Beyond Identity logo
0(0 reviews)
Software Status:Active

About Beyond Identity

Beyond Identity is an identity management platform from Beyond Identity that focuses on passwordless authentication. It provides secure access management, continuous authentication, and identity verification so organizations can protect sensitive information. The platform eliminates the need for traditional passwords, reducing the risk of credential theft. Beyond Identity enables users to access applications and systems using secure, hardware-based authentication methods. Key capabilities: passwordless login biometric authentication risk-based access control secure identity verification user activity monitoring Best for: enterprises that need to improve security protocols and user use while minimizing the risks associated with passwords.

Beyond Identity Details

Vendor
Beyond Identity
Year Launched
2020
Location
3 Park Avenue 41st Floor New York, NY 10016
Deployment
cloud, ios, android
Training Options
documentation, videos, live online
Countries Served
All Countries
Languages
English, Spanish, French, German, Italian, Portuguese, Dutch, Russian, Chinese, Japanese, Korean
Users
Enterprises, Financial institutions, Healthcare organizations, Government agencies, Technology companies
Industries Served
Finance, Healthcare, Government, Technology, Education, Retail
Tags
Authentication, Multi-Factor Authentication, Single Sign On, Password Management, Beyond Identity

Beyond Identity's In-App Market Place

Does Beyond Identity have an in-app market place?

Yes

How many Mini-Apps in the marketplace?

1

Mini Apps

N/A

Pricing Options

Free trial
Free version
Request a quote
Promo Offer

Accepted Payment Currencies

USD ($), EUR (€), GBP (£), JPY (¥), AUD ($), CAD ($), CHF (Fr), CNY (¥), HKD ($), INR (₹), KRW (₩), MXN ($), NOK (kr), NZD ($), RUB (₽), SEK (kr), SGD ($), ZAR (R)

Pros & Cons

  • Simplifies identity and password management, eliminating the need to restore passwords.
  • Secure storage of password information.
  • Great support from the Beyond Identity (BI) team during the Proof of Concept (PoC) to the full roll-out process.
  • Increases productivity by alleviating the need to type cryptic passwords.
  • Lack of OS-level automated checks to block access if end user machines are non-compliant.
  • Frequent updates can be annoying, even though they usually take less than five minutes.

Beyond Identity's Alternatives