Delinea Acquires Authomize to Tackle Identity-Based Threats

Silicon Valley access management vendor Delinea on Tuesday announced the acquisition of Israeli startup Authomize, a deal that adds identity threat detection and response technologies to its product portfolio.
The private equity-owned Delinea, formed in April 2012 through the merger of Centrify and Thycotic, said the deal extends its reach into the lucrative identity category and adds technology to help businesses to eliminate identity-based threats across SaaS, cloud, and traditional systems.
Authomize, which emerged from stealth in 2021 with ambitious plans in the IDTR space, raised about $22 million in venture capital funding from a roster of investors that included Tenable Ventures, BlumbergCapital, Microsoft M12, and Entree Capital.
In a note announcing the transaction, Delinea pointed to data that shows a surge in identity-related data breaches that could have a cascading effect through the cloud ecosystem.
The company noted that attacks have moved to target identities, bypassing traditional security tools such as endpoint protection and network security.
WIth the Authomize acquisition, Delinea is hoping to expand the reach and capabilities of its flagship PAM platform to provide tooling for businesses to detect and mitigate abuse across all their identities in the world of integrated SaaS applications and hybrid infrastructure.


This Cyber News was published on www.securityweek.com. Publication date: Tue, 09 Jan 2024 19:13:04 +0000


Cyber News related to Delinea Acquires Authomize to Tackle Identity-Based Threats

Delinea acquires Authomize to help organizations reduce identity-related risk - Delinea announced it has acquired Authomize, an innovator in the detection and elimination of identity-based threats across the cloud. The continuous discovery and visibility capabilities of Authomize, married with Delinea's SaaS solutions for PAM, ...
1 year ago Helpnetsecurity.com
Delinea Acquires Authomize to Tackle Identity-Based Threats - Silicon Valley access management vendor Delinea on Tuesday announced the acquisition of Israeli startup Authomize, a deal that adds identity threat detection and response technologies to its product portfolio. The private equity-owned Delinea, formed ...
1 year ago Securityweek.com
Taking the complexity out of identity solutions for hybrid environments: Identity Fabric and orchestration - For the past two decades, businesses have been making significant investments to consolidate their identity and access management platforms and directories to manage user identities in one place. Instead, businesses must learn how to consistently and ...
1 year ago Securityintelligence.com
Delinea Fixes Flaw After Analyst Goes Public With Disclosure First - A critical flaw in Delinea's Secret Server SOAP API disclosed this week sent security teams racing to roll out a patch. A researcher claims he contacted the privileged access management provider weeks ago to alert them to the bug, only to be told he ...
9 months ago Darkreading.com
Identity as a Service - Let us introduce Identity as a Service, a revolutionary identity management strategy that aims to improve security, simplify user interfaces, and enable frictionless access to online resources. Organizations can use IDaaS platforms to access identity ...
1 year ago Feeds.dzone.com
How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions - In particular, there is an immediate and profound impact on the identity and access management postures of both companies. While most combined organizations aspire to eventually consolidate their identity systems, this is a challenging and ...
1 year ago Microsoft.com
Unseen Threats: Identity Blind Spots and Misconfigurations in Cybersecurity - It's rather obvious to most in the IT sector that cybercriminals consistently and successfully exploit stolen or weak online identities to gain unauthorized access to businesses of all types. It's these identities in an enterprise that are clearly ...
11 months ago Cybersecurity-insiders.com
What is Azure Identity Protection and 7 Steps to a Seamless Setup - As a result, tools such as Microsoft's Azure Identity Protection have become a staple in protecting against compromised identities, account takeover, and misuse of privileges. Azure Identity Protection is a security service that provides a robust ...
7 months ago Securityboulevard.com
MixModes Approach to Combating The Growing Threat of Identity-Based Attacks on Enterprise Organizations - In today's interconnected digital landscape, enterprise organizations are increasingly vulnerable to identity-based threats. According to recent studies, over 80% of data breaches are attributed to compromised credentials, highlighting the critical ...
1 year ago Securityboulevard.com
The Latest Identity Theft Methods: Essential Protection Strategies Revealed - Identity theft has evolved far beyond the days of stolen mail and dumpster diving. Today's identity thieves employ sophisticated techniques, including account takeovers and government benefit fraud, making it essential for you to stay vigilant to ...
11 months ago Hackread.com
The Role of Identity Data Management in Achieving CISA'S Strategic Goals - At the heart of this growing risk is identity, with over 60% of all breaches today involving identity exploitation. As organizations continue to expand their digital footprints, driven by a move towards cloud resources and remote systems, their ...
9 months ago Cyberdefensemagazine.com
31 Alarming Identity Theft Statistics for 2024 - Identity theft is a prevalent issue that affects millions of people annually. Although the numbers are startling, we've selected the 31 most concerning identity theft statistics to help you understand how to secure your identity. In 2022, the FTC ...
1 year ago Pandasecurity.com
What is identity management? Definition from SearchSecurity - Identity management is the organizational process for ensuring individuals have the appropriate access to technology resources. Identity management is an essential component of security. Identity management includes authenticating users and ...
9 months ago Techtarget.com
SailPoint unveils two sets of new offerings to help companies grow their identity security program - SailPoint unveiled two sets of new offerings designed to give customers options as they build their identity program, while driving customer success throughout their identity journey. First, the company is extending the family of SailPoint Identity ...
11 months ago Helpnetsecurity.com
Reducing credential complexity with identity federation - Help Net Security - Organizations also need to ensure compatibility between different platforms and protocols, and effectively merge user identities across multiple IdPs to avoid security gaps or identity conflicts. From a security perspective, federated authentication ...
3 months ago Helpnetsecurity.com
The Latest Delinea Secret Server Release Boosts Usability With New Features - PRESS RELEASE. San Francisco, CA - November 30, 2023 - Delinea, a leading provider of solutions that seamlessly extend Privileged Access Management, today announced new features for Secret Server to improve usability and increase PAM ...
1 year ago Darkreading.com
Delinea has cloud security incident in Thycotic Secret Server gaffe - Delinea Secret Server - also known as Thycotic Secret Server - is a privileged access management product which allows the storage and rotation of credentials. Competitors include the likes of CyberArk. It is a Crown Jewels product, designed to ...
9 months ago Doublepulsar.com
What is Identity Threat Detection and Response? - Identity Threat Detection and Response remains crucial for preventing unauthorized access and mitigating security breaches. The security of digital identities has never been more paramount, and Identity Threat Detection and Response is a 2024 ...
1 year ago Securityboulevard.com
1Kosmos Unifies Identity Verification User Journeys Across Web and Mobile Platforms - PRESS RELEASE. EAST BRUNSWICK, N.J., Nov. 29, 2023 - 1Kosmos, the company that unifies identity proofing and passwordless authentication, today announced the 1Kosmos BlockID platform now enables organizations to seamlessly extend web-based identity ...
1 year ago Darkreading.com
The 11 Best Identity and Access Management Tools - Demand for Identity and Access Management tools is booming. Today, there are dozens of Identity and Access Management tools on the market. Identity and Access Management solutions share many things in common with other cybersecurity technologies. ...
11 months ago Heimdalsecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
​​Strengthening identity protection in the face of highly sophisticated attacks​​ - We continuously work to improve the built-in security of our products and platforms. It's a multi-year commitment to advance the way we design, build, test, and operate our technology to ensure we deliver solutions that meet the highest possible ...
1 year ago Techcommunity.microsoft.com
Unmasking Identity Theft: Detection and Mitigation Strategies - In an increasingly digital world, the threat of identity theft looms large, making it imperative for individuals to be proactive in detecting potential breaches and implementing effective mitigation measures. This article delves into key strategies ...
1 year ago Cybersecurity-insiders.com
The Evolution of Cyber Threats: Past, Present, and Future - Cyber threats have evolved significantly over time, posing increasing risks to individuals, organizations, and governments in our interconnected world. Let's explore the past, present, and future of cyber threats to better understand how to protect ...
11 months ago Securityzap.com
Delinea Research Reveals that Ransomware Is Back on the Rise As Cybercriminals' Motivation Shifts to Data Exfiltration - The familiar tactics of crippling a company and holding it hostage have been replaced by new strategies that use stealth to exfiltrate private and sensitive data. Cybercriminals then frequently threaten to sell it to the highest bidder on the darknet ...
11 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)