Authentication , ID & Access Management , Identity & Access Management

ID and Access Management: The Role of Standards

Ping Identity's CTO Mark Perry on Easing the Implementation of IAM
ID and Access Management: The Role of Standards
Mark Perry, APAC CTO, Ping Indentity

The key to simplifying the implementation of identity and access management, and streamlining integration with other systems, is to take advantage of industry standards, says Mark Perry of Ping Identity, an identity-defined security provider.

"There is a need to use open standards ... security protocols such as OpenIDConnect, SAML [Security Assertion Markup Language] and OAuth [Open Authorization], which can help integrate quickly and this pattern is widely accepted as it helps in establishing a good security framework," he says in an interview with Information Security Media Group.

"Multifactor authentication is a base level requirement now," he stresses. "It doesn't matter whether you're securing access for employees or for customers. It's just required."

Emerging forms of authentication, including several biometric options as well as pushing notification through smart phone apps, will play important roles as IAM continues to evolve, he says.

In the interview (see audio link below photo) Perry also offers insights on:

  • The role of IAM in today's extended enterprise;
  • Why some security pros find IAM deployment challenging;
  • New authentication technologies and solutions being deployed.

Based in Australia, Perry is APAC chief technology officer and principal security architect at Ping Identity. He has several years of IAM experience working with customers in the Asia Pacific region. He formerly had roles in technical support, consulting and pre-sales engineering.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.