FEATURE: CYBERSECURITY
Q & A with Jasie Fon, Regional Vice President( RVP) of Asia, Ping Identity, on how AI-driven identity and access management( IAM) is reshaping cybersecurity and compliance across Southeast Asia’ s interconnected supply chains.
p
Ping Identity recently launched its services on AWS Singapore – marking a major milestone for its operations in Southeast Asia. How does this local deployment enhance IAM capabilities for regulated industries in Southeast Asia? requirements while still leveraging the flexibility and scalability of the cloud.
When identity services are hosted closer to the user base, login and verification processes become faster, more reliable and more secure.
Many organisations in ASEAN are moving to multicloud or hybrid environments. Our local deployment ensures they can do so while meeting both business and regulatory expectations.
With 54 % of organisations experiencing third-party breaches, how is Ping Identity using AI to transform external access into a strategic defence layer?
Third-party access is no longer a fringe concern but one of the largest and most exploited attack vectors in today’ s digital enterprise. Whether it’ s a vendor accessing a partner portal or a contractor using internal tools, each third-party relationship introduces risk.
This is a major milestone for us and for the region.
With Ping Identity now available on AWS Singapore, customers across Southeast Asia, particularly those in regulated industries like banking, healthcare and government, gain access to a highly secure, Singapore-hosted identity infrastructure.
Data residency, low-latency access and regulatory compliance are non-negotiable in these sectors.
Many of our customers are under legal obligations to keep personal data within national borders. Hosting on AWS Singapore enables them to meet these
Ping Identity uses AI and machine learning to continuously monitor behaviour patterns, such as login frequency, IP addresses, device types and keystroke dynamics across all users, including external ones.
This allows us to build a dynamic risk posture. If an external user suddenly logs in from an unfamiliar location or attempts to access systems they don’ t normally use, the system can trigger adaptive policies: step-up authentication, session termination or even access revocation.”
We’ re no longer relying on static roles or credentials. Instead, we’ re making real-time access decisions
Your supply chain could be your next cyber nightmare – is your IAM ready?
24 INTELLIGENTCIO APAC www. intelligentcio. com