Request a Demo
  • Platform
    • Integrations
  • Solutions
    • By Use Case
      • Apply Zero Trust to Your IAM
        Tightly secure access to your valuable assets
      • Manage & Monitor External Exposure
        Detect & secure externally exposed data and accounts
      • Enforce Security Policies and Guardrails
        Turn security challenges into enforceable policies
      • Secure & Automate JML Lifecycle​
        Eliminate partial offboarding and right-size privileges
      • Streamline Your User Access Reviews
        Automate compliance with pre-built workflows
    • By Industry All Industries
      • Financial Services
      • Health Care
      • Insurance
    • By Application All Applications
      • AWS
      • Azure
      • GCP
      • Salesforce
      • Office 365
  • Partners
    • Strategic Partners
  • Blog
  • Company
    • Company
      • About
      • Resources
      • Events
      • News & Press
      • Careers
      • Security and Trust
      • Authomize Research on Post-Holiday Account Takeovers

        Discover the motives and behavior of cyber criminals and how...

        Read More
  • Contact Us
Request a Demo
  • News
  • Press Releases

Unused identities: A growing security threat

In early May 2021, Colonial Pipeline, the operator of the pipeline that pumps 45% of the East Coast’s fuel, announced that they had been hacked.

Read the full article

Back to lobby
Next read
  • Dotan Bar Noy, Authomize: “we need to manage our identity security more diligently than before”

    Apr Tue, 2022

    Considering the possibility that one’s identity might be stolen is an unpleasant yet necessary practice. An effective solution to the potential problem would be to mitigate the risk by limiting everyone’s access to the required information necessary for work purposes. Storing information across devices and platforms has become a chaotic norm. But accessing and sharing […]

  • Platform
    • Achieve Full Observability
    • Continuously Ensure Security
    • Remediate Quickly and Confidently
    • Simplify Authorization Management
    • Streamline Access Reviews Campaigns and Auditing
  • Use cases
    • Apply Zero Trust to Your IAM
    • Enforce Security Policies and Guardrails
    • Manage & Monitor External Exposure
    • Secure & Automate JML Lifecycle​
    • Streamline Your User Access Reviews
  • Resources
    • Blog
    • Solutions Briefs
    • Case studies
    • Webinars
    • White papers
    • Videos
  • Company
    • About
    • Partners
    • Careers
    • Support
    • Contact Us
Don't miss out

Subscribe to Authomize communication

Follow us

All rights reserved Authomize 2023 • Terms of use • Privacy policy • DPA

Don't Miss Out

Subscribe to Authomize communication

Follow us

All rights reserved Authomize 2020 • Terms of use • Privacy policy