Permiso Security’s cover photo
Permiso Security

Permiso Security

Computer and Network Security

Palo Alto, CA 7,027 followers

The Identity Security Platform

About us

Permiso Security provides comprehensive identity protection and detection for human and non-human identity threats at all stages of the identity lifecycle, across all environments. The company is backed by Altimeter Capital, Point72, Foundation Capital, Work-Bench, 11.2 Capital and Rain Capital.

Website
http://permiso.io
Industry
Computer and Network Security
Company size
51-200 employees
Headquarters
Palo Alto, CA
Type
Privately Held
Founded
2020
Specialties
Identity Threat Detection & Response, Cloud Detection & Response, Incident Response, Identity Attack Surface Management, Cyber Risk Visibility & Monitoring, Non-Human Identity Security, Account Takeover Protection, Insider Threat, Credential Compromise, Threat Hunting, Security Operations, and Identity Security Posture Management

Locations

Employees at Permiso Security

Updates

  • Identity risks often hide in plain sight. From zombie accounts to toxic permissions, small gaps can quickly turn into big exposures. We’ve put together a quick ISPM (Identity Security Posture Management) cheat sheet to help teams spot and fix the most common identity misconfigurations. What you’ll find inside: - Key misconfigurations and their real impact - A 90-day roadmap to strengthen identity posture - Quick wins mapped to SOC2, ISO 27001, and NIST A simple guide to start cleaning up your identity surface. Download the ISPM Cheatsheet: https://hubs.la/Q03VXhnc0

    • No alternative text description for this image
  • Permiso Security reposted this

    Scattered Spider has forced a fundamental rethink of which security tools actually matter. Across LUCR-3 investigations, one pattern is consistently observed: the tools that help most are those that strengthen identity visibility, reduce misconfigurations, and validate human interactions. Organizations must use new identity visibility intelligence platforms and identity threat detection and response technologies to enhance security outcomes. Our analysis highlights several markets now central to defending against this threat: ✔️ Identity-focused technologies are becoming foundational ▪️ Identity Visibility and Intelligence Platforms ▪️ Identity Threat Detection and Response ▪️ Automated Identity Verification ✔️ SaaS and cloud posture tools are essential for reducing exposure ▪️ Continuous Threat and Exposure Management ▪️ SaaS Security Posture Management ✔️ Human verification capabilities are expanding quickly ▪️ Passkeys for phishing-resistant authentication ▪️ Automated Impersonation and Deepfake Detection Together, these markets reflect how defence is shifting toward identity-centric visibility combined with posture management and verification controls across cloud and SaaS ecosystems. To ground this landscape in real-world capabilities, the report also includes solution profiles from Silverfort, Permiso Security and CrowdStrike. our full analysis here: https://lnkd.in/gYK6NFd5 We hope the attack analysis in this report provides practical value. If you find this style of research helpful, we welcome your feedback! #CyberSecurity #IdentitySecurity #CISO #ThreatDetection #ScatteredSpider #SecurityStrategy

    • Markets addressing scattered spider attack diagram
  • Identity sprawl isn’t slowing down. It is accelerating. The challenge ahead isn’t only securing known identities. It is discovering the ones that were never tracked, never inventoried, and never monitored. In his latest piece with ITSecurity Wire, Paul Nguyen explores why security teams are losing visibility across identity types and what needs to change before the problem becomes systemic. Read it here: https://lnkd.in/dDSgu5gm

  • We're honored to be included alongside Silverfort and CrowdStrike in Software Analyst Cyber Research's recent report, "Defending the Modern Identity Stack: Scattered Spider and the New Era of Identity Warfare." We appreciate the great work of Lawrence Pingree, Francis Odum and team! "Permiso aggregates telemetry from cloud, SaaS, and identity systems to correlate events tied to an identity into high-fidelity multi-plane alerts. These alerts provide a holistic view of an attack timeline across different environments, identity types, and behaviors; which is necessary to stop groups like Scattered Spider from rapidly jumping around an environment."

    View organization page for Software Analyst Cyber Research

    6,930 followers

    Identity has become the defining entry point for modern cyber intrusions, and attackers know it. In our latest report, 𝗗𝗲𝗳𝗲𝗻𝗱𝗶𝗻𝗴 𝘁𝗵𝗲 𝗠𝗼𝗱𝗲𝗿𝗻 𝗜𝗱𝗲𝗻𝘁𝗶𝘁𝘆 𝗦𝘁𝗮𝗰𝗸: 𝗦𝗰𝗮𝘁𝘁𝗲𝗿𝗲𝗱 𝗦𝗽𝗶𝗱𝗲𝗿 𝗮𝗻𝗱 𝘁𝗵𝗲 𝗡𝗲𝘄 𝗘𝗿𝗮 𝗼𝗳 𝗜𝗱𝗲𝗻𝘁𝗶𝘁𝘆 𝗪𝗮𝗿𝗳𝗮𝗿𝗲, authored by our very own Lawrence Pingree, analyzes how groups like Scattered Spider exploit identity pathways across SaaS, cloud, and on-premises environments at high velocity. These actors don’t rely on zero days. They rely on human-validated access, misconfigurations, and gaps in identity workflows. Once inside, they pivot across multi-cloud environments and overwhelm traditional defences within hours. This report outlines: 1️⃣ How identity, SaaS, and cloud interlock to form today’s dominant attack surface 2️⃣ The step-by-step methods Scattered Spider uses to gain and expand access 3️⃣ Where legacy defences break down against identity-centric intrusion patterns 4️⃣ The key priorities CISOs must strengthen, from visibility and posture to behavioural detection To ground the research in real capabilities, we highlight examples from CrowdStrike, Silverfort, and Permiso Security, each illustrating different advancements in identity threat detection, posture management, automated verification, and graph-driven analytics. If you’re accountable for identity risk and preparing for emerging intrusion methods, this analysis clarifies what’s changing and what must change next. 👉 Read our full report here: https://lnkd.in/eupADZ93 #IdentitySecurity #ThreatDetection #ScatteredSpider #SecurityStrategy

    • Image representing how ITDR solutions solve the scattered spider attack
  • The Gainsight → Salesforce incident is another example of how OAuth connectors and non-human identities have become high-value entry points for attackers. When vendors release limited technical detail early on, defenders need to rely on baseline identity behavior to spot misuse fast. Our P0 Labs team analyzed activity across customer environments and identified what “normal” Gainsight connector behavior looks like - AWS-based IP patterns, consistent event types, and a narrow API footprint. Any deviation from that baseline is a signal worth investigating. Ian Ahl breaks down these patterns, the atomics to watch, and how this aligns with tactics seen in prior SaaS-to-Salesforce compromises. 👉 Watch Ian's rapid technical analysis: https://hubs.la/Q03VqZQx0

  • Permiso Security reposted this

    View profile for Lawrence Pingree

    Data Security and AI Research Leader

    Identity has become the primary control plane of enterprise security, and attackers know it. Over the past few months, my research has consistently pointed to the same conclusion:We’re no longer dealing with endpoint or network-centric intrusion patterns. We’re dealing with identity warfare. We released my latest report at Software Analyst Cyber Research: Defending the Modern Identity Stack: Scattered Spider and the Rise of Identity Warfare. Groups like Scattered Spider continue to demonstrate that adversaries don’t need zero-days or advanced malware when identity pathways are poorly governed. Misconfigurations in SaaS, overly permissive cloud roles, weak help desk workflows, and fragmented visibility are now the fastest route to compromise. In this research, I map out: Why identity, SaaS, and cloud have become the dominant attack surface. How Scattered Spider weaponizes identity gaps with operational speed, social engineering precision, and multi-layer access chaining. The architectural priorities CISOs must adopt to defend the identity stack as an interconnected system, not a collection of siloed controls. To ground the analysis, I also include representative case studies from CrowdStrike, Silverfort, and Permiso Security. These examples illustrate how leading and emerging vendors are approaching identity visibility, posture hardening, and threat detection across complex, hybrid environments. If you are responsible for modern security architecture, this research provides a clear view of how identity-centric attack patterns are evolving, and what must change to stay ahead of them. Read the full report: https://lnkd.in/g46z_4uq

  • Identity is now the primary battleground, and SACR’s latest research breaks down why. The new Scattered Spider report from Francis Odum and team gives a clear view of how modern intrusions unfold: -Social engineering becomes the entry point -Identity systems fail first -Attackers pivot across cloud and SaaS faster than defenders can react Permiso was highlighted for our work in providing complete identity visibility, detecting behavioral anomalies, and surfacing identity-driven threats that traditional tools miss. If you're tracking identity-based intrusions or building your 2026 identity strategy, this analysis is worth your time. Read the report here: https://lnkd.in/eupADZ93

Similar pages

Browse jobs

Funding