Multi-factor & Risk-based Authentication , Security Operations

Jim Clark: Why He's Giving Away Passwordless Technology

Internet Browser Pioneer on ID Threats and Overcoming the Password Liability
Jim Clark, chairman and co-founder, Beyond Identity

When he co-founded the firm Beyond Identity in 2020, serial entrepreneur Jim Clark said he felt somewhat responsible for the proliferation of passwords. Now he and partner Tom Jermoluk are doing something about it. They are providing access to their passwordless technology for free.

The giveaway is part of a new marketing campaign. Starting Jan. 26, Beyond Identity says, it will provide access to its passwordless identity platform free of charge to “any company that wants to offer its employees or customers a completely frictionless and fundamentally secure authentication experience.”

Why? "The best answer is: The world desperately needs it, and we know how to do it,” Clark says in an exclusive video interview with Information Security Media Group.

In the interview, Clark discusses:

  • Why Beyond Identity is giving away its passwordless technology;
  • The "state of the password" and ID-targeting threats;
  • The rise of passwordless technology amid accelerated transformation.

Clark is an American entrepreneur and computer scientist. He founded several Silicon Valley technology companies, including Silicon Graphics Inc., Netscape Communications Corp., MyCFO, Healtheon, Applied DNA Sciences, CommandScape and Beyond Identity.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.