Da 18 anni aiutiamo le aziende
a scegliere i migliori software

Beyond Identity
Cos'è Beyond Identity?
Beyond Identity offre un'autenticazione altamente sicura. Elimina le password e fornisce la massima garanzia dell'identità digitale dell'utente richiedente, legando crittograficamente la sua identità al suo dispositivo. Garantisce che solo gli utenti autorizzati e i dispositivi sicuri abbiano accesso ad applicazioni e risorse basate sul cloud. È un MFA senza password sicuro che i tuoi utenti apprezzeranno.
Chi utilizza Beyond Identity?
È al servizio di aziende di tutte le dimensioni (PMI, aziende di medie dimensioni e di livello enterprise) su scala globale. Con clienti nel settore finanziario, sanitario, videoludico, della vendita al dettaglio e dell'istruzione, Beyond Identity può offrire a chiunque un accesso più sicuro.
Hai dubbi su Beyond Identity?
Confrontalo con un'alternativa popolare

Beyond Identity
Recensioni su Beyond Identity

Save and store password and identity
Aspetti positivi:
I love it as it has making identity and password management really easy to manage and i have never had to restore my password again as all of my password information are safely stored in here.
Aspetti negativi:
The are some bugs here and there, but nothing that are too much that are hindering me from completing my work in this software. No complaint from me for now.
Game Changing Authentication Solution
Commenti: We are one of the earlier, not earliest, adopters of Beyond Identity. BI team has been and still maintains to be very responsive to our issues and suggestions. The BI team was great during the PoC to the full roll-out process. I feel solutions like BI are a game-changer in alleviating typing of cryptic passwords to increase productivity. The one drawback of not requiring users to type their passwords on a daily basis is that users will forget their passwords periodically but this was an issue before BI as well. We need a Beyond User solution. With BI, it definitely felt like a partnership in evaluating, implementing, and using the product rather thana customer/vendor relationship.
Aspetti positivi:
- Password-less (not free) authentication add-on into our Single Sign-On OKTA. - Device information and trust
Aspetti negativi:
- Management dashboard is still evolving so not yet mature to provide full analytics and reports. - Palo Alto Endpoint often flags updates as malware - Wish the client has an automatic update function
Great customer support
Aspetti positivi:
The product is super easy to use and makes it environment more secure while making users happy.
Aspetti negativi:
We hit some snags with a few bugs, but the customer support we received from the engineering team really set them apart and they were able to resolve all of them within a reasonably fast time frame.
Review for Beyond Identity
Aspetti positivi:
Being the administrator of Beyond Identity internally I found it easy to deploy and get everyone enrolled with the authenticator. This is perfect as I deployed it within minutes, all I had to do was assign a user into a group in our IAM solution and then Beyond Identity automatically send the users emails with steps on how to enrol with the authenticator app, the second they enrolled it then flicked the switch to allow users to authenticate passwordless instead of needing a username, password, and MFA method. Alongside this, Beyond Identity also has a managed environment, therefore I can create risk-based policies for how and when users can authenticate when using the authenticator application. From an end user’s perspective Beyond Identity makes my life a lot easier! I no longer need to use my mobile phone to authenticate me into my applications, this allows me to sign in rapidly instead of having to use a password and my mobile to gain access into my account.
Aspetti negativi:
Updates everyday, this can be a tiny bit annoying but its understanding as the product is getting stronger.
Easiest to deploy
Commenti: MFA to every app in our ecosystem
Aspetti positivi:
SaaS based. Quickest to depkoy. Easy to use. Love the feedback loop and insights from Beyond Identity team.
Aspetti negativi:
One particular feature where we could do OS level automated checks on the end user machines and block the access if they are found to be non compliant.