“With authorization, agencies can determine whether known users have the right permissions to perform a specific action. It’s no longer a question whether they can get into an application but whether they can execute that API, go into that folder or access that URL,” Rosensteel wrote in an article published on Carahsoft.com.
He noted that UberEther’s IAM Advantage platform integrates technologies from Ping Identity.
In this article, the executive explained how Ping Identity’s technology offerings support scalable platforms like IAM Advantage when it comes to identity governance.
“Everything that is happening in the identity governance engine is stored in a directory where it can be read by Ping Identity. So, for example, when a user logs in, we can feed that authentication information to a privileged access management module so agencies can apply fine-grained access controls,” Rosensteel wrote.
He noted that Ping Identity, along with IAM Advantage, works to help agencies improve their ability to safeguard valuable data through the adoption of a modernized identity and access management infrastructure.
Client Solution Architects has appointed Ellen Barletto as chief growth officer, expanding her leadership responsibilities after nearly two decades with…
Brian Meyer, federal field chief technology officer at Axonius Federal, said cybersecurity asset management could help government agencies make dozens…
“Technology transformation company Red River has acquired Invictus International Consulting to expand its cybersecurity and enterprise modernization capabilities to support…
Synergy ECP, a software engineering, cybersecurity and systems engineering services provider, has acquired NetServices, a company offering secure, mission-focused technology services. The…