Privileged access management (PAM) specialist Delinea has acquired cloud security player Authomize with a view to extending Delinea’s protections against identity-based cloud attacks.
Terms of the deal were not disclosed.
Art Gilliland, chief executive at Delinea, said acquiring the Tel Aviv, Israel based vendor would improve customer abilities to detect and mitigate active identity threats across SaaS, cloud and hybrid infrastructures.
“The extension of human and non-human identities beyond the traditional firewall requires continuous visibility,” Gilliland said in the announcement.
Gal Diskin, chief technology officer at Authomize, said: “Together we will greatly expand and enhance privilege security across the enterprise, addressing rising identity threats.”
The companies proffered Osterman Research figures suggesting that 76% of the eight in ten enterprises that use “multiple clouds” lack visibility into access policies and applications, increasing risk exposure to related threats.
Authomize is expected to add capabilities to Delinea cloud infrastructure entitlement management (CIEM) as well as identity threat detection and response in the cloud-native Delinea Platform, defending against account takeovers, insider threats, and lateral movement.
The acquisition of Authomize also establishes a Delinea research and development (R&D) centre in Israel, according to Authomize chief executive Dotan Bar Noy.
Delinea has added some 400 integrations, tools, applications and downloads to its Delinea Platform marketplace since March 2023 – including for security information and event management (SIEM) identity governance, IT service management (ITSM), and disaster response.
“Integration potential with currently owned software is the third most important factor for software buyers, according to Gartner. In a typical enterprise, cybersecurity teams, IT operations, cloud architects, and engineers use an ever expanding number of systems to manage, monitor, and protect,” according to the related Delinea announcement.
“Systems built by different vendors are often disconnected, with data trapped in silos and with processes that would break without manual intervention, leaving them vulnerable to attack.”