
Syniverse Integrates with Ping Identity for a More Flexible and Trusted Customer Experience
"Global authentication doesn't work without reliable delivery — and that's where Syniverse stands apart," said Nathan Robbins, Vice President of Go to Market Strategy and Alliances of Syniverse. "Users expect to verify their identity immediately, and SMS and voice calls remain the fastest and most familiar ways to do that. Our native integration with PingOne lets customers configure SMS and voice delivery without building custom connections or workarounds."
This API-level integration enables Ping's customers to preserve their existing authentication workflows while switching to Syniverse. There's no need for custom development or lengthy implementation as credentials are configured directly in the PingOne interface, allowing teams to move quickly without interrupting the user experience.
The transition to Syniverse also opens the door to use cases beyond OTP delivery. Syniverse offers advanced messaging features like scheduling, branded links, and translation — available over short or long codes — all backed by high-touch support from messaging and compliance experts. These capabilities allow Ping's customers to strengthen their security posture and communication strategy while avoiding the hidden costs that come with poor deliverability or compliance missteps.
"Ping Identity is committed to providing our customers with flexible and secure authentication options," said Shannon Lightfoot, Director of Technology Alliances at Ping Identity. "Our partnership with Syniverse is a key part of this strategy, enabling PingOne customers to seamlessly transition to a BYO model for SMS and voice while benefiting from Syniverse's global reach, reliability, and advanced messaging capabilities. This gives our joint customers greater control over their authentication experience, allowing them to enhance branding, optimize delivery for different regions, and gain direct access to messaging analytics and logs, all while maintaining the high security standards they expect from Ping Identity."
Syniverse serves six of the top 10 banks in the United States, as well as three of the four major credit card issuers, with messaging solutions designed to help businesses connect with customers securely and efficiently across various channels. Its Messaging Trust service adds an extra layer of protection to authentication traffic by helping filter out spam, fraud, and other unwanted messages before they reach users.
To learn more about switching to Syniverse for SMS and voice authentication on PingOne, click here. For more information on Syniverse, visit https://www.syniverse.com.
About Syniverse
Syniverse is the world's most connected company. We seamlessly connect the world's networks, devices, and people so the world can unlock the full power of communications.
Our secure, global technology powers the world's leading carriers, top Forbes Global 2000 companies, and billions of people, devices, and transactions every day. Our engagement platform delivers better, smarter experiences that strengthen relationships between businesses, customers, and employees.
For over 30 years, we have accelerated important advances in communications technology. Today we are an essential driver of the world's adoption of intelligent connectivity, from 5G and CPaaS to IoT and beyond. Find out more at https://www.syniverse.com/.
About Ping Identity
Ping delivers unforgettable user experiences and uncompromising security. We make crafting digital experiences simple for any type of user—partners, customers, employees, and beyond. We are anti-lock-in. That means integration with existing ecosystems, clouds, and on-prem technologies is simple. Out-of-the-box templates let businesses leverage our identity expertise to give their users frictionless experiences. Whether they're building a foundation of modern digital identity, or out-innovating their competitors with cutting-edge services like digital credentials, AI-driven fraud prevention and governance, Ping is the one-stop shop for game-changing digital identity.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
a day ago
- Forbes
How To Secure No-Code Applications In Regulated Industries
Yair Finzi is cofounder & CEO of Nokod Security and was cofounder & CEO of SecuredTouch (now Ping Identity) and a product leader at Meta. No-code development platforms are rapidly gaining traction across highly regulated industries such as financial services, pharmaceuticals, healthcare, manufacturing and government. There's good reason for this: These solutions empower citizen developers to quickly build and modify custom applications without the need for extensive coding expertise. Some healthcare organizations, for example, rely on no-code platforms to develop patient management systems that streamline patient intake, appointment scheduling, billing and electronic health record (EHR) management. Likewise, financial services firms leverage no-code platforms for loan and claims management applications, significantly speeding up processes like application tracking, approval workflows, disbursements and insurance claims processing. Even compliance-related tasks benefit from no-code automation, including workflows for licensing, permitting, regulatory reporting and audit documentation. While this increased agility and flexibility allows organizations to rapidly respond to new business opportunities, it also introduces potential security and regulatory compliance risks. The very features that make no-code platforms appealing—ease of use and accessibility—also introduce notable security trade-offs. Because no-code applications frequently operate beyond the oversight of traditional application security (AppSec) programs, the likelihood of overlooked vulnerabilities increases, particularly in sectors governed by stringent regulations like PCI DSS, HIPAA, GDPR and various federal guidelines. Unique No-Code Security Issues No-code applications introduce several new risks not typically addressed by existing security frameworks. Often created by business users outside formal IT oversight, no-code applications that manage sensitive data commonly do not undergo necessary security reviews. Data connectors over-sharing compounds this visibility gap. Citizen-developed applications that connect broadly to critical systems, like payment gateways, patient records or customer databases, inadvertently allow access that far exceeds necessary limits. Traditional software development teams have rigorous protocols for securely managing API keys and tokens. Conversely, in no-code applications, credentials are often hard-coded into workflows, making them difficult to monitor and easier targets for exploitation if compromised. Third-party connectors amplify these vulnerabilities. No-code applications often rely on prebuilt integrations with external services—such as payment processors or document management systems—that may introduce insecure configurations or outdated libraries. No-Code Compliance Challenges Proper governance of these no-code integrations is essential in regulated environments to ensure comprehensive vendor management, but compliance becomes a moving target within no-code environments. Data classification and handling are common issues. Many no-code apps lack clearly defined data management policies, potentially exposing personally identifiable information (PII), protected health information (PHI) and financial data to unauthorized access, improper storage locations or insecure third-party transfers. Auditability presents another substantial challenge. Compliance regulations such as SOX, HIPAA and PCI DSS mandate detailed audit trails for sensitive data applications. Yet, no-code platforms typically fall short on providing the necessary forensic-level tracking capabilities, leaving security teams struggling with basic visibility questions such as identifying application creators, connected systems and recent updates. Security Best Practices For No-Code Applications To address these risks, security teams need to extend their existing application security and governance programs to cover no-code applications. The goal isn't to slow down innovation, but to embed sensible guardrails that allow no-code development to thrive without exposing the organization to unnecessary risk. Here are some best practices to help security teams manage no-code application risks in regulated industries: • Establish a formal discovery and governance process for no-code development. Continuously identify, catalog and perform a risk assessment on all no-code applications across the organization. Since enforcing strict policies on citizen developers can be challenging, focus on automated discovery and visibility to surface potential risks, misconfigurations and unapproved third-party integrations before they reach production. • Continuously monitor the security posture of no-code applications. Use tools or processes to gain real-time visibility into no-code assets, configurations and data flows. Set automated alerts for excessive permissions, unauthorized external integrations and sensitive data access outside approved workflows. • Adapt application security processes to address the unique nature of no-code applications. Traditional AppSec programs are built around source code visibility and secure coding practices, but no-code platforms operate differently—vulnerabilities often stem from misconfigurations and flawed logic, not insecure code. Security teams should focus on reviewing high-risk workflows, data flows and integration points, applying configuration-based risk assessments and logic reviews to no-code applications. Securing no-code applications in regulated industries requires more than retrofitting traditional AppSec practices. By building oversight into no-code development workflows, security can enable faster, safer innovation, helping the business automate processes, improve agility and meet regulatory requirements without introducing unnecessary risk. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?


Forbes
28-07-2025
- Forbes
Debunking Three Misconceptions For Those Scared To Go Passwordless
Peter Barker, Chief Product Officer - Ping Identity. Humans have typically been the weakest link in cybersecurity, meaning traditional passwords aren't just ineffective; they're a vulnerability waiting to be exploited. Whether it's repurposing weak passwords across multiple accounts or writing credentials down on paper and leaving them somewhere too accessible (i.e., the classic Post-it note on a desk), passwords have worked against security for far too long. Luckily, as an industry, we've remained bullish when educating end users about the dangers of traditional passwords. As a result, we're seeing greater adoption of best practices like multifactor authentication (MFA), creating more complex passwords and the use of password managers, but as cybercriminals continue to become more sophisticated, even these measures may not be enough. As organizations face increasing cyber threats and user fatigue with passwords, passwordless authentication is gaining traction. Passwordless authentication relies on verifying user identities without requiring a password or hard-to-remember security questions. Instead, it uses biometrics, certificates, one-time passwords and/or hardware tokens to ensure you are who you say you are, keeping cybercriminals out of accounts and sensitive information. Debunking Three Passwordless Misconceptions But as with any shift in technology, questions remain about timing, complexity, cost and readiness. Because of this, some organizations are understandably hesitant to adopt passwordless authentication. However, I believe many of these concerns can be mitigated by debunking some of the most common misconceptions once and for all. It's easy to assume that passwordless is a future technology—something to plan for later. But in practice, adoption is already underway. Microsoft, Apple and a growing number of enterprises have rolled out passkeys or other passwordless methods across ecosystems used by millions. Before Microsoft's shift, Google paved the path to passwordless, implementing passkeys to work across iPhones, Macs and Windows computers as well as Google's Android devices. From banking apps to gaming consoles, passwordless is no longer the exception—it's becoming the default in many places. Still, just because big tech has adopted it doesn't mean every organization is ready. The key is to assess where passwordless could add the most value today, and finding the right starting point matters more than trying to match the pace of early adopters. Passwordless authentication adoption can be overwhelming at first. But it doesn't have to be an 'all or nothing' experience. Organizations should move forward with a gradual approach at a pace that feels most comfortable for their business needs. While passwordless can simplify the login experience for end users, it's true that it can introduce new complexities on the back end, especially for organizations with legacy systems, federated identity models or compliance constraints. That said, traditional password systems come with their own complexity. Users often juggle dozens—sometimes hundreds—of credentials, leading to frequent resets, weak reuse and support burdens. In many cases, the day-to-day experience of passwordless (using Touch ID, a face scan or a magic link) is more intuitive than managing traditional logins. The real question is where the complexity lies: in the user's hands or in your infrastructure. Understanding that trade-off is essential when planning any passwordless initiative. Upfront implementation of passwordless systems can require investment, especially if it involves overhauling identity providers or retraining IT staff. But the long-term cost equation tells a different story. Analyst reports estimate that a third of help-desk calls are related to passwords. Each reset can cost upward of $70, which adds up quickly. The average large enterprise allocates over $1 million annually to password-related support costs. For customer-facing platforms, the stakes are even higher: A forgotten password can derail a purchase, hurt conversion rates or drive churn. To help overcome potential cost obstacles, it's important to understand your organization's specific cost-benefit analysis based on your current needs, long-term plans and IT infrastructure. Consider both hard and soft costs in the process. For instance, how much productivity time will employees gain with a simple, secure sign-on? Closing Thoughts Passwordless authentication isn't a cure-all, but it is a compelling piece of a broader cybersecurity and user-experience puzzle. Success depends less on hype and more on intentional implementation. For organizations exploring this path, the best question to ask may not be 'Is it time to go passwordless?' but 'Where can we start experimenting today?' Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?


Business Wire
24-07-2025
- Business Wire
Syniverse's Sandra Rosa Named to Tampa Titan 100 for Second Consecutive Year
BUSINESS WIRE)-- Syniverse, the world's most connected company ®, celebrates Executive Vice President and Chief Human Resources Officer Sandra Rosa for her second consecutive recognition as a Tampa Titan 100 honoree. The Titan 100 program annually honors the region's top executives who demonstrate exceptional leadership, vision, and influence. Rosa's repeat selection reflects her continued impact on workplace culture and inclusion at Syniverse, as well as her leadership in building high-performing teams through transparency and data-driven action. She is part of a distinguished group of leaders who have been reselected through a competitive process that highlights sustained excellence. "This honor belongs to the people who've engaged with the culture we're building — those who have asked hard questions, raised ideas, and believed in where we're heading," Rosa said. "It also allows me to stay connected to other leaders across Tampa who are navigating similar challenges, and that perspective helps shape how we continue to lead at Syniverse." Since her first Titan 100 recognition in 2024, Rosa has led the evolution of Syniverse's global culture strategy, which is grounded in human connection and powered by employee engagement. She launched a "Continuous Listening Strategy" that replaced the former once-a-year engagement survey with a new cadence of two to three surveys annually, complemented by deep-listening "Culture Connect" forums to gather actionable feedback. She also introduced quarterly storytelling platforms, launched a global women's network, and piloted a women's mentorship program that connected a small group of director and senior director-level women with C-suite leaders and senior vice presidents. Lessons from the pilot are now informing plans to expand the program more broadly. Her direct engagement with employees in India, Luxembourg, Costa Rica, and the United Kingdom has helped shape programs that reflect diverse needs and deliver measurable impact. "Sandra's leadership has made culture a core part of how we operate," said Andrew Davies, CEO of Syniverse. "She has built a strategy that reflects how people actually work, not just how we think they should, and her approach shapes how we lead and make decisions across every level of our organization." Rosa's commitment to empowering others extends well beyond Syniverse. She chairs the board of The Concilio, a Dallas-based nonprofit that unlocks opportunities for Latino families and serves on the board of the Network for Teaching Entrepreneurship (NFTE), which helps high school students to turn ideas into businesses through experiential learning and mentorship. Most recently, she joined the board of Wheels of Success, a Tampa-based nonprofit that addresses transportation barriers for working families and single mothers. The Tampa Titan 100 recognizes executives who exemplify exceptional leadership and community impact. This year's honorees will be celebrated on Oct. 30 at The Motor Enclave in Tampa. Collectively, this year's Titans and their companies employ over 235,000 people and generate more than $56 billion in annual revenue. For more information on Syniverse, visit About Syniverse Syniverse is the world's most connected company. We seamlessly connect the world's networks, devices, and people so the world can unlock the full power of communications. Our secure, global technology powers the world's leading carriers, top Forbes Global 2000 companies, and billions of people, devices, and transactions every day. Our engagement platform delivers better, smarter experiences that strengthen relationships between businesses, customers, and employees. For over 30 years, we have accelerated important advances in communications technology. Today we are an essential driver of the world's adoption of intelligent connectivity, from 5G and CPaaS to IoT and beyond. Find out more at