Über Beyond Identity

Starke passwortlose Authentifizierung, um Angriffe auf Anmeldeinformationen zu vermeiden und Mitarbeiter- und Kundenidentitäten zu schützen.

Erfahre mehr über Beyond Identity

Vorteile:

Nicht verfügbar

Nachteile:

Nicht verfügbar

Bewertungen zu Beyond Identity

Durchschnittliche Bewertung

Benutzerfreundlichkeit
4,8
Kundenservice
4,9
Funktionen
4,4
Preis-Leistungs-Verhältnis
4,9

Weiterempfehlungsquote

9,1/10

Beyond Identity hat eine Gesamtbewertung von 4,9 von 5 Sternen basierend auf 11 Nutzerbewertungen auf Capterra.

Nutzerbewertungen filtern (11)

Sortieren nach

Hast du Beyond Identity bereits verwendet?

Teile deine Erfahrungen mit anderen Softwareinteressenten.

Nutzerbewertungen filtern (11)

Shahrul I.
Shahrul I.
Information Technology Assistant in Malaysia
Verifizierter Nutzer auf LinkedIn
Finanzdienstleistungen, 10.000+ Mitarbeiter
Verwendete die Software für: Mehr als 2 Jahre
Herkunft der Bewertung

Save and store password and identity

5 vor 6 Monaten

Vorteile:

I love it as it has making identity and password management really easy to manage and i have never had to restore my password again as all of my password information are safely stored in here.

Nachteile:

The are some bugs here and there, but nothing that are too much that are hindering me from completing my work in this software. No complaint from me for now.

Duke L.
Director of Corporate IT in Belgien
Finanzdienstleistungen, 201-500 Mitarbeiter
Verwendete die Software für: Mehr als 1 Jahr
Herkunft der Bewertung

Game Changing Authentication Solution

5 vor 10 Monaten

Kommentare: We are one of the earlier, not earliest, adopters of Beyond Identity. BI team has been and still maintains to be very responsive to our issues and suggestions. The BI team was great during the PoC to the full roll-out process. I feel solutions like BI are a game-changer in alleviating typing of cryptic passwords to increase productivity. The one drawback of not requiring users to type their passwords on a daily basis is that users will forget their passwords periodically but this was an issue before BI as well. We need a Beyond User solution. With BI, it definitely felt like a partnership in evaluating, implementing, and using the product rather thana customer/vendor relationship.

Vorteile:

- Password-less (not free) authentication add-on into our Single Sign-On OKTA. - Device information and trust

Nachteile:

- Management dashboard is still evolving so not yet mature to provide full analytics and reports. - Palo Alto Endpoint often flags updates as malware - Wish the client has an automatic update function

Verifizierter Rezensent
Information security engineer in USA
Verifizierter Nutzer auf LinkedIn
Biotechnologie, 501-1.000 Mitarbeiter
Verwendete die Software für: 1-5 Monate
Herkunft der Bewertung

Great customer support

4 vor 11 Monaten

Vorteile:

The product is super easy to use and makes it environment more secure while making users happy.

Nachteile:

We hit some snags with a few bugs, but the customer support we received from the engineering team really set them apart and they were able to resolve all of them within a reasonably fast time frame.

Nathaniel F.
Technical Presales Specialist in UK
Computer- & Netzwerksicherheit, 11-50 Mitarbeiter
Verwendete die Software für: 6-12 Monate
Herkunft der Bewertung

Review for Beyond Identity

5 vor 11 Monaten

Vorteile:

Being the administrator of Beyond Identity internally I found it easy to deploy and get everyone enrolled with the authenticator. This is perfect as I deployed it within minutes, all I had to do was assign a user into a group in our IAM solution and then Beyond Identity automatically send the users emails with steps on how to enrol with the authenticator app, the second they enrolled it then flicked the switch to allow users to authenticate passwordless instead of needing a username, password, and MFA method. Alongside this, Beyond Identity also has a managed environment, therefore I can create risk-based policies for how and when users can authenticate when using the authenticator application. From an end user’s perspective Beyond Identity makes my life a lot easier! I no longer need to use my mobile phone to authenticate me into my applications, this allows me to sign in rapidly instead of having to use a password and my mobile to gain access into my account.

Nachteile:

Updates everyday, this can be a tiny bit annoying but its understanding as the product is getting stronger.

Harry S.
Channel Account Manager in UK
Informationstechnologie & -dienste, 11-50 Mitarbeiter
Verwendete die Software für: 1-5 Monate
Herkunft der Bewertung

great system

5 vor 11 Monaten

Kommentare: great system, that I am glad my employer uses.

Vorteile:

Coming from a company that had several MFA, for me its the time saving element of just being able to log in straight away, not having to go find my mobile, type a code in wait for the code to arrive via text. one click and im into all my systems, great. plus no longer having to worry about getting help desk involved with a password reset.

Nachteile:

I dont have any cons yet as a new user. I wasn't involved in set up

Matthew B.
account exc in UK
Computer- & Netzwerksicherheit, 11-50 Mitarbeiter
Verwendete die Software für: 1-5 Monate
Herkunft der Bewertung

Beyond identity review

5 vor 11 Monaten

Vorteile:

It's the simplicity for me. I log in with my username in the morning and thats it. No worries of forgetting to turn on capitals or mispelling my password. And with the intergration with Okta its made my day so much quicker.

Nachteile:

The frequent udates are annoying. Although they normally take less than five minutes, it is annoying when i have to keep updating it.

Srini M.
Manager in USA
Computer-Software, 5.001-10.000 Mitarbeiter
Verwendete die Software für: 1-5 Monate
Herkunft der Bewertung

Seamless PasswordLess expereince

5 vor 6 Monaten

Kommentare: Seamless passwordless experience.

Vorteile:

Entire passwordless solution is built on the PKI concepts and every individual device is root on it's own and easy to manager. No additional certificate management overhead. Reduced helpdesk cost with 100% self service

Nachteile:

Solution not ready yet for end to end passwordless such as SSH and sudo access to linux servers etc.

Steve P.
Technical Manager in UK
Informationstechnologie & -dienste, 11-50 Mitarbeiter
Verwendete die Software für: 1-5 Monate
Herkunft der Bewertung

Increased security without increasing user friction

5 vor 10 Monaten

Kommentare: Increasing security which is incredibly user when responsible for cyber security. The ability to remove the dependency on passwords which cause many breaches.
I now used Beyond Identity on my laptop and on my mobile device.

Vorteile:

Effective without making life more difficult

Nachteile:

If the app is not open it causes issues. Doesn't just open the app smoothly.

Joshua P.
Account executive in UK
Sicherheit & Untersuchungen, 11-50 Mitarbeiter
Verwendete die Software für: 1-5 Monate
Herkunft der Bewertung

Ease and security

5 vor 11 Monaten

Kommentare: Really good, like where the product is going and the ease of use, hope it can keep on improving though it's cycles

Vorteile:

How easy it makes it to actually log on and having my time saved and not having to remember passwords.

Nachteile:

Updates everyday and can sometimes be slightly slow, though I know this is improving

Russell T.
Dir of Cybersecurity in USA
Einzelhandel, 501-1.000 Mitarbeiter
Verwendete die Software für: 1-5 Monate
Herkunft der Bewertung

core security

5 vor 9 Monaten

Kommentare: very professional and responsive

Vorteile:

effectiveness, ease of use, platform coverage

Nachteile:

there were no issues nothing nada it did what I want

Dan N.
eCommerce Manager / Senior Magento Developer in UK
Bau, 51-200 Mitarbeiter
Verwendete die Software für: 6-12 Monate
Herkunft der Bewertung

Great software, with great customer service

5 vor 5 Tagen Neu

Kommentare: It has massively helped with user/device authentication and resolves the issue of users sharing passwords.

Vorteile:

Easy to get set up, easy to manage, easy to use!

Nachteile:

I can't think of anything, all issues we did have with either setup or compatibility with our internal network have been resolved