The Good Tech Companies - Aembit Raises $25 Million In Series A Funding For Non-Human Identity And Access Management

Episode Date: September 12, 2024

This story was originally published on HackerNoon at: https://hackernoon.com/aembit-raises-$25-million-in-series-a-funding-for-non-human-identity-and-access-management. ...The investment will drive the company’s advancement of scalable workload access management for enterprises. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #aembit, #cyberwire, #press-release, #aembit-announcement, #crypto-funding, #cyberthreats, #good-company, and more. This story was written by: @cyberwire. Learn more about this writer by checking @cyberwire's about page, and for more stories, please visit hackernoon.com. Aembit has secured $25 million in Series A funding, bringing its total capital raised to nearly $45 million. Non-human identity (NHI) refers to the applications, scripts, and bots that businesses use to automate their operations. Over 60% of respondents are looking for a comprehensive solution across their entire organization. Aembit continues to advance access management with capabilities such as MFA-strength conditional access.

Transcript
Discussion (0)
Starting point is 00:00:00 This audio is presented by Hacker Noon, where anyone can learn anything about any technology. Aembit raises $25 million in Series A funding for non-human identity and access management by CyberWire. Silver Spring, United States, September 12, 2024, CyberNewsWire, asterisk Aembit, the leading non-human identity and access management, IAM, company, has secured $25 million in Series A funding, bringing its total capital raised to nearly $45 million. Acru Capital led the round, with participation from existing investors Ballistic Ventures, 1011 Ventures, Okta Ventures, and CrowdStrike Falcon Fund. AEMBIT's funding comes in the wake of continued high-profile
Starting point is 00:00:43 non-human identity attacks on organizations such as Cloudflare, The New York Times, and Microsoft. Non-human identity, NHI, refers to the applications, scripts, and bots that businesses use to automate their operations, as well as the credentials used by NHIs to communicate to sensitive databases, applications, and infrastructure. These incidents exposed secrets such as API keys, access tokens, and other non-human access credentials, which were used to penetrate enterprise environments. In a newly published survey of security professionals, EMBIT found that most organizations still struggle with managing NHI credentials securely.
Starting point is 00:01:21 Over 30% still storing credentials in code, and 23% using email and chat to share credentials. Over 60% of respondents are looking for a comprehensive solution across their entire organization. Security professionals are recognizing the need for an access-focused approach that automates identity-driven, secretless, centrally enforced, and auditable access between distributed applications and SaaS services to sensitive resources in the cloud and on-premises. EMBIT has led the market in solving this emerging challenge by pioneering Ninhuman IAM. It enables policy-based access management between workloads and THE-sensitive resources they access, moving beyond reactive visibility and governance to proactively shrink the
Starting point is 00:02:04 attack surface of rapidly growing and highly distributed non-human identities. AEMBIT was recently lauded as a top two finalist in the prestigious 2024 RSA Innovation Sandbox Competition and is a finalist for Best Identity Management Solution at the 2024 SC Awards. AEMBIT continues to advance access management with capabilities such as MFA-strength conditional access, policy automation via infrastructure as code, and robust auditing for NHI access. Greater than EMBID is tackling one of the most pressing challenges in modern enterprise greater than security, said Mark Kranich, founding partner at Acru Capital.
Starting point is 00:02:41 The shift to greater than cloud and SaaS and AI has driven an order of magnitude expansion in non-human greater-than identities. With the proliferation of microservices and APIs across diverse greater-than environments, IAM has become the critical first line of defense for protecting greater-than-sensitive data. Legacy access management approaches weren't designed with this greater-than level of scale and automation in mind. We are thrilled to be partnering with greater-than-embit to bring a new approach to the market. Co-founders David Goldschlag and Kevin Sapp have spent their careers innovating across the identity landscape, most recently creating NewEdge Labs, acquired by Netscope, one of the first user-zero-trust products on the market greater than kevin and i founded mbit
Starting point is 00:03:25 with a vision to help enterprises secure access greater than between non-human workloads applications and software resources with the greater than same principles used today to secure human access said david goldschlag greater than co-founder and ceo of mbit talking to hundreds of enterprises and working greater than closely with design partners, our approach centers on proactively securing greater-than access between non-human identities while eliminating friction for developers greater-than and security teams. Greater than, by solving non-human IAM, AEMBID is tackling an essential security greater-than challenge, said Brad Jones, CISO at Snowflake and an AEMBID customer. Not greater-than only is their approach to non-human access innovative, said Brad Jones, CISO at Snowflake and an EMBIT customer.
Starting point is 00:04:08 Not greater than only is their approach to non-human access innovative, but EMBIT is a greater-than provider we can rely on. The EMBIT Workload IAM platform enforces secure access between non-human workloads and the services that authorize access to sensitive data and infrastructure. EMBIT's policy engine grants secretless access, just in time, based on the workload's identity and posture. Leveraging native identities and sophisticated automation, organizations use Aembit to eliminate storage of sensitive secrets within applications or vaults be moving to short-lived access tokens with a no-code-auth approach. With Aembit,
Starting point is 00:04:40 businesses proactively secure non-human access while eliminating the manual and fragmented work required today by security, engineering, and DevSecOps teams. About MBIT to MBIT is the non-human identity and access management platform that secures access between workloads across clouds, SaaS, and data centers. With MBIT's identity control plane, DevSecOps can fully automate secretless, policy-based, and zero-trust workload access with MFA-strength capabilities. For more information, users can visit https://embed.io and follow us on LinkedIn. Contact CMO Aperva Dava EmbedInfo at embed.io.
Starting point is 00:05:21 Tip This story was distributed as a release by Cyberwire under HackerNoon's business blogging program. Learn more about the program here. Thank you for listening to this HackerNoon story, read by Artificial Intelligence. Visit HackerNoon.com to read, write, learn and publish.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.