Still buzzing from our Security Leadership Dinner in Santa Clara last week! At Opal, we know that security is ultimately about people—protecting individuals and the teams that drive innovation forward. A huge thank you to everyone who joined us and made it a night of great conversations and connections. Next up: We’re bringing cybersecurity leaders together for an exclusive dinner in New York on March 6th. Want to join us? RSVP with the link in comments!
Opal Security
Computer and Network Security
New York, NY 5,013 followers
Secure every identity and access path 🔒
About us
Opal is a modern, data-centric identity security platform. Our platform offers consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS. Opal is backed by Greylock, Battery Ventures, and some of the top security experts around the world, including Silicon Valley CISO Investments (SVCI).
- Website
-
https://opal.dev
External link for Opal Security
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- New York, NY
- Type
- Privately Held
- Founded
- 2020
- Specialties
- Identity Security, Identity Governance, Just-in-time Access, User Access Reviews, Privileged Access Management, Time-based Access, Identity and Access Management, and Threat Detection and Reduction
Products
Opal Security
Identity & Access Management (IAM) Software
Opal is the unified identity platform for modern enterprises. Opal aggregates identity and access data to provide visibility and defense-in-depth infrastructure for mission-critical systems. With the product, enterprises can discover anomalous identity risks and remediate them in minutes. The world's best companies trust Opal to govern and adapt sensitive access.
Locations
-
Primary
41 E 11th St
New York, NY 10003, US
-
77 Geary St
San Francisco, California 94108, US
Employees at Opal Security
-
Dharmesh Thakker
General Partner at Battery Ventures - Supporting Cloud, DevOps, AI and Security Entrepreneurs
-
Abbas Haider Ali
VP @ GitHub ($2B+ ARR) leading post-sales incl. Customer Success, Professional Services, Support, Renewals, Strategy, and CS Engineering orgs |…
-
Dave Wilner
Board Member, Go-to-Market Advisor
-
Andrew Peterson
Updates
-
We're taking things 🌊 coast to coast 🌊 ! After an incredible time kicking off the Official Cybersecurity Summit - Silicon Valley, we’re heading east to the 15th Edition of the New York Cybersecurity Summit on Thursday, March 6. Want to join us? Use code CSS25-Opal for free admission! We're also hosting a cybersecurity leaders dinner at The Capital Grille after the conference. RSVP link in the comments! See you in NYC! 🗽🔐 #CyberSecurity #IdentitySecurity #ZeroTrust #OpalSecurity
-
-
-
-
-
+1
-
-
Opal Security reposted this
Last Wednesday, I had the opportunity to speak at Cybersecurity Summit in San Jose. It’s well covered territory that identity is a massive threat vector (and is only about to get worse with the rise of agents everywhere)—but why, as an industry, do we remain unprepared and unequipped with the right abstractions? Breaches tell a repetitive story: Access was compromised, exposing customer and internal data. The forensics reveal familiar patterns—anomalous activity, irregular access, and a kill switch hit only after the damage was done. We understand that we need better systems and paradigms for real-time authorization. The only feasible path that emerges in our complex environments is enforcing least-privilege and dynamic policies before attackers strike. Others may think this approach is broken and impossible, but that’s why they’re building the same inadequate old-school IGA tools in a modern language— as if that will somehow mitigate these issues. And of course it's a hard problem! That's why it's unsolved, and why it's such a huge opportunity to change the industry. Identity security isn’t just about authentication; it’s also everything that comes after that, including authorization. We’ve spent decades perfecting the login—MFA, passkeys, biometrics. Breaches are happening after authentication, through overprovisioned access and unchecked privileges. But we need identity primitives that work across cloud, SaaS, and hybrid environments, and multiple identity data pipelines—powered by engineering, not just workflow glue. Groups and JIT were a leap of innovation, but we haven't made progress beyond that technically, and we are already off to patenting new frameworks and funny marketing terms. We need a platform that can handle discovery, realtime change management, and governance, verification and creation of dynamic policies, static analysis, detection, and native deployment, that can sit on top of whatever rat’s nest of identity data that already exists in an organization. We know how to build these types of systems in data security, so why not in identity? Identity security is organizational reputation. Make engineering and security a first class citizen in your IGA tools, and focus on building for scale and complexity. It’s not going to get any better reinventing the same wheel.
Reporting Live from the Official Cybersecurity Summit in Silicon Valley! If you’re at the summit, stop by our booth to chat about how Opal Security is redefining identity security to mitigate risks, streamline access, and future-proof your enterprise. See you there! 👋 #CyberSecurity #IdentitySecurity #ZeroTrust #AccessManagement
-
-
🎉 Time to celebrate! Our founder, UK, has been named a winner in the 2025 Tech Innovation CUBEd Awards! A huge thank you to SiliconANGLE & theCUBE for this recognition of our founder and team’s dedication to innovation. Congratulations to all the nominees across categories! Check out the full winners list here https://lnkd.in/gp9cB5Y9 .
-
-
We’re excited to have Eula join as our new Head of Finance and Business Operations! Her expertise will drive operational excellence as we continue building the future of identity security and scale Opal. Welcome to the team, Eula! We’re lucky to have you on board. 🚀 #OpalSecurity #Finance #Operations #Welcome
-
-
Big welcome to Alex Pien! 🚀 Alex joins us from Meta with deep technical expertise and a strong track record. As we continue to scale, his contributions will be key in driving innovation and strengthening our platform. We’re looking forward to seeing what you build, Alex—welcome to the team! 🔐 #OpalSecurity #Engineering #IdentitySecurity
-
-
Reporting Live from the Official Cybersecurity Summit in Silicon Valley! If you’re at the summit, stop by our booth to chat about how Opal Security is redefining identity security to mitigate risks, streamline access, and future-proof your enterprise. See you there! 👋 #CyberSecurity #IdentitySecurity #ZeroTrust #AccessManagement
-
-
New today: Our *second* case study with Blend highlights how we helped streamline access management and boost compliance for this global financial services and digital lending platform. Check out the full case study to learn how Opal Security: 🌟Empowered Blend to shore up its identity security by automating access decisions with transparent deterministic logic 🌟Accelerated Blend’s user access review process, boosting compliance in the process 🌟Helped Blend build on its culture of radical candor and collaboration Read more about how we’re setting a new standard in identity security (link in comments):
-
-
Managing identity data across multiple systems just got easier. 🚀 We’re excited to launch Multi-Attribute Sources, now available in on Opal! With this new feature, customers can now: ✅ Ingest identities and attributes from multiple sources (e.g., Okta, Azure, Google, Workday) ✅ Combine user metadata across IDPs and HR systems ✅ Set source priority on a per-attribute basis for a customized, complete user profile If your organization juggles multiple IDPs or HR systems, Opal now gives you centralized control and flexibility like never before. Want to see it in action? Reach out to our team to learn more 👉 https://lnkd.in/gyjwyiyK #IdentityManagement #LeastPrivilege #OpalSecurity
-
-
Trusted AI assistant Grammarly has been scaling rapidly—now helping over 40 million people and 50,000 organizations do their best work. With security as a top priority, Grammarly searched for an access management solution that could scale alongside it, helping the company maintain a robust security posture while also boosting productivity. Enter Opal Security. We helped Grammarly: ✅ Eliminate standing access and adopt Just-In-Time (JIT) provisioning ✅ Empower teams to quickly and easily manage access through self-service options ✅ Accelerate user access requests, cutting down response time from hours to mere minutes Our work with Grammarly exemplifies the value of a trusted security partner who can provide the tools and expertise necessary to meet—and exceed—evolving security requirements while ensuring a seamless end user experience. ✨ Read more in our new case study (link in comments)!
-