Product

Beyond Identity Launches Partner Program for Account Onboarding and Recovery

Written By
Kurt Johnson
Published On
Mar 20, 2025

Beyond Identity is excited to introduce a new partnership program designed to create an ecosystem of partners to provide secure onboarding and account recovery for Beyond Identity customers. The Beyond Identity Account Onboarding and Recovery Partner Program will identify vendor products with certified integrations to the Beyond Identity Secure Access platform. 

I’m happy to announce that Nametag is the first partner to join this program. Nametag’s solutions complement Beyond Identity’s device-bound, phishing resistant MFA by securing both the onboarding and recovery flows for end users with an easy-to-use identity verification process.

The Help Desk Under Attack

Beyond Identity’s interest in launching this partner program was done to ensure we leave no stone unturned in securing our customers. Threat actors are increasing targeting the help desk as a path to steal credentials and gain unauthorized access, as in the case of the MGM breach. They are adopting social engineering tactics where they call a targeted organization’s IT help desk and impersonate a legitimate employee to get the help desk agent to reset passwords and multi-factor authentication (MFA) for the end-user’s account.

IT help desk agents thrive on providing good customer service and are eager to help an end-user get back up and running quickly. While help desk employees are required to ask end-users to provide information to verify them such as name, date of birth, or an answer to a security question, these are often easy for adversaries to get around. Much of this information can be found in public resources and social media sites. Even more confidential Identity data such a Social Security number, are easily available in underground markets.

Particularly concerning has been an exponential risk in voice phishing (vishing) attacks where adversaries call victims as part of their social engineering tactics. According to the CrowdStrike Global Threat Report 2025, vishing attacks were up an alarming 442% between the first and second half of 2024.

As part of vishing campaigns, threat actors call targeted end users and attempt to get them to perform an activity such as entering their credentials to adversary-in-the-middle (AITM) phishing pages, downloading malicious files, or starting a remote support session.  Campaigns include threat actors impersonating IT support and help desk staff, calling targeted users as part of helping resolve IT related or security issues. 

Like other social engineering techniques, vishing is effective because it targets human weakness or error, and with the increased use of AI tools, these are becoming even more effective and difficult for end users to detect.  Like many aspects of enterprise security, in puts the responsibility in the hands of the end users to recognize potential threats.

Securing Account Registration and Recovery

According to Akif Khan from Gartner, “In the last year, the biggest change that I saw in the Identity Verification (IDV) market was the growing interest in using IDV in workforce use cases. Securing workforce account recovery flows (interest spurred on by the MGM attacks) is the biggest driver of client interest, followed by employee onboarding (interest spurred on by reports of US firms inadvertently hiring North Koreans for remote roles).”

Recognizing that these social engineering and vishing attacks could be potentially effective in trying to hijack a new user registration or account recovery process, Beyond Identity is committed to add additional controls for our customers. A key component of this is to introduce identity verification solutions, such as those available from Nametag, into the Beyond Identity workflows.

Beyond Identity is making it possible for customers to incorporate their existing identity verification and proofing solutions as part of the Beyond Identity onboarding and recover process. Our goal is to provide an open architecture than gives our customers choice in which solution they prefer. The Beyond Identity Account Onboarding and Recovery Partner Program aims to identify leading technologies for identity verification to ensure a seamless integration for our customers.  Partner products will be thoroughly tested and validated. Nametag is the first partner for Beyond Identity to achieve this certification.

Nametag Partnership

Nametag was an obvious choice as our inaugural partner in the program. Nametag provides integrated identity verification and account protection solutions that prevent modern impersonation threats and streamline user experiences. Powered by Deepfake Defense™, Nametag detects and blocks sophisticated attacks which bypass other, outdated approaches to user verification, delivering strong identity assurance. 

Beyond Identity was drawn to Nametag with their focus on providing out-of-the-box solutions focused on this key issue of helping enterprises secure their entire user account lifecycle, from onboarding through recovery, while ensuring compliance with the latest privacy standards.

Beyond Identity seamlessly integrates with Nametag to facilitate enterprise user onboarding, both in-person and remotely. During the standard onboarding process, users scan a QR code to launch the Nametag app clip (iOS) or instant app (Android) on their mobile device. Nametag then conducts identity verification by capturing images of an identity document (such as a driver’s license or passport) along with live user images. After assessing the provided data, Nametag returns the verification results to Beyond Identity. Once successfully verified, the user is onboarded to a Beyond Identity tenant, and a passkey is enrolled for secure access.

In cases where a Beyond Identity end-user loses access to corporate credentials, Nametag streamlines account recovery by reinitiating the identity verification process to enroll a new credential. Users who have previously completed identity verification can be re-verified through Nametag. Additionally, Nametag supports recovery for users who have not undergone prior identity verification, ensuring a flexible and secure recovery solution.

Beyond Identity’s integration with Nametag is immediately available for customers.  Integration with Nametag is directly configured through Beyond Identity’s console, providing an easy to use, consistent interface for Beyond Identity’s customers.

Program Evolution

Threat actors will continue to look for the path of least resistance. The Beyond Identity phishing resistant authentication eliminates credential theft and compromise. Nametag complements the Beyond Identity capability to offer a complete, end-to-end enterprise solution, further reducing risk for our customers.

We are opening the program for other partners that can help our customer prevent identity threats. By incorporating solutions such as identity verification into the onboarding and recovery process, we can together eliminate a wide range of identity threat. Together we can further our vision to complete the vision of eliminating identity threat for our customers.

If you are interested in joining the program, please reach out to partners@beyondidentity.com.  We look forward to announcing additional partners soon.

Get started with Device360 today

Beyond Identity Launches Partner Program for Account Onboarding and Recovery

Download

Beyond Identity is excited to introduce a new partnership program designed to create an ecosystem of partners to provide secure onboarding and account recovery for Beyond Identity customers. The Beyond Identity Account Onboarding and Recovery Partner Program will identify vendor products with certified integrations to the Beyond Identity Secure Access platform. 

I’m happy to announce that Nametag is the first partner to join this program. Nametag’s solutions complement Beyond Identity’s device-bound, phishing resistant MFA by securing both the onboarding and recovery flows for end users with an easy-to-use identity verification process.

The Help Desk Under Attack

Beyond Identity’s interest in launching this partner program was done to ensure we leave no stone unturned in securing our customers. Threat actors are increasing targeting the help desk as a path to steal credentials and gain unauthorized access, as in the case of the MGM breach. They are adopting social engineering tactics where they call a targeted organization’s IT help desk and impersonate a legitimate employee to get the help desk agent to reset passwords and multi-factor authentication (MFA) for the end-user’s account.

IT help desk agents thrive on providing good customer service and are eager to help an end-user get back up and running quickly. While help desk employees are required to ask end-users to provide information to verify them such as name, date of birth, or an answer to a security question, these are often easy for adversaries to get around. Much of this information can be found in public resources and social media sites. Even more confidential Identity data such a Social Security number, are easily available in underground markets.

Particularly concerning has been an exponential risk in voice phishing (vishing) attacks where adversaries call victims as part of their social engineering tactics. According to the CrowdStrike Global Threat Report 2025, vishing attacks were up an alarming 442% between the first and second half of 2024.

As part of vishing campaigns, threat actors call targeted end users and attempt to get them to perform an activity such as entering their credentials to adversary-in-the-middle (AITM) phishing pages, downloading malicious files, or starting a remote support session.  Campaigns include threat actors impersonating IT support and help desk staff, calling targeted users as part of helping resolve IT related or security issues. 

Like other social engineering techniques, vishing is effective because it targets human weakness or error, and with the increased use of AI tools, these are becoming even more effective and difficult for end users to detect.  Like many aspects of enterprise security, in puts the responsibility in the hands of the end users to recognize potential threats.

Securing Account Registration and Recovery

According to Akif Khan from Gartner, “In the last year, the biggest change that I saw in the Identity Verification (IDV) market was the growing interest in using IDV in workforce use cases. Securing workforce account recovery flows (interest spurred on by the MGM attacks) is the biggest driver of client interest, followed by employee onboarding (interest spurred on by reports of US firms inadvertently hiring North Koreans for remote roles).”

Recognizing that these social engineering and vishing attacks could be potentially effective in trying to hijack a new user registration or account recovery process, Beyond Identity is committed to add additional controls for our customers. A key component of this is to introduce identity verification solutions, such as those available from Nametag, into the Beyond Identity workflows.

Beyond Identity is making it possible for customers to incorporate their existing identity verification and proofing solutions as part of the Beyond Identity onboarding and recover process. Our goal is to provide an open architecture than gives our customers choice in which solution they prefer. The Beyond Identity Account Onboarding and Recovery Partner Program aims to identify leading technologies for identity verification to ensure a seamless integration for our customers.  Partner products will be thoroughly tested and validated. Nametag is the first partner for Beyond Identity to achieve this certification.

Nametag Partnership

Nametag was an obvious choice as our inaugural partner in the program. Nametag provides integrated identity verification and account protection solutions that prevent modern impersonation threats and streamline user experiences. Powered by Deepfake Defense™, Nametag detects and blocks sophisticated attacks which bypass other, outdated approaches to user verification, delivering strong identity assurance. 

Beyond Identity was drawn to Nametag with their focus on providing out-of-the-box solutions focused on this key issue of helping enterprises secure their entire user account lifecycle, from onboarding through recovery, while ensuring compliance with the latest privacy standards.

Beyond Identity seamlessly integrates with Nametag to facilitate enterprise user onboarding, both in-person and remotely. During the standard onboarding process, users scan a QR code to launch the Nametag app clip (iOS) or instant app (Android) on their mobile device. Nametag then conducts identity verification by capturing images of an identity document (such as a driver’s license or passport) along with live user images. After assessing the provided data, Nametag returns the verification results to Beyond Identity. Once successfully verified, the user is onboarded to a Beyond Identity tenant, and a passkey is enrolled for secure access.

In cases where a Beyond Identity end-user loses access to corporate credentials, Nametag streamlines account recovery by reinitiating the identity verification process to enroll a new credential. Users who have previously completed identity verification can be re-verified through Nametag. Additionally, Nametag supports recovery for users who have not undergone prior identity verification, ensuring a flexible and secure recovery solution.

Beyond Identity’s integration with Nametag is immediately available for customers.  Integration with Nametag is directly configured through Beyond Identity’s console, providing an easy to use, consistent interface for Beyond Identity’s customers.

Program Evolution

Threat actors will continue to look for the path of least resistance. The Beyond Identity phishing resistant authentication eliminates credential theft and compromise. Nametag complements the Beyond Identity capability to offer a complete, end-to-end enterprise solution, further reducing risk for our customers.

We are opening the program for other partners that can help our customer prevent identity threats. By incorporating solutions such as identity verification into the onboarding and recovery process, we can together eliminate a wide range of identity threat. Together we can further our vision to complete the vision of eliminating identity threat for our customers.

If you are interested in joining the program, please reach out to partners@beyondidentity.com.  We look forward to announcing additional partners soon.

Beyond Identity Launches Partner Program for Account Onboarding and Recovery

Beyond Identity is excited to introduce a new partnership program designed to create an ecosystem of partners to provide secure onboarding and account recovery for Beyond Identity customers.

Beyond Identity is excited to introduce a new partnership program designed to create an ecosystem of partners to provide secure onboarding and account recovery for Beyond Identity customers. The Beyond Identity Account Onboarding and Recovery Partner Program will identify vendor products with certified integrations to the Beyond Identity Secure Access platform. 

I’m happy to announce that Nametag is the first partner to join this program. Nametag’s solutions complement Beyond Identity’s device-bound, phishing resistant MFA by securing both the onboarding and recovery flows for end users with an easy-to-use identity verification process.

The Help Desk Under Attack

Beyond Identity’s interest in launching this partner program was done to ensure we leave no stone unturned in securing our customers. Threat actors are increasing targeting the help desk as a path to steal credentials and gain unauthorized access, as in the case of the MGM breach. They are adopting social engineering tactics where they call a targeted organization’s IT help desk and impersonate a legitimate employee to get the help desk agent to reset passwords and multi-factor authentication (MFA) for the end-user’s account.

IT help desk agents thrive on providing good customer service and are eager to help an end-user get back up and running quickly. While help desk employees are required to ask end-users to provide information to verify them such as name, date of birth, or an answer to a security question, these are often easy for adversaries to get around. Much of this information can be found in public resources and social media sites. Even more confidential Identity data such a Social Security number, are easily available in underground markets.

Particularly concerning has been an exponential risk in voice phishing (vishing) attacks where adversaries call victims as part of their social engineering tactics. According to the CrowdStrike Global Threat Report 2025, vishing attacks were up an alarming 442% between the first and second half of 2024.

As part of vishing campaigns, threat actors call targeted end users and attempt to get them to perform an activity such as entering their credentials to adversary-in-the-middle (AITM) phishing pages, downloading malicious files, or starting a remote support session.  Campaigns include threat actors impersonating IT support and help desk staff, calling targeted users as part of helping resolve IT related or security issues. 

Like other social engineering techniques, vishing is effective because it targets human weakness or error, and with the increased use of AI tools, these are becoming even more effective and difficult for end users to detect.  Like many aspects of enterprise security, in puts the responsibility in the hands of the end users to recognize potential threats.

Securing Account Registration and Recovery

According to Akif Khan from Gartner, “In the last year, the biggest change that I saw in the Identity Verification (IDV) market was the growing interest in using IDV in workforce use cases. Securing workforce account recovery flows (interest spurred on by the MGM attacks) is the biggest driver of client interest, followed by employee onboarding (interest spurred on by reports of US firms inadvertently hiring North Koreans for remote roles).”

Recognizing that these social engineering and vishing attacks could be potentially effective in trying to hijack a new user registration or account recovery process, Beyond Identity is committed to add additional controls for our customers. A key component of this is to introduce identity verification solutions, such as those available from Nametag, into the Beyond Identity workflows.

Beyond Identity is making it possible for customers to incorporate their existing identity verification and proofing solutions as part of the Beyond Identity onboarding and recover process. Our goal is to provide an open architecture than gives our customers choice in which solution they prefer. The Beyond Identity Account Onboarding and Recovery Partner Program aims to identify leading technologies for identity verification to ensure a seamless integration for our customers.  Partner products will be thoroughly tested and validated. Nametag is the first partner for Beyond Identity to achieve this certification.

Nametag Partnership

Nametag was an obvious choice as our inaugural partner in the program. Nametag provides integrated identity verification and account protection solutions that prevent modern impersonation threats and streamline user experiences. Powered by Deepfake Defense™, Nametag detects and blocks sophisticated attacks which bypass other, outdated approaches to user verification, delivering strong identity assurance. 

Beyond Identity was drawn to Nametag with their focus on providing out-of-the-box solutions focused on this key issue of helping enterprises secure their entire user account lifecycle, from onboarding through recovery, while ensuring compliance with the latest privacy standards.

Beyond Identity seamlessly integrates with Nametag to facilitate enterprise user onboarding, both in-person and remotely. During the standard onboarding process, users scan a QR code to launch the Nametag app clip (iOS) or instant app (Android) on their mobile device. Nametag then conducts identity verification by capturing images of an identity document (such as a driver’s license or passport) along with live user images. After assessing the provided data, Nametag returns the verification results to Beyond Identity. Once successfully verified, the user is onboarded to a Beyond Identity tenant, and a passkey is enrolled for secure access.

In cases where a Beyond Identity end-user loses access to corporate credentials, Nametag streamlines account recovery by reinitiating the identity verification process to enroll a new credential. Users who have previously completed identity verification can be re-verified through Nametag. Additionally, Nametag supports recovery for users who have not undergone prior identity verification, ensuring a flexible and secure recovery solution.

Beyond Identity’s integration with Nametag is immediately available for customers.  Integration with Nametag is directly configured through Beyond Identity’s console, providing an easy to use, consistent interface for Beyond Identity’s customers.

Program Evolution

Threat actors will continue to look for the path of least resistance. The Beyond Identity phishing resistant authentication eliminates credential theft and compromise. Nametag complements the Beyond Identity capability to offer a complete, end-to-end enterprise solution, further reducing risk for our customers.

We are opening the program for other partners that can help our customer prevent identity threats. By incorporating solutions such as identity verification into the onboarding and recovery process, we can together eliminate a wide range of identity threat. Together we can further our vision to complete the vision of eliminating identity threat for our customers.

If you are interested in joining the program, please reach out to partners@beyondidentity.com.  We look forward to announcing additional partners soon.

Beyond Identity Launches Partner Program for Account Onboarding and Recovery

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Beyond Identity is excited to introduce a new partnership program designed to create an ecosystem of partners to provide secure onboarding and account recovery for Beyond Identity customers. The Beyond Identity Account Onboarding and Recovery Partner Program will identify vendor products with certified integrations to the Beyond Identity Secure Access platform. 

I’m happy to announce that Nametag is the first partner to join this program. Nametag’s solutions complement Beyond Identity’s device-bound, phishing resistant MFA by securing both the onboarding and recovery flows for end users with an easy-to-use identity verification process.

The Help Desk Under Attack

Beyond Identity’s interest in launching this partner program was done to ensure we leave no stone unturned in securing our customers. Threat actors are increasing targeting the help desk as a path to steal credentials and gain unauthorized access, as in the case of the MGM breach. They are adopting social engineering tactics where they call a targeted organization’s IT help desk and impersonate a legitimate employee to get the help desk agent to reset passwords and multi-factor authentication (MFA) for the end-user’s account.

IT help desk agents thrive on providing good customer service and are eager to help an end-user get back up and running quickly. While help desk employees are required to ask end-users to provide information to verify them such as name, date of birth, or an answer to a security question, these are often easy for adversaries to get around. Much of this information can be found in public resources and social media sites. Even more confidential Identity data such a Social Security number, are easily available in underground markets.

Particularly concerning has been an exponential risk in voice phishing (vishing) attacks where adversaries call victims as part of their social engineering tactics. According to the CrowdStrike Global Threat Report 2025, vishing attacks were up an alarming 442% between the first and second half of 2024.

As part of vishing campaigns, threat actors call targeted end users and attempt to get them to perform an activity such as entering their credentials to adversary-in-the-middle (AITM) phishing pages, downloading malicious files, or starting a remote support session.  Campaigns include threat actors impersonating IT support and help desk staff, calling targeted users as part of helping resolve IT related or security issues. 

Like other social engineering techniques, vishing is effective because it targets human weakness or error, and with the increased use of AI tools, these are becoming even more effective and difficult for end users to detect.  Like many aspects of enterprise security, in puts the responsibility in the hands of the end users to recognize potential threats.

Securing Account Registration and Recovery

According to Akif Khan from Gartner, “In the last year, the biggest change that I saw in the Identity Verification (IDV) market was the growing interest in using IDV in workforce use cases. Securing workforce account recovery flows (interest spurred on by the MGM attacks) is the biggest driver of client interest, followed by employee onboarding (interest spurred on by reports of US firms inadvertently hiring North Koreans for remote roles).”

Recognizing that these social engineering and vishing attacks could be potentially effective in trying to hijack a new user registration or account recovery process, Beyond Identity is committed to add additional controls for our customers. A key component of this is to introduce identity verification solutions, such as those available from Nametag, into the Beyond Identity workflows.

Beyond Identity is making it possible for customers to incorporate their existing identity verification and proofing solutions as part of the Beyond Identity onboarding and recover process. Our goal is to provide an open architecture than gives our customers choice in which solution they prefer. The Beyond Identity Account Onboarding and Recovery Partner Program aims to identify leading technologies for identity verification to ensure a seamless integration for our customers.  Partner products will be thoroughly tested and validated. Nametag is the first partner for Beyond Identity to achieve this certification.

Nametag Partnership

Nametag was an obvious choice as our inaugural partner in the program. Nametag provides integrated identity verification and account protection solutions that prevent modern impersonation threats and streamline user experiences. Powered by Deepfake Defense™, Nametag detects and blocks sophisticated attacks which bypass other, outdated approaches to user verification, delivering strong identity assurance. 

Beyond Identity was drawn to Nametag with their focus on providing out-of-the-box solutions focused on this key issue of helping enterprises secure their entire user account lifecycle, from onboarding through recovery, while ensuring compliance with the latest privacy standards.

Beyond Identity seamlessly integrates with Nametag to facilitate enterprise user onboarding, both in-person and remotely. During the standard onboarding process, users scan a QR code to launch the Nametag app clip (iOS) or instant app (Android) on their mobile device. Nametag then conducts identity verification by capturing images of an identity document (such as a driver’s license or passport) along with live user images. After assessing the provided data, Nametag returns the verification results to Beyond Identity. Once successfully verified, the user is onboarded to a Beyond Identity tenant, and a passkey is enrolled for secure access.

In cases where a Beyond Identity end-user loses access to corporate credentials, Nametag streamlines account recovery by reinitiating the identity verification process to enroll a new credential. Users who have previously completed identity verification can be re-verified through Nametag. Additionally, Nametag supports recovery for users who have not undergone prior identity verification, ensuring a flexible and secure recovery solution.

Beyond Identity’s integration with Nametag is immediately available for customers.  Integration with Nametag is directly configured through Beyond Identity’s console, providing an easy to use, consistent interface for Beyond Identity’s customers.

Program Evolution

Threat actors will continue to look for the path of least resistance. The Beyond Identity phishing resistant authentication eliminates credential theft and compromise. Nametag complements the Beyond Identity capability to offer a complete, end-to-end enterprise solution, further reducing risk for our customers.

We are opening the program for other partners that can help our customer prevent identity threats. By incorporating solutions such as identity verification into the onboarding and recovery process, we can together eliminate a wide range of identity threat. Together we can further our vision to complete the vision of eliminating identity threat for our customers.

If you are interested in joining the program, please reach out to partners@beyondidentity.com.  We look forward to announcing additional partners soon.

Book

Beyond Identity Launches Partner Program for Account Onboarding and Recovery

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Download the book

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.