Select your product:
Beyond Identity Secure Workforce
Featured Capabilities | Passwordless MFA | Zero Trust Authentication | Secure Developer Bundle |
---|---|---|---|
Secure, passkey-based (public-private) key authentication. | |||
Secure, frictionless, and always-on MFA that uses zero phishable factors. FIDO passkeys + biometrics with no second device required for secure authentication. | |||
Simplified deployment. Out of the box integration with all major single sign-on platforms (Microsoft, Okta, Ping, Forgerock, Google, AWS, CyberArk, and Shibboleth) and PIM/PAM solutions via standard identity protocols (OIDC, SAML, OAuth, and SCIM). | |||
Secure, integrated passkey-based login to Windows 10 and WIndows 11 desktops. Pin and biometrics-based login to the Windows desktop backed by a TPM. | |||
Complete record for simplified audits, proof of compliance, and incident investigations. Your data lake contains detailed authentication and continuous adaptive trust transaction records. Every log entry is digitally signed during to provide an immutable record of every activity. | |||
Ensure only authorized endpoints that comply with company policies are allowed access. Beyond Identity authenticator natively collects dozens of device security posture checks on both company issued and BYOD/contractor endpoints without requiring an MDM. Create additional administrator-defined checks for a complete evaluation of endpoints. | |||
Ensure users are logging in from authorized locations and check for impossible travel with geolocation. | |||
Enforce comprehensive zero trust policies by augmenting Beyond Identity’s native device and user behavior risk signals. Beyond Identity provides out-of-the-box integrations with MDM, EDR/XDR so that risk policy decisions are made with data collected in real-time. | |||
A robust, easy to configure policy engine that assesses risk signals natively collected by Beyond Identity, plus signals from our zero trust alliance partners, to ensure complete zero-trust access to apps and network resources. | |||
Continuous, post-authentication policy checks using fresh/real-time risk signals to ensure device security posture, user behavior, and third party risk signals remain within policy. Never trust, and continuously verify! |
Beyond Identity Features: | Passwordless MFA | Zero Trust Authentication | Secure Developer Bundle |
---|---|---|---|
Passwordless, Phishing-Resistant MFA | |||
Download or deploy the Beyond Identity Authenticator on multiple devices. Users gain consistent, omnichannel, frictionless login experience, reduced lockouts, and no password resets. Available on Windows, Mac, Android, IOS/IpadOS, Unix. | |||
Frictionless, always-on MFA. Combine device biometrics with cryptographic passkeys, all from a single device, for the fastest most streamlined authentication available. No need for users to locate a second device or a fob for secure logins. | |||
Login to web apps on shared devices or kiosks. User authentication via QR code and their mobile device. | |||
Secure, integrated passkey-based login to Windows 10 and WIndows 11 desktops. Pin and biometric-based login to the Windows desktop backed by a TPM. | |||
End User Self Sign-up and Recovery | |||
End users can add, suspend, remove devices. Admins can control these actions with policies. | |||
View authentication transactions and add/suspend/remove device history. | |||
Device Security Posture Checks | |||
Check dozens of device settings and security controls including: OS Version, firewall status, disk encryption status, jailbroken or rooted device, and more. | |||
Build custom checks including the presence or absence of files, registry keys, and running processes for comprehensive security and compliance. | |||
Device security posture checks work across company issued/managed devices or BYOD/contractor devices without the need for an MDM. | |||
Ability to include risk signals from third party MDM/EUM solutions (Jamf, Microsoft Intune, VMWare Workspace ONE). | |||
Beyond Identity Zero Trust Policy Engine Features | |||
Intuitive, policy builder UI to create custom policies based on your organization's risk tolerance and compliance requirements. | |||
Allow, deny, allow with additional verification (operating system biometric check/step-up authentication). | |||
Policy "monitor" mode enables administrator ability to test the effect of new or revised policies before enforcing allow or deny actions. | |||
Publish new policies and maintain a complete record of previously published policies. | |||
Complete visibility into how policies were evaluated and what specific actions were triggered for every authentication/continuous authentication transaction. Exceptionally easy to audit policy activities and troubleshoot issues. | |||
Enforce policies at the time of authentication and continuously thereafter. Things change and our continuous assessment retrieves fresh, real-time signals to ensure you remain secure throughout the entire session. | |||
Integrations with EDR and ZTNA systems enable you to quarantine a device or terminate a network session. Stop attackers in their tracks before they have time to move laterally in your network. | |||
Dashboarding and Analytics Features | |||
Dashboard displaying user authentication and device adds by geo, time, type of platform (OS). | |||
Deployment snapshot and activity trends for identities and passkeys. | |||
Daily activity report, fleet composition report, risk analysis report. | |||
Support (25% addition to seat price) | |||
Remote 24 x 7 x 365 support and deployment services. | |||
Additional Services ($2,500/day) | |||
Onsite services are available at an additional cost of $2,500 per day plus reasonable travel & meal costs. |
Secure Developer Features: | |
---|---|
Source Code Signing | |
Frictionless MFA - no passwords, one-time codes, or second device | |
Stops git commits from non-authorized devices | |
Beyond Identity Git Action to verify signature in CI/CD pipeline | |
Key Management | |
Unmovable GPG Keys generated and stored in TPM of developer’s authorized device | |
Developers can self-enroll in the Beyond Identity Authenticator and set up GPG keys | |
Centralized Key Revocation | |
Policies for which devices can generate keys | |
Supports MacOS | |
Code Provenance Checks | |
Immutable audit log every time key is created, deleted, or expired | |
Immutable audit log of every source code commit signed | |
Integrations | |
Integration with Github, Gitlab, and Bitbucket |
Small Market Bundle
Includes deployment support and premium support.