Newsletter Subject

This Week's Top Ping Identity Blogs

From

pingidentity.com

Email Address

news@pingidentity.com

Sent On

Fri, Oct 9, 2020 12:05 PM

Email Preheader Text

This Week's Top Ping Identity Blogs Blog Subscription Weekly Email ‌ Hello! Here's the latest a

[Ping Identity]( This Week's Top Ping Identity Blogs Blog Subscription Weekly Email ‌ Hello! Here's the latest and greatest from the Ping Identity blogosphere. [2020 Identity Excellence Award Winners]( Posted: Wednesday, October 7, 2020 Each year, I look forward to reviewing the nominations for the [Identity Excellence Awards](. It’s a privilege to get a behind-the-curtains look at the many ways our customers and partners continue to raise the bar on identity security excellence. There’s just one downside: that we can’t give everyone an award for their efforts. Trust me when I say it was no easy feat to choose the winners from among many worthy nominations. But after many hours of review and deliberation, our judging committee narrowed the field to identify the top entries across eight different categories. The worthy award recipients were celebrated at our annual user conference, [IDENTIFY 2020](. Like many events this year, IDENTIFY was held virtually, but that didn’t stop us from rolling out the digital red carpet for these deserving companies. It’s my great honor to announce this year’s Identity Excellence Awards winners as follows. [View article]( [Meet Your New Chief Identity Champion!]( Posted: Tuesday, October 6, 2020 What’s a Chief Identity Champion? Our Chief Identity Champion (CIC) is someone who embodies all the characteristics, personality and values of Ping Identity. He occupies an executive-level role to help us elevate the idea of identity in people’s minds and highlight how we champion identity for our customers. [View article]( [Access Denied: Token Revocation]( Posted: Monday, October 5, 2020 Have you ever had a notification about a suspicious login attempt from a digital destination you’ve never been to? Hopefully it came with the option to say it wasn’t you, allowing you to deny access to that specific place and rebuff the user trying to sneak into your account or information. If so, you probably have token revocation to thank for the security measure. Token revocation means a token is no longer able to be used for access to a protected digital place, and it’s often behind the scenes in the denying process. It’s similar to session revocation in that you’re blocking access at some level, but there’s a key difference. With session revocation, you can deny one or more sessions and still access protected information. But token revocation is more permanent because it “kills” the token that might otherwise be reused for the duration of the token’s lifetime. Tokens play a big role in OAuth 2.0, which is designed to protect resources from wandering or malicious hands by using tokens to securely authorize users. You could build your own method of verifying access tokens and get a decent way there with open source packages, but a ready-made solution—token introspection—is easy to use and gives you the ability to offload the work from the app team to the identity platform’s team. PingOne for Customers handles the messy job of building a token verification system by giving you an API endpoint that does the work for you on our backend. In this blog post, I’ll walk you through how to use token revocation in PingOne for Customers. [View article]( ‌ CHECK THESE OUT! ‌ [Twitter]( [Facebook]( [Linked in]( [Youtube]( [CONTACT PING]( © Ping Identity. All Rights Reserved. 1001 17th Street, Suite 100 | Denver, CO 80202 | [+1 303-468-2900]( [Update preferences or unsubscribe »](

Marketing emails from pingidentity.com

View More
Sent On

19/08/2022

Sent On

12/08/2022

Sent On

05/08/2022

Sent On

01/07/2022

Sent On

24/06/2022

Sent On

10/06/2022

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2025 SimilarMail.