18 ans à aider les entreprises françaises
à choisir le meilleur logiciel

Beyond Identity
Description de Beyond Identity
Beyond Identity fournit une des solutions d'authentification les plus sécurisées au monde. Beyond Identity élimine les mots de passe et garantit l'identité numérique des utilisateurs en liant cryptographiquement leur identité à leur appareil. Seuls les utilisateurs autorisés et les appareils sécurisés ont accès aux applications et ressources cloud. Vos utilisateurs vont adorer cette solution d'authentification multifacteur sécurisée et sans mot de passe.
Qui utilise Beyond Identity ?
Elle se prête aux entreprises de toutes tailles (PME, entreprises moyennes, grandes entreprises) à l'échelle mondiale. Avec des clients dans les domaines de la finance, de la santé, des jeux, du commerce de détail et de l'éducation, Beyond Identity peut fournir à quiconque une connexion plus sécurisée.
Beyond Identity ne vous convainc pas tout à fait ?
Comparer avec une alternative populaire

Beyond Identity
Avis sur Beyond Identity

Save and store password and identity
Avantages :
I love it as it has making identity and password management really easy to manage and i have never had to restore my password again as all of my password information are safely stored in here.
Inconvénients :
The are some bugs here and there, but nothing that are too much that are hindering me from completing my work in this software. No complaint from me for now.
Game Changing Authentication Solution
Commentaires : We are one of the earlier, not earliest, adopters of Beyond Identity. BI team has been and still maintains to be very responsive to our issues and suggestions. The BI team was great during the PoC to the full roll-out process. I feel solutions like BI are a game-changer in alleviating typing of cryptic passwords to increase productivity. The one drawback of not requiring users to type their passwords on a daily basis is that users will forget their passwords periodically but this was an issue before BI as well. We need a Beyond User solution. With BI, it definitely felt like a partnership in evaluating, implementing, and using the product rather thana customer/vendor relationship.
Avantages :
- Password-less (not free) authentication add-on into our Single Sign-On OKTA. - Device information and trust
Inconvénients :
- Management dashboard is still evolving so not yet mature to provide full analytics and reports. - Palo Alto Endpoint often flags updates as malware - Wish the client has an automatic update function
Great customer support
Avantages :
The product is super easy to use and makes it environment more secure while making users happy.
Inconvénients :
We hit some snags with a few bugs, but the customer support we received from the engineering team really set them apart and they were able to resolve all of them within a reasonably fast time frame.
Review for Beyond Identity
Avantages :
Being the administrator of Beyond Identity internally I found it easy to deploy and get everyone enrolled with the authenticator. This is perfect as I deployed it within minutes, all I had to do was assign a user into a group in our IAM solution and then Beyond Identity automatically send the users emails with steps on how to enrol with the authenticator app, the second they enrolled it then flicked the switch to allow users to authenticate passwordless instead of needing a username, password, and MFA method. Alongside this, Beyond Identity also has a managed environment, therefore I can create risk-based policies for how and when users can authenticate when using the authenticator application. From an end user’s perspective Beyond Identity makes my life a lot easier! I no longer need to use my mobile phone to authenticate me into my applications, this allows me to sign in rapidly instead of having to use a password and my mobile to gain access into my account.
Inconvénients :
Updates everyday, this can be a tiny bit annoying but its understanding as the product is getting stronger.
Easiest to deploy
Commentaires : MFA to every app in our ecosystem
Avantages :
SaaS based. Quickest to depkoy. Easy to use. Love the feedback loop and insights from Beyond Identity team.
Inconvénients :
One particular feature where we could do OS level automated checks on the end user machines and block the access if they are found to be non compliant.