Combining Just-in-Time (JIT) access with Just-Enough Privilege (JEP) is one of the most effective ways to reduce risk in real time—by eliminating standing privileges. Standing access leaves environments unnecessarily exposed. In contrast, JIT and JEP models align with the natural cadence of work, granting access only when it’s needed, and only to the extent required. The result? A significantly reduced attack surface and a more agile, adaptive security posture. Learn more about the Gartner® recommendations and why Xage Security was recognized as a key vendor in the report, “Reduce Risk Through a Just-in-Time Approach to PAM.” https://lnkd.in/d4g3AMwJ
Xage Security
Computer and Network Security
Palo Alto, California 8,585 followers
Global leader in zero trust access and protection
About us
Xage is a global leader in zero trust access and protection on a mission to pioneer a secure tomorrow. Control access and prevent attacks in the cloud, in the data center, at the remote operational edge anywhere on Earth, and even in orbit with the Xage Fabric Platform. Xage is easy to manage and can be deployed in a day, giving users easy and secure access to the assets they need from anywhere, while preventing advanced adversaries and insider threats at every stage of the attack chain. Learn why organizations like the U.S. Space Force, PETRONAS, and Kinder Morgan choose Xage at xage.com.
- Website
-
http://www.xage.com
External link for Xage Security
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- Palo Alto, California
- Type
- Privately Held
- Founded
- 2017
- Specialties
- Cybersecurity, Zero Trust, Critical Infrastructure Protection, Industrial IoT Security, Operational Technology Security, Identity and Access Management, Zero Trust Remote Access, Cyber-Physical Systems Security, IT OT Convergence, and Digital Transformation
Locations
-
Primary
445 Sherman Ave
200
Palo Alto, California 94306, US
Employees at Xage Security
-
Tommy Cormier
Empathetic Leader, Enabling Zero Trust, Digital Transformation and Protecting Organizations Against Advanced Threats for Enterprises! | Leader…
-
Ken Forster
Venture Industrialist
-
Geoffrey Mattson
Chief Executive Officer @ Xage Security
-
Sumant Mandal
Co-Founder & Managing Partner at March Capital
Updates
-
Follow Xage Security and subscribe to the Cyber Risk Roundup for key developments across the threat landscape. This month, a cyberattack crippled city systems in St. Paul, Minnesota, prompting the governor to activate the National Guard for recovery support. Pakistan Petroleum reported an attempted breach by the Blue Locker ransomware strain amid a 935% surge in attacks against the oil and gas sector. Meanwhile, a scan of 21 major U.S. energy providers uncovered more than 5,750 vulnerabilities—nearly 380 of which were actively exploited. These developments and more are covered in this month’s roundup.
-
We live in a world that runs on critical infrastructure, and let's face it, keeping it safe is the new superpower. With pressure mounting, resilience isn't just a goal—it's the only way forward. Xage Security is excited to sponsor the CS4CA Nordic Summit to help you harness that superpower 🦸. Our team, including Jack Sindall and Jeremy Philpott, will be in Copenhagen on September 10–11 at the Radisson Blu Scandinavia. They'll be sharing strategies for protecting critical operations and building a more resilient future. Book your 1-1 meeting here: https://lnkd.in/gENZUrAe #CS4CA #CyberSecurity #ZeroTrust #CriticalInfrastructure #NordicCyberSummit
-
-
Final Call! This Thursday, the illusion shatters. Think your OT is safe in isolation? Believe patching is enough? Still stuck in “respond-only” mode? Time to bust those myths! Join us for “The OT Cybersecurity Illusion: Breaking Down the Biggest Myths” – live tomorrow, August 28 at 1 PM ET | 10 AM PT. Don’t miss the final reveal. Register now before the curtain drops: https://lnkd.in/giWbbuUN #OTSecurity #Cybersecurity #Webinar
-
-
Xage Security co-founder Roman Arutyunov weighed in about the potential for identity-centric protection in OT
Identity and Access Management (IAM) is becoming an increasingly vital component of #cyberdefense in #operationaltechnology (OT) and #criticalinfrastructure facilities. But its journey forward is anything but simple, complicated by legacy infrastructure, cultural reluctance to change, and a never-ending tussle between operational continuity and imposition of tighter security controls. #IAM is evolving from a peripheral consideration to becoming a litmus test for industrial robustness, as the complexity of #cyberthreats becomes deeper and the degree of connectivity increases. Industrial Cyber reached out to experts to assess the key architectural and cultural challenges of adopting identity-centric models, such as zero trust or least privilege, in #OTenvironments. They also look at how organizations can address these without compromising uptime or safety. Matthew Rogers, ICS cybersecurity expert in the Cybersecurity and Infrastructure Security Agency’s office of the technical director and lead for secure by design for OT, identified that the technology to do IAM exists in OT and has existed for over a decade. “The architectural challenge is getting a critical mass of components (or intermediary gateways) that support IAM. Otherwise, secure communication cannot reasonably occur. Where the technology exists but is disabled, there are concerns over operational complexity, interoperability, sustained costs, and availability being impacted by poor key management or encryption, preventing troubleshooting.” Adopting #zerotrust or #leastprivilege in OT often meets cultural resistance, as many see it as conflicting with defense-in-depth, Roman Arutyunov, co-founder and senior vice president of products at Xage Security, said. “In reality, the two can work together—Zero Trust can strengthen, not replace, existing layers of protection.” Simon Moffatt, founder and research analyst at The Cyber Hut, said that the biggest cultural challenge between OT and say enterprise IAM deployments is the use of the CIA triad of confidentiality, integrity, and availability for security and risk management. “Within OT, either availability becomes the primary concern, or indeed the triad is augmented alongside safety, with safety, then availability being a priority above confidentiality and integrity. This can entirely alter how identity conflicts like security, usability are handled and how IAM is deployed.” “The key architectural and cultural challenges to adopting identity-centric models in OT environments are rooted in human behavior and financial impact. First, any change costs money,” Morey Haber, chief security advisor at BeyondTrust, said. “Whether it is the licensing of new technology or man-hours to make changes, there is always a financial impact. If an OT environment cannot afford downtime, operates on fixed margins, or the organization does not have the financial means to make the necessary security changes, they will probably not happen.”
-
This weekend’s Security Digest examines how organizations can move beyond the basics in Privileged Access Management (PAM). The Gartner® report, “Reduce Risk Through a Just-in-Time Approach to PAM”, reveals that "only 45% of organizations have deployed a PAM tool and are using it at a very basic level (that is, vaulting and rotating privileged credentials)." #PrivilegedAccessManagement #Cybersecurity #JustInTimeAccess #CloudSecurity
-
We're proud to share that Xage Security is recognized in the April 2025 Gartner report: “Reduce Risk Through a Just-in-Time Approach to PAM.” The takeaway? Always-on privileged access is no longer acceptable. In the report, in our opinion, Gartner® underscores the shift to Just-in-Time (JIT) and Just-Enough Privilege (JEP) models to reduce risk—especially as cloud and AI dramatically expand the attack surface. Read our blog for key insights and to download the report: https://lnkd.in/d4g3AMwJ
-
-
We are proud to be involved in the release of the Manufacturing Cybersecurity Handbook 2025, a free community resource from Industrial Cyber. With contributions from industry practitioners, security leaders, and technology innovators, this handbook provides real-world guidance for protecting manufacturing environments—whether you’re operating legacy systems or building next-gen smart factories. Cybersecurity is no longer optional. It’s core to resilience, compliance, and competitiveness. Download the handbook: https://lnkd.in/d5uJ7zgR #IndustrialCyber #ManufacturingSecurity #OTCyber #SmartManufacturing #CyberResilience #ICS #ZeroTrust
-
-
Xage Security reposted this
Join our MythBusters, Roman Arutyunov, Victor Chang, CISSP, and Chris Cone, CISSP, as they expose dangerous beliefs that are silently putting your industrial operations at risk. Myth #1: “Air-gapping keeps me safe.” Myth #2: “Patching is enough.” Myth #3: “In OT, I can’t prevent—only respond” Is it plausible, or is it busted? 💥 Find out for yourself on Thursday, August 28th at 10 AM PT / 1 PM ET in the live webinar. Reg Link: https://lnkd.in/dhgau5yf #IndustrialSafety #CyberSecurity #OTSecurity #Webinar #XageSecurity #ZeroTrust #AirGapping #CriticalInfrastructure #CyberPhysicalSystems #MythBusted
-
-
Xage Security reposted this
The White House has released an ambitious new roadmap to secure America’s technological dominance in AI, a strategy as bold as the space race. America's AI Action Plan is built on three strategic pillars: 1️⃣ Accelerating innovation through deregulation, open-source support, scientific R&D, and workforce development 2️⃣ Building robust AI infrastructure—from data centers to secure power grids and semiconductor supply chains 3️⃣ Leading in global AI diplomacy by promoting U.S. exports, countering adversarial influence, and tightening export controls In our latest blog, we dive into the recommended policy actions that stood out to us, and their downstream impact on cybersecurity, access control, and infrastructure protection. We explore why Zero Trust is not just a best practice—but a foundational requirement for securing the AI-driven future, and what it means to apply these principles across critical sectors—from utilities to national defense. Read the blog: https://lnkd.in/g_5tsjf8 #AIActionPlan #AI #ZeroTrust #Cybersecurity #InfrastructureSecurity #AIPolicy
-