Delinea acquires Authomize to help organizations reduce identity-related risk

Delinea announced it has acquired Authomize, an innovator in the detection and elimination of identity-based threats across the cloud.
The continuous discovery and visibility capabilities of Authomize, married with Delinea's SaaS solutions for PAM, will extend the Delinea Platform's reach for comprehensive privileged controls in the cloud while expanding its role to provide a strong defense against identity-based attacks such as account takeovers, insider threats, and lateral movement.
CIEM and ITDR capabilities will be delivered through the cloud-native Delinea Platform, adding depth to its execution of the company's vision to extend PAM across the modern enterprise.
The acquisition of Authomize also establishes a Delinea research and development centre in Israel.
Osterman Research indicates that 80% of enterprises now use multiple clouds, while 76% lack complete visibility into access policies and applications across multiple clouds, increasing the threat landscape.
CIEM extends controls to SaaS applications and public cloud infrastructure to minimize the risk of overprivileged cloud identities.
A June 2022 report by the Identity Defined Security Alliance revealed that 84% of organizations experienced an identity-related breach over the previous year, with 96% stating they could have prevented or minimized the breach by implementing identity-focused outcomes.
ITDR works across all identities to detect threats and mitigate risk with better visibility and remediation.
Broaden least privilege in the cloud, detect threats and reduce risks for all identities.
Authomize CIEM empowers enterprises to extend least privilege controls into their cloud environments by continuously monitoring access privileges, usage changes, and connections between cloud services, SaaS applications, and IAM solutions.
Adding Authomize ITDR will increase protection against threats across all identities by detecting abuse and responding to attacks.
On the Delinea Platform, the enhanced capabilities will identify and address issues such as stale accounts, over-privileged identities, and privilege escalation paths, significantly bolstering cloud security by proactively detecting and mitigating threats while maintaining operational continuity.
This approach will most effectively safeguard assets and data while reducing risk, all without introducing complexity.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Tue, 09 Jan 2024 14:43:04 +0000


Cyber News related to Delinea acquires Authomize to help organizations reduce identity-related risk

Delinea acquires Authomize to help organizations reduce identity-related risk - Delinea announced it has acquired Authomize, an innovator in the detection and elimination of identity-based threats across the cloud. The continuous discovery and visibility capabilities of Authomize, married with Delinea's SaaS solutions for PAM, ...
1 year ago Helpnetsecurity.com
Delinea Acquires Authomize to Tackle Identity-Based Threats - Silicon Valley access management vendor Delinea on Tuesday announced the acquisition of Israeli startup Authomize, a deal that adds identity threat detection and response technologies to its product portfolio. The private equity-owned Delinea, formed ...
1 year ago Securityweek.com
Taking the complexity out of identity solutions for hybrid environments: Identity Fabric and orchestration - For the past two decades, businesses have been making significant investments to consolidate their identity and access management platforms and directories to manage user identities in one place. Instead, businesses must learn how to consistently and ...
1 year ago Securityintelligence.com
Delinea Fixes Flaw After Analyst Goes Public With Disclosure First - A critical flaw in Delinea's Secret Server SOAP API disclosed this week sent security teams racing to roll out a patch. A researcher claims he contacted the privileged access management provider weeks ago to alert them to the bug, only to be told he ...
1 year ago Darkreading.com Silence
Identity as a Service - Let us introduce Identity as a Service, a revolutionary identity management strategy that aims to improve security, simplify user interfaces, and enable frictionless access to online resources. Organizations can use IDaaS platforms to access identity ...
1 year ago Feeds.dzone.com
Master Security by Building on Compliance with A Risk-Centric Approach - In recent years, a confluence of circumstances has led to a sharp rise in IT risk for many organizations. That's why a proactive approach to seeing, understanding, and acting on risk is key to improving the effectiveness of defenses in place to meet ...
1 year ago Cyberdefensemagazine.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
3 months ago Cybersecuritynews.com
SailPoint unveils two sets of new offerings to help companies grow their identity security program - SailPoint unveiled two sets of new offerings designed to give customers options as they build their identity program, while driving customer success throughout their identity journey. First, the company is extending the family of SailPoint Identity ...
1 year ago Helpnetsecurity.com
Reducing credential complexity with identity federation - Help Net Security - Organizations also need to ensure compatibility between different platforms and protocols, and effectively merge user identities across multiple IdPs to avoid security gaps or identity conflicts. From a security perspective, federated authentication ...
1 year ago Helpnetsecurity.com
How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions - In particular, there is an immediate and profound impact on the identity and access management postures of both companies. While most combined organizations aspire to eventually consolidate their identity systems, this is a challenging and ...
1 year ago Microsoft.com
What is Azure Identity Protection and 7 Steps to a Seamless Setup - As a result, tools such as Microsoft's Azure Identity Protection have become a staple in protecting against compromised identities, account takeover, and misuse of privileges. Azure Identity Protection is a security service that provides a robust ...
1 year ago Securityboulevard.com
16 top ERM software vendors to consider in 2024 - Enterprise risk management software helps organizations identify, mitigate and remediate business risks, which can lead to improved business performance. The risk management market is rapidly evolving from separate tools across different risk domains ...
1 year ago Techtarget.com
How Healthcare Organizations can use ASPM to Fill CSPM Coverage Gaps and Save Money - In recent years, healthcare organizations have increasingly moved their healthcare information systems applications and infrastructure to the cloud to take advantage of its scalability, flexibility and cost-effectiveness. To mitigate these risks, ...
1 year ago Securityboulevard.com
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
2 years ago Trendmicro.com
How to Build a Cyber Risk Tolerance Statement for Your Organization as a CISO - Creating an effective cyber risk appetite statement requires a structured approach that begins with a thorough understanding of your organization’s risk profile, business model, and strategic objectives. A well-defined cyber risk appetite ...
5 months ago Cybersecuritynews.com
The Latest Delinea Secret Server Release Boosts Usability With New Features - PRESS RELEASE. San Francisco, CA - November 30, 2023 - Delinea, a leading provider of solutions that seamlessly extend Privileged Access Management, today announced new features for Secret Server to improve usability and increase PAM ...
1 year ago Darkreading.com
ProcessUnity Introduces Industry's All-In-One Third-Party Risk Management Platform - PRESS RELEASE. BOSTON-(BUSINESS WIRE)- ProcessUnity, provider of comprehensive end-to-end third-party risk management and cybersecurity solutions to leading enterprises, today announced the completed integration of the Global Risk Exchange. The newly ...
1 year ago Darkreading.com
What is identity management? Definition from SearchSecurity - Identity management is the organizational process for ensuring individuals have the appropriate access to technology resources. Identity management is an essential component of security. Identity management includes authenticating users and ...
1 year ago Techtarget.com
The Role of Identity Data Management in Achieving CISA'S Strategic Goals - At the heart of this growing risk is identity, with over 60% of all breaches today involving identity exploitation. As organizations continue to expand their digital footprints, driven by a move towards cloud resources and remote systems, their ...
1 year ago Cyberdefensemagazine.com
The Latest Identity Theft Methods: Essential Protection Strategies Revealed - Identity theft has evolved far beyond the days of stolen mail and dumpster diving. Today's identity thieves employ sophisticated techniques, including account takeovers and government benefit fraud, making it essential for you to stay vigilant to ...
1 year ago Hackread.com
The ONE Thing All Modern SaaS Risk Management Programs Do - Reducing SaaS risk is, without a doubt, a difficult challenge. Gaining visibility into all the SaaS apps used across an enterprise is hard enough, but it becomes an even greater challenge when only a portion of the apps go through the company's ...
1 year ago Securityboulevard.com
Cybersecurity Performance Goals: Assessing How CPGs Help Organizations Reduce Cyber Risk - In October 2022, CISA released the Cybersecurity Performance Goals to help organizations of all sizes and at all levels of cyber maturity become confident in their cybersecurity posture and reduce business risk. Earlier this summer, CISA outlined ...
1 year ago Cisa.gov
Unseen Threats: Identity Blind Spots and Misconfigurations in Cybersecurity - It's rather obvious to most in the IT sector that cybercriminals consistently and successfully exploit stolen or weak online identities to gain unauthorized access to businesses of all types. It's these identities in an enterprise that are clearly ...
1 year ago Cybersecurity-insiders.com
Delinea Research Reveals that Ransomware Is Back on the Rise As Cybercriminals' Motivation Shifts to Data Exfiltration - The familiar tactics of crippling a company and holding it hostage have been replaced by new strategies that use stealth to exfiltrate private and sensitive data. Cybercriminals then frequently threaten to sell it to the highest bidder on the darknet ...
1 year ago Darkreading.com
31 Alarming Identity Theft Statistics for 2024 - Identity theft is a prevalent issue that affects millions of people annually. Although the numbers are startling, we've selected the 31 most concerning identity theft statistics to help you understand how to secure your identity. In 2022, the FTC ...
1 year ago Pandasecurity.com

Cyber Trends (last 7 days)