Uniform risk analysis of authentication attempts

Access access authentication

Share post

Silverfort and Ping Identity jointly rely on a uniform risk analysis of authentication attempts. Product integration provides comprehensive visibility and assessment of access activities, enabling customers to identify and respond to threats.

Silverfort, a Unified Identity Protection company, recently started working with Ping Identity. Together they want to support customers with a standardized risk analysis of authentication and access attempts - both in local and in multi-cloud environments. This is to identify and prevent identity-based attacks.

61 percent of the attacks are based on stolen credentials

According to the Verizon 2021 Data Breach Investigations Report, 61 percent of security breaches are due to compromised credentials. This makes identity-based attacks the primary method that hackers use to access sensitive data.

The integration of the Silverfort platform with PingFederate enables companies to carry out universal, risk-based monitoring and evaluation of authentication attempts for on-premises and cloud environments. This enables them to proactively prevent threats. The combined solution also offers the extension of identity-based verification to previously unprotected local resources such as servers, workstations, legacy applications developed in-house, file shares and more. These controls can detect advanced attacks in hybrid environments with extreme accuracy, initiate security policy enforcement, and ensure a smooth user experience.

The integration of Silverfort and PingFederate offers the following advantages

  • Transparent redirection of authentication attempts from all applications federated by PingFederate for risk analysis to the Silverfort platform
  • Evaluation of each request based on the full context of the user account by Silverfort, including the most recent local authentication and access activities
  • Application of an access policy in the entire environment of the customer by Silverfort, including locally, in the cloud and in the multi-cloud, if a risky behavior is detected
  • Protection against lateral movements by attackers across hybrid infrastructures
  • Complete transparency and an audit trail for the authentication activities of each user

"The integration of Silverfort and Ping Identity enables customers to implement Zero Trust identity security while providing seamless authentication experiences for users," said Loren Russon, VP of Product Management at Ping Identity. "Regardless of whether applications are in the cloud, on-premises, connected or hybrid, Ping Identity and Silverfort make it possible to see the true context of authentication with AI-based risk analysis and apply adaptive access policies that protect against identity-related security threats."

Authentication in hybrid and cloud environments

"Detecting risky authentication and access requests in hybrid and cloud environments requires a unified approach that can span multiple identity providers and data silos," said Martin Kulendik, Silverfort's Regional Sales Director DACH. “The combination of Silverfort and Ping Identity provides the visibility, risk analysis, and policy enforcement needed to detect and respond to identity-based threats while remaining transparent to authorized users.”

More at Silverfort.com

 


About Silverfort

Silverfort is the provider of the first Unified Identity Protection Platform that consolidates IAM security controls in corporate networks and cloud environments in order to ward off identity-based attacks. Through the use of innovative agent-free and proxy-free technology, Silverfort integrates seamlessly into all IAM solutions, standardizes their risk analysis and security controls and extends their coverage to assets that previously could not be protected, such as self-developed and legacy applications, IT infrastructure , File systems, command-line tools, machine-to-machine access and more.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more