Ping Identity Unveils Just-in-time Privileged Access Capability to Empower Enterprises Across the Full Identity Lifecycle

Robust Identity Trifecta answers dynamic business needs within a centralized platform

DENVER, Aug. 18, 2025 /PRNewswire/ — Ping Identity, a leader in securing digital identities for the world’s largest enterprises, announced its new Just-in-time Privileged Access capabilities within the Ping Identity Platform, offering comprehensive capabilities across all three categories of identity: Access Management (AM), Identity Governance and Administration (IGA), and Privileged Access Management (PAM). Using centralized identity controls in a single platform, this trifecta empowers customers with a more comprehensive suite of solutions to protect and manage their digital environments.

“As enterprises embrace multi-cloud strategies, the scale and complexity of cloud permissions are expanding faster than ever. Traditional, vault-based PAM solutions can’t keep up with today’s dynamic business needs,” said Peter Barker, Chief Product Officer at Ping Identity. “With the addition of PAM capabilities, we’re empowering organizations to adopt just-in-time (JIT) privileged access and solve a broader set of identity and security challenges – all within a unified platform.”

These PAM capabilities enable more secure control over exploding cloud permissions by utilizing a Trusted Platform Module (TPM) to protect privileged sessions at the device-level, which can be both agentless and agent-based, depending on customer needs. With Ping’s privileged access offerings, customers benefit from:

  • JIT Privileged Access: End-users can securely request and obtain time-bound access to cloud environments (AWS, GCP, Azure), as well as cloud or on-premises servers, databases, Kubernetes and other critical resources in a user-friendly portal, adhering to zero trust best practices.
  • Passwordless Access: Authentication to all the resources (e.g. Server SSH, RDP, IAM) is handled in a passwordless manner, eliminating the need for static credentials (e.g. SSH Keys, RDP password).
  • Ensured Compliance: Session recordings and audit logs for privileged access support compliance with regulations such as SOX, SOC2, GDPR, HIPAA, and PCI-DSS.
  • Hybrid Infrastructure Support: JIT granular access to entitlements, roles and resources in AWS, Azure, GCP, and Kubernetes with context-aware policies and real time authorization.

“We’re at a critical inflection point, where AI is reshaping the landscape and eroding trust,” said Andre Durand, CEO and founder of Ping Identity.  “Ping is now uniquely positioned to equip organizations with next-generation privileged access capabilities—protecting access to cloud infrastructure and securing the full spectrum of identities from a single, trusted platform.” 

Ping Identity’s privileged access capabilities will be made available through PingOne Privilege and are made possible by the recent acquisition of Procyon, a cloud-native startup founded in 2021 by Sukhesh Halemane, Suman Sharma, and Mahantesh Pattanshetti. The company was founded with a vision to enable simple, seamless, and secure privileged access to both cloud and on-prem infrastructure. Procyon was designed for modern DevOps workflows, offering a solution that’s easy to deploy, use, and maintain. Its mission focused on increasing productivity for both security and development teams while providing high assurance protection for enterprises from identity breaches.

About Ping Identity
At Ping, we make it possible to trust every digital moment—moments with customers, employees, partners, and non-human identities. Whether you’re securing millions of users, fighting sophisticated fraud, simplifying third-party access, or embracing passwordless experiences and verifiable credentials, establishing trust shouldn’t slow you down. Our enterprise-grade identity platform is built for scale, speed, and flexibility—and works seamlessly with your existing tech stack across cloud, hybrid, and on-prem. We help innovators like you accelerate growth and confidently leverage AI—making life easier for your developers, users, IT teams, and partners. With Ping, all your digital experiences start with trust. Learn more at pingidentity.com.

Ping Identity Media Relations
[email protected] 

Follow us on Twitter/X: @PingIdentity

Join us on LinkedIn: Ping Identity

Subscribe to our YouTube Channel: PingIdentityTV

Like us on Facebook: PingIdentityPage

SOURCE Ping Identity


Go to Source