ID and Access Management: The Role of StandardsPing Identity's CTO Mark Perry on Easing the Implementation of IAM
The key to simplifying the implementation of identity and access management, and streamlining integration with other systems, is to take advantage of industry standards, says Mark Perry of Ping Identity, an identity-defined security provider.
"There is a need to use open standards ... security protocols such as OpenIDConnect, SAML [Security Assertion Markup Language] and OAuth [Open Authorization], which can help integrate quickly and this pattern is widely accepted as it helps in establishing a good security framework," he says in an interview with Information Security Media Group.
"Multifactor authentication is a base level requirement now," he stresses. "It doesn't matter whether you're securing access for employees or for customers. It's just required."
In the interview (see audio link below photo) Perry also offers insights on:
- The role of IAM in today's extended enterprise;
- Why some security pros find IAM deployment challenging;
- New authentication technologies and solutions being deployed.
Based in Australia, Perry is APAC chief technology officer and principal security architect at Ping Identity. He has several years of IAM experience working with customers in the Asia Pacific region. He formerly had roles in technical support, consulting and pre-sales engineering.