Blog

Dylan Press | Friday, June 5, 2020
On the surface, access seems like a binary decision. Should this person access this application or resource? Yes or no? But as applications and systems increase in value and sensitivity, the types of questions you need to ask change. Can we verify the user’s identity?
Jonathan Sander | Thursday, May 14, 2020
Walking from Moscone to a small PE office during RSA Conference 2019, I thought I was on my way to do a favor for a friend. This wasn’t Snowflake business since I was going to meet the Beyond Identity team on a personal invitation.
Dylan Press | Thursday, May 7, 2020
The average employee now has 191 passwords. How did we get here?
Dylan Press | Friday, May 1, 2020
How could having no password be more secure than having a password? Isn’t that like removing the lock on your door for the sake of convenience? For those familiar with the principles of asymmetric cryptography, the answer to those questions may be obvious, but for the rest of you I have written up…
Password123! | Tuesday, April 21, 2020
Look, I know this is over, I know you found something better and I honestly can’t say it’s a surprise. The writing has been on the wall (and the sticky notes on your monitor) for a while now.
Jim Clark | Tuesday, April 14, 2020 | Identity
In many ways, Beyond Identity has been decades in the making, from back when we started Netscape, the first browser through which most people accessed the Internet and the first platform through which most people entered a password.
Thomas Jermoluk | Tuesday, April 14, 2020
Isn’t Passwordless Identity Management the same as Passwordless Authentication? What does removing a password change about access, visibility, and monitoring? It turns out, a lot if done right.