---
description: Review of Ping Identity Software: system overview, features, price and cost information. Get free demos and compare to similar programs on Software Advice New Zealand.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Ping Identity | Reviews, Pricing & Demos - SoftwareAdvice NZ
---

Breadcrumb: [Home](/) > [Authentication Software](/directory/4311/authentication/software) > [Ping Identity](/software/150649/pingidentity)

# Ping Identity

Canonical: https://www.softwareadvice.co.nz/software/150649/pingidentity

Page: 1 / 3\
Next: [Next page](https://www.softwareadvice.co.nz/software/150649/pingidentity?page=2)

> At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. We champion every identity. &#10;&#10;How do we do it? Through a no-code, drag-and-drop canvas that allows enterprises of all sizes to orchestrate and iterate their identity flows. From designing user experiences to automating identity workflows to methodically migrating users from different data stores, our orchestration tool allows anyone to design flows that integrate all your chosen identity vendors.&#10;&#10;Identity has traditionally been a highly specialized skill set but now requires input from technical and non-technical audiences. Ping’s orchestration solution unleashes the potential of identity by enabling people at various levels to create, test, optimize and deploy user experiences through no-code integrations and flows.&#10;&#10;&#9;•&#9;Integrate new products and services with speed and precision&#10;&#9;•&#9;Streamline multi-vendor architectures without custom coding&#10;&#9;•&#9;Explore new ways to engage users and optimize workflows with minimal disruption&#10;&#10;Ping offers hundreds of integration kits, connectors, and productized flows to easily deploy the following capabilities:&#10;&#9;•&#9;Identity Verification&#10;&#9;•&#9;Credential Issuance&#10;&#9;•&#9;Profile Management&#10;&#9;•&#9;Single Sign-On / Authentication&#10;&#9;•&#9;Multi-Factor Authentication&#10;&#9;•&#9;Authorization&#10;&#9;•&#9;Threat Insights&#10;&#10;With Ping Identity’s PingOne Cloud platform, you can have your choice of multiple deployment options, no matter where you are on your cloud migration or digital transformation journey. We offer solutions that work across hybrid, multi-cloud, multi-generational, cloud-first, or completely on-premise environments.&#10;&#10;We serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, and identity and access management.
> 
> Verdict: Rated **4.7/5** by 39 users. Top-rated for **Likelihood to recommend**.

-----

## Quick Stats & Ratings

| Metric | Rating | Detail |
| **Overall** | **4.7/5** | 39 Reviews |
| Ease of Use | 4.6/5 | Based on overall reviews |
| Customer Support | 4.6/5 | Based on overall reviews |
| Value for Money | 4.7/5 | Based on overall reviews |
| Features | 4.6/5 | Based on overall reviews |
| Recommendation percentage | 90% | (9/10 Likelihood to recommend) |

## About the vendor

- **Company**: Ping Identity
- **Founded**: 2002

## Commercial Context

- **Pricing model**: Flat Rate (Free Trial)
- **Pricing Details**: Please contact Ping Identity directly for pricing details.
- **Target Audience**: Self Employed, 2–10, 11–50, 51–200, 201–500, 501–1,000, 1,001–5,000, 5,001–10,000, 10,000+
- **Deployment & Platforms**: Cloud, SaaS, Web-based, Android (Mobile), iPhone (Mobile), iPad (Mobile)
- **Supported Languages**: English
- **Available Countries**: United States

## Features

- API
- Access Control
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Application Access Control
- Authentication
- Behavioural Analytics
- Biometrics
- Compliance Management
- Configurable Workflow
- Credential Management
- Customisable Templates
- Data Mapping
- Data Security
- Data Synchronisation
- File Management
- Identity Federation
- Mobile Authentication
- Multi-Factor Authentication

## Integrations (6 total)

- CyberArk Privileged Access Management Solutions
- Namely
- Oracle Fusion Cloud HCM
- OrangeHRM
- Paylocity
- Zoho People

## Support Options

- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat

## Category

- [Authentication Software](https://www.softwareadvice.co.nz/directory/4311/authentication/software)

## Related Categories

- [Authentication Software](https://www.softwareadvice.co.nz/directory/4311/authentication/software)
- [Data Governance Software](https://www.softwareadvice.co.nz/directory/4158/data-governance/software)
- [Privileged Access Management Software](https://www.softwareadvice.co.nz/directory/4241/privileged-access-management/software)
- [Single Sign On Software](https://www.softwareadvice.co.nz/directory/4347/single-sign-on/software)
- [Customer Identity and Access Management (CIAM) Software](https://www.softwareadvice.co.nz/directory/4427/ciam/software)

## Alternatives

1. [Okta](https://www.softwareadvice.co.nz/software/419181/okta) — 4.7/5 (930 reviews)
2. [Auth0](https://www.softwareadvice.co.nz/software/107607/auth0) — 4.7/5 (137 reviews)
3. [LastPass](https://www.softwareadvice.co.nz/software/140455/lastpass-enterprise) — 4.6/5 (2782 reviews)
4. [SecureW2 JoinNow Platform](https://www.softwareadvice.co.nz/software/522522/JoinNow-Cloud-RADIUS) — 4.8/5 (45 reviews)
5. [Cisco Duo](https://www.softwareadvice.co.nz/software/430527/duo-security) — 4.7/5 (548 reviews)

## Reviews

### "Excellent authentication software\!" — 5.0/5

> **Brandon** | *11 December 2019* | Information Technology & Services | Recommendation rating: 9.0/10
> 
> **Pros**: The UI is very clean and easy to navigate. Adding or removing a device is straight forward and easy to do.
> 
> **Cons**: My only complaint is some of the transitions can be confusing. For example, after adding a new device there is a brief pause before the device is authenticated. An unfamiliar user may close out the windows before the process is done because there is no indication that something is happening in the background.
> 
> I use PingID multiple times a day to authenticate user's new upgraded computers. The old computer gets removed from Ping and we add the new machine.

-----

### "PING ID: A guide to efficient Data Security" — 5.0/5

> **Thea** | *6 November 2022* | Outsourcing/Offshoring | Recommendation rating: 10.0/10
> 
> **Pros**: After the pandemic and lockdowns were at place already, one crucial step into transitioning to a WFH set up is how you'll manage and protect Data Security. With how our company responded it is really phenomenal and this platform made it possible for us to keep our job and clients data safe for almost 3 years of staying at home and working over the same tools. The 2 factor authentication and the tandem between our company's partner domain which is with okta. It really helped us connect, navigate and persevere even while staying at home. I gladly recommend this platform for company's who aim to mobilize working from home and still protect their client's privacy. This could also be a great individual help for freelancers and workers who aim to secure their data at home.
> 
> **Cons**: I think one aspect that they could integrate from this platform is by using it as an individual app for freelancers and marketing it not just on big outsourcing areas but also with startup small companies which needs an extra layer of help for data privacy.

-----

### "Good Authenticator, Variety of Uses" — 4.0/5

> **Shannon** | *29 July 2023* | Information Technology & Services | Recommendation rating: 7.0/10
> 
> **Pros**: There are lots of different authentication apps out there. Ping Identity is great for letting you have multiple authentications through different organizations. I currently use Ping Identity for three different organizations. It also is fairly customizable on how the organization want to use its authentication. The different organizations I have use it for varying degrees of multi-authentication.
> 
> **Cons**: The interface could be more aesthetic. There have been a few instances where the ping to authenticate takes a few minutes to come through.

-----

### "Protects our data and yours\!" — 5.0/5

> **Pippa** | *31 August 2023* | Apparel & Fashion | Recommendation rating: 9.0/10
> 
> **Pros**: Started using this regularly when we began to work from home and were not connected to the secure network by default. It is a really secure and simple way to manage access to ensure only authorised users can access sensitive information and areas, even if an unauthorised user has accessed their laptop.
> 
> **Cons**: It can be tricky to pair with older phones. Also if the phone the ID is linked to is lost or broken to a point it's not usable, it can be difficult to authorise a new device for pairing without support from IT. I understand this is for added security, but it does impact the user experience.

-----

### "Ping Identity is a strong partner focused on my company's success" — 5.0/5

> **Greg** | *22 July 2020* | Pharmaceuticals | Recommendation rating: 10.0/10
> 
> **Pros**: Standards based products which interoperate with all my other products. Continuous innovation. Rich product suite enabling both Workforce/Enterprise IAM and Customer IAM. Strong cloud capabilities with on-prem components, in whatever mix works best for me.
> 
> **Cons**: Self-service capabilities for managing SSO relationships by application \[SENSITIVE CONTENT HIDDEN\] have been slow to arrive, though that has changed in the past year and evolving to meet the needs of a large, global enterprise.
> 
> Our primary focus has been workforce SSO and MFA for the past five years. Ping took the trouble to get to know our needs before we were even a customer and had a strong response to our initial RFP. They've consistently solicited and responded to our product and service feedback, making the solution better and better. They focus on and celebrate not just our success, but that of all their customers.

-----

Page: 1 / 3\
Next: [Next page](https://www.softwareadvice.co.nz/software/150649/pingidentity?page=2)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/software/150649/pingidentity)

## This page is available in the following languages

| Locale | URL |
| en | <https://www.softwareadvice.com/authentication/pingidentity-profile/> |
| en-AU | <https://www.softwareadvice.com.au/software/150649/pingidentity> |
| en-GB | <https://www.softwareadvice.co.uk/software/150649/pingidentity> |
| en-IE | <https://www.softwareadvice.ie/software/150649/pingidentity> |
| en-NZ | <https://www.softwareadvice.co.nz/software/150649/pingidentity> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.nz/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"Ping Identity","description":"At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. We champion every identity. \n\nHow do we do it? Through a no-code, drag-and-drop canvas that allows enterprises of all sizes to orchestrate and iterate their identity flows. From designing user experiences to automating identity workflows to methodically migrating users from different data stores, our orchestration tool allows anyone to design flows that integrate all your chosen identity vendors.\n\nIdentity has traditionally been a highly specialized skill set but now requires input from technical and non-technical audiences. Ping’s orchestration solution unleashes the potential of identity by enabling people at various levels to create, test, optimize and deploy user experiences through no-code integrations and flows.\n\n\t•\tIntegrate new products and services with speed and precision\n\t•\tStreamline multi-vendor architectures without custom coding\n\t•\tExplore new ways to engage users and optimize workflows with minimal disruption\n\nPing offers hundreds of integration kits, connectors, and productized flows to easily deploy the following capabilities:\n\t•\tIdentity Verification\n\t•\tCredential Issuance\n\t•\tProfile Management\n\t•\tSingle Sign-On / Authentication\n\t•\tMulti-Factor Authentication\n\t•\tAuthorization\n\t•\tThreat Insights\n\nWith Ping Identity’s PingOne Cloud platform, you can have your choice of multiple deployment options, no matter where you are on your cloud migration or digital transformation journey. We offer solutions that work across hybrid, multi-cloud, multi-generational, cloud-first, or completely on-premise environments.\n\nWe serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, and identity and access management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/3ce6f9de-58c7-4677-b3b8-82cb1b4bfe02.png","url":"https://www.softwareadvice.co.nz/software/150649/pingidentity","@type":"SoftwareApplication","@id":"https://www.softwareadvice.co.nz/software/150649/pingidentity#software","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"aggregateRating":{"@type":"AggregateRating","ratingValue":4.7,"bestRating":5,"ratingCount":39},"operatingSystem":"Cloud, Android, Platform ios, Platform ipad"},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Authentication Software","position":2,"item":"/directory/4311/authentication/software","@type":"ListItem"},{"name":"Ping Identity","position":3,"item":"/software/150649/pingidentity","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/software/150649/pingidentity#breadcrumblist"}]}
</script>
