Beyond Identity: Company Research Report
Company Overview
Name
Beyond Identity
Mission
Beyond Identity aims to protect the livelihood of their customers by offering a secure-by-design access platform that eliminates, not reduces, access risks.
Founded
2020
Key People
- Jasson Casey, PhD - Chief Executive Officer
- Kurt Johnson - Chief Strategy Officer
- Chris Duffy - VP, Finance and Operations
- Sarah Cecchetti - Director of Platform Product
- Jonathan Shapira - Chief Legal Officer
- Joy Chen - VP, Growth
- Augustine Eosso - VP, Commercial Sales
- Bob Burke - VP, Security and Infrastructure
- Susanne Gurman - VP, Revenue Marketing
- Nelson Melo - Founding Engineer
- Lital Asher-Dotan - Chief Marketing Officer
- Mark Priebe - Vice President of Sales
Headquarters
3 Park Avenue, 41st Floor, New York, NY 10016
Number of Employees
51-200 Employees
Revenue
No information is available
Known For
Beyond Identity is known for its secure-by-design identity and access management platform, promoting zero-trust strategies and eliminating access risks through phishing-resistant and passwordless authentication.
Products
Overview:
Beyond Identity offers a comprehensive secure access platform and multiple innovative identification and access management products aimed at fostering seamless and secure authentication processes.
Major Products Include:
1. Workforce Secure Access Platform
- Description: A comprehensive workforce identity solution that provides advanced authentication tools and access risk detection features.
- Key Features:
- Risk Discovery: Identify vulnerable authentication paths and device misconfigurations.
- Passwordless, Phish-Resistant MFA: Eliminates passwords and avoids phishable factors.
- Continuous Policy Enforcement: Real-time monitoring and policy applications.
- Secure Single Sign-On (SSO): Enhanced security with zero standing privileges.
2. RealityCheck
- Description: AI-based tool designed to prevent deepfake and impersonation attacks on video conferencing calls.
- Key Features:
- Participant authenticity certification.
- Device trustworthiness verification.
- Visual verification badge.
3. Device360
- Description: A tool for detailed real-time visibility and compliance for device security.
- Key Features:
- Real-time security posture reports.
- Continuous endpoint monitoring and policy enforcement.
- Seamless integration with third-party security tools.
4. Access360
- Description: A solution to identify and eliminate security vulnerabilities in SSO configurations.
- Key Features:
- Misconfiguration visualization.
- Automated security risk assessments.
5. Secure DevOps
- Description: A tool to ensure the security of Infrastructure as Code and development pipelines.
- Key Features:
- Code commit verification.
- Secure access policies specific to DevOps environments.
Recent Developments
Recent Developments Include:
1. Introduction of RealityCheck:
- Combatting deepfake and AI impersonation attacks by certifying call participants and their devices.
2. Launch of the Secure Access Platform:
- A unified identity access management solution designed to eliminate access risks more efficiently.
3. Advanced Device Management:
- Enhanced features for unmanaged and managed device security, ensuring real-time compliance with security policies.
4. Access360 Expansion:
- Addition of more comprehensive SSO migration guidance and vulnerability assessment tools.
5. Integration Updates:
- Enhanced integration with prominent third-party security tools like CrowdStrike and JAMF for improved risk detection and seamless security management.
6. Commitment to Secure by Design Approach:
- Recognition and adherence to CISA’s Secure by Design Pledge aimed at elevating the security development and deployment standards.
7. BeyondCon 2024:
- Hosting a premier industry conference aimed at exploring the future of identity and access management in cybersecurity.
New Partnerships:
1. Integration with Cybereason:
- Facilitated stronger enterprise zero-trust strategies through combining advanced phishing-resistant multi-factor and cloud access security.
2. Enhanced Features for Reducing Risks:
- Strengthened partnerships and technology integrations focusing on secure access and compliance verification.
No additional product launches or specific feature additions have been noted beyond the above-listed advancements.