• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security, News

Beyond Identity, Cybersecurity Companies Launch Zero Trust Authentication Push

Beyond Identity and other leading security firms are backing the creation of Zero Trust Authentication, a new subcategory of zero trust.

March 17, 2023 Zachary Comeau Leave a Comment

Zero Trust, ZTNA, Netskope
stock.adobe.com/Alexander

Passwordless authentication software provider Beyond Identity is launching Zero Trust Authentication, a new subcategory of zero trust technology designed to help organizations move towards secure authentication that advances the zero trust security movement.

According to Beyond Identity, several industry-leading security companies are backing the creation of Zero Trust Authentication, including Palo Alto Networks, CrowdStrike, Optiv, World Wide Technology, Guidepoint Security, BeyondTrust, Ping Identity and Climb Channel Solutions.

Beyond Identity says Zero Trust Authentication has been developed in response to the failure of traditional authentication methods and the increasing number of cyberattacks. Zero Trust Authentication, the company says, will help organizations overcome limitations of passwords and legacy mutli-factor authentication (MFA) and implement more robust security strategies.

The company says Zero Trust Authentication includes components such as its risk scoring and continuous authentication capabilities.

In addition, Beyond Identity and the other cybersecurity leaders are launching the Worldwide Zero Trust Leadership series of events that will run through 2023.

In a statement, Tom Jermoluk, CEO and co-founder of Beyond Identity, says security leaders have realized that the industry needs to formally bring identity and access management into the industry.

“We are bringing together the leaders from the essential technology categories to ensure authentication decisions are risk based and continuously informed with signals from the wealth of existing cybersecurity tooling,” Jermoluk says. “Through close technology collaboration and now go-to-market collaboration in this Zero Trust Leadership series, we are delivering strong authentication built for an ‘always on’ zero trust world coupled with the practical advice and best practices so that enterprises can finally close identity and access management vulnerabilities.”

The group of cybersecurity firms has defined a set of practical requirements that organizations can use to measure their identity practices and adopt to protect workforce and customers, including:

  1. Passwordless – No use of passwords or other shared secrets, as these can easily be obtained from users, captured on networks, or hacked from databases.
  2. Phishing resistant – No opportunity to obtain codes, magic links, or other authentication factors through phishing, adversary-in-the-middle, or other attacks.
  3. Capable of validating user devices – Able to ensure that requesting devices are bound to a user and authorized to access information assets and applications.
  4. Capable of assessing device security posture – Able to determine whether devices comply with security policies by checking that appropriate security settings are enabled, and security software is actively running.
  5. Capable of analyzing many types of risk signals – Able to ingest and analyze data from endpoints and security and IT management tools.
  6. Continuous risk assessment – Able to evaluate risk throughout a session rather than relying on one-time authentication.
  7. Integrated with the security infrastructure – Integrating with a variety of tools in the security infrastructure to improve risk detection, accelerate responses to suspicious behaviors, and improve audit and compliance reporting.

Beyond Identity and its partners are also bringing this practical advice directly to customers and channel partners to major events like RSA and Black Hat, and key cities across North America and Europe over  2023.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, Zero Trust

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.