Permiso Security has been named a finalist for Best Threat Detection Technology in the 2026 SC Awards. This is the second consecutive year Permiso has been recognized in this category, and follows the company's win for Most Promising Early-Stage Startup at the 2025 SC Awards. Winners will be announced on March 24 during RSAC 2026 in San Francisco.
The Best Threat Detection Technology category recognizes solutions that deliver detection and remediation capabilities across the full attack surface. This year's finalists alongside Permiso include CrowdStrike, ExtraHop, Gurucul, and Oligo Security.
The threat landscape has shifted. The most damaging breaches over the past two years have not started with malware or network exploitation. They have started with stolen credentials, compromised service accounts, and hijacked identity sessions. Groups like LUCR-3 (Scattered Spider) demonstrated that controlling an identity means controlling the environment. Traditional threat detection built around endpoints and network traffic catches these attacks late, if it catches them at all.
Permiso was built on a different premise: identity is the primary detection surface. The platform does not retrofit identity context onto endpoint or network telemetry. Every detection starts with an identity, what it is, what it can access, what it is doing, and whether that behavior is consistent with its established baseline. This applies equally to human users, service accounts, API keys, OAuth tokens, IAM roles, and AI agents.
Covering all three identity types in a single detection model matters because attackers do not stay in one lane. A breach that starts with a compromised human credential pivots to a service account for persistence, then leverages an AI agent's execution role for lateral movement or data access. If your detection only covers human identities, the attacker disappears from view the moment they pivot. Permiso traces these cross-identity attack paths in a single model, so the detection follows the attacker rather than losing the thread at each boundary.
Permiso's threat detection capabilities are built on two foundations: the Universal Identity Graph and the P0 Labs threat research operation. The Universal Identity Graph unifies every identity type across cloud, SaaS, CI/CD, and on-premise environments into a single model. It maps not just who each identity is, but how identities connect to each other, what permissions they hold, and what they are doing at runtime. This is the visibility layer that makes real threat detection possible.
P0 Labs, Permiso's in-house threat research team composed of former FireEye and Mandiant responders, contributes over 1,500 detection signals tied to real-world adversary tactics. These signals are built from direct breach response experience and are continuously updated as attack patterns evolve. The team has also released 13 open-source security tools to date, contributing research and detection capabilities back to the broader security community. The combination of unified identity visibility and threat-informed detection is what allows Permiso to surface attacks that SIEMs, CSPMs, and identity providers miss natively.
Over the past year, Permiso has expanded the platform significantly. The company now detects and protects AI agent identities with the same depth as human and non-human identities, covering identity misconfigurations, overprivileged execution roles, missing audit controls, and agent-to-agent communication gaps. Identity security posture management capabilities now work alongside runtime detection to give security teams both proactive exposure reduction and real-time threat response in a single platform.
Permiso's platform is trusted by Fortune 500 enterprises and organizations operating some of the largest cloud environments globally. Customers consistently point to the platform's ability to deliver visibility and detection that their existing security stack does not provide, cutting through alert noise from tools that were not built for identity-first detection.
That customer validation, combined with the platform's technical depth, is what earned the SC Awards recognition. The judging panel, composed of CISOs and cybersecurity practitioners, evaluates solutions on real-world impact. Being recognized alongside some of the largest names in cybersecurity reflects how critical identity-based threat detection has become for the enterprise.
Winners will be announced at RSAC 2026 on March 24 in San Francisco. If you are attending RSAC and want to see the platform in action, reach out to schedule a meeting.
To learn more about Permiso, visit permiso.io. To see the full list of 2026 SC Awards finalists, visit scworld.com/news/2026-trust-awards-finalists-announced-ahead-of-rsa-conference