Customer StoriesSnowflake Case Study

Snowflake Case Study

Get a demo
Watch Now

Secure by design

Built with a security-first mindset, our solutions ensure robust protection against evolving threats without compromising on performance or reliability.

Easy to use

Intuitive interfaces and seamless workflows empower users to navigate and operate effortlessly, enabling productivity without steep learning curves.

Simple to admin

Simplify administration with tools that streamline setup, management, and maintenance—saving time while enhancing control and visibility.

The Security Challenges for Snowflake

There's a couple of challenges for Snowflake in security. One, our customer data is the holiest of holiest, and you got to protect that. Additionally, we have to concern ourselves also with the SaaS applications that we use, even though they are not there to support the Snowflake service, they could become conduits for potentially gaining access to Snowflake or potentially our customer's data.

So, I create all the security, I deploy all the security technology and tools in my managed systems, the things that I manage, the computers that are owned by the company. But with SaaS, you can actually use any other computer, you can use your own computer at home to access your email for work like, Gmail or Slack or whatever tool, whatever SaaS application.

And what ends up happening is, well, how do you know your person's system is configured or secure enough to protect the data? So this is the big problem. How do I allow my employees to be productive and to keep up with today's challenges?

Solving the Password Problem

Passwords are not effective. They were never effective. Now, you're probably going to get back and you ask me, "Well, can you do VPN? Can you do things like CASB?" Well, the answer's yes, but try it, and try and be effective without upsetting your employees, without reducing productivity, without making it seamless. It doesn't work. CASBs are a failure. VPNs are not keeping up.

Beyond Identity was introduced to me by a colleague at Snowflake. And we first started talking about passwordless solutions, but what immediately became clear to me was how this could become a solution for a lot of the challenges in SaaS applications or accessing SaaS applications or accessing the cloud.

And so, what now Beyond Identity has, in addition to passwordless, is the ability to say only allow the systems that are managed by my company to access the SaaS applications, these critical SaaS applications.

I speak to CISOs or senior security leaders weekly. Just last week I was having a conversation with a former CISO for a very large company and I said, "Well, I got to tell you about this whole Beyond Identity and how it's helping us solve this whole CASB, passwordless, VPN issues, and also enforcement of security hygiene on your endpoints all in one tool." And he's like, "Really?" And I'm like, "Yeah, it's terrific. You got to see this tool."

And people get it. Once they hear the concept and how it's used and how effective and how useful it can be, they get excited.

Why Employees Love Beyond Identity

Typically, security tools are not the most sexy, exciting things that people are raving about, "Hey, this is a great tool. Thank you, Mario, for doing this." You never hear that from a security tool.

There isn't a day that we don't receive an email from our employees raving about what Beyond Identity is doing for them. They say, "I can't believe how Beyond Identity has made my life so much easier without having to manage passwords." Every day I get emails. Not one email, multiple emails. It's crazy.

But it wasn't necessarily a passwordless thing, it was for more security for us, but people really dig it because they don't have to worry about passwords anymore.

Learn more about our passwordless solutions for workforce and customers.

Hear what our customers have to say

arrow leftarrow left

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

“I can see how many devices get blocked by certain policies… being able to see it in action has been valuable for us.”

Ylan Muller
IT Manager

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

“We used to get a lot of support calls, sometimes once a week, from drivers who couldn’t remember their passwords. But we’ve virtually eliminated those kinds of calls, which has reduced the burden a lot on our customer support.”

Sasha Jovicic
CTO

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

“Beyond Identity helps us guarantee that our US employees are accessing our data through company-issued devices and contractors are accessing our system through devices that are fully compliant with our requirements.”

Miguel Espinosa
Director of Information Security

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

The passwordless authentication really is a win/win, and the ability to check device posture is key.

Identity Confidential
Senior Director of IT and Security