Announcing Zero Trust Authentication for Managed Devices & BYODAnnouncing Zero Trust Authentication for Managed Devices & BYOD
Beyond Identity now integrates with Jamf, Microsoft Intune, and VMware Workspace ONE UEM, collecting additional device attributes to further expand risk-based authentication decisions.
April 7, 2021
NEW YORK, April 6, 2021 -- Beyond Identity today announced the addition of new device security data to further bolster risk-based authentication decisions – continuing the company’s mission to provide the world’s most secure authentication available. By collecting additional security device posture attributes on its own, as well as attributes from new integrations with industry-leading mobile device management (MDM) solutions, including Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Beyond Identity now enables security teams to check real-time risk signals from every user, every device, at every authentication.
“It’s well-understood that passwords are inherently insecure and that account takeover attacks are the leading cybersecurity threat to organizations today,” said Jasson Casey, CTO at Beyond Identity. “It’s especially difficult to manage access to cloud applications. With SaaS and other cloud resources, anyone can login from any web browser on any device, if they have access to the password. We all know that passwords are completely compromised. Our zero trust authentication solution was built to help security teams close this gap and ensure only authorized users and devices are able to access the organization’s data and resources.”
The most secure way to control access is to replace passwords with fundamentally secure authentication factors and to stop users from logging in from unauthorized devices. The first step is to go completely passwordless with Beyond Identity’s advanced authenticator, which positively identifies users with multiple secure authentication factors. The second step is to screen each device at the time of login to ensure that it meets security and compliance requirements before allowing access. This enables organizations to actively control that only validated users and appropriately secure devices have access to company resources. With Beyond Identity, users and devices need to go through real-time security and behavioral checks.
With zero trust authentication, Beyond Identity’s passwordless authenticator now natively collects more than 25 attributes from users, devices, and applications, including granular device security data from all computers, tablets, and phones. These risk signals are collected from every device during every authentication, including managed and unmanaged devices such as bring your own device (BYOD). This new approach to passwordless authentication is purpose-built to secure organizations with distributed, hybrid workforces requiring secure access to cloud applications and resources.
For organizations that have already deployed MDM software, Beyond Identity has direct integrations with solutions such as Jamf, Microsoft Intune, and VMware Workspace ONE UEM to enhance the data set available in the creation of risk policies used during real-time authentication decisions. For those without an existing MDM provider, Beyond Identity can still gather a significant amount of device security posture data for use in risk-based authentication.
For more information, please:
About Beyond Identity
Headquartered in New York City, Beyond Identity was founded by industry legends Jim Clark and Tom Jermoluk to eliminate passwords and radically change the way the world logs in, without requiring organizations to radically change their technology stack or processes. Funded by leading investors, including Koch Disruptive Technologies (KDT) and New Enterprise Associates (NEA), Beyond Identity’s mission is to empower the next generation of secure digital business by replacing passwords with fundamentally secure X.509-based certificates. This patents-pending approach creates an extended Chain of Trust™ that includes user and device identity and a real-time snapshot of the device’s security posture for adaptive risk-based authentication and authorization. Beyond Identity’s cloud-native solution enables customers to increase business velocity, implement new business models, reduce operating costs, and achieve complete passwordless identity management. Visit www.beyondidentity.com for more information.
All product and company names herein may be trademarks of their respective owners.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
The Cyber Threat Impact of COVID-19 to Global Business
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report