Modern distributed systems have more complexity, components and data than ever before. Too many companies rely on inefficient and insecure middleware to connect their growing number of applications and microservices. Legacy solutions are falling…Read More
The modern enterprise runs on cloud infrastructure. That’s largely why we’ve seen hundreds of millions of investment dollars pour into the cloud security market over the past twelve months. Despite all this investment, organizations still struggle to manage the #1 risk to their cloud infrastructure—identities. By 2023, Gartner expects mismanaged identities and entitlements to be the cause of 75% of cloud security failures, up from 50% in 2020. That’s a staggering statistic.
Enter Ermetic, which helps Security and DevOps teams manage cloud security and compliance at a time when nearly every organization is struggling to secure its cloud environment.
By combining cloud infrastructure entitlement management (CIEM) and cloud security posture management (CSPM) in a single solution, Ermetic empowers organizations to expertly manage access permissions, shift left on least privilege, and ensure cloud compliance more quickly and effectively than before.
In the crowded and well-funded cloud security market, execution is key. Co-founders Shai Morag, Arick Goomanovsky, Michael Dolinsky, and Sivan Krisgman are all repeat entrepreneurs with deep roots in cybersecurity. Since launching the company in 2019, the quartet has demonstrated an impressive ability to attract talent, generate pipeline, and land dozens of enterprise customers across multiple industries. To sustain this growth, Ermetic is actively hiring across offices in Tel Aviv, Palo Alto, and Boston.
Forgepoint is pleased to announce our investment in Ermetic’s Series B, alongside Qumra, Accel, Glilot, Norwest, and Target Global! We look forward to partnering with the team in this next chapter of growth.
You may also enjoy:
Kathryn Shih is an Entrepreneur in Residence at Forgepoint. Learn more about her background here. Kathryn, your background is unique. You started your career as a software engineer, pivoted to product management, and are now an expert in generative…Read More
Issue: Cybercriminals increasingly target and compromise identities, but detection and response capabilities are behind the curve. Imagine: a cybercriminal installs a browser infostealer on a company engineer’s laptop to access 2FA-backed…Read More