Entro raises $6M to for its end-to-end secrets security solution

Mai 17, às 11:00


4 min de leitura


0 leituras

Entro, a Tel Aviv-based startup that is building a security platform that helps enterprises manage and protect their secrets like account credentials, certificates and API keys, today announced that it has...
Entro raises $6M to for its end-to-end secrets security solution

Entro, a Tel Aviv-based startup that is building a security platform that helps enterprises manage and protect their secrets like account credentials, certificates and API keys, today announced that it has raised a $6 million seed round led by StageOne Ventures and Hyperwise Ventures.  A number of angel investors, including Trusteer and Transmit Security founders Rakesh Loonkar and Mickey Boodaei, as well as Imperva founder Amichai Shulman also participated in this round.

Today’s enterprises often have to manage thousands of secrets across an ever-growing number of services — and often, they don’t even know how many their employees have created. These secrets are also often scattered and secret scanners and similar tools exist to ensure that this information doesn’t leak, these tools don’t know anything about the context in which these secrets are used. If there is a secret exposed in a piece of source code that already had its privileges removed, then that’s not exactly a high priority for remediation, for example.

The company was co-founded by Itzik Alvas (CEO) and Adam Cheriki (CTO), who first met during their time in the Israeli security forces. Alvas previously worked at a healthcare company and then as a senior SRE manager at Microsoft, while Cheriki worked in a number of security positions at large tech companies like IBM, Javelin Networks, Symantec and Broadcom.

“Secrets were always a big issue for me and for [Adam] as well,” Alvas told me. “We dealt with it for a long time and in our previous positions we were responsible for secret security. We saw how secrets are being created and handled without any proper security oversight — and we decided to do something about it.”

Image Credits: Entro Security

He noted that the team built Entro specifically with CISOs and security teams in mind. The service provides these stakeholders with insights into how their secrets are stored, be that in vaults, collaboration tools, cloud environments and SaaS platforms. It then analyzes the secrets it finds, correlates them to workloads and provides users with a straightforward dashboard that helps them understand any potential issues.

“We spoke with more than a hundred CISOs and heard the same complaints over and over,” said Alvas. “Companies have no idea how many secrets they hold in
the cloud, where they are, who is using them, and most importantly, how to protect them.”

Typically, companies use a multitude of tools to manage and secure their secrets, including scanners like Gitleaks, vaults from the likes of AWS, Azure or HashiCorp, and secret scanners for CI/CD like Cycode or Aqua’s Argon.

Image Credits: Entro

One of Entro’s major differentiators, Alvas noted, is that it is an end-to-end monitoring solution. Because of this, the service can understand the context of where secrets are used and is able to help developers and security teams prioritize which issues they should focus on. The company’s service also integrates with a company’s existing vaults, CI/CD systems, tools like Confluence where developers may share credentials and others. Within a few minutes, Entro can provide businesses with a single pane of glass to identify and remediate the secrets that are potentially at risk.

“In recent years, we have witnessed how companies were devastated by secret-based cyber-attacks that were highly damaging. Today, R&D teams are forced to manage a growing number of secrets in their development and tend to spread them across different vaults, repositories, and services, while security teams are having an incredibly hard time combatting this problem. This is where Entro Security comes to the rescue,” said Nofar Schnider, principal at StageOne Ventures.

Continue lendo


How to Create an Evil Twin Access Point; Step-by-Step Guide
Step-by-Step Guide: Creating an Evil Twin An Evil Twin Access Point is a malicious wireless access point that is set up to mimic a legitimate one. It can be used to intercept sensitive information such as...

Jun 3, às 23:41


Atomic Design: A Methodology for Building Design Systems
Introduction Atomic Design is a methodology for creating design systems that recognizes the need to develop thoughtful design systems, rather than creating simple collections of web pages. In this approach,...

Jun 3, às 23:04

Hacker News

Thought Cloning: Learning to Think while Acting by Imitating Human Thinking
Language is often considered a key aspect of human thinking, providing us with exceptional abilities to generalize, explore, plan, replan, and adapt to new situations. However, Reinforcement...

Jun 3, às 23:00

AI | Techcrunch

YouTube rolls back its rules against election misinformation
YouTube was the slowest major platform to disallow misinformation during the 2020 U.S. election and almost three years later, the company will toss that policy out altogether. The company announced Friday...

Jun 3, às 22:57


Techinical Debt; what is it?
Imagine you're building a house. You want to finish it quickly, so you take some shortcuts along the way. You use low-quality materials, skip some important steps, and don't do thorough testing. The house is...

Jun 3, às 22:45

Marktechpost AI Research News

Researchers From UT Austin and UC Berkeley Introduce Ambient Diffusion: An AI Framework To Train/Finetune Diffusion Models Given Only Corrupted Data As Input
For learning high-dimensional distributions and resolving inverse problems, generative diffusion models are emerging as flexible and potent frameworks. Text conditional foundation models like Dalle-2, Latent...

Jun 3, às 22:40


Exploring Tech Paths: Discovering Exciting Possibilities
Table of Contents: Introduction Understanding the Diverse Fields in Tech The Search for the Right Tech Path A Case Scenario: Linda's Journey Actionable Advice for Exploring Tech Paths Success Story: Jane's...

Jun 3, às 20:55

Código Fonte

Ele usou o GPT-4 para criar uma nova linguagem de programação – Código Fonte
É inegável que os largos modelos de linguagem (LLMs), que são a base dos atuais algoritmos de Inteligência Artificial generativa, chegaram para revolucionar, nem que seja somente o ano de 2023, até a...

Jun 3, às 20:51


☸️ How to deploy a cost-efficient AWS/EKS Kubernetes cluster using Terraform in 2023
Introduction Variables Providers and locals The enclosing VPC network The actual Kubernetes cluster Docker registries S3 application bucket Outputs Conclusion Cover image generated locally by DiffusionBee...

Jun 3, às 20:18

AI | Techcrunch

Gig workers get paid, Fidelity slashes Reddit's valuation and AI conquers Minecraft
Hey, folks, welcome to Week in Review (WiR), TechCrunch’s regular newsletter that recaps the week in tech. Hope the summer’s treating y’all well — it’s a balmy 90 degrees here in NYC! — and that some...

Jun 3, às 20:15