About astrix

Non-Human Identity Security. World-Class Team.

We’re on a mission to secure identity’s biggest blindspot

Non-Human Identities (NHIs) are the building blocks of automation and integration. They’re also organizations’ weakest security link – ungoverned, over-permissive, and with non-expiring access to critical systems.

As the pioneers of NHI security, we’ve helped leading enterprises extend IAM and threat detection and response to NHIs since 2021. Our customers can safely leverage GenAI, third-party apps, no-code platforms, and internal integrations without compromising security.

Leadership

Alon Jackson

Co-Founder & CEO

Idan Gour

Co-Founder & CTO

Ofek Amir

VP of RnD

Dana Katz

VP of Marketing

Patrick Murphy

VP of Sales

Yuki Arbel

VP of Product

Shibby Sadot

VP of HR

Marina Epel

VP of Finance

Achiad Alter

VP of BizDev

Supported by the best

and leading cybersecurity industry experts

Astrix meets the highest industry standards

Astrix Security completes another substantial $25M fundraising round

Astrix Security, which uses ML to secure app integrations, raises $25M

Alon Jackson, Astrix CEO & co-founder discusses the promise & problems of third-party app integrations

Astrix is named one of CRN’s Top-10 Hottest Cloud Security Startups of 2024.

Astrix featured as one of the 30 most promising global cyber companies of the 2024 Rising In Cyber.

FEEDBACK

Trusted by industry leaders

Yaron Slutzky

“With the rise in automation and new API-based integrations, Astrix’s ongoing monitoring and threat detection of what is accessing our environments became a key capability in our arsenal.”

Yaron Slutzky CISO, Agoda
Jason Chan, Former CISO, Netflix

“Identity has been the foundation for sharp security teams for years. As architectures continue to move to more interconnected ecosystems consisting of both internal and third party systems, non-human identity is more important than ever. Leading security teams are prioritizing the security of non-human identities to keep the business safe and moving fast.”  

Hannu Visti

“Thanks to Astrix’s behavioral analysis, we get alerts about suspicious connections in real-time and can immediately respond to incidents of stolen or abused tokens.”

Hannu Visti Director of Information Security, Hopper
Devdatta Akhawe

“Figma was built on the browser. As a cloud-native company, we work tirelessly to ensure that all of our software is secure and stable for our global users. Astrix bolsters our security promise by effectively monitoring risk from SaaS integrations.”.

Devdatta Akhawe Head of Security, Figma
Chase Cunningham, Dr. ZeroTrust

By ensuring NHIs are properly managed and protected, businesses can significantly reduce the risk of unauthorized access and potential breaches. Astrix is addressing a key need for any organization that is moving forward on their Zero Trust journey.”

“Astrix helps us significantly reduce response time to NHI risks and quickly get to the root cause of the problem, which is key for mitigation. Feels like I have an extended security team with Astrix.”

Carl Siva, CISO
Chris Hughes, Cyber Innovation Fellow, CISA

“Astrix continues to be an industry pioneer in securing the all too often overlooked Non-Human Identity space. With the complexity of modern environments, SaaS sprawl, and increased focus on compromising credentials by attackers, Astrix offers a much-needed solution to a pressing industry problem”

Yaniv Toledano

“Astrix strengthens our identity security program by providing us with continuous visibility and governance over thousands of non-human identities across the entire organization, from the corporate to the production environments.”

Yaniv Toledano CISO, Pagaya
Gerhard Eschelbeck, Former CISO, Google

“As machine learning and AI continue to evolve, the security of non-human identities becomes ever more essential. Astrix is at the forefront of addressing this rising attack vector, helping organizations close a crucial security gap.”

Moriah Hara, 3x Fortune 500 CISO, Strategic Advisor

“In today’s interconnected world, securing non-human identities is crucial. Astrix’s solution helps organizations maintain the integrity of their automated processes and systems.”

“Astrix helps us to deal with a growing challenge – tracking the lifecycle and the behavior of a token, especially when provided to a third-party. Astrix creates unprecedented visibility and changes the game for us.“

CISO, S&P 500 Company

Heather Hinton, Advisory Board Member, Harvard Cybersecurity Program

“When we all went cloud-native and highly integrated, the identifiers and credentials used to support secure communications and zero trust exploded in number beyond what we saw in the old “on-premise” world. And yes, Astrix Security is absolutely a leader in this space”.

gilad-solomon

“API keys, OAuth tokens, and service accounts are powerful credentials and should be protected as vigorously as user passwords. Astrix has helped us to take control over the app-to-app access layer for the first time.”

Gilad Solomon Head of IT & Information Security, Guesty

“Astrix is more than just a security tool. It is an extension of security throughout the whole company – from Cloud Security to GRC and TPRM”.

Kyle Kurdziolek Director of Cloud Security

“Astrix democratizes security by allowing end users to explain why a tool can access our environment, which is crucial for security teams.”

Branden Wagner CISO
Yaron Slutzky

“With the rise in automation and new API-based integrations, Astrix’s ongoing monitoring and threat detection of what is accessing our environments became a key capability in our arsenal.”

Yaron Slutzky CISO, Agoda
Jason Chan, Former CISO, Netflix

“Identity has been the foundation for sharp security teams for years. As architectures continue to move to more interconnected ecosystems consisting of both internal and third party systems, non-human identity is more important than ever. Leading security teams are prioritizing the security of non-human identities to keep the business safe and moving fast.”  

Hannu Visti

“Thanks to Astrix’s behavioral analysis, we get alerts about suspicious connections in real-time and can immediately respond to incidents of stolen or abused tokens.”

Hannu Visti Director of Information Security, Hopper
Devdatta Akhawe

“Figma was built on the browser. As a cloud-native company, we work tirelessly to ensure that all of our software is secure and stable for our global users. Astrix bolsters our security promise by effectively monitoring risk from SaaS integrations.”.

Devdatta Akhawe Head of Security, Figma
Chase Cunningham, Dr. ZeroTrust

By ensuring NHIs are properly managed and protected, businesses can significantly reduce the risk of unauthorized access and potential breaches. Astrix is addressing a key need for any organization that is moving forward on their Zero Trust journey.”

“Astrix helps us significantly reduce response time to NHI risks and quickly get to the root cause of the problem, which is key for mitigation. Feels like I have an extended security team with Astrix.”

Carl Siva, CISO
Chris Hughes, Cyber Innovation Fellow, CISA

“Astrix continues to be an industry pioneer in securing the all too often overlooked Non-Human Identity space. With the complexity of modern environments, SaaS sprawl, and increased focus on compromising credentials by attackers, Astrix offers a much-needed solution to a pressing industry problem”

Yaniv Toledano

“Astrix strengthens our identity security program by providing us with continuous visibility and governance over thousands of non-human identities across the entire organization, from the corporate to the production environments.”

Yaniv Toledano CISO, Pagaya
Gerhard Eschelbeck, Former CISO, Google

“As machine learning and AI continue to evolve, the security of non-human identities becomes ever more essential. Astrix is at the forefront of addressing this rising attack vector, helping organizations close a crucial security gap.”

Moriah Hara, 3x Fortune 500 CISO, Strategic Advisor

“In today’s interconnected world, securing non-human identities is crucial. Astrix’s solution helps organizations maintain the integrity of their automated processes and systems.”

“Astrix helps us to deal with a growing challenge – tracking the lifecycle and the behavior of a token, especially when provided to a third-party. Astrix creates unprecedented visibility and changes the game for us.“

CISO, S&P 500 Company

Heather Hinton, Advisory Board Member, Harvard Cybersecurity Program

“When we all went cloud-native and highly integrated, the identifiers and credentials used to support secure communications and zero trust exploded in number beyond what we saw in the old “on-premise” world. And yes, Astrix Security is absolutely a leader in this space”.

gilad-solomon

“API keys, OAuth tokens, and service accounts are powerful credentials and should be protected as vigorously as user passwords. Astrix has helped us to take control over the app-to-app access layer for the first time.”

Gilad Solomon Head of IT & Information Security, Guesty

“Astrix is more than just a security tool. It is an extension of security throughout the whole company – from Cloud Security to GRC and TPRM”.

Kyle Kurdziolek Director of Cloud Security

“Astrix democratizes security by allowing end users to explain why a tool can access our environment, which is crucial for security teams.”

Branden Wagner CISO

We’re always looking for amazing humans

Join our journey