GettyImages 1333105479

Cerby Lands 17 Million in Funding to Manage Access to Non-Standard Enterprise Apps

Technology

As a former Google software engineer, Bel Lepe has always been aware of the risk associated with non-standard apps in businesses. These applications are often used by employees but lack support for identity standards, making them a cybersecurity concern.

According to a Ponemon Institute survey, 52% of organizations have experienced a cybersecurity incident caused by their inability to secure nonstandard apps. Lepe realized that this issue was not just limited to a few companies but was a widespread problem. He decided to take matters into his own hands and co-founded Cerby, a company aimed at managing access for business-to-business non-standard apps.

The Problem with Non-Standard Apps

Security tools have traditionally been built with only security and IT users in mind. However, many apps that businesses depend on do not support modern identity protocols for automated onboarding and offboarding of users. Lepe describes these applications as ‘nonstandard apps.’ These apps lack the necessary support to work seamlessly with enterprise IT and security tools.

Lepe has seen this problem firsthand throughout his career, working in various startups and organizations. However, it wasn’t until he was connected with a customer willing to invest in solving the issue that he decided to take action.

The Solution: Cerby

Cerby aims to remove the need for manual tools and compensating controls by automating everyday human security tasks based on single sign-on and lifecycle management cues from upstream identity providers. The company harnesses the power of identity providers like Okta, Azure AD, and SailPoint.

How Cerby Works

To use Cerby, companies first connect the platform to a corporate identity provider, such as Okta or Ping. They then register their apps in Cerby, allowing users to access them by logging into the corporate identity provider. This process ensures that every application, regardless of location or support for standards, is integrated into a unified identity mesh.

Cerby provides security and compliance teams with real-time visibility into user activity across non-standard applications, enabling them to detect and respond to potential threats more effectively.

The Benefits of Cerby

By automating the process of managing access to non-standard apps, Cerby offers several benefits to businesses:

  • Improved Security: Cerby’s automated processes reduce the risk of human error and ensure that all users have the necessary permissions to access their applications.
  • Increased Efficiency: The platform streamlines the process of managing user access, freeing up IT teams from mundane tasks and enabling them to focus on more strategic initiatives.
  • Enhanced Compliance: Cerby ensures that all apps are properly integrated with enterprise security tools, reducing the risk of non-compliance and associated fines.

The Future of Non-Standard Apps

As businesses continue to adopt new technologies and applications, the need for secure access management solutions like Cerby will only grow. Lepe’s vision is to provide a unified platform that enables organizations to securely manage user access across all apps, regardless of their standards compliance.

By addressing the current limitations of non-standard apps, Cerby aims to become an essential tool for businesses looking to protect themselves from potential cybersecurity threats.

Conclusion

Cerby’s innovative approach to securing non-standard apps is a game-changer in the world of cybersecurity. By leveraging identity providers and automating everyday security tasks, the platform provides real-time visibility into user activity across all applications.

Lepe’s vision for Cerby is not just limited to solving the current problem but also extends to the future needs of businesses. With its focus on providing a unified platform that enables secure access management across all apps, Cerby has the potential to become an industry leader in security solutions.

Related Topics

  • Cybersecurity
  • Enterprise Security
  • Identity Providers

[1] Ponemon Institute Survey