Q37
Do you have a current SOC 2 Type II report?
SOC 2 Type II: claimed_with_trust_page
Before you share customer data with Ping Identity, your compliance team needs documented proof they can be trusted. ThirdProof investigated Ping Identity across 27 intelligence sources — here's what we found.
⚠ FedRAMP Status: Not found in the FedRAMP Marketplace. Vendors handling government data or CUI must be FedRAMP authorized.
27 sources queried. 100% confidence. Every Ping Identity investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.
Get Ping Identity's Full Report Free →Security Questionnaire — Auto-Filled
Auto-filled from public evidence • 67% complete
Q37
SOC 2 Type II: claimed_with_trust_page
Q38
ISO 27001 claim found on trust page (Vendor attested)
Q41
Not found in FedRAMP marketplace
Q40
Ping Identity maintains a Business Associate Agreement for HIPAA compliance and processes PHI subject to the existing BAA with customers.
Q42
Ping Identity has a Data Privacy Addendum (DPA) available and confirms compliance with GDPR Article 28(3) requirements for data processors.
+ 7 more compliance questions answered in the full report
Every investigation produces a full PDF report plus the complete 133-question questionnaire, mapped to SOC 2, HIPAA, PCI DSS, SIG, and more.
Get Ping Identity's Full Report Free →Verified against FedRAMP Marketplace API as of March 2026
Organizations with federal compliance requirements should verify this directly at marketplace.fedramp.gov.
Ping Identity is not listed on the FedRAMP Marketplace.
Low Risk
Vendor Risk Assessment
Based on data availability and source coverage
27
Sources Queried
25
Sources With Data
April 17, 2026
Last Assessed
AI-generated analysis for Ping Identity
Ping Identity is an enterprise identity and access management (IAM) vendor assessed at Risk Tier 4 (Low Risk), reflecting a strong overall security posture across infrastructure, domain reputation, compliance documentation, and operational resilience. The assessment surfaced numerous positive signals across technical and governance dimensions:
The primary area requiring attention is certification verification. Both SOC 2 and ISO 27001 are vendor-attested on the trust page but could not be independently confirmed via public registries during this assessment. This is the source of a cross-source contradiction (CONTRA-1): ISO 27001 is contractually committed to but was not found in the IAF CertSearch registry. Additionally, the AI data usage policy, referenced through the Data Privacy Addendum, does not explicitly state whether customer data is used to train AI models, which warrants clarification given Ping Identity's use of AI-enabled features and subprocessors including OpenAI and Google Vertex AI. Overall, Ping Identity presents as a mature, well-governed IAM vendor with documented security controls, clean external signals, and strong contractual commitments — certification documentation requests represent a routine due diligence step rather than a material risk concern.
Independence Statement
All evidence in this report was independently sourced from external data registries, threat intelligence databases, DNS/TLS infrastructure scans, public compliance pages, and automated document analysis without vendor participation or input.
2 findings identified for Ping Identity
pingidentity.com is missing 3 recommended security headers: Strict-Transport-Security, Content-Security-Policy, X-Frame-Options.
PING IDENTITY LIMITED was first registered approximately 12 months ago.
25 positive signals verified
2 Open Ports Detected
Infrastructure Exposure →Legal Entity Actively Registered
Business Registration →No Sanctions Matches Found
Sanctions & Watchlist Screening →No Adverse Media Found
Adverse Media Scan →No Adverse Media Signals
Adverse Media Scan (Fallback) →Firmographic Data Available
Company Intelligence →Valid SSL Certificate
Domain Analysis →Established Domain (24+ years)
Domain Registration →Clean domain reputation
Threat Intelligence →No Hacker News Mentions
Tech Community Sentiment →HTTP Security Grade: B
HTTP Security Scan →Certificate Data from TLS Handshake
Certificate Transparency →Established Web Presence (23+ years)
Web Archive History →No Threat Intelligence Pulses
Threat Intelligence (OTX) →Clean IP Reputation
IP Reputation →Clean Safe Browsing Status
Malware & Phishing Check →Clean Website Security Scan
Website Security Scan →Certification Claimed: SOC 2
Trust & Compliance Page Scan →Certification Claimed: ISO 27001
Trust & Compliance Page Scan →31 Subprocessors Identified
Supply Chain & Subprocessor Discovery →Not Found as FDIC-Insured Institution
FDIC Institution Check →No SEC Enforcement Filings Found
SEC Filing Search →No Historical Adverse Media Found
Historical Media Search →SOC 2 Compliance Claimed on Trust Page
Certification Registry Verification →Deep Document Crawler Results
Deep Document Analysis →Steps to address findings for Ping Identity
Request the SOC 2 Type II report and bridge letter from Ping Identity's security team — ask for a copy directly or check https://pingidentity.com/security; many enterprise IAM vendors share these under a mutual NDA as part of standard procurement.
Resolve the ISO 27001 registry discrepancy: request the certificate number, issuing certification body, scope, and expiry date from the vendor, then manually verify at https://www.iafcertsearch.org. Complete this within 30 days of onboarding.
Clarify AI data usage practices: ask the vendor directly whether customer data (including identity attributes processed through PingOne or related services) is used to train AI or ML models, and specifically how data shared with AI subprocessors such as OpenAI and Google Vertex AI is governed. Reference their [Data Privacy Addendum](https://www.pingidentity.com/en/legal/data-privacy-addendum.html) as the starting point.
Review the full subprocessor list at https://pingidentity.com/sub-processors and confirm that any subprocessors relevant to your data processing activities (e.g., OpenAI, Google Vertex AI, AWS Rekognition) are acceptable under your organization's data governance policies.
Note the domain expiry date of 2026-12-31 — add a calendar reminder to verify renewal 60 days prior; a lapsed domain for an IAM provider would be a material operational risk.
27 sources in this assessment
Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.
Are you Ping Identity? Claim this profile to complete your security record. Buyers are reviewing this profile now.
Claim this profile →Is Ping Identity on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?
What is Ping Identity's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.
Is Ping Identity a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.
Has Ping Identity appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.
Is Ping Identity's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.
What are Ping Identity's firmographics? Employee count, industry classification, technology stack, and corporate structure.
Does Ping Identity claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.
Who does Ping Identity depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.
Has Ping Identity appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.
Full methodology, rule engine, and AI disclosure: /methodology
Ping Identity claims SOC 2, ISO 27001, and FedRAMP certifications on its public security page. None of these certifications could be independently verified through a public registry at the time of ThirdProof's assessment. As an identity and access management (IAM) provider, Ping Identity processes authentication credentials and access control data — making certification verification critical for SOC 2 CC6.1 (logical access) evidence. ThirdProof investigated Ping Identity across 27 intelligence sources and assigned a Low Risk (Tier 4) rating with 82% confidence.
Seeing this in an audit? ThirdProof lets you investigate Ping Identity and every other vendor in your stack — average report time: 7 minutes. Get Ping Identity's Full Report Free →
SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.
ThirdProof investigates Ping Identity across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.
Replaces $600–$900 in manual compliance consulting time per vendor assessed.