Welcome!

News Feed Item

Ping Identity Growth Accelerates on Enterprise Demand for Next-Generation Cloud and Mobile Identity Management

Ping Identity®, The Identity Security Company™, today announced its annual bookings grew more than 50 percent for the third consecutive year. The company added more than 200 new customers in 2012, raising its total to nearly 1,000, including 45 of the Fortune 100. As a result of the company’s rapid growth, Ping Identity increased its market share at the expense of traditional identity and access management (IAM) providers in a market IDC estimated grew 11 percent in 2012*. The company also announced it has named Bill Dedrick president to manage business operations as Ping Identity continues its accelerated growth.

“Cloud and mobile infrastructures are making traditional identity and access management software obsolete,” said Ping Identity CEO Andre Durand. “At Ping Identity, we’re building the platform for a new generation of IAM, and we saw some impressive returns last year.”

IDC predicts from 2013 to 2020 “90 percent of IT industry growth will be driven by [technologies] that, today, represent just 22 percent of ICT spending. For a $4.6B IAM market projected to grow $1.5B in the next 3 years, much is at stake.*

In 2012, cloud-based apps became mainstream, mobile technologies empowered the workforce like never before and companies relied heavily on APIs to connect in the digital economy. Ping Identity responded with significant advances in its product line.

The Future of Identity Management

“The future of identity management facilitates trusted interaction among groups of application providers and customers on the Web, through APIs, and from any mobile or desktop screen,” said new Ping Identity President Bill Dedrick. “It requires a cloud identity environment (IDaaS) that bridges to on premises enterprise infrastructure, including local applications, data, legacy IAM technology, and high-reliability data center environments, with identity standards at its core.”

Spanning the Cloud and the Data Center

In 2012, Ping Identity unveiled its standards-based Identity-as-a-Service (IDaaS) for cloud SSO, PingOne™, exceeding 300,000 subscribed users and nearly two million SSO transactions since its launch less than six months ago. In addition, Ping Identity released adaptive federation capabilities in its PingFederate® identity bridge software, allowing businesses to easily extend existing security policies and legacy identity infrastructure to the cloud. The company also launched Ping IdentityBridge for Salesforce on salesforce.com’s AppExchange, announced its PingOne Application Provider Services Free Plan, and released details of its partnership with Criterion Systems on a NSTIC Pilot.

“Ultimately,” said Dedrick, “Ping Identity understands we’re in the business of enabling business advantage for our customers by delivering simple and secure access for their customers and their employees to any application resource from any device at enterprise scale. That’s at the heart of our success for 2012 and why 2013 looks equally promising.”

2012 Market Highlights

Customers, Partners, Employees and Security Thought Leaders

  • 200 new customers selected Ping Identity
    • New customers included Land ‘O Lakes, Palo Alto Networks, DIRECTV and Quest Diagnostics
  • Hundreds of millions of users rely on Ping Identity for customer and workforce identity use-cases
  • At the end of 2012, Ping Identity customers also include:
    • 3 of the 5 largest U.S. health plans
    • 7 of the top 10 global biopharmaceutical companies
    • 4 of the 6 largest U.S. banks
  • 100 new SaaS vendors joined the Ping Identity SaaS Partner Program, growing to 280+
  • New partners included FishNet Security Accuvant, Tempus Nova, CipherCloud and Perspecsys
  • Formed a strategic partnership with Macnica Networks to meet growing demand in Japan
  • Added new offices and staff in EMEA and Asia-Pacific to extend the company’s global reach
  • 450 security thought leaders and IT executives attended the 3rd Annual Cloud Identity Summit
    • Be sure to attend this year’s even bigger event in Napa, Calif., July 8-12

Accolades

About Ping Identity | The Identity Security Company

Ping Identity believes secure professional and personal identities underlie human progress in a connected world. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 900 companies, including 45 of the Fortune 100, rely on our award-winning products to make the digital world a better experience for hundreds of millions of people. Visit pingidentity.com for more information.

*IDC Predictions 2013: Security Products & Services and IDC WW IAM 2011 – 2015 Forecast

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"There is a huge interest in Kubernetes. People are now starting to use Kubernetes and implement it," stated Sebastian Scheele, co-founder of Loodse, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walked through how Octob...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
SYS-CON Events announced today that Catchpoint, a leading digital experience intelligence company, has been named “Silver Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Catchpoint Systems is a leading Digital Performance Analytics company that provides unparalleled insight into your customer-critical services to help you consistently deliver an amazing customer experience. Designed for digital business, C...
"We formed Formation several years ago to really address the need for bring complete modernization and software-defined storage to the more classic private cloud marketplace," stated Mark Lewis, Chairman and CEO of Formation Data Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.