SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Aperio wireless locks join Rhombus security platform
    • Ramtech boosts U.S. presence with wireless safety solutions
    • Checkmarx acquires Tromzo: Leap in autonomous AppSec
    • HackerOne executive appointments: Accelerate CTEM growth
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Why open matters in the age of AI
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    IFSEC India 2025

    IFSEC India 2025

    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Beyond Identity selects Ignition Technology to drive channel expansion

26 Aug 2021

Beyond Identity selects Ignition Technology to drive channel expansion
Contact company
Contact Beyond Identity
icon Add as a preferred source Download PDF version
Related Links
  • Ignition Technology partners with Siemplify to bring the SOAR technology to a growing MSSP community
  • The future of secure identity & access is not using passwords
  • Representation at security events - A benchmark for progress and diversity

Beyond Identity, the global provider of the strongest passwordless authentication on the planet has formed a strategic partnership with Ignition Technology to distribute Beyond Identity’s solutions through its extensive network of IT resellers and MSSPs in the Nordics as well as in Benelux.  

Recently ransomware attacks have been on the increase, close to doubling from the first half of 2020 to the first half of 2021. Passwords are the number one cause of ransomware attacks and other data breaches, and stolen credentials are at the heart of 85% of all cyberattacks. Beyond Identity addresses this by eliminating passwords as an authentication method. When passwords can’t be used to authenticate, organisations can slam the door on all credential-based attacks. 

Passwordless method of user verification

The solution eliminates passwords and cryptographically binds the user’s identity to their devices

With the Beyond Identity Platform, organisations can eliminate passwords, positively verify user identities, confirm device trust, and enforce risk-based access controls. The solution eliminates passwords and cryptographically binds the user’s identity to their devices, using asymmetric cryptography, which is the same proven, secure, and scalable technology used to protect trillions of transactions daily across the internet. 

Beyond Identity extends the chain of trust established with TLS (modern-day SSL) to end-users and their devices. In this way, it is possible to bind the device to identity, thus making passwords obsolete.  

Identity and access management solutions

“We are delighted to start working with Ignition Technology in the Nordics. They were an obvious choice because of their proven ability to deliver cybersecurity, identity, and access management solutions.”

“Like us, they see a huge market opportunity and that the market for this type of solution can be expected to grow rapidly. Together we will work hard to make Beyond Identity a recognised leader in passwordless authentication in Northern Europe”, said Juha Hakava, Regional Director Nordics for Beyond Identity.  

The setup of Beyond Identity’s solution is completed in a matter of hours and integrates with all leading single sign-on solutions. 

Authentication solutions

Beyond Identity's advanced passwordless platform and solutions complements Ignition Technology's offering" “Ignition Technology is a specialised security distributor for the Saas world and we are focusing on helping our great channel partners to gain advantages of the market with leading new technologies. We have strong experience in identity solutions and have seen increasing demand for authentication solutions that are radically helping customers to improve their security postures and enabling them to reduce risks relating to passwords and trust.” 

“We are very pleased to partner with Beyond Identity. Their world-class advanced passwordless platform and solutions are complementing our market-leading Identity offering successfully and we are looking forward to working with their talented and superior team in the Northern European market”, said Marko Lindstedt, Sales Director for Ignition Technologies NEUR. 

“Beyond Identity has a 100 % channel-centric business in EMEA. Now that we have the key people on board and a European data centre up and running it’s time for us to work together with our partners to help us grow in the Nordic and Benelux markets,” said Juha Hakava.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Digital video surveillance
  • Industrial security
  • Commercial security
  • Private sector security
  • Public sector security
  • Security management
  • Security devices
  • Security tagging
  • Security access systems
  • Electronic access control
  • Identity management
  • Institute security
  • Wireless security
  • Network cameras
  • Security software
  • Security service
  • Human identification system
  • IP security solutions
  • Integration software
  • Cyber security
  • Corporate Security
  • Data Security
  • Touchless Security
  • Related links
  • Access Control Software Access control software
  • Related categories
  • Access control software
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
Aperio wireless locks join Rhombus security platform

Aperio wireless locks join Rhombus security platform

Effective high-security wedge barriers by Delta

Effective high-security wedge barriers by Delta

What’s behind (perimeter) door #1?

What’s behind (perimeter) door #1?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec