Beyond Identity has announced the addition of new device security data to support risk-based authentication decisions, trying to offer the most secured authentication. 

FREMONT, CA: Beyond Identity announces the addition of new device security data to support risk-based authentication decisions, trying to advance the company's goal to provide the world's most reliable authentication. Beyond Identity now allows security teams to verify real-time risk signals from every user, every device, at every authentication by gathering additional security device posture attributes on its own and attributes from recent integrations with industry-leading mobile device management (MDM) solutions like Jamf, Microsoft Intune, and VMware Workspace ONE UEM.

"It's well-understood that passwords are inherently insecure and that account takeover attacks are the leading cybersecurity threat to organizations today," said Jasson Casey, CTO at Beyond Identity. "It's especially difficult to manage access to cloud applications. With SaaS and other cloud resources, anyone can login from any web browser on any device, if they have access to the password. We all know that passwords are completely compromised. Our zero-trust authentication solution was built to help security teams close this gap and ensure only authorized users and devices are able to access the organization's data and resources."

Replace passwords with fundamentally reliable authentication factors and prevent users from logging in from unauthorized devices is the most secure methods to access control. The first stage is to go passwordless with Beyond Identity's innovative authenticator, which correctly identifies users with multiple secure authentication factors. Step two is to screen every device at the login time to verify that it complies with security and enforcement criteria before granting access. It allows businesses to actively manage access to company resources by ensuring that only validated users and sufficiently secure devices have access. Users and devices must go through real-time security and behavioural tests with Beyond Identity.

Beyond Identity has direct integrations with solutions like Jamf, Microsoft Intune, and VMware Workspace ONE UEM as the organizations that have already implemented MDM applications to expand the data set available in developing risk policies used during real-time authentication activities. Beyond Identity will collect many device security posture data for use in risk-based authentication even if organizations don't have an established MDM provider.