opal.dev Open in urlscan Pro
63.35.51.142  Public Scan

Submitted URL: https://auth.opal.dev/
Effective URL: https://opal.dev/
Submission: On August 14 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 3 forms found in the DOM

Name: wf-form-Inbound-Lead-FormGET

<form id="wf-form-Inbound-Lead-Form" name="wf-form-Inbound-Lead-Form" data-name="Inbound Lead Form" method="get" class="form" data-wf-page-id="628d1948d7eddf619e8a04b1" data-wf-element-id="49abc58f-bef0-a138-a349-017fc53a6b4c"
  aria-label="Inbound Lead Form" data-hs-cf-bound="true">
  <div class="inputs-wrapper _20">
    <div id="w-node-_49abc58f-bef0-a138-a349-017fc53a6b4e-9e8a04b1" class="input _1">
      <div><input class="text-field _2 amplitude-event is-centered w-input" maxlength="256" name="Work-email" data-name="Work email" placeholder="Work email" data-event-category="Work Email" type="email" id="Work-email-3" required=""></div>
    </div>
    <div class="w-form-formrecaptcha recaptcha g-recaptcha g-recaptcha-error g-recaptcha-disabled g-recaptcha-invalid-key"></div><input id="opal-submit" type="submit" data-wait="Please wait..." data-event-category="Sumbit Schedule a Demo"
      class="button is-submit amplitude-event w-node-_49abc58f-bef0-a138-a349-017fc53a6b51-9e8a04b1 w-button" value="Submit">
  </div>
  <div class="margin-top margin-small">
    <div class="text-size-small text-color-grey">Request a demo in under a minute.</div>
  </div>
</form>

Name: email-formGET

<form id="cta-email-form" name="email-form" data-name="Email Form" method="get" class="header31_form" data-wf-page-id="628d1948d7eddf619e8a04b1" data-wf-element-id="ccc9d6a4-a3e9-5712-5fdd-d1c8d539eb68" aria-label="Email Form"
  data-hs-cf-bound="true"><input class="form_input centered-text text-color-white w-input" maxlength="256" name="email-2" data-name="Email 2" placeholder="Enter your work email" type="email" id="email-2" required=""><input type="submit"
    data-wait="Please wait..." class="button is-submit-white w-button" value="Schedule a Demo"></form>

Name: wf-form-Cookie-PreferencesGET

<form id="cookie-preferences" name="wf-form-Cookie-Preferences" data-name="Cookie Preferences" method="get" class="fs-cc-prefs2_form" data-wf-page-id="628d1948d7eddf619e8a04b1" data-wf-element-id="47f3ce66-891f-b9c0-e5be-b9faba6f5ed5"
  aria-label="Cookie Preferences" data-hs-cf-bound="true">
  <div fs-cc="close" class="fs-cc-prefs2_close" role="button" tabindex="0">
    <div class="fs-cc-preferences2_close-icon w-embed"><svg fill="currentColor" aria-hidden="true" focusable="false" viewBox="0 0 16 16">
        <path d="M9.414 8l4.293-4.293-1.414-1.414L8 6.586 3.707 2.293 2.293 3.707 6.586 8l-4.293 4.293 1.414 1.414L8 9.414l4.293 4.293 1.414-1.414L9.414 8z"></path>
      </svg></div>
  </div>
  <div class="fs-cc-prefs2_content">
    <div class="fs-cc-prefs2_space-small">
      <div class="fs-cc-prefs2_title">Privacy Preferences</div>
    </div>
    <div class="fs-cc-prefs2_option">
      <div class="fs-cc-prefs2_toggle-wrapper">
        <div class="fs-cc-prefs2_label">Essential cookies</div>
        <div class="text-size-small">Required</div>
      </div>
    </div>
    <div class="fs-cc-prefs2_option">
      <div class="fs-cc-prefs2_toggle-wrapper">
        <div class="fs-cc-prefs2_label">Marketing cookies</div><label class="w-checkbox fs-cc-prefs2_checkbox-field">
          <div class="w-checkbox-input w-checkbox-input--inputType-custom fs-cc-prefs2_checkbox"></div><input type="checkbox" id="marketing-2" name="marketing-2" data-name="Marketing 2" fs-cc-checkbox="marketing"
            style="opacity:0;position:absolute;z-index:-1"><span for="marketing-2" class="fs-cc-prefs2_checkbox-label w-form-label">Essential</span>
        </label>
      </div>
    </div>
    <div class="fs-cc-prefs2_option">
      <div class="fs-cc-prefs2_toggle-wrapper">
        <div class="fs-cc-prefs2_label">Personalization cookies</div><label class="w-checkbox fs-cc-prefs2_checkbox-field">
          <div class="w-checkbox-input w-checkbox-input--inputType-custom fs-cc-prefs2_checkbox"></div><input type="checkbox" id="personalization-2" name="personalization-2" data-name="Personalization 2" fs-cc-checkbox="personalization"
            style="opacity:0;position:absolute;z-index:-1"><span for="personalization-2" class="fs-cc-prefs2_checkbox-label w-form-label">Essential</span>
        </label>
      </div>
    </div>
    <div class="fs-cc-prefs2_option">
      <div class="fs-cc-prefs2_toggle-wrapper">
        <div class="fs-cc-prefs2_label">Analytics cookies</div><label class="w-checkbox fs-cc-prefs2_checkbox-field">
          <div class="w-checkbox-input w-checkbox-input--inputType-custom fs-cc-prefs2_checkbox"></div><input type="checkbox" id="analytics-2" name="analytics-2" data-name="Analytics 2" fs-cc-checkbox="analytics"
            style="opacity:0;position:absolute;z-index:-1"><span for="analytics-2" class="fs-cc-prefs2_checkbox-label w-form-label">Essential</span>
        </label>
      </div>
    </div>
    <div class="fs-cc-prefs2_buttons-wrapper">
      <a fs-cc="deny" href="#" class="fs-cc-prefs2_button fs-cc-button-alt w-button" role="button" tabindex="0">Reject all cookies</a><a fs-cc="allow" href="#" class="fs-cc-prefs2_button w-button" role="button" tabindex="0">Allow all cookies</a><a fs-cc="submit" href="#" class="fs-cc-prefs2_submit w-button" role="button" tabindex="0">Save preferences</a>
    </div>
  </div>
</form>

Text Content

Meet us at Black hat 2024 in Vegas! Learn More >
🤝 Meet the Opal Team at Booth 1786 for Black Hat 2023

Register Today

Platform

PLATFORM


Least Privilege

Accelerated access

Continuous Compliance

Integrations

USE CASES

Threat detection and response

Just-in-time access to production

Customer data access

Accelerate access requests
Automate on-call access

Streamline employee onboarding

Automate user access reviews

Employee transfer review
Customers
Learn
Guides

Blog

Docs
Company
About

Security

Contact

Careers
Sign InSchedule a Demo
Sign In
Schedule a Demo








OPAL SECURITY IS A MODERN, DATA-CENTRIC IDENTITY SECURITY PLATFORM

Opal helps organizations reduce access sprawl, manage identity attack surfaces,
and enforce policies that are secure by default.


Schedule a Demo
Request a demo in under a minute.
Thanks for getting in touch with us! We'll reach out to you as soon as possible.
Oops! Something went wrong while submitting the form.
Visit us on G2



OPAL SECURES YOUR IDENTITY PERIMETER

Opal's identity and access management platform offers a consolidated view and
control of your whole ecosystem - one surface to implement secure-by-default
policies, assess identity risk, and remediate.

Data Source

Identity Providers

HRIS

ITSM

On-Call

Opal Platform

Security
Enforce Least Privilege

IT & Engineering
Accelerate Employee Access

Compliance
Continuous Compliance

Applications

Cloud Apps

SaaS

Opal API



FULL OBSERVABILITY + REMEDIATION

View the complete state of identity + access in your whole ecosystem, from
on-prem to cloud and SaaS. Remediate risks with one click.

Learn More
Least privilege access sits at the core of our engineering strategy at Valon.
Opal helps us improve that access with workflows that developers actually enjoy
using. The developer-centric experience makes the posture of secure by default
feel effortless
Paul Veevers
Senior Engineering Manager




SCALABLE, ADAPTABLE JUST-IN-TIME WORKFLOWS

75% of “compromised credential” incidents stem from misconfigured or mismanaged
access. Reduce access sprawl and move towards least privilege.

Learn More
“At Scale, we believe Opal is the right way to do least privilege. As a
Terraform shop, it's important for us to be able to use our current workflows to
implement privileged access management on resources with granular and robust
security and approval policies.”
Loui Barrett
Lead Product Security Engineer



EFFICIENT AND FRICTIONLESS LEAST-PRIVILEGE

Build highly configurable guardrails for just-in-time access that scales with
you as business needs change. Keep your people happy with workflows that meet
them where they work.

Learn More
“With Opal, we were able to shift our engineering team's time towards Blend's
products and focus less on business processes for granting and calibrating
access. With Opal's developer extensibility and intuitive user experience, we
are able to scale our identity security strategy and ensure our users have the
guardrails to be secure by default on our most sensitive systems.”
Paul Gutherie
Information Security Officer



SIMPLIFY COMPLIANCE WITHOUT MANUAL OVERHEAD

Kill the spreadsheet(s). Opal streamlines process and output for user access
reviews, protecting your team's time.

Learn More
“Opal has redefined how we approach identity governance at scale. The product
and roadmap align closely with the needs of our hyper-growth business. With
their rich API's and Terraform support, we can modernize and automate IAM and
assurance in ways that are aligned with other mature facets of our
infrastructure.”
Andrew McAllister
Head of Corporate Engineering



ADMIN AND SECURITY

Deploy with ease, trust with confidence


DEPLOY IN MINUTES

By integrating with native APIs, Opal can be set up in minutes without agents or
proxies


FLEXIBLE DEPLOYMENT METHODS

Opal offers the flexibility of SaaS or self-hosted deployment with a seamless
management interface


SCALE INFINITELY

With robust APIs, Opal admins can manage access policies at scale using
Infrastructure-as-Code


TRUST AT THE CORE

Opal SOC-2 Type 2’s report attests to our enterprise-grade system and robust
organizational controls


INTERNAL DOGFOODING

We use Opal internally to ensure all privileged access requests keep up with
leading best practices


SECURITY FIRST

Opal leverages AES 256-bit encryption using hardware security models for data
at-rest and in-transit and regularly undergoes penetration testing
Learn More


LOVED BY THE SECURITY COMMUNITY

Opal celebrates security leaders who want to embrace positive change, not check
boxes.

Opal provides an efficient and intuitive solution for managing user access and
access reviews. Opal's straightforward design and logically organized layout
streamlines the process and allows me to quickly and easily understand what
requires attention and why.
Alfredo Hickman
Head of Information Security
We wanted to increase our security posture by limiting who at our company had
data to what, and Opal has been very effective at allowing us to do that as we
grow quickly. Opal has become a critical part of our daily workflows. We use the
Opal Slack feature a lot, and it's helped speed up access requests.
Shensi DIng
Chief Executive Officer
Opal has become a core pillar of our IAM strategy and is the primary method of
granting access.
Mathew Jackson
Security Operations and Architecture Manager
Critical app for robust access management. Opal has been a great cornerstone for
our identity and access program, enabling robust authorization controls in a
super user-friendly manner. It's super easy to review and approve requests right
from slack.
Jacob Brackett
Head of Security
Access management is not just a technology problem—it’s also about people,
process and most of all, scale. Opal’s approach to decentralize approvals and
automate time-bounded provisioning via popular productivity platforms. This
approach enables organizations to move move beyond compliance and adopt true
least privilege at scale
Yassir Abousselham
Chief Information Security Officer
Great product with a promising future. We like the ability to manage access
approval workflows, time-restricted access, automate access provisioning,
break-the-glass access. User access reviews via Opal make things streamlined and
easy. Out of the box, it helps us save time on User Access Management.
Evgeny Lazarev
Head of Cyber Security
Implementing traditional access management solutions are typically large and
complex projects with the potential to slow down employees. With Opal,
enterprises can improve internal security posture and accelerate employee
productivity.
Brian Johnson
Chief Information Security Officer
Excellent product with even better customer service. The highlight for my team
is how attentive Opal has been to implementing the product and how responsive
their team has been to issues we encountered while setting Opal up in our
environment.
Brandon Pearce
Enterprise Security Manager
Opal is the foundation of Switchboard’s infrastructure security.
Chris Jones
Chief Technology Officer
With deep integrations for both engineering infrastructure and SaaS
applications, Opal provides enterprises with one interface to visualize and
orchestrate access, protecting and enabling the organization all at once
Steve Dotson
Chief Information Security Officer
Opal just makes things so much easier. The reduction in time necessary between
an access request and provisioning has been reduced dramatically. This helps us
meet our internal SLAs across the organization. Effective, time-limited, auto
revoked access is the ideal state for any access management program.
Mike Walsh
Sr. Director of Security
Drata uses Opal to automate access requests across the company. The platform is
lowering helpdesk volume and saving headcount by delivering a seamless access
experience.
Ross Hosman
Chief Information Security Officer
Opal isn't just another security tool that produces too many warnings. Opal has
enabled us to reduce risk by minimizing privilege across Engineering, while
making it easy to obtain admin when needed. So far we've used it to minimize
privilege on Kubernetes, IAM roles, breakglass, self-management of low-risk
accounts, OpsGenie on-call integration, and the list goes on.
Jon Anderson
Senior Application Security Engineer
Implementing least privilege is really hard. The Opal platform tackles this
problem in the right way – granting access that is granular, short-lived, and
fully audited
John Abel
Chief Information Security Officer


INTERESTED IN OPAL?

Get in touch with our team to learn more!

Schedule a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

We are a proudly hybrid workplace, working where we work best ❤


Headquartered in SF and NYC.

 * San Francisco
   
   77 Geary St
   San Francisco, CA 94108

 * New York
   
   41 E 11th St
   New York, NY 10003

 * hello@opal.dev


PLATFORM

Least PrivilegeEmployee AccessContinuous ComplianceIntegrations


COMPANY

AboutSecurityContactCareersCustomers


CONTACT US

sales@opal.devpress@opal.devsupport@opal.dev


FOLLOW US


Updates

Twitter

LinkedIn


USE CASES

Threat detection and responseJust-in-time access to productionCustomer data
accessAccelerate access requestsAutomate on-call accessStreamline employee
onboardingAutomate user access reviewsEmployee transfer review


CONTENT

AWS Multi-Account ManagementIdentity and Access Management using
Infrastructure-as-Code (Terraform)Internal tool access controlAutomated On-Call
AccessProduct Overview – User Access Review Software Product Overview – Access
ManagementHow Opal fits in Zero TrustImplement SOC-2 controls with Opal


RESOURCES

BlogGuidesAPI ReferenceProduct DocsChangelogOpal Terraform Registry


Copyright © 2024 Perma Security Inc DBA Opal Security | All Rights Reserved
| Not affiliated with Opal Labs

 * Data Protection
 * Status
 * Subprocessors
 * Privacy Policy
 * Terms of Service
 * Brand Kit

We use cookies to improve your experience on our site. By using our site, you
are agreeing to the collection and use of data as described in our our Privacy
Policy


By clicking “Accept”, you agree to the storing of cookies on your device to
enhance site navigation, analyze site usage, and assist in our marketing
efforts. View our Privacy Policy for more information.
DenyAccept

Privacy Preferences
Essential cookies
Required
Marketing cookies

Essential
Personalization cookies

Essential
Analytics cookies

Essential
Reject all cookiesAllow all cookiesSave preferences



🤝 Meet the Opal Team at Booth 1786 for Black Hat 2023

Register Today

🤝 Meet the Opal Team at Booth 1786 for Black Hat 2023

Register Today

August 9, 2023
Aug 9
-
Aug 10, 2023
|
Las Vegas, Nevada


BLACK HAT 2023

Wednesday, August 9 2023 – Thursday, August 10 2023

Mandalay Bay Convention Center, Las Nevas, NV

Register