Subscribe for notification
Tech

Linx Raises $33M to Secure Identity in New Security Perimeter

Linx secures $33M in funding to advance its AI-driven identity management solutions, aiming to address security challenges and strengthen perimeters in the face of evolving threats

The funding for Linx is being announced in a singular sum, but it will be distributed in two tranches that reflect the company’s momentum during its stealth phase. Linx recently raised $27 million in a joint venture by Index Ventures and Cyberstarts. Before this, Linx had raised $6 million in a venture by Cyberstarts.

Assaf Rappaport and Yinon Costica (Wiz, Adallom), Rakesh Loonkar (Trusteer, Transmit), and Mickey Boodaei (Imperva, Trusteer, Transmit) are among the other investors in Linx who attest to the founders’ credibility within the Israeli security community. Cerca Partners and Knollwood Investment Advisory are the other investors in the round.

Linx Security has existed for over a year and has a captivating origin story. The two co-founders, Israel Duanis (CEO) and Niv Goldenberg (CPO), initially encountered and became companions in the Israeli tech industry, as is common in the industry. They were enlisted in the 8200 cyber unit of the Israeli army. Assaf Rappaport and the other Wiz founders were also included in that cohort.

Israel Duanis (CEO)| Youtube

Duanis and Goldenberg subsequently pursued employment with cybersecurity companies, with Duanis working for Checkpoint Software and Adallom and Goldenberg for Microsoft and Transmit. Duanis also ventured outside the industry, founding, operating, and ultimately selling Fleetonomy, an automotive fleet management technology company, to Via. And yet, Duanis continued to believe that he needed to do something in security.

In an interview, he stated, “I have always felt that ID has been overlooked when I look at the past 20 years.” He recalled that access management and permissions were primarily IT issues at Checkpoint rather than security concerns. However, he also noted that many attacks are now ID-driven.

By conducting a cursory examination of several of the most prominent exposures of the past few years, including Equifax, T-Mobile, and Snowflake, it becomes evident that malicious hackers could potentially exploit ungoverned credentials, specifically identity. Duanis stated, “These were all credentials-related issues.”

They believed that a platform that could comprehend and resolve this issue from the perspectives of security, compliance, and efficiency “could have a significant impact,” he stated.

“Today, identity is the new perimeter, and as a result, you must address it.”

Ultimately, the Rappaport Rapport was quite robust. When Duanis informed Assaf that he was contemplating establishing a startup that would concentrate on ID administration, Assaf introduced him to Gili Raanan at Cyberstarts, a figurehead in the Israeli cyber industry. Within 24 hours, the seed transaction was executed, and Linx Security was established.

The company is not disclosing customers’ identities or providing significant details about its operations, with Linx only emerging from stealth today. However, the fundamental concept is as follows:

Hundreds, if not thousands, of distinct applications and software, are typically employed or utilized by organizations today. User authentication will be necessary for access to each. However, a business may be unable to eliminate all of the identity information associated with the waxing and waning of a particular app or worker when the app is no longer routinely used or when workers come and go.

The organization may accumulate substantial ungoverned identity information over time, which can quickly become a significant liability. This information may remain unnoticed until a malignant actor exploits it to access the entire system.

Linx employs analytics and AI to analyze and comprehend the broader landscape of an organization’s system, thereby connecting all identities to actual, active employees (hence the name). It also identifies IDs no longer associated with active users during the process, allowing for their removal.

The resulting data is then transformed into a map that can be employed to monitor the system over time. Consequently, you will be aware of an ID being unexpectedly retrieved and utilized.

Even though AI has become an overused term and is likely to be misused in the technology industry, Duanis stated that Linx’s application is highly precise.

“He acknowledged that the term “AI” is overused; however, he believes that the ability to extract the essence of a network and execute algorithms at a rapid pace on the development side, thereby leveraging this power to offer suggestions and automation, has had a significant impact and established a foundation for a genuine transformation in the current management paradigm.

Stated that eliminating ungoverned identities, which would have taken months to complete, can now be completed in “hours.”

Raanan at Cyberstarts swiftly agreed to provide Linx with financial support due to his assessment of the market’s potential for growth.

He stated that “identity is the primary threat vector for the contemporary enterprise.”

“The CISO’s identity teams are grappling with increasing responsibilities and are hampered by antiquated legacy solutions.”

James Emmanuel

James is a Computer Science student with a robust foundation in tech and a skilled DevOps engineer. His technical expertise extends to his role as a news reporter at Protechbro, where he specializes in crafting well-informed, technical content that highlights the latest trends and innovations in technology.

Disqus Comments Loading...

Recent Posts

Federal Task Force Busts Cartel-Linked Crypto Laundering Ring

Nine individuals were charged with laundering U.S. drug proceeds into cryptocurrency for Mexican and Colombian cartels from 2020 to 2023.…

1 hour ago

Truemarkets Raises $4M in NFT Sale, Vitalik Buterin Purchases 400 NFTs

Truemarkets raised over $4M by selling 15,071 NFTs at $250 each. Vitalik Buterin bought 400 NFTs worth $107K in the…

2 hours ago

Apple Acknowledges Security Flaw Exposing Crypto Users—Here’s What to Do

Apple acknowledged on Monday that its devices were susceptible to an exploit that enabled the execution of remote malicious code…

2 hours ago

Hackers Breach Tate’s Online ‘University,’ Steal Data

Hackers have infiltrated an online course that was established by Andrew Tate, a self-described misogynist and purported influencer The compromise…

7 hours ago

Apple Builds Conversational Siri with LLMs

Apple is reportedly working on an enhanced version of Siri, incorporating large language models (LLMs) to create a more conversational…

7 hours ago

YouTube Shorts Unveils AI Video Backgrounds

Thursday was the day that YouTube announced that its Dream Screen feature for Shorts now allows users to construct movie…

8 hours ago