From a user perspective, if you need to get into our VPN or virtual private network, which is for remote people, there is protected data behind a vault. And if you need access to the vault, you must use a multi-factor and PingID. Additionally, vicariously, people have to use multi-factor to get into applications. The final aim is to get into laptops and desktops, and you have to use Multi-factor to restart or unlock your PC. You have to use multi-factor. The way that we do multi-factor here is we give the users a choice of using a phone or a Ubiquiti as to something they have. So after they type in their password and username, they're prompted for a device that they have registered, and they have their choice of a phone or a Ubiquiti, or both.
Authentication is the most fundamental component of access management and is part of security requirements in the digital world. It verifies the identity of users trying to access systems and data by validating their credentials.
I've been managing it in my company. I am more on the implementation side.
We use the product to run different reports.
We use PingID for multifactor authentication, passwordless login, and push notifications.
From a user perspective, if you need to get into our VPN or virtual private network, which is for remote people, there is protected data behind a vault. And if you need access to the vault, you must use a multi-factor and PingID. Additionally, vicariously, people have to use multi-factor to get into applications. The final aim is to get into laptops and desktops, and you have to use Multi-factor to restart or unlock your PC. You have to use multi-factor. The way that we do multi-factor here is we give the users a choice of using a phone or a Ubiquiti as to something they have. So after they type in their password and username, they're prompted for a device that they have registered, and they have their choice of a phone or a Ubiquiti, or both.
PingID is similar to identity access management and customer identity access management, however, the profile is different.
I am a reseller for PingID.
We have integrated PingID with different applications. Mainly the internet-facing applications.
We primarily use the solution for access to cloud applications.
We primarily use the solution as software for some of the applications.
My primary use case is for mobile one-time passwords and identity solution. Multi-factor authentification.