Home
 > Research and Reports > Case Studies > Case Study: Ping Identity

Case Study: Ping Identity

Source: Luxoft Ping Identity provides software for the computer security and identity management industry. Ping wanted to facilitate rapid, high-end development and accelerate time to market for its leading Web security product. When its first outsourcing choice didn’t offer enough Agile development expertise, Ping found another solution that helped reduce costs by 46 percent and doubled in-house performance in key areas. Learn more.

Featured publications:



You may also be interested in these related documents:

Case Study: ByTec
Source: Plex Systems Bytec, Inc., a supplier of electronic and mechanical assemblies for the automotive sector, needed a system to allow original equipment manufacturer (OEM) customers to trace a particularly complex part. Learn how ByTec chose a solution that provided each part with a unique identity, complete with full traceability through the entire manufacturing process, enabling OEMs to identify faults, and avoid warranty costs. Read More...
Identity-based NAC: Using Identity to Put the “Control” in Network Access Control
Source: Caymas Systems Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users. Read More...
Turn Identity into a Business Enabler, Not an IT Bottleneck
Source: Radiant Logic This paper will examine identity and context as they relate to your identity management (IdM) infrastructure, and it will also look at how delivering identity and context as a service can help jumpstart—or extend—your identity management efforts, offering you actionable insight into your most valuable resource: your employees, partners, and customers. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.