Product

New Feature Announcement: Risk Dashboards

Written By
Gregory Petropoulos
Published On
Jun 11, 2024

Today, we’re excited to announce the general availability of a new data and insights feature in our Secure Workforce product — Risk Dashboards.

Available for all Beyond Identity customers today, Risk Dashboards simplify deployment health management for administrators of Beyond Identity. Additionally, it enables IT, identity, and security teams to prove the impact of their efforts. Risk Dashboards achieve these benefits by making it easy to pinpoint device, user, and passkey risk ranked by severity, providing insights for optimizing risk-based policy, and enabling exportable reports that show improvements in organizational risk posture over time.

Get an overview of these features below or dig into our technical documentation.

Instant risk overview

During our initial feature discovery, we heard this common sentiment echoed across Beyond Identity admins that “I don’t have a lot of time to suss out risk, my team is only so big”. So we set out to eliminate the need to go on the hunt for risk. Instead, the admin will now be able to quickly see it and easily get the context needed to diagnose the cause in order to do something about it.

IT, security, and identity admins now can simply log in to their Beyond Identity Admin Console and immediately:

  • See 18 risk signals surfaced in the risk overview graph. Each risk signal is designed to detect a particular type of security risk or suspicious behavior using features from authentication events.For the detailed list, please see our technical documentation.
  • Rank risk scores by user, automatically calculated based on the number or risks exhibited and severity
  • Drill down into each risk signal by user, device, or passkey for deeper context

Prove impact of security efforts

An enduring struggle of IT and security teams is proving the impact of their efforts. It’s obvious when access control breaks down, unauthorized access and breaches are measurable incidents whether in number, dollar amount, and/or hours lost. However, when strong access controls are in place, unauthorized access is prevented before it causes harm. But proving the non-existence of something is comparably more difficult than when that thing has occurred. 

As part of our efforts to empower IT and security teams to provide evidence of their work’s positive impact, Risk Dashboards provides two charts for this exact purpose:

  1. Risks blocked by adaptive access policy rules
  2. Risk by passkeys over time

Along with these two charts that show security policies at work and change in credential risk over time, Beyond Identity admins can also export risk reports to share with other teams or executives to demonstrate security at work. 

Simplify troubleshooting

Authentication failures can be caused by a number of reasons. Common reasons include policy denial denials and end-user network interruptions. When authentication fails, it’s the IT admin’s job to know what caused it and ensure that the user is able to gain secure access into the applications and resources they need to do their jobs. 

To reduce the cognitive load required to diagnose authentication failures, Risk Dashboards surfaces the following insights to the admin:

  • Authentication events impacted by policy rules (and which ones specifically)
  • Users impacted by policy rules (and which ones specifically)
  • % change in authentication denial by policy

These insights quickly show admins if there’s an unusual spike in authentication denials by policy rules and which policy rules, if any, caused an authentication denial. This allows customers to understand where policy denials are originating from so they can help end-users become compliant.

Optimize risk-based policies

Risk-based access policies are one of the most powerful components of our Secure Workforce product because it allows organizations to enforce continuous, adaptive authentication rules using real-time risk signals gathered natively from Beyond Identity or from third-party integrations (e.g. CrowdStrike, Jamf, Intune, SentinelOne, etc).

However, policy is only as powerful as its configuration. To help customers make the most out of policy, we wanted to provide a consolidated policy analysis that delivers the insights necessary to close the feedback loop and optimize policy over time. 

Through Risk Dashboards, customers can now:

  • See which policies are impacting authentication events and users
  • Understand changes over time in policy denials
  • Make data-informed adjustments to policy

Conclusion

The goal of Risk Dashboards is to provide our customers with the insights they need to make better decisions for access controls and demonstrate the impact of strong access controls. We’re grateful for the early preview feedback from customers and look forward to improving this feature over time. 

Login to your admin console to try it out today and let us know what you think.

Get started with Device360 today
Weekly newsletter
No spam. Just the latest releases and tips, interesting articles, and exclusive interviews in your inbox every week.

New Feature Announcement: Risk Dashboards

Download

Today, we’re excited to announce the general availability of a new data and insights feature in our Secure Workforce product — Risk Dashboards.

Available for all Beyond Identity customers today, Risk Dashboards simplify deployment health management for administrators of Beyond Identity. Additionally, it enables IT, identity, and security teams to prove the impact of their efforts. Risk Dashboards achieve these benefits by making it easy to pinpoint device, user, and passkey risk ranked by severity, providing insights for optimizing risk-based policy, and enabling exportable reports that show improvements in organizational risk posture over time.

Get an overview of these features below or dig into our technical documentation.

Instant risk overview

During our initial feature discovery, we heard this common sentiment echoed across Beyond Identity admins that “I don’t have a lot of time to suss out risk, my team is only so big”. So we set out to eliminate the need to go on the hunt for risk. Instead, the admin will now be able to quickly see it and easily get the context needed to diagnose the cause in order to do something about it.

IT, security, and identity admins now can simply log in to their Beyond Identity Admin Console and immediately:

  • See 18 risk signals surfaced in the risk overview graph. Each risk signal is designed to detect a particular type of security risk or suspicious behavior using features from authentication events.For the detailed list, please see our technical documentation.
  • Rank risk scores by user, automatically calculated based on the number or risks exhibited and severity
  • Drill down into each risk signal by user, device, or passkey for deeper context

Prove impact of security efforts

An enduring struggle of IT and security teams is proving the impact of their efforts. It’s obvious when access control breaks down, unauthorized access and breaches are measurable incidents whether in number, dollar amount, and/or hours lost. However, when strong access controls are in place, unauthorized access is prevented before it causes harm. But proving the non-existence of something is comparably more difficult than when that thing has occurred. 

As part of our efforts to empower IT and security teams to provide evidence of their work’s positive impact, Risk Dashboards provides two charts for this exact purpose:

  1. Risks blocked by adaptive access policy rules
  2. Risk by passkeys over time

Along with these two charts that show security policies at work and change in credential risk over time, Beyond Identity admins can also export risk reports to share with other teams or executives to demonstrate security at work. 

Simplify troubleshooting

Authentication failures can be caused by a number of reasons. Common reasons include policy denial denials and end-user network interruptions. When authentication fails, it’s the IT admin’s job to know what caused it and ensure that the user is able to gain secure access into the applications and resources they need to do their jobs. 

To reduce the cognitive load required to diagnose authentication failures, Risk Dashboards surfaces the following insights to the admin:

  • Authentication events impacted by policy rules (and which ones specifically)
  • Users impacted by policy rules (and which ones specifically)
  • % change in authentication denial by policy

These insights quickly show admins if there’s an unusual spike in authentication denials by policy rules and which policy rules, if any, caused an authentication denial. This allows customers to understand where policy denials are originating from so they can help end-users become compliant.

Optimize risk-based policies

Risk-based access policies are one of the most powerful components of our Secure Workforce product because it allows organizations to enforce continuous, adaptive authentication rules using real-time risk signals gathered natively from Beyond Identity or from third-party integrations (e.g. CrowdStrike, Jamf, Intune, SentinelOne, etc).

However, policy is only as powerful as its configuration. To help customers make the most out of policy, we wanted to provide a consolidated policy analysis that delivers the insights necessary to close the feedback loop and optimize policy over time. 

Through Risk Dashboards, customers can now:

  • See which policies are impacting authentication events and users
  • Understand changes over time in policy denials
  • Make data-informed adjustments to policy

Conclusion

The goal of Risk Dashboards is to provide our customers with the insights they need to make better decisions for access controls and demonstrate the impact of strong access controls. We’re grateful for the early preview feedback from customers and look forward to improving this feature over time. 

Login to your admin console to try it out today and let us know what you think.

New Feature Announcement: Risk Dashboards

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Today, we’re excited to announce the general availability of a new data and insights feature in our Secure Workforce product — Risk Dashboards.

Available for all Beyond Identity customers today, Risk Dashboards simplify deployment health management for administrators of Beyond Identity. Additionally, it enables IT, identity, and security teams to prove the impact of their efforts. Risk Dashboards achieve these benefits by making it easy to pinpoint device, user, and passkey risk ranked by severity, providing insights for optimizing risk-based policy, and enabling exportable reports that show improvements in organizational risk posture over time.

Get an overview of these features below or dig into our technical documentation.

Instant risk overview

During our initial feature discovery, we heard this common sentiment echoed across Beyond Identity admins that “I don’t have a lot of time to suss out risk, my team is only so big”. So we set out to eliminate the need to go on the hunt for risk. Instead, the admin will now be able to quickly see it and easily get the context needed to diagnose the cause in order to do something about it.

IT, security, and identity admins now can simply log in to their Beyond Identity Admin Console and immediately:

  • See 18 risk signals surfaced in the risk overview graph. Each risk signal is designed to detect a particular type of security risk or suspicious behavior using features from authentication events.For the detailed list, please see our technical documentation.
  • Rank risk scores by user, automatically calculated based on the number or risks exhibited and severity
  • Drill down into each risk signal by user, device, or passkey for deeper context

Prove impact of security efforts

An enduring struggle of IT and security teams is proving the impact of their efforts. It’s obvious when access control breaks down, unauthorized access and breaches are measurable incidents whether in number, dollar amount, and/or hours lost. However, when strong access controls are in place, unauthorized access is prevented before it causes harm. But proving the non-existence of something is comparably more difficult than when that thing has occurred. 

As part of our efforts to empower IT and security teams to provide evidence of their work’s positive impact, Risk Dashboards provides two charts for this exact purpose:

  1. Risks blocked by adaptive access policy rules
  2. Risk by passkeys over time

Along with these two charts that show security policies at work and change in credential risk over time, Beyond Identity admins can also export risk reports to share with other teams or executives to demonstrate security at work. 

Simplify troubleshooting

Authentication failures can be caused by a number of reasons. Common reasons include policy denial denials and end-user network interruptions. When authentication fails, it’s the IT admin’s job to know what caused it and ensure that the user is able to gain secure access into the applications and resources they need to do their jobs. 

To reduce the cognitive load required to diagnose authentication failures, Risk Dashboards surfaces the following insights to the admin:

  • Authentication events impacted by policy rules (and which ones specifically)
  • Users impacted by policy rules (and which ones specifically)
  • % change in authentication denial by policy

These insights quickly show admins if there’s an unusual spike in authentication denials by policy rules and which policy rules, if any, caused an authentication denial. This allows customers to understand where policy denials are originating from so they can help end-users become compliant.

Optimize risk-based policies

Risk-based access policies are one of the most powerful components of our Secure Workforce product because it allows organizations to enforce continuous, adaptive authentication rules using real-time risk signals gathered natively from Beyond Identity or from third-party integrations (e.g. CrowdStrike, Jamf, Intune, SentinelOne, etc).

However, policy is only as powerful as its configuration. To help customers make the most out of policy, we wanted to provide a consolidated policy analysis that delivers the insights necessary to close the feedback loop and optimize policy over time. 

Through Risk Dashboards, customers can now:

  • See which policies are impacting authentication events and users
  • Understand changes over time in policy denials
  • Make data-informed adjustments to policy

Conclusion

The goal of Risk Dashboards is to provide our customers with the insights they need to make better decisions for access controls and demonstrate the impact of strong access controls. We’re grateful for the early preview feedback from customers and look forward to improving this feature over time. 

Login to your admin console to try it out today and let us know what you think.

New Feature Announcement: Risk Dashboards

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Today, we’re excited to announce the general availability of a new data and insights feature in our Secure Workforce product — Risk Dashboards.

Available for all Beyond Identity customers today, Risk Dashboards simplify deployment health management for administrators of Beyond Identity. Additionally, it enables IT, identity, and security teams to prove the impact of their efforts. Risk Dashboards achieve these benefits by making it easy to pinpoint device, user, and passkey risk ranked by severity, providing insights for optimizing risk-based policy, and enabling exportable reports that show improvements in organizational risk posture over time.

Get an overview of these features below or dig into our technical documentation.

Instant risk overview

During our initial feature discovery, we heard this common sentiment echoed across Beyond Identity admins that “I don’t have a lot of time to suss out risk, my team is only so big”. So we set out to eliminate the need to go on the hunt for risk. Instead, the admin will now be able to quickly see it and easily get the context needed to diagnose the cause in order to do something about it.

IT, security, and identity admins now can simply log in to their Beyond Identity Admin Console and immediately:

  • See 18 risk signals surfaced in the risk overview graph. Each risk signal is designed to detect a particular type of security risk or suspicious behavior using features from authentication events.For the detailed list, please see our technical documentation.
  • Rank risk scores by user, automatically calculated based on the number or risks exhibited and severity
  • Drill down into each risk signal by user, device, or passkey for deeper context

Prove impact of security efforts

An enduring struggle of IT and security teams is proving the impact of their efforts. It’s obvious when access control breaks down, unauthorized access and breaches are measurable incidents whether in number, dollar amount, and/or hours lost. However, when strong access controls are in place, unauthorized access is prevented before it causes harm. But proving the non-existence of something is comparably more difficult than when that thing has occurred. 

As part of our efforts to empower IT and security teams to provide evidence of their work’s positive impact, Risk Dashboards provides two charts for this exact purpose:

  1. Risks blocked by adaptive access policy rules
  2. Risk by passkeys over time

Along with these two charts that show security policies at work and change in credential risk over time, Beyond Identity admins can also export risk reports to share with other teams or executives to demonstrate security at work. 

Simplify troubleshooting

Authentication failures can be caused by a number of reasons. Common reasons include policy denial denials and end-user network interruptions. When authentication fails, it’s the IT admin’s job to know what caused it and ensure that the user is able to gain secure access into the applications and resources they need to do their jobs. 

To reduce the cognitive load required to diagnose authentication failures, Risk Dashboards surfaces the following insights to the admin:

  • Authentication events impacted by policy rules (and which ones specifically)
  • Users impacted by policy rules (and which ones specifically)
  • % change in authentication denial by policy

These insights quickly show admins if there’s an unusual spike in authentication denials by policy rules and which policy rules, if any, caused an authentication denial. This allows customers to understand where policy denials are originating from so they can help end-users become compliant.

Optimize risk-based policies

Risk-based access policies are one of the most powerful components of our Secure Workforce product because it allows organizations to enforce continuous, adaptive authentication rules using real-time risk signals gathered natively from Beyond Identity or from third-party integrations (e.g. CrowdStrike, Jamf, Intune, SentinelOne, etc).

However, policy is only as powerful as its configuration. To help customers make the most out of policy, we wanted to provide a consolidated policy analysis that delivers the insights necessary to close the feedback loop and optimize policy over time. 

Through Risk Dashboards, customers can now:

  • See which policies are impacting authentication events and users
  • Understand changes over time in policy denials
  • Make data-informed adjustments to policy

Conclusion

The goal of Risk Dashboards is to provide our customers with the insights they need to make better decisions for access controls and demonstrate the impact of strong access controls. We’re grateful for the early preview feedback from customers and look forward to improving this feature over time. 

Login to your admin console to try it out today and let us know what you think.

Book

New Feature Announcement: Risk Dashboards

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Download the book

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.