Beyond Identity Now Integrates With Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Collecting Additional Device Attributes to Further Expand Risk-Based Authentication Decisions
NEW YORK – April 6, 2021 – Beyond Identity today announced the addition of new device security data to further bolster risk-based authentication decisions – continuing the company’s mission to provide the world’s most secure authentication available. By collecting additional security device posture attributes on its own, as well as attributes from new integrations with industry-leading mobile device management (MDM) solutions, including Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Beyond Identity now enables security teams to check real-time risk signals from every user, every device, at every authentication.
“It’s well-understood that passwords are inherently insecure and that account takeover attacks are the leading cybersecurity threat to organizations today,” said Jasson Casey, CTO at Beyond Identity. “It’s especially difficult to manage access to cloud applications. With SaaS and other cloud resources, anyone can login from any web browser on any device, if they have access to the password. We all know that passwords are completely compromised. Our zero trust authentication solution was built to help security teams close this gap and ensure only authorized users and devices are able to access the organization’s data and resources.”
The most secure way to control access is to replace passwords with fundamentally secure authentication factors and to stop users from logging in from unauthorized devices. The first step is to go completely passwordless with Beyond Identity’s advanced authenticator, which positively identifies users with multiple secure authentication factors. The second step is to screen each device at the time of login to ensure that it meets security and compliance requirements before allowing access. This enables organizations to actively control that only validated users and appropriately secure devices have access to company resources. With Beyond Identity, users and devices need to go through real-time security and behavioral checks.
With zero trust authentication, Beyond Identity’s passwordless authenticator now natively collects more than 25 attributes from users, devices, and applications, including granular device security data from all computers, tablets, and phones. These risk signals are collected from every device during every authentication, including managed and unmanaged devices such as bring your own device (BYOD). This new approach to passwordless authentication is purpose-built to secure organizations with distributed, hybrid workforces requiring secure access to cloud applications and resources.
For organizations that have already deployed MDM software, Beyond Identity has direct integrations with solutions such as Jamf, Microsoft Intune, and VMware Workspace ONE UEM to enhance the data set available in the creation of risk policies used during real-time authentication decisions. For those without an existing MDM provider, Beyond Identity can still gather a significant amount of device security posture data for use in risk-based authentication.
For more information, please:
- Learn about Beyond Identity’s passwordless authentication
- Set up free passwordless authentication
- Request a demo
About Beyond Identity
Headquartered in New York City, Beyond Identity was founded by industry legends Jim Clark and Tom Jermoluk to eliminate passwords and radically change the way the world logs in, without requiring organizations to radically change their technology stack or processes. Funded by leading investors, including Koch Disruptive Technologies (KDT) and New Enterprise Associates (NEA), Beyond Identity’s mission is to empower the next generation of secure digital business by replacing passwords with fundamentally secure X.509-based certificates. This patents-pending approach creates an extended Chain of Trust™ that includes user and device identity and a real-time snapshot of the device’s security posture for adaptive risk-based authentication and authorization. Beyond Identity’s cloud-native solution enables customers to increase business velocity, implement new business models, reduce operating costs, and achieve complete passwordless identity management. Visit www.beyondidentity.com for more information.
All product and company names herein may be trademarks of their respective owners.