Authomize
Authomize was an Israeli identity security startup that developed a cloud identity threat detection and response (ITDR) platform, providing visibility into identity attack surfaces, detecting identity-based threats, and enabling automated remediation across multi-cloud and SaaS environments.
Visit WebsiteCompany Overview
Authomize built a Cloud Identity Threat Detection and Response platform that discovered, monitored, and secured identity relationships across multi-cloud and SaaS environments. The platform mapped identity-to-resource relationships, detected excessive privileges, identified identity-based threats (credential misuse, lateral movement, privilege escalation), and enabled automated remediation—providing security teams with granular visibility into the identity attack surface.
Commercially, Authomize competed in the emerging ITDR and identity security posture management (ISPM) market alongside CrowdStrike, Microsoft, Silverfort, and Oort. Founded in 2020 in Tel Aviv by Dotan Bar Noy (CEO, ex-Israeli Air Force, ex-Symantec) and Gal Diskin (CTO, ex-Intel, ex-Cyvera), the company raised $20M from Innovation Endeavors, M12 (Microsoft's venture fund), and Entrée Capital. In 2023, Delinea acquired Authomize, integrating its ITDR capabilities into Delinea's privileged access management platform.
From a defense and national security perspective, identity threat detection is critical for military and government networks where adversaries frequently use compromised credentials and privilege escalation as primary attack vectors. The ability to detect identity-based threats across complex multi-cloud environments maps directly to defense requirements for zero-trust architectures and insider threat programs. The founders' military and intelligence backgrounds reinforce the dual-use DNA.
Dual-Use Assessment
Identity threat detection and response directly applies to military zero-trust architectures, insider threat detection, and defense network identity security. Detecting credential compromise, privilege escalation, and lateral movement are core defense cybersecurity requirements.
Key Technologies
- Cloud identity threat detection and response (ITDR)
- Identity-to-resource relationship mapping and visualization
- Excessive privilege detection and access right optimization
- Identity-based threat detection (credential misuse, lateral movement)
- Automated identity security remediation workflows
- Multi-cloud and SaaS identity posture management
Use Cases & Applications
- Multi-cloud identity attack surface visibility and monitoring
- Identity-based threat detection: credential misuse and privilege escalation
- Excessive access and standing privilege identification and remediation
- SaaS and cloud identity security posture management
- Military/government zero-trust identity security enforcement (dual-use)
- Defense network insider threat detection via identity behavior analysis (dual-use)
Strategic Value to U.S.-Israel Alliance
Identity-based attacks are the primary vector for adversary operations against military and government networks. ITDR capabilities are foundational for zero-trust architectures mandated across defense organizations.
Interested in this startup?
Learn more about our investment approach or get in touch to discuss opportunities in dual-use technology.