing consulting, outsourcing, technology and
software. For 30 years, ZS has helped companies across a range of industries get the most out
of their sales and marketing organizations. From 20 offices around the world, ZS experts use
analytics and deep expertise to help companies make smart decisions quickly and cost effectively.
ZS comprises multiple affiliated legal entities. Learn more at: www.zsassociates.com.

© 2013 Ping Identity Corporation. All rights
reserved. Ping Identity, PingFederate, PingOne,
PingEnable, the Ping Identity logo, and Cloud
Identity Summit are registered trademarks, or
servicemarks of Ping Identity Corporation. All
other product and service names mentioned
are the trademarks of their respective
companies.
11/13.1

About Ping Identity | The Identity Security Company
Ping Identity believes secure professional and personal identities underlie human progress in a
connected world. Our identity and access management platform gives enterprise customers and
employees one-click access to any application from any device. Over 1,000 companies, including
half of the Fortune 100, rely on our award-winning products to make the digital world a better
experience for hundreds of millions of people. For more information, dial U.S. toll-free 877.898.2905
or +1.303.468.2882, email sales@pingidentity.com or visit pingidentity.com.

2

More Related Content

More from Ping Identity

Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences MatterPing Identity
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructurePing Identity
 
Ping’s Technology Partner Program
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner ProgramPing Identity
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthPing Identity
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There? Ping Identity
 
Extraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesPing Identity
 
Extraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesPing Identity
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicPing Identity
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | InfographicPing Identity
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
 
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESLES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESPing Identity
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?Ping Identity
 
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapPing Identity
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
 
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSPing Identity
 
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational GapPing Identity
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...Ping Identity
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverPing Identity
 
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyFishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyPing Identity
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
 

More from Ping Identity (20)

Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences Matter
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
Ping’s Technology Partner Program
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner Program
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust Growth
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?
 
Extraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer Experiences
 
Extraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer Experiences
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESLES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
 
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical Gap
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
 
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyFishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 

Zs associates-customer-success-story

  • 1. Customer Success ZS Associates Drives Client Growth Using Ping Identity for Single Sign-On Environment ■■ IdM suite: Internal solution The Challenge Anticipating client needs and developing innovative solutions that transform sales and marketing ■■ Existing SSO: Internal solution from an art to a science have been the hallmark of global business services firm ZS Associates ■■ Directory: LDAP, Microsoft Active Directory for over 30 years. So in 2008, it was no surprise that the company recognized that single sign- ■■ SaaS provider role: Javelin™ software suite (24 applications) and ZS ARTiS™ BI Solution applications. on (SSO) was an essential component in developing its JavelinTM software-as-a-service (SaaS) For many companies, success hinges on the effectiveness of their sales and marketing operations. Since 1983, this has been ZS’s focus. The firm works with hundreds of the world’s top corporations to address critical sales-force effectiveness issues and optimize their sales and marketing efforts. Challenge “Early on we recognized the potential value of the SaaS model to the clients we serve,” said Chris Back in 2008, the need to get ahead Weathers, SaaS Operations manager and director of SSO activities. “We planned to get ahead of the SSO adoption curve and better of the SSO adoption curve and provide centralized authentication for our clients who didn’t yet support its growing SaaS client base led ZS Associates to Ping Identity. realize they needed this capability.” Weathers said ZS wanted to be ready when clients started requesting SSO services from the company. Solution ■■ PingFederate® Results ■■ Leverage PingFederate for external clients and internal users ■■ 20,000+ external SSO users “We implemented our solution in 2009, and then helped our clients adopt SSO to access our SaaS applications. Two years later, clients began listing identity federation, specifically SAML-based, capabilities regularly as a standard requirement” said Weathers. “We felt extremely prepared.” The Solution ZS chose the on-premises PingFederate identity bridge to power its standards-based SSO solution to the SaaS applications it offers customers. But the company didn’t stop there. ZS’s IT organization also found benefit in implementing SSO to support their own business needs. ZS began using PingFederate internally to enable secure SSO access to numerous cloud applications. ■■ 2,000+ internal SSO users “Not only did we need to enable a full-featured SSO solution for our cloud-based services, but ■■ Secure browser-based web and mobile access for Javelin™ and BI applications our internal IT group also wanted to begin moving our enterprise applications to the cloud,” said ■■ Zero delay in deprovisioning client users Weathers. “PingFederate is a secure, robust solution that we can use both ways.” PingFederate enables federated SSO, secure mobile access, API security, social identity integration and automated user provisioning. It integrates easily with existing IT infrastructure and supports workforce, customer, partner and consumer identity use cases. ZS is also setting up mobile access to many of its SaaS applications. PingFederate enables secure access from tablets, smartphones and other mobile devices. Web and native mobile apps leverage OAuth and OpenID Connect protocols. 1
  • 2. Customer Success “ Scott Ewell, SaaS operations manager at ZS, remarked in the coming year, the company will Because of Ping’s reliance on explore other features PingFederate offers, such as dynamic user provisioning. PingFederate supports the lightweight, automated SCIM standard for inbound and outbound user provisioning SAML and other vetted industry- to corporate directories and SaaS providers. standard protocols, our security- Benefits minded clients don’t question how we handle SSO. ” Chris Weathers QA Manager, ZS Associates ZS serves clients across a variety of highly regulated industries including financial services, healthcare, high-tech, insurance and others, so providing a secure, reliable SSO connection to the company’s SaaS applications is critical. Ping Identity’s decade-long track record as a proven identity and access management (IAM) solution is a significant benefit to ZS’s IT team. Weathers said, “Our selection of PingFederate has paid off. Our clients rarely question how we handle SSO. Because Ping Identity relies exclusively on industry-vetted standards and protocols, our clients are confident our solution will meet the security requirements of their company and their users.” Weathers continued, “How our clients interact with us is changing. Their interest in SaaS applications is growing dramatically. To keep our clients long term, we need solutions that consistently perform. We can count on PingFederate to deliver the reliability our clients expect.” The immediacy of deprovisioning users is something ZS’s clients particularly value. “There’s no delay between when a user leaves the company and when that user’s access to our apps is cut off,” said Weathers. “Due to the proprietary and sensitive nature of the information our applications might handle, the risk of any unauthorized access is nil.” About ZS Associates ZS Associates is a global leader in sales and marketing consulting, outsourcing, technology and software. For 30 years, ZS has helped companies across a range of industries get the most out of their sales and marketing organizations. From 20 offices around the world, ZS experts use analytics and deep expertise to help companies make smart decisions quickly and cost effectively. ZS comprises multiple affiliated legal entities. Learn more at: www.zsassociates.com. © 2013 Ping Identity Corporation. All rights reserved. Ping Identity, PingFederate, PingOne, PingEnable, the Ping Identity logo, and Cloud Identity Summit are registered trademarks, or servicemarks of Ping Identity Corporation. All other product and service names mentioned are the trademarks of their respective companies. 11/13.1 About Ping Identity | The Identity Security Company Ping Identity believes secure professional and personal identities underlie human progress in a connected world. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 1,000 companies, including half of the Fortune 100, rely on our award-winning products to make the digital world a better experience for hundreds of millions of people. For more information, dial U.S. toll-free 877.898.2905 or +1.303.468.2882, email sales@pingidentity.com or visit pingidentity.com. 2