• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

Ping Identity launches Just-in-time Privileged Access in unified platform, enabling secure, passwordless, time-bound access with TPM-backed session protection across cloud and hybrid infrastructures

August 20, 2025 //  by Finnovate

Ping Identity announced its new Just-in-time Privileged Access capabilities within the Ping Identity Platform, offering comprehensive capabilities across all three categories of identity: Access Management (AM), Identity Governance and Administration (IGA), and Privileged Access Management (PAM). Using centralized identity controls in a single platform, this trifecta empowers customers with a more comprehensive suite of solutions to protect and manage their digital environments. These PAM capabilities enable more secure control over exploding cloud permissions by utilizing a Trusted Platform Module (TPM) to protect privileged sessions at the device-level, which can be both agentless and agent-based, depending on customer needs. With Ping’s privileged access offerings, customers benefit from: JIT Privileged Access: End-users can securely request and obtain time-bound access to cloud environments (AWS, GCP, Azure), as well as cloud or on-premises servers, databases, Kubernetes and other critical resources in a user-friendly portal, adhering to zero trust best practices. Passwordless Access: Authentication to all the resources (e.g. Server SSH, RDP, IAM) is handled in a passwordless manner, eliminating the need for static credentials (e.g. SSH Keys, RDP password). Ensured Compliance: Session recordings and audit logs for privileged access support compliance with regulations such as SOX, SOC2, GDPR, HIPAA, and PCI-DSS. Hybrid Infrastructure Support: JIT granular access to entitlements, roles and resources in AWS, Azure, GCP, and Kubernetes with context-aware policies and real time authorization.

Read Article

Category: Innovation Topics, Authentication & Identity

Previous Post: « Embedded payments are seeing rising adoption in the parking sector through AI-recognition tech that lets customers just drive in and scan a QR code to enter their credit card information the first time they park, with automatic vehicle identification and charges applied on subsequent trips

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.