The Good Tech Companies - Aembit Raises $25 Million In Series A Funding For Non-Human Identity And Access Management
Episode Date: September 12, 2024This story was originally published on HackerNoon at: https://hackernoon.com/aembit-raises-$25-million-in-series-a-funding-for-non-human-identity-and-access-management. ...The investment will drive the company’s advancement of scalable workload access management for enterprises. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #aembit, #cyberwire, #press-release, #aembit-announcement, #crypto-funding, #cyberthreats, #good-company, and more. This story was written by: @cyberwire. Learn more about this writer by checking @cyberwire's about page, and for more stories, please visit hackernoon.com. Aembit has secured $25 million in Series A funding, bringing its total capital raised to nearly $45 million. Non-human identity (NHI) refers to the applications, scripts, and bots that businesses use to automate their operations. Over 60% of respondents are looking for a comprehensive solution across their entire organization. Aembit continues to advance access management with capabilities such as MFA-strength conditional access.
Transcript
Discussion (0)
This audio is presented by Hacker Noon, where anyone can learn anything about any technology.
Aembit raises $25 million in Series A funding for non-human identity and access management
by CyberWire. Silver Spring, United States, September 12, 2024, CyberNewsWire,
asterisk Aembit, the leading non-human identity and access management, IAM, company, has secured
$25 million in Series A
funding, bringing its total capital raised to nearly $45 million. Acru Capital led the round,
with participation from existing investors Ballistic Ventures, 1011 Ventures, Okta Ventures,
and CrowdStrike Falcon Fund. AEMBIT's funding comes in the wake of continued high-profile
non-human identity attacks on
organizations such as Cloudflare, The New York Times, and Microsoft. Non-human identity, NHI,
refers to the applications, scripts, and bots that businesses use to automate their operations,
as well as the credentials used by NHIs to communicate to sensitive databases,
applications, and infrastructure. These incidents exposed secrets
such as API keys, access tokens, and other non-human access credentials, which were used
to penetrate enterprise environments. In a newly published survey of security professionals,
EMBIT found that most organizations still struggle with managing NHI credentials securely.
Over 30% still storing credentials in code, and 23% using email and
chat to share credentials. Over 60% of respondents are looking for a comprehensive solution across
their entire organization. Security professionals are recognizing the need for an access-focused
approach that automates identity-driven, secretless, centrally enforced, and auditable
access between distributed applications and SaaS services to sensitive resources in the cloud and on-premises.
EMBIT has led the market in solving this emerging challenge by pioneering Ninhuman IAM.
It enables policy-based access management between workloads and THE-sensitive resources they access,
moving beyond reactive visibility and governance to proactively shrink the
attack surface of
rapidly growing and highly distributed non-human identities. AEMBIT was recently lauded as a top
two finalist in the prestigious 2024 RSA Innovation Sandbox Competition and is a finalist for Best
Identity Management Solution at the 2024 SC Awards. AEMBIT continues to advance access
management with capabilities such as MFA-strength
conditional access, policy automation via infrastructure as code, and robust auditing
for NHI access. Greater than EMBID is tackling one of the most pressing challenges in modern
enterprise greater than security, said Mark Kranich, founding partner at Acru Capital.
The shift to greater than cloud and SaaS and AI has driven an order of magnitude
expansion in non-human greater-than identities. With the proliferation of microservices and APIs
across diverse greater-than environments, IAM has become the critical first line of defense
for protecting greater-than-sensitive data. Legacy access management approaches weren't
designed with this greater-than level of scale and automation in mind.
We are thrilled to be partnering with greater-than-embit to bring a new approach to the market. Co-founders David Goldschlag and Kevin Sapp have spent their careers innovating across
the identity landscape, most recently creating NewEdge Labs, acquired by Netscope, one of the
first user-zero-trust products on the market greater than kevin and i founded mbit
with a vision to help enterprises secure access greater than between non-human workloads
applications and software resources with the greater than same principles used today to secure
human access said david goldschlag greater than co-founder and ceo of mbit talking to hundreds
of enterprises and working greater than closely with design partners,
our approach centers on proactively securing greater-than access between non-human identities while eliminating friction for developers greater-than and security teams.
Greater than, by solving non-human IAM, AEMBID is tackling an essential security
greater-than challenge, said Brad Jones, CISO at Snowflake and an AEMBID customer.
Not greater-than only is their approach to non-human access innovative, said Brad Jones, CISO at Snowflake and an EMBIT customer.
Not greater than only is their approach to non-human access innovative,
but EMBIT is a greater-than provider we can rely on.
The EMBIT Workload IAM platform enforces secure access between non-human workloads and the services that authorize access to sensitive data and infrastructure.
EMBIT's policy engine grants secretless access, just in time,
based on the workload's
identity and posture. Leveraging native identities and sophisticated automation,
organizations use Aembit to eliminate storage of sensitive secrets within applications or
vaults be moving to short-lived access tokens with a no-code-auth approach. With Aembit,
businesses proactively secure non-human access while eliminating the manual
and fragmented work required today by security, engineering, and DevSecOps teams.
About MBIT to MBIT is the non-human identity and access management platform that secures
access between workloads across clouds, SaaS, and data centers. With MBIT's identity control plane,
DevSecOps can fully automate secretless, policy-based,
and zero-trust workload access with MFA-strength capabilities.
For more information, users can visit https://embed.io and follow us on LinkedIn.
Contact CMO Aperva Dava EmbedInfo at embed.io.
Tip This story was distributed as a release by Cyberwire under HackerNoon's business
blogging program. Learn more about the program here. Thank you for listening to this HackerNoon
story, read by Artificial Intelligence. Visit HackerNoon.com to read, write, learn and publish.