Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:00 PM
Dark Reading
Dark Reading
Products and Releases

Authomize Secures $6M Seed Funding for Automated Authorization and Security

Authomize emerges from stealth to unveil its automated authorization governance and management solution.

TEL AVIV, Israel, June 23, 2020 --  Authomize, the cloud-based authorization management solution, today announced the launch of an Automated Authorization Governance and Management solution. Authomize enables organizations to manage and secure complex and vastly different applications across cloud and on-premise applications with precision and ease. Acting as a bridge between IT Ops and security teams, Authomize prevents permission sprawl and ensures adherence to security and compliance standards, significantly reducing IT's workload, while enhancing security posture.

Authomize also announced a $6 million seed round backed by Blumberg Capital, M12 Microsoft's venture fund, and Entrée Capital.

"We founded Authomize after seeing the chaos organizations experience when it comes to managing the authorization lifecycle," said Dotan Bar Noy, Co-founder and CEO at Authomize. "Current Identity Governance and Administration (IGA) tools lack the ability to provide the intelligence and automation needed to make informed and efficient decisions. With Authomize, IT and Security teams can make highly informed decisions or choose to automate processes, removing the need to compromise between IT efficiency and impeccable security hygiene."

In today's complex environments, critical organizational assets are increasingly spread across a constantly growing and changing number of SaaS, IaaS and on-premise applications. Human and machine identities are also multiplying at lightning speed, and this rapid growth in both human and non-human identities, together with the multitude of applications, results in operational burden and increased security risk which organizations are failing to control.

Authomize removes this challenge by delivering a holistic view of authorization across all scattered applications. It also grants deep granular visibility with prescriptive and corrective suggestions to enable organizations to take informed and fully automated actions. Authomize's solution dramatically reduces the burden on IT and secures identities by providing them with the exact right level of permissions, while also managing risk and ensuring compliance. 

"Many companies are in the dark about how to effectively manage authorizations," said Yodfat Harel Buchris, managing director at Blumberg Capital. "It can become impossible to manage and secure authorizations and identities, especially in today's workplace, with record numbers of employees working outside the perimeter. Authomize addresses this pain point with an innovative approach, enabling companies to keep growing and adapting to the rapidly changing norm without the security and operational risks."

Authomize has developed a unique technology called "SmartGroups", which aggregates data in real-time from multiple enterprise IT systems and dynamically infers the "right-sized" permissions. Using this data, the platform then offers predictive and prescriptive suggestions to IT and Security teams to enable them to take smart actions or automate processes.

"The team at Authomize has the right vision to ensure organizations are more productive, secure, and agile. Our digital environment has grown and become too complex for humans alone to manage and secure permissions without intelligent and automated processes," said Eran Bielski, General Partner at Entrée Capital. "We're thrilled to back Authomize on their journey to solve this monumental problem which plagues even the best of enterprises."

To learn how authorization is becoming the new perimeter, join us for a live webinar on July 14th at 2pm EST/11am PST, Gal Diskin, Co-founder and CTO of Authomize, Michael Coates, former CISO of Twitter and Yuval Cohen, former CISO of ServiceNow.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-10
For GitLab Runner before 13.0.12, 13.1.6, 13.2.3, by replacing dockerd with a malicious server, the Shared Runner is susceptible to SSRF.
PUBLISHED: 2020-08-10
An exploitable code execution vulnerability exists in the file system checking functionality of fsck.f2fs 1.12.0. A specially crafted f2fs file can cause a logic flaw and out-of-bounds heap operations, resulting in code execution. An attacker can provide a malicious file to trigger this vulnerabilit...
PUBLISHED: 2020-08-10
An SQL injection vulnerability exists in the frappe.desk.reportview.get functionality of ERPNext 11.1.38. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
PUBLISHED: 2020-08-10
A code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.
PUBLISHED: 2020-08-10
A memory leak in the OCUtil.dll library used by Nextcloud Desktop Client 2.6.4 can lead to a DoS against the host system.