BeyondTrust and Beyond Identity Partner for Zero Trust PAM

Unphishable MFA Plus Privileged Access Management Ensures Only Authorized Users on Secure Devices Have Access to All Privileged Accounts

Beyond Identity announced a technical partnership and integration that advances zero trust for the most sensitive accounts. The combined solution integrates Beyond Identity’s unphishable, passwordless multi-factor authentication with BeyondTrust’s Endpoint Privilege Management and Privileged Password Management solutions, ensuring that only authorized users and secure devices can gain privileged access to critical systems.

Marketing Technology News: Beyond Identity Raises $100 Million to Accelerate Adoption of Invisible, Un-phishable MFA for…

The new BeyondTrust and Beyond Identity integration offers customers the following benefits:

  • Out-of-the-box zero trust multi-factor authentication and access controls for PAM accounts.
  • Only devices that meet company security policy have access to PAM accounts.
  • When privileges on endpoints are elevated, the combined solution immediately requires end users to frictionlessly and securely authenticate and then checks that the endpoint meets policy.

“This new integration significantly elevates security for PAM accounts,” said David Manks, Vice President of Strategic Alliances at BeyondTrust. “Combining Beyond Identity passwordless authentication with BeyondTrust’s leading Privileged Password Management and Endpoint Privilege Management products enables our mutual customers to implement a zero trust architecture for comprehensive protection against cyberthreats.”

When a user attempts to run an executable on a managed device, BeyondTrust Endpoint Privilege Management pauses the action and engages Beyond Identity to perform a passwordless, multi-factor authentication to ensure the user has the necessary privileges and that the device meets security policy before proceeding. BeyondTrust makes an OIDC (OpenID Connect) call to Beyond Identity, which authenticates the user and checks that the device meets security policy. Once the identity and device are authenticated, and the device passes security checks, Beyond Identity asserts the identity to BeyondTrust’s Endpoint Privilege Management to allow the action to proceed.

“We are excited to work with the BeyondTrust team to enhance security for privileged accounts,” said Kurt Johnson, Vice President of Strategy and Business Development at Beyond Identity. “We believe this is a one plus one equals three model where our integrated solutions will significantly increase protection for accounts that are most desirable targets for adversaries.”

Marketing Technology News: MarTech Interview with Bob Ciccone, EVP of Corporate Development at NetBase Quid

buy modafinil where to buy modafinil