Natoma的封面图片
Natoma

Natoma

计算机和网络安全

Non-Human Identity Management

关于我们

One platform to secure and manage all non-human identities (e.g. service accounts, access tokens, API keys, workloads, bots, and more) with automated discovery, risk monitoring, ownership, and lifecycle management. Founded by a team of identity experts from Okta, Microsoft, Google, & Salesforce, and backed by Greylock, Index, and prominent industry leaders.

网站
https://www.natoma.id
所属行业
计算机和网络安全
规模
11-50 人
总部
San Francisco
类型
私人持股
创立
2024

地点

Natoma员工

动态

  • Natoma转发了

    查看Software Analyst Cyber Research的组织主页

    2,232 位关注者

    The Key to Securing NHIs? Full Lifecycle Management Last week, we covered what NHIs are and why they’re a growing risk. Now, let’s focus on how security teams are tackling the problem and the vendors leading the charge. The Real Fix: NHI Lifecycle Management Here’s what that looks like in practice: 1/ Discovery & Inventory : Identify all NHIs and machine identities, across cloud and on-prem systems. Build a real-time inventory mapping their purpose, ownership, and access. 2/ Provisioning & Classification : NHIs need the right access from the start, not too much, not too little. Tag them by privilege level, owner, and function so they’re properly assigned and monitored. 3/ Monitoring & Threat Detection : NHIs shouldn’t have excessive access, and any unusual activity should trigger alerts. Continuous monitoring helps catch excessive permissions, misconfigurations, and potential compromises early. 4/ Secrets Rotation & Vaulting : Credentials shouldn’t last forever. Automate API key and service account rotation every 30, 60, or 90 days and store them in secure, encrypted vaults, no hardcoded secrets. 5/ Deprovisioning & Cleanup : Unused NHIs? Remove them. Set expiration dates, revoke old credentials, and run audits to prevent “zombie identities” from becoming security risks. Who’s Solving This? A new wave of vendors is stepping up to help enterprises get a grip on NHI security. Some of the companies leading the charge are Natoma, Entro Security, Astrix Security, Clutch Security ,Veza and Aembit. Read about this and more in our full report on NHI's : https://lnkd.in/evjmqXde Looking ahead, here are the bigger questions we need to answer: - Will human and non-human identity ecosystems converge, or will they remain distinct categories in the coming years? - As NHIs vastly outnumber human identities, how will CISOs manage and budget for this growing challenge? Drop your thoughts in the comments. Let’s discuss. ***** Please repost it ?? and follow us, SACR , for more similar posts.

    • 该图片无替代文字
  • Natoma转发了

    查看Paresh Bhaya的档案

    Co-Founder @ Natoma

    Some insightful nighttime reading—an excellent Gartner report on Machine IAM and NHI. Erik Wahlstr?m and Felix Gaehtgens, as always, stellar report. However, I must strongly disagree on multiple fronts. 1. How is LEI (ISO 17442) an NHI? LEIs identifies corporations, financial institutions, and stock exchanges. Classifying them as NHIs in IAM and security context seems misaligned. 2. Classifying pet microchips as NHIs in IAM is a stretch. Sure pets need IDs, but not for authentication. My lab may look cute in a Natoma shirt, but I don't think he is logging into my laptop with paw print anytime soon. 3. If you want to overrate in this vein, I would challenge how are SaaS apps or mobile apps or RPA services classified as machines? Shouldn't machines be limited to devices, servers, VMs etc? Well I am sure Erik Wahlstr?m you would love a Shakespeare quote here :) - "“What's in a name??That which we call a rose by any other name would smell as sweet” For now how about we enjoy the most beloved "non-human" member of our family in Natoma t-shirt Erik Wahlstr?m Felix Gaehtgens Simon Moffatt Jack Poller Todd Thiemann Ian Glazer would love your thoughts.

    • 该图片无替代文字
  • 查看Natoma的组织主页

    2,552 位关注者

    ??? Counting down the days until our Executive Cybersecurity Dinner in New Orleans! Financial services CISOs are invited to join us on March 10 for an evening of networking, insightful conversation, and delicious cuisine. Register today as spots are limited: https://lu.ma/i9sh0kyp

    查看Onyxia Cyber的组织主页

    3,222 位关注者

    Join us in The Big Easy for a lavish Executive #Cybersecurity Dinner! Together with Natoma and Sparked Ventures, we are hosting a private dinner for financial services #CISOs at one of New Orleans' premier restaurants in the Warehouse District, founded by James Beard award-winning chefs. If you’ll be attending the FS-ISAC 2025 Americas Spring Summit or are based in New Orleans, we’d love to see you! Save your spot today as spaces are limited: https://lnkd.in/gVaxdjNV Come enjoy contemporary Louisiana cuisine, thoughtful conversation, and an opportunity to connect with like-minded peers as you share insights on how to protect your infrastructure and harness your data for stronger cyber defense.

    • Onyxia Cyber, Sparked Ventures, and Natoma Executive Cybersecurity Dinner in New Orleans
  • 查看Natoma的组织主页

    2,552 位关注者

    2025 is the year of Non-Human Identity ?? It's no secret that managing NHIs is a complex problem, and it doesn't help that these entities are defined by what they *are not*. The first step is understanding what needs to be secured, so we've put together a useful framework to help you approach Non-Human Identity management. Check out this blog post to learn more: https://bit.ly/3PXbJiq

    • 该图片无替代文字
  • 查看Natoma的组织主页

    2,552 位关注者

    ?? Our latest blog, authored by our Head of Product Ryan Bradley, provides a useful matrix to help understand & define Non-Human Identity, and how each identity type should be handled. Check it out to learn more ??

相似主页

查看职位