Case Study: Ping Identity

Ping Identity provides software for the computer security and identity management industry. Ping wanted to facilitate rapid, high-end development and accelerate time to market for its leading Web security product. When its first outsourcing choice didn’t offer enough Agile development expertise, Ping found another solution that helped reduce costs by 46 percent and doubled in-house performance in key areas. Learn more.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

You may also be interested in these related documents:

Case Study: ByTec

Bytec, Inc., a supplier of electronic and mechanical assemblies for the automotive sector, needed a system to allow original equipment manufacturer (OEM) customers to trace a particularly complex part. Learn how ByTec chose a solution that provided each part with a unique identity, complete with full traceability through the entire manufacturing process, enabling OEMs to identify faults, and avoid warranty costs.
  • Written By:
  • Published On:

Identity-based NAC: Using Identity to Put the “Control” in Network Access Control

Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.
  • Written By:
  • Published On: