Trying to achieve Least Privilege but finding it overwhelming? Check out our on-demand demo of Opal Security’s Identity Security Platform! See how it helps: ⏱️ Quickly provision Just In Time (JIT) access 🔎 Identify and fix risks such as unused or externally granted access 📈 Scale approvals and UARs via automation Opal Security helps make Least Privilege practical - even at hyperscale! Watch here: https://lnkd.in/gk5ZDJnt
Opal Security
Computer and Network Security
San Francisco, California 4,107 followers
Secure every identity and access path 🔒
About us
Opal is a modern, data-centric identity security platform. Our platform offers consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS. Opal is backed by Greylock, Battery Ventures, and some of the top security experts around the world, including Silicon Valley CISO Investments (SVCI).
- Website
-
https://opal.dev
External link for Opal Security
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- San Francisco, California
- Type
- Privately Held
- Founded
- 2020
- Specialties
- Identity Security, Identity Governance, Just-in-time Access, User Access Reviews, Privileged Access Management, Time-based Access, Identity and Access Management, and Threat Detection and Reduction
Products
Opal Security
Identity & Access Management (IAM) Software
Opal is the unified identity platform for modern enterprises. Opal aggregates identity and access data to provide visibility and defense-in-depth infrastructure for mission-critical systems. With the product, enterprises can discover anomalous identity risks and remediate them in minutes. The world's best companies trust Opal to govern and adapt sensitive access.
Locations
-
Primary
600 California St
San Francisco, California 94108, US
-
41 E 11th St
New York, NY 10003, US
Employees at Opal Security
-
Dharmesh Thakker
General Partner at Battery Ventures - Supporting Cloud, DevOps, AI and Security Entrepreneurs
-
Abbas Haider Ali
VP @ GitHub leading Customer Success, Professional Services, Support, and Renewals orgs | Investor | Advisor | Mentor | ex-Twilio ex-Segment
-
Dave Wilner
Board Member, Go-to-Market Advisor
-
Ravi Maira
Updates
-
📣 The best identity security solution gets better!! 📣 In April, Opal Security launched our least privilege posture management feature, bringing a security workflow to identity management, and enabling teams to detect, prioritize and mitigate risks stemming from over-provisioned access as a continuous security program. In just a few short months, we have continued to innovate and today announce some amazing new capabilities of our platform. Read the release to learn about: 🚀 Group optimization - calibrate IDP groups to remove over-provisioned group access 🚀 Irregular access - leveraging AI to identify access that does not conform to usual patterns, and may be risky 🚀 Snowflake first-party integration - easily manage and remediate granular access to Snowflake roles and resources such as databases, schemas and tables. We’re proud to be leading the way in enabling companies to manage identity as a first-tier security focus. As our founder and CEO Umaimah Khan puts it, “We empower teams to properly mitigate more types of identity risk, move away from point-in-time audits managed by arbitrary teams, and get to an ongoing flow within a comprehensive security strategy.” Read the release for more - link in the comments!
-
-
🔎Fact: 75% of security incidents are aided by human error. Specifically, errors related to access privileges and identity mismanagement. Next time you see a headline about a security breach, trace the facts back to the root cause. You’ll (almost always) discover failed LP enforcement or issues related to over-privileging. Check out the link in the comments for some real-world examples in this blog post by Opal Security's George Ou.
-
-
🎉 The countdown to Black Hat has begun! The Opal Security team is very excited to be connecting with security leaders next week at events like Greylock's networking event, our CISO dinner, and many more. We’d love to meet you too—use the link below to book time with our team or reach out if you'd like an invite to one of our events. See you soon! 👋 #BlackHat #Cybersecurity #Networking
-
-
We're thrilled to welcome Murad Akhundov to Opal Security! Murad is a talented software developer with a background in identity, risk mitigation and resiliency, and he's a founding engineer at our Toronto office. Welcome aboard!
-
-
In the latest issue of Security Magazine, the "GenAI explosion" is under the spotlight, revealing both incredible advancements and new security challenges. As technology evolves, so do the strategies of cyber attackers. At Opal Security, we understand this all too well. AI has become a double-edged sword — while it drives efficiency and innovation, it also equips cybercriminals with sophisticated tools to breach systems and exploit vulnerabilities. From AI-generated phishing attacks to algorithms that brute-force passwords at lightning speeds, the threat landscape is more dynamic and dangerous than ever. As a security professional, I see firsthand how these advancements are misused to compromise corporate systems. This article by CEO/founder Umaimah Khan outlines a critical approach to counter these threats: implementing a least privilege policy. Why Least Privilege Matters: 🔑 90% of identities use less than 5% of their granted permissions. 🔑 Stolen credentials are the most common attack vector. 🔑 Limiting access reduces attack surfaces and restricts lateral movement. Implementing Least Privilege: 🔨 Start by reducing excessive accounts and applying just-in-time access. 🔨 Monitor and refine access continuously to keep up with evolving needs. 🔨 Form a dedicated team to lead the implementation and ensure adherence to timelines. By adopting a least privilege strategy, organizations can drastically reduce their risk and better defend against AI-powered attacks. Let’s make our systems safer and more resilient. Read the full article (link in comments) to learn more about protecting your business from the rise of AI-powered cyber threats! 🔐📖 #CyberSecurity #AI #LeastPrivilege #OpalSecurity #IdentityAndAccessManagement #IdentitySecuirty #DataProtection #CyberThreats #SecurityNews
-
-
We're thrilled to welcome Florie Cai to Opal Security! Florie is a talented software developer and founding engineer at our Toronto office. Welcome aboard!
-
-
🚨 Massive data breaches, like the recent AT&T attack, often stem from weak identity controls. 🚨 In the latest episode of the Grey Matter podcast, Opal Security CEO and co-founder Umaimah Khan and Greylock partner Saam Motamedi discuss how security teams can and should take a security-first approach to identity, why that is hard to do in the real world, and how her insight into this problem led to her founding of Opal. Link in the comments!
-
🚀 We’re thrilled to announce that Opal Security will be at Black Hat in Las Vegas from August 6th-8th! If you’re attending, we would love to meet with you. This is a great opportunity to meet the Opal Security team and discuss how we can help enhance your identity security strategies. 📅 Grab time to meet with us here: https://lnkd.in/dXEtJVTe As a bonus, we'll also be hosting a small group of CISOs for dinner at Ocean prime. Interested in joining? Reach out to us at marketing@opal.dev to join. #BlackHatUSA #LasVegas #CyberSecurity #OpalSecurity #IdentitySecurity
-
-
It’s a Catch-22. Security teams want to limit access to secure their companies’ assets and systems. But employees across other departments reject barriers that restrict collaboration and efficiency. 👀 Does this sound familiar? You might be wondering if there’s a happy medium. The answer is yes. ⭐️ It’s all about refining, not restricting, access.⭐️ Here are 3 practical changes any organization can make to mitigate the risk of breaches caused by over-provisioning — without compromising workflows. Link in comments.
-