From a user perspective, if you need to get into our VPN or virtual private network, which is for remote people, there is protected data behind a vault. And if you need access to the vault, you must use a multi-factor and PingID. Additionally, vicariously, people have to use multi-factor to get into applications. The final aim is to get into laptops and desktops, and you have to use Multi-factor to restart or unlock your PC. You have to use multi-factor. The way that we do multi-factor here is we give the users a choice of using a phone or a Ubiquiti as to something they have. So after they type in their password and username, they're prompted for a device that they have registered, and they have their choice of a phone or a Ubiquiti, or both.
IDENTITY DEFINED SECURITY PLATFORM delivers a unified, standards-based platform that can be deployed as SaaS, software or both and can scale to handle millions of identities. From multi-factor authentication and single sign-on to access security, directory and data governance, our capabilities work together to give employees, partners and customers secure access to cloud, mobile and enterprise applications, securing and streamlined everything from sign-on to sign-off and everywhere in between.
I've been managing it in my company. I am more on the implementation side.
We use the product to run different reports.
We use PingID for multifactor authentication, passwordless login, and push notifications.
From a user perspective, if you need to get into our VPN or virtual private network, which is for remote people, there is protected data behind a vault. And if you need access to the vault, you must use a multi-factor and PingID. Additionally, vicariously, people have to use multi-factor to get into applications. The final aim is to get into laptops and desktops, and you have to use Multi-factor to restart or unlock your PC. You have to use multi-factor. The way that we do multi-factor here is we give the users a choice of using a phone or a Ubiquiti as to something they have. So after they type in their password and username, they're prompted for a device that they have registered, and they have their choice of a phone or a Ubiquiti, or both.
PingID is similar to identity access management and customer identity access management, however, the profile is different.
I am a reseller for PingID.
We have integrated PingID with different applications. Mainly the internet-facing applications.
We primarily use the solution for access to cloud applications.
We primarily use the solution as software for some of the applications.
My primary use case is for mobile one-time passwords and identity solution. Multi-factor authentification.