Od 18 lat pomagamy firmom
w wyborze lepszego oprogramowania

Beyond Identity
Czym jest Beyond Identity?
Beyond Identity zapewnia bezpieczne uwierzytelnianie. Platforma eliminuje hasła i dostarcza wysoką pewność tożsamości cyfrowej użytkownika składającego żądanie, wiążąc jego tożsamość kryptologicznie z urządzeniem. Dostęp do aplikacji i zasobów w chmurze mają tylko upoważnieni użytkownicy i bezpieczne urządzenia. Bezhasłowe MFA (uwierzytelnianie wielopoziomowe) jest bezpieczniejsze, a Twoi użytkownicy je pokochają.
Kto korzysta z produktu: Beyond Identity?
Rozwiązanie przeznaczone dla organizacji różnej wielkości (MŚP, MM, korporacje) na całym świecie. Beyond Identity, obsługująca klientów z branży finansów, opieki zdrowotnej, gier, handlu detalicznego i edukacji, może zapewnić każdemu bezpieczniejsze logowanie.
Nie jesteś pewien, czy Beyond Identity to dobre rozwiązanie?
Porównaj z popularnymi rozwiązaniami alternatywnymi

Beyond Identity
Inne najlepsze rozwiązania alternatywne dla produktu Beyond Identity
Beyond Identity – Recenzje od zweryfikowanych użytkowników

Save and store password and identity
Zalety:
I love it as it has making identity and password management really easy to manage and i have never had to restore my password again as all of my password information are safely stored in here.
Wady:
The are some bugs here and there, but nothing that are too much that are hindering me from completing my work in this software. No complaint from me for now.
Game Changing Authentication Solution
Komentarze: We are one of the earlier, not earliest, adopters of Beyond Identity. BI team has been and still maintains to be very responsive to our issues and suggestions. The BI team was great during the PoC to the full roll-out process. I feel solutions like BI are a game-changer in alleviating typing of cryptic passwords to increase productivity. The one drawback of not requiring users to type their passwords on a daily basis is that users will forget their passwords periodically but this was an issue before BI as well. We need a Beyond User solution. With BI, it definitely felt like a partnership in evaluating, implementing, and using the product rather thana customer/vendor relationship.
Zalety:
- Password-less (not free) authentication add-on into our Single Sign-On OKTA. - Device information and trust
Wady:
- Management dashboard is still evolving so not yet mature to provide full analytics and reports. - Palo Alto Endpoint often flags updates as malware - Wish the client has an automatic update function
Great customer support
Zalety:
The product is super easy to use and makes it environment more secure while making users happy.
Wady:
We hit some snags with a few bugs, but the customer support we received from the engineering team really set them apart and they were able to resolve all of them within a reasonably fast time frame.
Review for Beyond Identity
Zalety:
Being the administrator of Beyond Identity internally I found it easy to deploy and get everyone enrolled with the authenticator. This is perfect as I deployed it within minutes, all I had to do was assign a user into a group in our IAM solution and then Beyond Identity automatically send the users emails with steps on how to enrol with the authenticator app, the second they enrolled it then flicked the switch to allow users to authenticate passwordless instead of needing a username, password, and MFA method. Alongside this, Beyond Identity also has a managed environment, therefore I can create risk-based policies for how and when users can authenticate when using the authenticator application. From an end user’s perspective Beyond Identity makes my life a lot easier! I no longer need to use my mobile phone to authenticate me into my applications, this allows me to sign in rapidly instead of having to use a password and my mobile to gain access into my account.
Wady:
Updates everyday, this can be a tiny bit annoying but its understanding as the product is getting stronger.
Easiest to deploy
Komentarze: MFA to every app in our ecosystem
Zalety:
SaaS based. Quickest to depkoy. Easy to use. Love the feedback loop and insights from Beyond Identity team.
Wady:
One particular feature where we could do OS level automated checks on the end user machines and block the access if they are found to be non compliant.