Preempt Security
Preempt Security was an Israeli identity security startup that developed a conditional access and identity threat prevention platform, enabling organizations to detect and prevent identity-based attacks including lateral movement, privilege escalation, and credential theft in real time.
Visit WebsiteCompany Overview
Preempt Security built an identity-centric security platform that analyzed user and entity behavior in real time to detect and prevent identity-based attacks—including compromised credentials, lateral movement, privilege escalation, and Active Directory exploitation—before they could cause damage. The platform provided conditional access controls that dynamically adjusted authentication requirements based on risk context, enabling step-up authentication or access blocking when suspicious identity behavior was detected.
Commercially, Preempt competed in the emerging identity threat detection and response (ITDR) market alongside Silverfort, Illusive Networks, and Attivo Networks. Founded in 2014 in Ramat Gan, Israel by Roman Blachman (CTO, former IDF Unit 8200) and Ajit Sancheti (CEO), the company raised $18M from investors including DTCP (Deutsche Telekom Capital Partners), Menlo Ventures, and ClearSky Security. In September 2020, CrowdStrike acquired Preempt Security for approximately $96M, integrating its identity protection capabilities into the Falcon platform.
From a defense and national security perspective, identity-based attacks are the primary vector for advanced persistent threats targeting military and government networks. The ability to detect compromised credentials, prevent lateral movement through Active Directory, and enforce conditional access based on real-time risk assessment directly addresses defense cyber operations requirements.
Dual-Use Assessment
Identity threat detection and conditional access prevention directly addresses military and government network defense against credential-based attacks, lateral movement, and Active Directory exploitation—the primary vectors for nation-state adversaries.
Key Technologies
- Real-time identity threat detection and prevention
- Conditional access based on dynamic risk assessment
- Active Directory security and attack path analysis
- Lateral movement and privilege escalation detection
- Step-up authentication and adaptive access controls
- User and entity behavior analytics (UEBA) for identity
Use Cases & Applications
- Enterprise identity threat detection and real-time prevention
- Active Directory security monitoring and attack path elimination
- Conditional access enforcement based on risk context
- Compromised credential detection and lateral movement blocking
- Military/government network identity-based threat prevention (dual-use)
- Defense Active Directory protection against nation-state attacks (dual-use)
Strategic Value to U.S.-Israel Alliance
Identity-based attacks are the dominant vector for advanced threats against defense networks. Real-time identity threat detection and conditional access directly address critical defense cybersecurity gaps.
Interested in this startup?
Learn more about our investment approach or get in touch to discuss opportunities in dual-use technology.