Opal Security

Opal Security

Computer and Network Security

New York, NY 5,013 followers

Secure every identity and access path 🔒

About us

Opal is a modern, data-centric identity security platform. Our platform offers consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS. Opal is backed by Greylock, Battery Ventures, and some of the top security experts around the world, including Silicon Valley CISO Investments (SVCI).

Website
https://opal.dev
Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
New York, NY
Type
Privately Held
Founded
2020
Specialties
Identity Security, Identity Governance, Just-in-time Access, User Access Reviews, Privileged Access Management, Time-based Access, Identity and Access Management, and Threat Detection and Reduction

Products

Locations

Employees at Opal Security

Updates

  • Still buzzing from our Security Leadership Dinner in Santa Clara last week! At Opal, we know that security is ultimately about people—protecting individuals and the teams that drive innovation forward. A huge thank you to everyone who joined us and made it a night of great conversations and connections. Next up: We’re bringing cybersecurity leaders together for an exclusive dinner in New York on March 6th. Want to join us? RSVP with the link in comments!

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
  • We're taking things 🌊 coast to coast 🌊 ! After an incredible time kicking off the Official Cybersecurity Summit - Silicon Valley, we’re heading east to the 15th Edition of the New York Cybersecurity Summit on Thursday, March 6. Want to join us? Use code CSS25-Opal for free admission! We're also hosting a cybersecurity leaders dinner at The Capital Grille after the conference. RSVP link in the comments! See you in NYC! 🗽🔐 #CyberSecurity #IdentitySecurity #ZeroTrust #OpalSecurity

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
      +1
  • Opal Security reposted this

    Last Wednesday, I had the opportunity to speak at Cybersecurity Summit in San Jose. It’s well covered territory that identity is a massive threat vector (and is only about to get worse with the rise of agents everywhere)—but why, as an industry, do we remain unprepared and unequipped with the right abstractions? Breaches tell a repetitive story: Access was compromised, exposing customer and internal data. The forensics reveal familiar patterns—anomalous activity, irregular access, and a kill switch hit only after the damage was done. We understand that we need better systems and paradigms for real-time authorization. The only feasible path that emerges in our complex environments is enforcing least-privilege and dynamic policies before attackers strike. Others may think this approach is broken and impossible, but that’s why they’re building the same inadequate old-school IGA tools in a modern language— as if that will somehow mitigate these issues. And of course it's a hard problem! That's why it's unsolved, and why it's such a huge opportunity to change the industry. Identity security isn’t just about authentication; it’s also everything that comes after that, including authorization. We’ve spent decades perfecting the login—MFA, passkeys, biometrics. Breaches are happening after authentication, through overprovisioned access and unchecked privileges. But we need identity primitives that work across cloud, SaaS, and hybrid environments, and multiple identity data pipelines—powered by engineering, not just workflow glue. Groups and JIT were a leap of innovation, but we haven't made progress beyond that technically, and we are already off to patenting new frameworks and funny marketing terms. We need a platform that can handle discovery, realtime change management, and governance, verification and creation of dynamic policies, static analysis, detection, and native deployment, that can sit on top of whatever rat’s nest of identity data that already exists in an organization. We know how to build these types of systems in data security, so why not in identity? Identity security is organizational reputation. Make engineering and security a first class citizen in your IGA tools, and focus on building for scale and complexity. It’s not going to get any better reinventing the same wheel.

  • New today: Our *second* case study with Blend highlights how we helped streamline access management and boost compliance for this global financial services and digital lending platform. Check out the full case study to learn how Opal Security:  🌟Empowered Blend to shore up its identity security by automating access decisions with transparent deterministic logic 🌟Accelerated Blend’s user access review process, boosting compliance in the process 🌟Helped Blend build on its culture of radical candor and collaboration Read more about how we’re setting a new standard in identity security (link in comments): 

    • No alternative text description for this image
  • Managing identity data across multiple systems just got easier. 🚀 We’re excited to launch Multi-Attribute Sources, now available in on Opal! With this new feature, customers can now: ✅ Ingest identities and attributes from multiple sources (e.g., Okta, Azure, Google, Workday) ✅ Combine user metadata across IDPs and HR systems ✅ Set source priority on a per-attribute basis for a customized, complete user profile If your organization juggles multiple IDPs or HR systems, Opal now gives you centralized control and flexibility like never before. Want to see it in action? Reach out to our team to learn more 👉 https://lnkd.in/gyjwyiyK #IdentityManagement #LeastPrivilege #OpalSecurity

    • No alternative text description for this image
  • View organization page for Opal Security, graphic

    5,013 followers

    Trusted AI assistant Grammarly has been scaling rapidly—now helping over 40 million people and 50,000 organizations do their best work. With security as a top priority, Grammarly searched for an access management solution that could scale alongside it, helping the company maintain a robust security posture while also boosting productivity. Enter Opal Security. We helped Grammarly: ✅ Eliminate standing access and adopt Just-In-Time (JIT) provisioning ✅ Empower teams to quickly and easily manage access through self-service options ✅ Accelerate user access requests, cutting down response time from hours to mere minutes Our work with Grammarly exemplifies the value of a trusted security partner who can provide the tools and expertise necessary to meet—and exceed—evolving security requirements while ensuring a seamless end user experience. ✨ Read more in our new case study (link in comments)!

    • No alternative text description for this image

Similar pages

Browse jobs

Funding