Ping Identity and iovation provide intelligent authentication to support Zero Trust architectures
Ping Identity, the leader in Identity Defined Security, announced its combined solution with iovation, a TransUnion company, to provide customers with intelligent authentication to support Zero Trust architectures.
Leveraging intelligent identity and strong authentication from Ping, with device reputation intelligence from iovation, customers can improve security and productivity for employees and partners, while also creating high-quality, secure customer experiences.
How does it work?
During the authentication process, iovation FraudForce recognizes the device requesting access and delivers a risk score by evaluating associated accounts, past history and suspicious behaviors tied to that device.
PingFederate then steps in to leverage that risk score when making access decisions with policies to apply step-up authentication where needed. For example, under normal circumstances a user should have access to a certain application. In this case, the device they’re using to access the application has fraud associated with it or a related device/account.
The joint solution helps ensure that Zero Trust principles, such as authenticating and authorizing devices based on multiple sources of data, are followed. In response, the enterprise can tailor its handling of the increased risk by monitoring the user, limiting the type of access available or requiring a step up authentication.
“In an age of unrelenting cyberattacks and fraud attempts, assessing user and device risk is the only way to improve security,” said Mark Batchelor, chief solutions architect, Ping Identity. “Ping Identity and iovation are committed to delivering a broad range of risk signals and enforcement points required to achieve Zero Trust security.”
“We’re excited to work with Ping Identity to create an end-to-end Zero Trust access security approach with the device at its center,” said Jon Karl, VP, corporate development, iovation, “By using the device’s riskiness as a trigger for stepped up authentication, potential cybercriminals can be kept out while providing low friction for trusted users.”