BeyondTrust and Ping Identity partner to unify identity security in the age of agentic AI

BeyondTrust and Ping Identity have announced a strategic partnership to deliver a unified identity security platform that integrates three critical components that have too often operated separately until now:

  • PAM (Privileged Access Management),
  • IAM (Identity and Access Management),
  • IGA (Identity Governance and Administration).

The goal: help organizations maintain a “good identity hygiene”, automate access decisions, and prepare for a world where protection is needed not only for human users but also for AI agents and other non-human identities.


Bye-bye to identity “silos”

In many corporate environments, PAM, IAM, and IGA solutions tend to function as isolated islands:

  • IAM handles login, SSO, MFA, and authentication,
  • PAM manages privileged accounts, server jumps, remote sessions, and privilege elevation,
  • IGA oversees high-level governance: who should have what access, recertifications, approval workflows, account lifecycle, etc.

According to BeyondTrust, this model has become insufficient:

With the rise of AI, these fragmented approaches no longer provide the unified visibility and control that organizations need.

The new partnership aims to orchestrate the entire identity lifecycle within a single security fabric: starting from a user (or agent)’s creation in the organization, to privilege assignment, activity monitoring, and ultimately, access revocation.


What each partner brings to the alliance

This integration combines the capabilities of both companies:

From BeyondTrust:

  • Privileged Access Management (PAM)
  • Endpoint privilege management
  • Privileged remote access
  • Visibility and intelligence on identities and sessions

From Ping Identity:

  • Advanced authentication and adaptive MFA
  • Identity flow orchestration with Ping DaVinci
  • Identity and governance functions integrating with multiple applications and services

Based on this foundation, the joint solution enables companies to:

  • Govern conditional access and enhance productivity
    Apply just-in-time access and adaptive MFA based on real-time risk, not just static rules.
  • Unify identity and privilege governance
    Automate the joiner–mover–leaver process (onboarding, role changes, offboarding), reducing exposure windows when someone changes roles or leaves the organization.
  • Automate threat response
    Allow signals from BeyondTrust (e.g., suspicious sessions) to trigger DaVinci workflows to revoke sessions instantly, rotate credentials, or cut off access without manual intervention.
  • Manage AI agents and non-human identities
    Apply principles of least privilege, consent flows, and continuous monitoring to service accounts, bots, AI agents, and other automated “users” that increasingly hold more power within the infrastructure.

Zero Trust… also for AI

The partnership clearly acts as a catalyst for Zero Trust strategies, but with a very current perspective: Zero Trust not only for human users and traditional apps but also for:

  • AI agents calling APIs,
  • interconnected services,
  • automation systems making decisions on behalf of the organization.

Ping Identity summarizes this as the need for identity systems that are as adaptive and intelligent as the environments they protect. The combination of orchestration, strong authentication, and privilege management aims to give security teams a unified framework to control all types of identities in hybrid and multi-cloud architectures.


Less complexity, more automation

Another key message from both companies is the reduction of complexity. Many organizations have layered security solutions with custom integrations and duplicated rules. The result:

  • Higher operational costs,
  • More blind spots,
  • Increased risk of misconfigurations.

With this integration, BeyondTrust and Ping Identity promise:

  • A more coherent and automated identity architecture.
  • Fewer data silos and access decision points.
  • Better leverage of existing investments in IAM, PAM, and IGA.

Partners like Xalient have already expressed support, highlighting the fit of this proposal in large-scale Zero Trust convergence projects.


Availability and channels

The joint solution from BeyondTrust and Ping Identity is now accessible via:

  • Designated integration partners from both companies,
  • and the AWS Marketplace, through a new program of private multi-product offers.

For organizations reevaluating their identity architecture for hybrid environments, advanced automation, and AI agent deployments, this partnership aims to be a compelling option to consolidate controls and reduce the risk of identity-centric attacks, increasingly exploited by adversaries.

Scroll to Top