Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:35 AM
Dark Reading
Dark Reading
Products and Releases

Beyond Identity Raises $75 Million

NEW YORK, Dec. 08, 2020 (GLOBE NEWSWIRE) -- Beyond Identity today announced a $75 million Series B round, funded by existing investors and bringing total investment in the company to $105 million. Investors in the company include New Enterprise Associates (NEA), Jim Clark, and Koch Disruptive Technologies, LLC (KDT). The company will use the proceeds to fuel further innovation of its industry-leading, advanced passwordless identity platform and to build a global footprint, including the acceleration of distribution channels, OEM partners, and international sales and support.

Launched in April 2020 by Silicon Valley icons Jim Clark and Thomas (TJ) Jermoluk, customers have been attracted by the company’s secure, scalable, and frictionless passwordless authentication, but what has really gotten their attention is the platform’s advanced architecture and ability to incorporate granular endpoint security data into a continuous risk policy-based authentication model. The company is currently supporting customers whose workforce counts range in size from less than a hundred, to hundreds of thousands of employees and is attracting businesses that are working to deploy its advanced identity platform to tens of millions of their end-user customers.

“The past seven months have been a challenging time and have forced organizations to rapidly adjust to supporting fully remote workforces, a change that will be largely permanent,” said Forest Baskett, General Partner at NEA. “The industry was moving incrementally in the direction of passwordless approaches, but Beyond Identity’s innovation leapfrogged all others with an elegant architecture and powerful solution. As investors, the opportunity to ride that wave with the leadership team they have assembled was simply too hard to ignore.”

Unlike previously available solutions like two-factor/multi-factor authentication (2FA/MFA) or password managers (which attempted to increase security but also greatly increased user friction), Beyond Identity’s advanced passwordless identity platform increases both usability and security, lowering cost and complexity while removing friction for users. The company has continued to rapidly extend its coverage – expanding its Beyond Identity Authenticator to all major operating systems (macOS, Windows, iOS, and Android). The company has streamlined the adoption of passwordless identity management across any business context by offering a completely cloud-native platform, supporting proven industry standards (e.g., OpenID Connect, SAML, TLS, and X.509), and developing formal integration partnerships with single sign-on (SSO) providers, including Ping Identity, Okta, ForgeRock, Microsoft, and others.

“Passwords are so repeatedly exposed that they have become a commodity for criminals. The result has been an exponential rise in account takeover fraud that is costing companies billions annually,” said TJ Jermoluk, CEO of Beyond Identity. “Too many companies use the phrase ‘passwordless’ totally wrong. They aren’t actually eliminating the password at all, just applying Band-Aids to existing legacy password systems. Fundamentally strong authentication requires that companies completely eliminate passwords. But that is just the first move, not the end game. Forward-looking companies are adopting continuous authentication, a new model that provides fundamentally strong, risk-based access, significantly reducing exposure to account takeovers and protecting user privacy.”

About Beyond Identity
Headquartered in New York City, Beyond Identity was founded by industry legends Jim Clark and Tom Jermoluk to eliminate passwords and radically change the way the world logs in. Funded by leading investors, including Koch Disruptive Technologies (KDT) and New Enterprise Associates (NEA), Beyond Identity’s mission is to empower the next generation of secure digital business. By replacing passwords with fundamentally secure X.509-based certificates and enabling continuous, risk-based authentication, the company’s patents-pending approach creates an extended Chain of Trust™ that dramatically improves security and provides a frictionless login experience. Beyond Identity’s cloud-native solution and advanced, standards-based architecture drastically reduces implementation time and costs – enabling customers to increase business velocity, implement new business models, and reduce operating costs. Visit www.beyondidentity.com for more information.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.