Beyond Identity Expands Integration with CrowdStrike to Deliver Universal Identity Defense for On-Prem Resources
New York, NY — September 15, 2025 — Beyond Identity, the only Identity Defense platform that eradicates the root cause of security incidents, today announced the expansion of its integration with CrowdStrike. In addition to a robust integration with CrowdStrike Insight XDR, Beyond Identity now integrates with CrowdStrike Identity Threat Detection and Response (ITDR). This collaboration closes a critical security gap by extending phishing-resistant MFA and device trust to legacy authentication protocols, enabling enterprises to stop identity-based attacks across hybrid environments.
While modern SaaS applications have broadly adopted strong authentication, many core business functions still rely on legacy protocols like Kerberos, NTLM, LDAP, and SMB—protocols foundational to Active Directory but never designed for modern, phishing-resistant MFA. These gaps are among the most frequently exploited entry points for attackers.
With this expanded integration, organizations can now:
- Extend phishing-resistant MFA to Kerberos, NTLM, LDAP, and SMB.
- Secure tools and services that don’t support MFA, such as RDP, SSH, and VPN.
- Protect legacy and homegrown applications without costly code or infrastructure changes.
- Continuously enforce device trust at time of access request with first-party signals and risk signals from CrowdStrike Falcon XDR, including Full Disk Access, Zero Trust Assessment Score, Application Firewall and more.
"Identity is the number one attack vector and legacy systems remain a critical weak spot in enterprise security,” said Jasson Casey, CEO of Beyond Identity. “Our expanded partnership with CrowdStrike underscores our shared commitment to delivering comprehensive identity security. Together, we’re providing organizations with the tools to eliminate identity-based attacks and enforce continuous adaptive access everywhere, from cloud applications to on-prem resources.”
Key Use Cases
This capability eliminates identity attacks, the #1 cause of security incidents, across various IT environments:
- IT Infrastructure & Admin Access: Secure RDP, SSH, and desktop logins with cryptographic identity assurance for privileged sessions via Kerberos/NTLM authentication.
- Legacy Applications: Add modern security to critical applications without code changes by enforcing step-up authentication for NTLM/LDAP requests.
- File Systems & Remote Access: Protect sensitive data access through SMB file shares, VPNs, and VDI/Citrix with high-trust authentication for all internal resource connections.
A Unified Approach to Identity Defense
Many Beyond Identity customers, like Snowflake and Cornell University, use Beyond Identity’s MDM and XDR integrations to block risky devices from the point of access.
This capability deepens the bi-directional integration between Beyond Identity and CrowdStrike. Together, the platforms form a closed-loop system that combines real-time threat detection with real-time policy enforcement. When CrowdStrike detects high-risk authentication activity, Beyond Identity ensures access is only granted following cryptographically secure verification.
To learn more or request a demo, visit https://www.beyondidentity.com/.
About Beyond Identity
Beyond Identity delivers the only Dynamic Identity Defense Platform for the AI era that eradicates the root cause of security incidents across users, machines, and AI agents. As AI democratizes both enterprise productivity and sophisticated cyber attacks, Beyond Identity provides security that provides guarantees built on cryptographic certainty rather than probabilistic detection.
The platform provides device trust enforcement for managed and unmanaged devices, continuous authentication that validates trust beyond login, and universal passwordless coverage across Linux, Windows, macOS, iOS, Android, ChromeOS, VDI, and emerging platforms. By cryptographically welding identity to hardware, Beyond Identity stops phishing, MFA bypass, session hijacking, and token replay attacks while reducing SOC and help desk workload and accelerating workforce productivity.
Trusted by enterprise customers including Snowflake, World Wide Technology, and Cornell University to secure their most critical assets, Beyond Identity integrates with existing infrastructure with no rip-and-replace. Founded by security industry veterans, the company is committed to transforming identity from the largest attack surface into the first line of cyber defense.
For more information, visit www.beyondidentity.com.