How Astrix Will Use Series B Funding to Transform Identity Security

Idan Gour December 16, 2024

Following our recent B funding, I couldn’t be more excited about what’s ahead. With the AI era transforming how organizations operate, we’re standing at a critical juncture where the definition of identity security is expanding dramatically

Our customers have always been our driving force – their security needs, challenges, and business priorities shape everything we do. We’ve been laser-focused on helping our customers secure their biggest identity blindspot – NHIs. Until Astrix, no vendor had ever tackled this problem head-on, even though non-human identities have been outnumbering them by a factor of 50 due to advancements in cloud and API technologies. 

High-profile cyberattacks such as those reported by Microsoft, Okta, Cloudflare, AWS, and many others, have repeatedly highlighted how attackers exploit NHIs, bringing them into sharp focus, elevating the importance of the NHI Security market from a niche concern to a priority in enterprises’ identity security strategies.

Earlier this week, during the opening keynote at Gartner’s Annual IAM Summit,  “Machine IAM” was highlighted as a no. 1 Trend in enterprise identity strategies. Not surprisingly, our recent research with CSA reveals that 1 in 4 organizations is already investing in these capabilities, and an additional 60% plan to do so within the next twelve months.

Top identity security trends presented in the 2024 Gartner IAM Summit.

Agentic AI expands the definition of Identity Security 

Our No. 1 goal remains clear: enabling our customers to adopt AI technologies, automation, and connectivity without compromising security. 

Gartner predicts that by 2028, 33% of enterprise software applications will include agentic AI. As organizations increasingly rely on these virtual “employees,” there’s a shift in the workforce, where AI Agents automate human workflows. This evolution is driving the proliferation of NHIs across corporate and production environments. 

While this evolution makes our mission more critical and complex than ever, it also presents an unprecedented opportunity for Astrix to ensure that NHI security evolves to address tomorrow’s challenges, particularly AI Agents and their impact on the NHI threat landscape.  

Comprehensive Identity Security for all identities 

Since our inception, we’ve been building multi-layer security capabilities for Non-human Identities, from discovery and posture management to anomaly detection, secret scanning, and lifecycle management

We’ve always taken a threat-driven approach, which comes from a belief that the key to properly securing NHIs lies not just in secret lifecycle management but in deeply understanding the behavior of these identities

However, the behavior of NHIs cannot be observed in a vacuum. Recognizing the overarching identity threat landscape, we understand that NHIs and human identities are connected. With that, Astrix is planning to expand its capabilities to monitor human identities alongside NHIs and AI Agents to properly address the NHI security gap

Combining insights from human and non-human behaviors across IaaS, SaaS, PaaS, and on-prem environments will provide customers with a deeper security context, which translates to better risk prioritization and resource allocation.  

Moving beyond observability

From early on, when my co-founder and I were still working from the Tel-Avivian apartment (the Israeli garage), we believed that solving the NHI challenge doesn’t stop with observability and workflows. After 3 years of helping F500 companies mature their NHI Security, it’s time to take a step forward on this belief. 

We are aiming to increase our investment in providing customers with capabilities that will extend their identity infrastructure to strengthen their security across environments – all in favor of supporting and enabling their business to bring new innovative technologies without the security risks.  

Let’s build the future of Identity Security together. Stay tuned! 🚀

Learn more

Introducing the OWASP NHI Top 10: Standardizing Non-Human Identity Security

Introducing the OWASP NHI Top 10: Standardizing Non-Human Identity Security

Securing NHIs in Jira and Confluence

Securing NHIs in Jira and Confluence

Securing NHIs in NetSuite

Securing NHIs in NetSuite