Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:00 PM
Dark Reading
Dark Reading
Products and Releases

Authomize Secures $6M Seed Funding for Automated Authorization and Security

Authomize emerges from stealth to unveil its automated authorization governance and management solution.

TEL AVIV, Israel, June 23, 2020 --  Authomize, the cloud-based authorization management solution, today announced the launch of an Automated Authorization Governance and Management solution. Authomize enables organizations to manage and secure complex and vastly different applications across cloud and on-premise applications with precision and ease. Acting as a bridge between IT Ops and security teams, Authomize prevents permission sprawl and ensures adherence to security and compliance standards, significantly reducing IT's workload, while enhancing security posture.

Authomize also announced a $6 million seed round backed by Blumberg Capital, M12 Microsoft's venture fund, and Entrée Capital.

"We founded Authomize after seeing the chaos organizations experience when it comes to managing the authorization lifecycle," said Dotan Bar Noy, Co-founder and CEO at Authomize. "Current Identity Governance and Administration (IGA) tools lack the ability to provide the intelligence and automation needed to make informed and efficient decisions. With Authomize, IT and Security teams can make highly informed decisions or choose to automate processes, removing the need to compromise between IT efficiency and impeccable security hygiene."

In today's complex environments, critical organizational assets are increasingly spread across a constantly growing and changing number of SaaS, IaaS and on-premise applications. Human and machine identities are also multiplying at lightning speed, and this rapid growth in both human and non-human identities, together with the multitude of applications, results in operational burden and increased security risk which organizations are failing to control.

Authomize removes this challenge by delivering a holistic view of authorization across all scattered applications. It also grants deep granular visibility with prescriptive and corrective suggestions to enable organizations to take informed and fully automated actions. Authomize's solution dramatically reduces the burden on IT and secures identities by providing them with the exact right level of permissions, while also managing risk and ensuring compliance. 

"Many companies are in the dark about how to effectively manage authorizations," said Yodfat Harel Buchris, managing director at Blumberg Capital. "It can become impossible to manage and secure authorizations and identities, especially in today's workplace, with record numbers of employees working outside the perimeter. Authomize addresses this pain point with an innovative approach, enabling companies to keep growing and adapting to the rapidly changing norm without the security and operational risks."

Authomize has developed a unique technology called "SmartGroups", which aggregates data in real-time from multiple enterprise IT systems and dynamically infers the "right-sized" permissions. Using this data, the platform then offers predictive and prescriptive suggestions to IT and Security teams to enable them to take smart actions or automate processes.

"The team at Authomize has the right vision to ensure organizations are more productive, secure, and agile. Our digital environment has grown and become too complex for humans alone to manage and secure permissions without intelligent and automated processes," said Eran Bielski, General Partner at Entrée Capital. "We're thrilled to back Authomize on their journey to solve this monumental problem which plagues even the best of enterprises."

To learn how authorization is becoming the new perimeter, join us for a live webinar on July 14th at 2pm EST/11am PST, Gal Diskin, Co-founder and CTO of Authomize, Michael Coates, former CISO of Twitter and Yuval Cohen, former CISO of ServiceNow.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.