News and announcements

Stay up to date on the latest at Beyond Identity

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Silicon Valley Legends Launch Beyond Identity in Quest to Eliminate Passwords

Internet icons Jim Clark and Tom Jermoluk (past founders of Netscape, Silicon Graphics and @Home Network) have launched a phone-resident personal certificate-based authentication and authorization solution that eliminates all passwords.

Media coverage
Silicon Valley Legends Launch Beyond Identity in Quest to Eliminate PasswordsSilicon Valley Legends Launch Beyond Identity in Quest to Eliminate Passwords

Sicherheit durch Null Vertrauen – Best Practices für eine Zero-Trust-Authentisierung

An authentication process that is both phishing-resistant and passwordless is a key component of a Zero Trust framework. This not only significantly reduces cybersecurity risks, but also improves employee productivity and IT team efficiency.

Media coverage
Sicherheit durch Null Vertrauen – Best Practices für eine Zero-Trust-AuthentisierungSicherheit durch Null Vertrauen – Best Practices für eine Zero-Trust-Authentisierung

Sharing Your Streaming Passwords Is More Dangerous Than You Think

To put it bluntly, sharing those passwords is putting your privacy and personal data at risk.

Media coverage
Sharing Your Streaming Passwords Is More Dangerous Than You ThinkSharing Your Streaming Passwords Is More Dangerous Than You Think

Seven critical requirements true zero trust authentication solutions should meet

Zero Trust Authentication fills the gaps left by first-gen MFA solutions that rely on easily phishable factors like passwords, push notifications, and one-time codes and ensures all requests to access information and assets are scrutinized based on pre-approved user authentication and device trust policies.

Media coverage
Seven critical requirements true zero trust authentication solutions should meetSeven critical requirements true zero trust authentication solutions should meet

Sicherheit durch Null Vertrauen – Best Practices für eine Zero-Trust-Authentisierung

Die traditionelle passwortbasierte Multi-Faktor-Authentisierung stellt für Angreifer inzwischen eine sehr niedrige Hürde dar. Ein Authentisierungsprozess, der sowohl Phishing-resistent als auch passwortlos ist, ist deshalb eine Schlüsselkomponente eines Zero-Trust-Frameworks.

Media coverage
Sicherheit durch Null Vertrauen – Best Practices für eine Zero-Trust-AuthentisierungSicherheit durch Null Vertrauen – Best Practices für eine Zero-Trust-Authentisierung

Research explores consumer susceptibility to ChatGPT scams

A survey from Beyond Identity underscores the importance of cyber vigilance against AI-powered phishing, app and password threats.

Media coverage
Research explores consumer susceptibility to ChatGPT scamsResearch explores consumer susceptibility to ChatGPT scams

RSAC 2023: 10 Coolest Cybersecurity Startup Companies

Beyond Identity was counted among the coolest cybersecurity startups at RSAC 2023, offering a FIDO2, passwordless authentication product with a “100% channel-first approach” to North America GTM.

Media coverage
RSAC 2023: 10 Coolest Cybersecurity Startup CompaniesRSAC 2023: 10 Coolest Cybersecurity Startup Companies

Retailers' Offboarding Procedures Leave Potential Risks

IT teams need to consider unforeseen threats to avoid violating privacy regulations and supplier contracts.

Media coverage
Retailers' Offboarding Procedures Leave Potential RisksRetailers' Offboarding Procedures Leave Potential Risks