sb-nz logo
Story image

Ping Identity wins CODiE Award for Best Identity & Access Security Solution

Cyber security company Ping Identity has been named the Best Identity & Access Security Solution of 2017 in the 32nd annual SIIA CODiE Awards.

Award recipients are selected based on an evaluation by industry experts and represent the companies producing the most innovative business technology products around the world.

“On behalf of the entire Ping Identity team, we are honoured and proud to be recognized as the top identity and access security solution by our industry peers,” says Andre Durand, Ping Identity CEO.

“After also having been recognised as a CODiE finalist in 2016, this award is a testament to our focus on creating a flexible, scalable, user-friendly platform and supporting our customers through employment and beyond to ensure continued success.”

The Ping Identity Platform delivers a unified, standards-based solution that can be deployed as SaaS, software or both, and can scale to handle millions of identities.

Capabilities of the platform include multi-factor authentication, single sign-on, access security, directory and data governance combine to deliver secure access to cloud, mobile and enterprise applications.

Ping provides identity and access management solutions for enterprises’ partners, customers and employees.

Ken Wasch, SIIA President says, “SIIA’s 2017 Business Technology CODiE Awards recognize the companies that are at the forefront of business innovation.

“These companies are shaping the future of how we conduct business, and it is truly an honour to recognise these products through the CODiE Awards”.

Ping identity have partnerships with Microsoft, Amazon and Google, and provides security solutions to fortune 100 companies including Boeing, Cisco, Disney, GE, Kraft Foods and Walgreens

Having been in operation since 1986, The SIIA CODiE Awards is the only peer-reviewed program to showcase business and education technology’s finest products and services.

The first-round review of all nominees is conducted by software and business technology experts with considerable industry expertise, including members of the industry, analysts, media, bloggers, bankers and investors.

Scores from a panel of expert industry judges determine the finalists, with SIIA members then voting on the finalist products

Winners are then determined by tabulating the results of the judges and the SIIA members.

Story image
Proofpoint and CyberArk extend partnership to further safeguard high-risk users
“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats."More
Link image
DevOps teams struggling to achieve enterprise scale - tips for enablement
Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.More
Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Story image
Plugging the gaps: Australian organisations are leaving their defence barriers wide open
Cybercriminals are are walking through the gaping holes in Australia’s organisational defences – gaps that leadership teams don’t even realise are there.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More