Wir helfen Unternehmen seit 17 Jahren,
bessere Software zu finden
Beyond Identity
Was ist Beyond Identity?
Beyond Identity bietet eine sehr sichere Authentifizierung. Das Unternehmen eliminiert Passwörter und bietet ein hohes Maß an Sicherheit in Bezug auf die digitale Identität des anfragenden Nutzers, indem es seine Identität kryptografisch an sein Gerät bindet. Die Lösung stellt sicher, dass nur autorisierte Nutzer und sichere Geräte Zugriff auf cloudbasierte Anwendungen und Ressourcen haben. Dabei handelt es sich um passwortlose MFA (Multi-Faktor-Authentifizierung), die sicherer ist und die deine Nutzer lieben werden.
Wer verwendet Beyond Identity?
Zum Kundenkreis zählen Unternehmen aller Größen (KMU, MM, Enterprise) auf internationaler Ebene. Beyond Identity hat Kunden in den Bereichen Finanzen, Gesundheitswesen, Gaming, Einzelhandel und Bildung und kann jedem mehr Sicherheit beim Login bieten.
Du bist nicht sicher, ob Beyond Identity das Richtige ist?
Mit einer beliebten Alternative vergleichen
Beyond Identity
Bewertungen über Beyond Identity
Save and store password and identity
Vorteile:
I love it as it has making identity and password management really easy to manage and i have never had to restore my password again as all of my password information are safely stored in here.
Nachteile:
The are some bugs here and there, but nothing that are too much that are hindering me from completing my work in this software. No complaint from me for now.
Game Changing Authentication Solution
Kommentare: We are one of the earlier, not earliest, adopters of Beyond Identity. BI team has been and still maintains to be very responsive to our issues and suggestions. The BI team was great during the PoC to the full roll-out process. I feel solutions like BI are a game-changer in alleviating typing of cryptic passwords to increase productivity. The one drawback of not requiring users to type their passwords on a daily basis is that users will forget their passwords periodically but this was an issue before BI as well. We need a Beyond User solution. With BI, it definitely felt like a partnership in evaluating, implementing, and using the product rather thana customer/vendor relationship.
Vorteile:
- Password-less (not free) authentication add-on into our Single Sign-On OKTA. - Device information and trust
Nachteile:
- Management dashboard is still evolving so not yet mature to provide full analytics and reports. - Palo Alto Endpoint often flags updates as malware - Wish the client has an automatic update function
Great customer support
Vorteile:
The product is super easy to use and makes it environment more secure while making users happy.
Nachteile:
We hit some snags with a few bugs, but the customer support we received from the engineering team really set them apart and they were able to resolve all of them within a reasonably fast time frame.
Review for Beyond Identity
Vorteile:
Being the administrator of Beyond Identity internally I found it easy to deploy and get everyone enrolled with the authenticator. This is perfect as I deployed it within minutes, all I had to do was assign a user into a group in our IAM solution and then Beyond Identity automatically send the users emails with steps on how to enrol with the authenticator app, the second they enrolled it then flicked the switch to allow users to authenticate passwordless instead of needing a username, password, and MFA method. Alongside this, Beyond Identity also has a managed environment, therefore I can create risk-based policies for how and when users can authenticate when using the authenticator application. From an end user’s perspective Beyond Identity makes my life a lot easier! I no longer need to use my mobile phone to authenticate me into my applications, this allows me to sign in rapidly instead of having to use a password and my mobile to gain access into my account.
Nachteile:
Updates everyday, this can be a tiny bit annoying but its understanding as the product is getting stronger.
Easiest to deploy
Kommentare: MFA to every app in our ecosystem
Vorteile:
SaaS based. Quickest to depkoy. Easy to use. Love the feedback loop and insights from Beyond Identity team.
Nachteile:
One particular feature where we could do OS level automated checks on the end user machines and block the access if they are found to be non compliant.