Author Archives: Darren Platt

Darren Platt

Darren Platt

Darren is the Founder and Chief Technology Officer of Symplified. Before Symplified, he was one of Ping Identity’s first three employees, leading Ping’s technology strategy and its transition into enterprise software. At Ping, Darren was given product, development and team management responsibility for Ping’s conformance services and led the entire lifecycle of Ping’s SOA security product, PingTrust. Prior to joining Ping in 2002, Darren was Securant’s first vice president of engineering in 1996. There he managed the first three releases of ClearTrust through 2000, and grew the engineering team to 40 people under tight bootstrap budgets in the hyper- competitive dot-com hiring boom. Darren co-authored AuthXML and represented Securant on the standards bodies. With the sale of Securant, Darren managed the transition of ClearTrust into RSA’s product portfolio and continued to represent RSA on the standards bodies

Reflections on Privacy and Practicality

A couple of weeks ago I had the honor of being invited to participate in a roundtable discussion about what the NSA’s surveillance means for business and entrepreneurship, hosted by the Silicon Flatirons Center for Law, Technology and Entrepreneurship and the ACLU of Colorado at the University of Colorado (CU) Law School. People with many Read More

Extending Web Federation to Native Applications – OpenID Foundation-Napps

I’ve seen a pattern emerge among enterprise-sized organizations that are trying to keep up with securing an expanding array of applications. The technologies through which they’re delivering applications to users have changed over the years, and their IT folks have implemented new identity systems to secure those applications. As a result, most large enterprises now Read More

The Long Tail of SaaS SSO

Most people who are familiar with the concept of “the long tail” were introduced to it by Chris Anderson who addressed it in the context of consumer sales strategy, first in WIRED and subsequently in his own book. Anderson showed how long tail products have low demand but provide an opportunity for online vendors to Read More

Hmmm…Service Provider Federation Challenges

In my last blog post I mentioned how Service Providers face a different set of challenges than Identity Providers as they roll out federated identity technology for customers. In this post, I’ll elaborate on those challenges and share best practices to address them. As I’ve said previously, identity is fundamentally an integration challenge. If you’re Read More

Federated SSO is for Service Providers, Too

When it comes to federation and single sign-on (SSO), a fundamental difference exists between Identity Providers (IdPs) and Service Providers. IdPs enable you to authenticate users accessing an application or website via SSO; Service Providers deliver the service you want users to consume. But in today’s market, we’re starting to see the lines blur as Read More

Stop Making Your Application Developers Write Identity And Security Code

A few weeks ago, OWASP, a leading group that monitors web application vulnerabilities and provides open source tools to help secure application infrastructure, updated its list of leading web application vulnerabilities.  This year, “Broken Authentication and Session Management” moved up a rank from number three to number two. Identity capabilities (Authentication, Session Management, User Activity Read More

Resources & Downloads View All »

Single Sign-On (SSO) Buyers Guide

How is your enterprise managing the need for secure single sign-on across cloud applications and mobile devices? Download a Free copy of Symplified's Buyer's Guide to Single Sign-On (SSO).

Download

Forrester Research – The Forrester Wave™: Enterprise Cloud Identity and Access Management

Download a FREE copy of The Forrester Wave™: Enterprise Cloud Identity and Access Management (IAM), Q3 2012.

Download

Forrester Research – “Build an Identity and Access Management Strategy”

Download a FREE copy of this recent Forrester Research report to use as a roadmap for delivering security, productivity and cost savings with IAM.

Download