The Identity Threat Detection and Response (ITDR) Solution Guide

GET THE GUIDE
Illustration Cloud

Permiso Named SC Awards Finalist In Two Categories

The identity security company has been named a finalist for both Most Promising Early Stage Startup and Best Threat Detection Technology categories 

PALO ALTO, CA – Aug 30, 2024 Permiso, the leader in identity security, has been named a finalist for the SC awards in two separate categories – most promising early-stage startup and best threat detection technology. The identity security startup has experienced exponential growth over the last twelve months, closing a $18.5M Series A earlier this year.   

”It’s an honor to be named a finalist in any category of the SC Awards, let alone in multiple categories,” said Paul Nguyen, co-founder and co-CEO of Permiso. “For the last 18 months we have been at the front lines of helping defenders detect identity-based attacks being orchestrated against their environments. To be recognized by the Cyber Risk Alliance and SC Media is a testament to how we’re helping organizations better secure all their identities across their environments.”   

Permiso, whose team is composed of several former FireEye/Mandiant executives, has detected and responded to hundreds of breaches collectively. By living in the breach, the team has front line knowledge of threat actors TTPs, and are able to understand where controls fail for security organizations. This experience has created more than 1,200 unique detections and more than 500 alert rules in their platform. 

“The finalists for the 2024 SC Awards truly represent the forefront of cybersecurity innovation and leadership,” said Tom Spring, Editorial Director at SC Media. “These solutions, organizations, and professionals have demonstrated outstanding capabilities in addressing today’s complex and ever-changing threat landscape. We are proud to recognize their contributions to the cybersecurity community.”  

Earlier this year, Permiso raised an $18.5M Series A led by Altimeter after successfully detecting identity-based attacks that bypassed existing security solutions. In the wake of Scattered Spider last year, the startup closed multiple six and seven figure license deals with Fortune 500 customers, including some of the strip’s largest luxury resorts and casinos. In 2022, Permiso was named as one of the SINET16 Innovators. This prestigious award recognizes the 16 most innovative and compelling cybersecurity companies from around the world.  
 
Many existing security posture management and threat detection solutions alert based on atomic events - specific actions performed in environment that could potentially be suspicious or malicious. These may include activities such as resetting MFA, logging in from a different geographic location, or database snapshotting. Because each of these events often generate alerts in an environment, many security teams drown in alerts that have no context of the activity that is actually taking place in their environment. 
 

ABOUT PERMISO 

Permiso’s unified identity security solution bridges the gap between siloed cloud security tools by securing human and non-human identities across the IdP, IaaS, PaaS and SaaS layers. We enable security organizations to harden their identity security posture and detect and respond to malicious activity, which can include account takeover, credential compromise and insider threat aiming to compromise sensitive data. 

Illustration Cloud

Related Articles

Permiso Launches Cloud Console Cartographer to Help Security Teams Make Sense of Console Activity in Cloud Logs

The open-source tool helps security teams easily transcribe log activity generated from events of AWS console sessions

Permiso Raises $18.5M Series A To Unify Threat Detection and Response In The Cloud

Permiso’s product offers a deep library of detection signals from known TTPs of modern threat actors and spans coverage across the cloud’s attack surface to detect threats in the cloud more quickly than ever

Permiso Launches CloudGrappler To Help Security Teams Better Detect Threat Actors In Their Cloud Environments

Free open source tool detects activity in cloud environments related to well-known threat actors such as LUCR-3 (Scattered Spider), the group responsible for MGM and Caesars breaches last September

View more posts