CxO Trail
Advertisement
  • Home
  • Cybersecurity
    • All
    • Acquisition
    • CISO & Cyber Leadership Africa
    • Cyber Governance & Risk
    • Cyber Visionaries
    • Cybersecurity Reports
    • Featured Stories
    • Global vs African threat landscape insights
    • Leading Women in Cyber
    • Top Threats & Trends
    Reasons Why Cybercriminals Are Exploiting Your Kindness

    Reasons Why Cybercriminals Are Exploiting Your Kindness

    GuardWare launches world-first ‘in-use’ encryption to secure design IP

    GuardWare launches world-first ‘in-use’ encryption to secure design IP

    Veeam to Acquire Securiti AI for $1.7 Billion

    Veeam to Acquire Securiti AI for $1.7 Billion

    Unmanaged BYOD Is the Biggest Cyber Risk in the Hybrid Workplace

    Unmanaged BYOD Is the Biggest Cyber Risk in the Hybrid Workplace

    AWS, CSC, CrowdStrike, and e& Launch Initiative to Make the UAE a Global Cybersecurity Innovation Hub

    AWS, CSC, CrowdStrike, and e& Launch Initiative to Make the UAE a Global Cybersecurity Innovation Hub

    Exclusive Interview with Daphne Njeri, DPO at National Bank of Kenya

    Exclusive Interview with Daphne Njeri, DPO at National Bank of Kenya

    Futurex Teams Up with Spire Solutions to Drive Next-Gen Encryption in the Middle East

    Futurex Teams Up with Spire Solutions to Drive Next-Gen Encryption in the Middle East

    Protecting Against AI-Generated Disinformation

    Protecting Against AI-Generated Disinformation

    SentinelOne Names Ana Pinczuk as President of Product & Technology

    SentinelOne Names Ana Pinczuk as President of Product & Technology

    • Cyber Visionaries
    • CISO & Cyber Leadership
    • Cyber Governance & Risk
    • Women in Cyber
    • Data Privacy & Ethics
    • Emerging Cyber Voices
  • Artificial Intelligence
    • All
    • AI & Automation
    • AI for Africa
    • AI Governance & Ethics
    • AI in Cybersecurity
    • AI Insights & Reports
    • AI Leadership
    • Global Industry Updates
    Reasons Why Cybercriminals Are Exploiting Your Kindness

    Reasons Why Cybercriminals Are Exploiting Your Kindness

    Gebeya Inc. Launches ‘Gebeya Dala,’ a Groundbreaking Artificial Intelligence (AI)-Powered App Builder Designed for Africa

    Gebeya Inc. Launches ‘Gebeya Dala,’ a Groundbreaking Artificial Intelligence (AI)-Powered App Builder Designed for Africa

    Madica Backs Two AI Startups, Anavid and Hypeo AI, Championing Equitable Growth Beyond Africa’s Tech Hubs

    Madica Backs Two AI Startups, Anavid and Hypeo AI, Championing Equitable Growth Beyond Africa’s Tech Hubs

    Locstat Secures €2.5M to Export Africa-Proven Fraud Detection to the UK and EU

    Locstat Secures €2.5M to Export Africa-Proven Fraud Detection to the UK and EU

    Kaspersky Urges Managed AI Strategy in META as Shadow IT Poses Major Data Security Risk

    Kaspersky Urges Managed AI Strategy in META as Shadow IT Poses Major Data Security Risk

    New UK Study Confirms AI Overviews Appear on 42% of Google Searches.

    New UK Study Confirms AI Overviews Appear on 42% of Google Searches.

    NTT DATA and Fortanix Announce Global Partnership to Strengthen Security in the AI and Post-Quantum Era

    NTT DATA and Fortanix Announce Global Partnership to Strengthen Security in the AI and Post-Quantum Era

    Google brings AI tools to university students across Africa

    Google brings AI tools to university students across Africa

    Sophos Launches Advisory Services to Fortify Defenses Against Cyberattacks

    Sophos Launches Advisory Services to Fortify Defenses Against Cyberattacks

  • CxO Visionaries
  • Webinars
    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Upcoming Webinar: The Future of Identity Security in Africa

    Upcoming Webinar: The Future of Identity Security in Africa

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

No Result
View All Result
  • Home
  • Cybersecurity
    • All
    • Acquisition
    • CISO & Cyber Leadership Africa
    • Cyber Governance & Risk
    • Cyber Visionaries
    • Cybersecurity Reports
    • Featured Stories
    • Global vs African threat landscape insights
    • Leading Women in Cyber
    • Top Threats & Trends
    Reasons Why Cybercriminals Are Exploiting Your Kindness

    Reasons Why Cybercriminals Are Exploiting Your Kindness

    GuardWare launches world-first ‘in-use’ encryption to secure design IP

    GuardWare launches world-first ‘in-use’ encryption to secure design IP

    Veeam to Acquire Securiti AI for $1.7 Billion

    Veeam to Acquire Securiti AI for $1.7 Billion

    Unmanaged BYOD Is the Biggest Cyber Risk in the Hybrid Workplace

    Unmanaged BYOD Is the Biggest Cyber Risk in the Hybrid Workplace

    AWS, CSC, CrowdStrike, and e& Launch Initiative to Make the UAE a Global Cybersecurity Innovation Hub

    AWS, CSC, CrowdStrike, and e& Launch Initiative to Make the UAE a Global Cybersecurity Innovation Hub

    Exclusive Interview with Daphne Njeri, DPO at National Bank of Kenya

    Exclusive Interview with Daphne Njeri, DPO at National Bank of Kenya

    Futurex Teams Up with Spire Solutions to Drive Next-Gen Encryption in the Middle East

    Futurex Teams Up with Spire Solutions to Drive Next-Gen Encryption in the Middle East

    Protecting Against AI-Generated Disinformation

    Protecting Against AI-Generated Disinformation

    SentinelOne Names Ana Pinczuk as President of Product & Technology

    SentinelOne Names Ana Pinczuk as President of Product & Technology

    • Cyber Visionaries
    • CISO & Cyber Leadership
    • Cyber Governance & Risk
    • Women in Cyber
    • Data Privacy & Ethics
    • Emerging Cyber Voices
  • Artificial Intelligence
    • All
    • AI & Automation
    • AI for Africa
    • AI Governance & Ethics
    • AI in Cybersecurity
    • AI Insights & Reports
    • AI Leadership
    • Global Industry Updates
    Reasons Why Cybercriminals Are Exploiting Your Kindness

    Reasons Why Cybercriminals Are Exploiting Your Kindness

    Gebeya Inc. Launches ‘Gebeya Dala,’ a Groundbreaking Artificial Intelligence (AI)-Powered App Builder Designed for Africa

    Gebeya Inc. Launches ‘Gebeya Dala,’ a Groundbreaking Artificial Intelligence (AI)-Powered App Builder Designed for Africa

    Madica Backs Two AI Startups, Anavid and Hypeo AI, Championing Equitable Growth Beyond Africa’s Tech Hubs

    Madica Backs Two AI Startups, Anavid and Hypeo AI, Championing Equitable Growth Beyond Africa’s Tech Hubs

    Locstat Secures €2.5M to Export Africa-Proven Fraud Detection to the UK and EU

    Locstat Secures €2.5M to Export Africa-Proven Fraud Detection to the UK and EU

    Kaspersky Urges Managed AI Strategy in META as Shadow IT Poses Major Data Security Risk

    Kaspersky Urges Managed AI Strategy in META as Shadow IT Poses Major Data Security Risk

    New UK Study Confirms AI Overviews Appear on 42% of Google Searches.

    New UK Study Confirms AI Overviews Appear on 42% of Google Searches.

    NTT DATA and Fortanix Announce Global Partnership to Strengthen Security in the AI and Post-Quantum Era

    NTT DATA and Fortanix Announce Global Partnership to Strengthen Security in the AI and Post-Quantum Era

    Google brings AI tools to university students across Africa

    Google brings AI tools to university students across Africa

    Sophos Launches Advisory Services to Fortify Defenses Against Cyberattacks

    Sophos Launches Advisory Services to Fortify Defenses Against Cyberattacks

  • CxO Visionaries
  • Webinars
    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Upcoming Webinar: The Future of Identity Security in Africa

    Upcoming Webinar: The Future of Identity Security in Africa

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

No Result
View All Result
CxO Trail
No Result
View All Result

Ping Identity Unveils Just-in-time Privileged Access Capability to Empower Enterprises Across the Full Identity Lifecycle

CXO Trail by CXO Trail
August 23, 2025
in Industry News
Reading Time: 3 mins read
0
Ping Identity Unveils Just-in-time Privileged Access Capability to Empower Enterprises Across the Full Identity Lifecycle

Robust Identity Trifecta answers dynamic business needs within a centralized platform

Ping Identity, a leader in securing digital identities for the world’s largest enterprises, announced its new Just-in-time Privileged Access capabilities within the Ping Identity Platform, offering comprehensive capabilities across all three categories of identity: Access Management (AM), Identity Governance and Administration (IGA), and Privileged Access Management (PAM). Using centralized identity controls in a single platform, this trifecta empowers customers with a more comprehensive suite of solutions to protect and manage their digital environments.

“As enterprises embrace multi-cloud strategies, the scale and complexity of cloud permissions are expanding faster than ever. Traditional, vault-based PAM solutions can’t keep up with today’s dynamic business needs,” said Peter Barker, Chief Product Officer at Ping Identity. “With the addition of PAM capabilities, we’re empowering organizations to adopt just-in-time (JIT) privileged access and solve a broader set of identity and security challenges – all within a unified platform.”

These PAM capabilities enable more secure control over exploding cloud permissions by utilizing a Trusted Platform Module (TPM) to protect privileged sessions at the device-level, which can be both agentless and agent-based, depending on customer needs. With Ping’s privileged access offerings, customers benefit from:

  • JIT Privileged Access: End-users can securely request and obtain time-bound access to cloud environments (AWS, GCP, Azure), as well as cloud or on-premises servers, databases, Kubernetes and other critical resources in a user-friendly portal, adhering to zero trust best practices.
  • Passwordless Access: Authentication to all the resources (e.g. Server SSH, RDP, IAM) is handled in a passwordless manner, eliminating the need for static credentials (e.g. SSH Keys, RDP password).
  • Ensured Compliance: Session recordings and audit logs for privileged access support compliance with regulations such as SOX, SOC2, GDPR, HIPAA, and PCI-DSS.
  • Hybrid Infrastructure Support: JIT granular access to entitlements, roles and resources in AWS, Azure, GCP, and Kubernetes with context-aware policies and real time authorization.

“We’re at a critical inflection point, where AI is reshaping the landscape and eroding trust,” said Andre Durand, CEO and founder of Ping Identity.  “Ping is now uniquely positioned to equip organizations with next-generation privileged access capabilities—protecting access to cloud infrastructure and securing the full spectrum of identities from a single, trusted platform.” 

Ping Identity’s privileged access capabilities will be made available through PingOne Privilege and are made possible by the recent acquisition of Procyon, a cloud-native startup founded in 2021 by Sukhesh Halemane, Suman Sharma, and Mahantesh Pattanshetti. The company was founded with a vision to enable simple, seamless, and secure privileged access to both cloud and on-prem infrastructure. Procyon was designed for modern DevOps workflows, offering a solution that’s easy to deploy, use, and maintain. Its mission focused on increasing productivity for both security and development teams while providing high assurance protection for enterprises from identity breaches.

SOURCE Ping Identity

Tags: AMIGAPAMPing Identity
Previous Post

LEADING TECH BRANDS DRIVE FUTURE DIGITAL ECONOMY TO SUPPORT NIGERIA’S US$1 TRILLION 2030 VISION

Next Post

Cognite Expands Global Footprint with New Abu Dhabi Entity to Accelerate Industrial AI Adoption in the Region

CXO Trail

CXO Trail

Next Post
Cognite Expands Global Footprint with New Abu Dhabi Entity to Accelerate Industrial AI Adoption in the Region

Cognite Expands Global Footprint with New Abu Dhabi Entity to Accelerate Industrial AI Adoption in the Region

  • Trending
  • Latest
Patchifi Officially Emerges from Stealth with Intelligent Automation at Its Core

Patchifi Officially Emerges from Stealth with Intelligent Automation at Its Core

October 31, 2025
George Njuguna Leads Kenya’s AI-Driven Cybersecurity and Digital Trust Movement

George Njuguna Leads Kenya’s AI-Driven Cybersecurity and Digital Trust Movement

July 31, 2025
Certified CISO Philip Aiwekhoe on Shaping the Future of Cybersecurity Strategy in Africa’s Financial Sector

Certified CISO Philip Aiwekhoe on Shaping the Future of Cybersecurity Strategy in Africa’s Financial Sector

August 5, 2025
CxOTrail Insight – GITEX Nigeria 2025 Edition Now Live

CxOTrail Insight – GITEX Nigeria 2025 Edition Now Live

September 8, 2025
Reasons Why Cybercriminals Are Exploiting Your Kindness

Reasons Why Cybercriminals Are Exploiting Your Kindness

November 3, 2025
Fortinet Hosts Security Day Kenya 2025 to Address the Future of Cybersecurity

Fortinet Hosts Security Day Kenya 2025 to Address the Future of Cybersecurity

November 3, 2025
GuardWare launches world-first ‘in-use’ encryption to secure design IP

GuardWare launches world-first ‘in-use’ encryption to secure design IP

October 31, 2025
Patchifi Officially Emerges from Stealth with Intelligent Automation at Its Core

Patchifi Officially Emerges from Stealth with Intelligent Automation at Its Core

October 31, 2025

Recent News

Reasons Why Cybercriminals Are Exploiting Your Kindness

Reasons Why Cybercriminals Are Exploiting Your Kindness

November 3, 2025
Fortinet Hosts Security Day Kenya 2025 to Address the Future of Cybersecurity

Fortinet Hosts Security Day Kenya 2025 to Address the Future of Cybersecurity

November 3, 2025
GuardWare launches world-first ‘in-use’ encryption to secure design IP

GuardWare launches world-first ‘in-use’ encryption to secure design IP

October 31, 2025
Patchifi Officially Emerges from Stealth with Intelligent Automation at Its Core

Patchifi Officially Emerges from Stealth with Intelligent Automation at Its Core

October 31, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Email us: editorial@cxotrail.com

© 2025 CxOTrail. A publication by SHAHPER Media Ltd.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

🧠 Stay Ahead in Cybersecurity & AI

Get Africa’s top C-level insights delivered monthly. Free, sharp, and on point.

No Result
View All Result
  • About Us
  • Advertise with Us
  • AI + Cybersecurity
  • AI Governance & Policy
  • Artificial Intelligence
  • CISO & Cyber Leadership
  • Contact Us
  • Cyber Governance & Risk
  • Cyber Visionaries
  • Cyber Visionaries | Africa
  • Data Privacy & Ethics
  • Emerging AI Talent & Startups
  • Emerging Cyber Voices
  • Gitex Nigeria
  • Home
  • Magazine
  • Magazines
  • Privacy Policy
  • Women in AI
  • Women in Cyber

© 2025 CxOTrail. A publication by SHAHPER Media Ltd.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.