Welcome!

Recurring Revenue Authors: Elizabeth White, Pat Romanski, Karyn Jeffery, Liz McMillan, Ed Featherston

News Feed Item

PerspecSys and Ping Identity to Deliver Best-in-class Cloud Data Security & Control

PerspecSys Inc., the leader in cloud data protection solutions for the enterprise, today announced it has partnered with Ping Identity, The Identity Security Company™, to make it easier and more secure for enterprises to take advantage of the cloud.

PerspecSys and Ping Identity are working together to introduce new and existing customers to the benefits of “Cloud Control” – the ability to manage not only user access to cloud applications but also information access in the face of increasing security risks, compliance and regulatory demands. By combining Ping Identity’s single sign-on (SSO) technology with PerspecSys’ cloud data protection platform, the companies are delivering a “one-two punch” that creates tighter, more reliable cloud security via control.

“One of the biggest barriers to enterprise cloud adoption is addressing how to protect sensitive data as it is stored in the cloud,” said Patrick Harding, CTO of Ping Identity. “Ping Identity and PerspecSys are removing that obstacle by creating a more holistic approach to cloud data security. Integrating our cloud identity and access management solutions with PerspecSys’ data protection gateway gives enterprise security teams the ability to deliver the cloud data protection they need coupled with the end-user experience their stakeholders demand.”

Ping Identity’s enterprise identity security solutions span the cloud and the data center to meet enterprise requirements for secure workforce and customer single sign-on to cloud or internal applications, from any device. PerspecSys’ Cloud Data Protection Gateway complements identity access security by ensuring a corporation’s data remains on-site (within their firewall) and under their full control by intercepting sensitive information and replacing it with a random token or encrypted value before it leaves and enters the cloud. The gateway renders the data meaningless outside the corporation but allows full functionality of cloud applications to be retained, helping ensure PerspecSys’ clients enjoy full use of the cloud while staying secure and in compliance with data protection regulations at all times. Together, these capabilities give organizations total control over their data and are part of a fast-growing set of security services that Gartner highlighted in a new category called Cloud Access Security Brokers, and in which they cited interoperability between technologies as essential to enterprise adoption.

“To fully address enterprise cloud security needs, PerspecSys recognized long ago that an integrated, standards-based platform approach was best,” said David Canellos, CEO of PerspecSys. “Organizations wrestling with data protection don’t need or want the added complexity brought about by trying to integrate multiple solutions with multiple requirements. And our friends at Ping Identity agree. We made sure our solutions worked seamlessly together so enterprise customers could have a clear migration path from data access control to data management control, and vice-versa. Unlike competitive offerings, our architecture enables interoperability with the other core security layers that our enterprise customers are demanding.”

PerspecSys and Ping Identity’s joint solution is currently available and has been deployed in Fortune 500 companies – including some of the world’s largest manufacturing and financial institutions. In addition to supporting complementary security solutions such as Ping Identity’s, the PerspecSys gateway enables organizations to deploy powerful encryption modules from companies like Voltage Security and SafeNet via its unique “pluggable” encryption architecture.

“Like Gartner, we believe interoperability is essential to developing a scalable security ecosystem, which in turn is necessary for delivering maximum value to enterprise customers looking to take advantage of cutting-edge technology,” added Canellos. “Compatibility between PerspecSys’ Gateway and Ping Identity’s single sign-on (SSO) solutions is another step in meeting that need and achieving our goal of eliminating the security, compliance and usability barriers that prevent enterprises from moving to the cloud.”

About PerspecSys’ Cloud Data Protection Gateway

The PerspecSys solution gives organizations important data privacy, residency and security capabilities when using cloud based applications. Sensitive information is secured through the use of tokenization or encryption, ensuring the data remains undecipherable when it is processed or stored in the cloud. With PerspecSys, organizations can be confident that their data is protected while their users enjoy the functionality of their cloud applications. The PerspecSys solution is designed to support many popular cloud applications at the same time, such as Oracle CRM On Demand, Salesforce, Chatter and Force.com, via “adapters” that enable interoperability between the application and the PerspecSys solution. PerspecSys currently delivers these capabilities to businesses in internationally regulated industries like financial services, healthcare, manufacturing, life sciences, retail and the public sector.

About PerspecSys

PerspecSys Inc. is a provider of cloud data protection solutions that enable mission-critical cloud applications to be adopted throughout the enterprise. PerspecSys removes the technical, legal and financial risks of placing sensitive company data in the cloud. The company accomplishes this for many large, heavily regulated companies across the world by never allowing sensitive data to leave a customer’s network, while maintaining the functionality of cloud applications. Based in Toronto, PerspecSys Inc. is a privately held company backed by leading investors including Intel Capital and GrowthWorks. For more information on PerspecSys, please visit www.perspecsys.com or follow on Twitter @perspecsys.

About Ping Identity | The Identity Security Company

Ping Identity believes secure professional and personal identities underlie human progress in a connected world. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 900 companies, including 45 of the Fortune 100, rely on our award-winning products to make the digital world a better experience for hundreds of millions of people. Visit pingidentity.com for more information.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...