{"id":989,"date":"2026-04-02T11:08:32","date_gmt":"2026-04-02T03:08:32","guid":{"rendered":"https:\/\/www.nsecsoft.com\/en\/?p=989"},"modified":"2026-04-02T11:19:47","modified_gmt":"2026-04-02T03:19:47","slug":"ping64-coming-soon","status":"publish","type":"post","link":"https:\/\/www.nsecsoft.com\/en\/news\/ping64-coming-soon.html","title":{"rendered":"Coming Soon | Ping64: The Next-Generation Unified Workplace Security Platform"},"content":{"rendered":"<p data-start=\"505\" data-end=\"603\">After more than a year of preparation, we\u2019re pleased to officially share what we\u2019ve been building:<\/p>\n<p data-start=\"605\" data-end=\"689\"><strong data-start=\"605\" data-end=\"689\">Ping64, our next-generation unified workplace security platform, is coming soon.<\/strong><\/p>\n<p data-start=\"691\" data-end=\"1029\">Ping64 represents an important step forward in how we think about workplace security. It is not simply a collection of security modules brought together under one name. It is a platform built around a unified architecture, designed to connect endpoint security, data security, identity, and access into a more coherent operational system.<\/p>\n<p data-start=\"1031\" data-end=\"1278\">For us, this launch is not just about introducing a new product. It is also about taking a more platform-oriented approach to enterprise security\u2014one that is better aligned with how modern organizations actually work, collaborate, and manage risk.<\/p>\n<h4 data-section-id=\"vsmcva\" data-start=\"1285\" data-end=\"1344\"><strong>From Modular Capabilities to a Unified Security Platform<\/strong><\/h4>\n<p data-start=\"1346\" data-end=\"1466\">Over the past decade, we have continued to invest deeply in two core areas: <strong data-start=\"1422\" data-end=\"1443\">endpoint security<\/strong> and <strong data-start=\"1448\" data-end=\"1465\">data security<\/strong>.<\/p>\n<p data-start=\"1468\" data-end=\"1503\">Ping64 is built on that foundation.<\/p>\n<p data-start=\"1505\" data-end=\"1720\">Rather than treating each capability as an isolated product or management silo, Ping64 brings them together under a unified control plane, allowing policies, workflows, and operational logic to work in coordination.<\/p>\n<p data-start=\"1722\" data-end=\"1788\">The platform integrates our existing core capabilities, including:<\/p>\n<ul data-start=\"1790\" data-end=\"2006\">\n<li data-section-id=\"1d1yqrc\" data-start=\"1790\" data-end=\"1829\"><strong data-start=\"1792\" data-end=\"1829\">Unified Endpoint Management (UEM)<\/strong><\/li>\n<li data-section-id=\"u2trgk\" data-start=\"1830\" data-end=\"1862\"><strong data-start=\"1832\" data-end=\"1862\">Data Loss Prevention (DLP)<\/strong><\/li>\n<li data-section-id=\"wj5n3b\" data-start=\"1863\" data-end=\"1896\"><strong data-start=\"1865\" data-end=\"1896\">Transparent File Encryption<\/strong><\/li>\n<li data-section-id=\"z3citl\" data-start=\"1897\" data-end=\"1933\"><strong data-start=\"1899\" data-end=\"1933\">Software Compliance Management<\/strong><\/li>\n<li data-section-id=\"1xoy254\" data-start=\"1934\" data-end=\"1976\"><strong data-start=\"1936\" data-end=\"1976\">FileLink Managed File Transfer (MFT)<\/strong><\/li>\n<li data-section-id=\"11qwcmj\" data-start=\"1977\" data-end=\"2006\"><strong data-start=\"1979\" data-end=\"2006\">Productivity Management<\/strong><\/li>\n<\/ul>\n<p data-start=\"2008\" data-end=\"2081\">On top of these, Ping64 also introduces two major strategic capabilities:<\/p>\n<ul data-start=\"2083\" data-end=\"2142\">\n<li data-section-id=\"1h3t1rl\" data-start=\"2083\" data-end=\"2116\"><strong data-start=\"2085\" data-end=\"2116\">Unified Identity Management<\/strong><\/li>\n<li data-section-id=\"9mlubs\" data-start=\"2117\" data-end=\"2142\"><strong data-start=\"2119\" data-end=\"2142\">Zero Trust Security<\/strong><\/li>\n<\/ul>\n<p data-start=\"2144\" data-end=\"2399\">Unified Identity Management establishes identity as a foundational layer of the platform. It supports internal identity and permission management while also providing standardized authentication and access capabilities for broader enterprise environments.<\/p>\n<p data-start=\"2401\" data-end=\"2757\">Zero Trust Security extends this foundation with continuous verification, dynamic policy enforcement, and identity- and device-aware access control. Built around a unified control plane and peer-to-peer secure connectivity, it is designed to provide a more consistent and secure access experience across changing networks and distributed work environments.<\/p>\n<p data-start=\"2759\" data-end=\"2893\">Together, these capabilities move Ping64 beyond traditional feature aggregation and toward a more integrated security operating model.<\/p>\n<h4 data-section-id=\"1vv0m67\" data-start=\"2900\" data-end=\"2958\"><strong>Built for Long-Term Evolution, Not Short-Term Packaging<\/strong><\/h4>\n<p data-start=\"2960\" data-end=\"3023\">A platform like Ping64 cannot be built through packaging alone.<\/p>\n<p data-start=\"3025\" data-end=\"3208\">It requires engineering depth, architectural continuity, and long-term investment in the underlying systems that make security products reliable in real-world enterprise environments.<\/p>\n<p data-start=\"3210\" data-end=\"3250\">That has been a consistent focus for us.<\/p>\n<p data-start=\"3252\" data-end=\"3521\">Over the years, we have continued to strengthen our engineering capabilities across complex workplace security scenarios, building a technical foundation that supports not only product breadth, but also operational consistency, maintainability, and long-term evolution.<\/p>\n<p data-start=\"3523\" data-end=\"3559\">This includes work in areas such as:<\/p>\n<ul data-start=\"3561\" data-end=\"4124\">\n<li data-section-id=\"9eqlnr\" data-start=\"3561\" data-end=\"3742\"><strong data-start=\"3563\" data-end=\"3636\">AI-based behavioral analysis for automated pirated software detection<\/strong>, enabling more accurate identification of unauthorized software usage based on endpoint behavior patterns<\/li>\n<li data-section-id=\"1b3oand\" data-start=\"3743\" data-end=\"3921\"><strong data-start=\"3745\" data-end=\"3803\">Deep traffic inspection and encrypted traffic analysis<\/strong>, allowing finer-grained visibility into data transfer activities and risk signals across complex network environments<\/li>\n<li data-section-id=\"1i8ryah\" data-start=\"3922\" data-end=\"4124\"><strong data-start=\"3924\" data-end=\"4005\">Transparent file encryption built on isolated mini-filter driver architecture<\/strong>, designed to provide lifecycle-level data protection while maintaining a usable and non-disruptive endpoint experience<\/li>\n<\/ul>\n<p data-start=\"4126\" data-end=\"4319\">These are not isolated innovations. They are part of a broader engineering direction: building security capabilities that can scale, evolve, and operate coherently as part of a larger platform.<\/p>\n<p data-start=\"4126\" data-end=\"4319\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-993\" src=\"https:\/\/www.nsecsoft.com\/en\/wp-content\/uploads\/2026\/04\/Ping64-dashboard-en.png\" alt=\"\" width=\"4096\" height=\"2398\" \/><\/p>\n<h4 data-section-id=\"4f4ap7\" data-start=\"4326\" data-end=\"4386\"><strong>A More Refined Product Experience for Enterprise Security<\/strong><\/h4>\n<p data-start=\"4388\" data-end=\"4571\">We have also long believed that enterprise software\u2014especially enterprise security software\u2014should not have to sacrifice usability, clarity, or design quality in order to be powerful.<\/p>\n<p data-start=\"4573\" data-end=\"4618\">That belief has shaped how we build products.<\/p>\n<p data-start=\"4620\" data-end=\"4811\">Over time, we have continued to invest not only in technical capability, but also in design systems, interaction quality, and product consistency. This includes ongoing work in areas such as:<\/p>\n<ul data-start=\"4813\" data-end=\"5012\">\n<li data-section-id=\"1eyysmi\" data-start=\"4813\" data-end=\"4860\">unified visual language and interface systems<\/li>\n<li data-section-id=\"15noy05\" data-start=\"4861\" data-end=\"4903\">higher-quality licensed design resources<\/li>\n<li data-section-id=\"1afpbp4\" data-start=\"4904\" data-end=\"4956\">more consistent component and interaction patterns<\/li>\n<li data-section-id=\"1uvscp1\" data-start=\"4957\" data-end=\"5012\">repeated refinement of critical operational workflows<\/li>\n<\/ul>\n<p data-start=\"5014\" data-end=\"5055\">This effort is not limited to aesthetics.<\/p>\n<p data-start=\"5057\" data-end=\"5250\">It is equally about improving information architecture, reducing operational ambiguity, and making complex security functions easier to understand and use in day-to-day enterprise environments.<\/p>\n<p data-start=\"5252\" data-end=\"5310\">With Ping64, that design direction has been taken further.<\/p>\n<p data-start=\"5312\" data-end=\"5640\">We have substantially reworked the product\u2019s overall design language to create a more consistent experience across visual hierarchy, interaction flow, and interface structure. The goal is straightforward: to make a complex security platform feel more understandable, more predictable, and more usable\u2014without reducing its depth.<\/p>\n<p data-start=\"5642\" data-end=\"5810\">In practical terms, that means better system feedback, clearer operational states, and a more coherent cross-platform experience for administrators and end users alike.<\/p>\n<h4 data-section-id=\"pcetr\" data-start=\"5817\" data-end=\"5846\"><strong>What to Expect from Ping64<\/strong><\/h4>\n<p data-start=\"5848\" data-end=\"5928\">As we move toward release, here are a few important things to know about Ping64:<\/p>\n<ul data-start=\"5930\" data-end=\"6401\">\n<li data-section-id=\"fqgukx\" data-start=\"5930\" data-end=\"5997\"><strong data-start=\"5932\" data-end=\"5997\">Ping64 is scheduled to be released no later than May 31, 2026<\/strong><\/li>\n<li data-section-id=\"5wj765\" data-start=\"5998\" data-end=\"6099\"><strong data-start=\"6000\" data-end=\"6099\">It will be the first time we officially introduce transparent file encryption support for macOS<\/strong><\/li>\n<li data-section-id=\"kmo5pq\" data-start=\"6100\" data-end=\"6188\"><strong data-start=\"6102\" data-end=\"6188\">Ping64 will support Simplified Chinese, Traditional Chinese, English, and Japanese<\/strong><\/li>\n<li data-section-id=\"8iwaya\" data-start=\"6189\" data-end=\"6304\"><strong data-start=\"6191\" data-end=\"6304\">We have redesigned the desktop security assistant to provide a more consistent cross-platform user experience<\/strong><\/li>\n<li data-section-id=\"173odnm\" data-start=\"6305\" data-end=\"6401\"><strong data-start=\"6307\" data-end=\"6401\">Several additional major innovations will be introduced progressively in the coming period<\/strong><\/li>\n<\/ul>\n<p data-start=\"6403\" data-end=\"6436\">More details will be shared soon.<\/p>\n<h4 data-section-id=\"1mpc0g\" data-start=\"6443\" data-end=\"6448\"><strong>FAQ<\/strong><\/h4>\n<p data-section-id=\"1l7uxu3\" data-start=\"6450\" data-end=\"6493\"><strong>Is Ping64 an upgraded version of Ping32?<\/strong><\/p>\n<p>No.<br \/>\nPing64 and Ping32 are two independent product lines, although they share parts of the same underlying codebase.Ping32 will continue to evolve around its existing strengths and product direction. Ping64, by contrast, is designed as a next-generation unified workplace security platform with a stronger focus on platform-level coordination, identity-centric control, and broader security operations.<\/p>\n<p data-section-id=\"51871\" data-start=\"6910\" data-end=\"6948\"><strong>Will Ping32 continue to be updated?<\/strong><\/p>\n<p>Yes.<br \/>\nPing32 will continue to be actively maintained and developed.Because the two product lines share a significant amount of underlying engineering foundation, many improvements, fixes, and technical advancements will continue to benefit both in parallel.<\/p>\n<p data-section-id=\"10o26ze\" data-start=\"7220\" data-end=\"7271\"><strong>Can existing Ping32 customers upgrade to Ping64?<\/strong><\/p>\n<p>limited-time free upgrade policy for eligible Ping32 customers.<br \/>\nDuring the upgrade window:&lt;<\/p>\n<ul data-start=\"7391\" data-end=\"7660\">\n<li data-section-id=\"1u2qtpw\" data-start=\"7391\" data-end=\"7501\">Customers who purchase Ping32 between now and <strong data-start=\"7439\" data-end=\"7455\">May 31, 2026<\/strong> will be eligible for a free upgrade to Ping64<\/li>\n<li data-section-id=\"1srkkcn\" data-start=\"7502\" data-end=\"7660\">Customers who purchased Ping32 before <strong data-start=\"7542\" data-end=\"7559\">April 1, 2026<\/strong> may also upgrade to Ping64 at no additional cost, provided their maintenance coverage remains active<\/li>\n<\/ul>\n<p data-start=\"7662\" data-end=\"7759\">For full eligibility details and policy terms, please contact your regional sales representative.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ping64 is coming soon\u2014a next-generation unified workplace security platform combining UEM, DLP, transparent file encryption, identity management, and Zero Trust security for modern enterprises.<\/p>\n","protected":false},"author":2,"featured_media":992,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-989","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts\/989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/comments?post=989"}],"version-history":[{"count":5,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts\/989\/revisions"}],"predecessor-version":[{"id":997,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts\/989\/revisions\/997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/media\/992"}],"wp:attachment":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/media?parent=989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/categories?post=989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/tags?post=989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}