2019-02-25T08:45:00Z

What is your primary use case for PingID?

Julia Miller - PeerSpot reviewer
  • 0
  • 14
PeerSpot user
10

10 Answers

PD
Real User
Top 20
2024-01-24T08:29:56Z
Jan 24, 2024

I've been managing it in my company. I am more on the implementation side.

Search for a product comparison
Mario Del Toro - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-05-26T16:22:46Z
May 26, 2023

We use the product to run different reports.

RC
Real User
Top 5Leaderboard
2023-05-26T10:01:44Z
May 26, 2023

We use PingID for multifactor authentication, passwordless login, and push notifications.

PB
Real User
Top 5Leaderboard
2023-05-23T19:02:37Z
May 23, 2023

From a user perspective, if you need to get into our VPN or virtual private network, which is for remote people, there is protected data behind a vault. And if you need access to the vault, you must use a multi-factor and PingID. Additionally, vicariously, people have to use multi-factor to get into applications. The final aim is to get into laptops and desktops, and you have to use Multi-factor to restart or unlock your PC. You have to use multi-factor. The way that we do multi-factor here is we give the users a choice of using a phone or a Ubiquiti as to something they have. So after they type in their password and username, they're prompted for a device that they have registered, and they have their choice of a phone or a Ubiquiti, or both.

SS
Real User
Top 20
2022-11-15T12:34:00Z
Nov 15, 2022

PingID is similar to identity access management and customer identity access management, however, the profile is different.

TO
Reseller
2022-02-23T07:07:00Z
Feb 23, 2022

I am a reseller for PingID.

Find out what your peers are saying about Ping Identity, Microsoft, RSA and others in Authentication Systems. Updated: March 2024.
765,234 professionals have used our research since 2012.
PK
Real User
2021-04-22T07:19:21Z
Apr 22, 2021

We have integrated PingID with different applications. Mainly the internet-facing applications.

RS
Real User
2020-01-19T06:38:00Z
Jan 19, 2020

We primarily use the solution for access to cloud applications.

BD
Real User
2019-11-07T10:36:00Z
Nov 7, 2019

We primarily use the solution as software for some of the applications.

it_user786186 - PeerSpot reviewer
Real User
2019-02-25T08:45:00Z
Feb 25, 2019

My primary use case is for mobile one-time passwords and identity solution. Multi-factor authentification.

Authentication Systems
Authentication is the most fundamental component of access management and is part of security requirements in the digital world. It verifies the identity of users trying to access systems and data by validating their credentials.
Download Authentication Systems ReportRead more