opal.dev
Open in
urlscan Pro
63.35.51.142
Public Scan
Submitted URL: https://auth.opal.dev/
Effective URL: https://opal.dev/
Submission: On August 14 via automatic, source certstream-suspicious — Scanned from DE
Effective URL: https://opal.dev/
Submission: On August 14 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
3 forms found in the DOMName: wf-form-Inbound-Lead-Form — GET
<form id="wf-form-Inbound-Lead-Form" name="wf-form-Inbound-Lead-Form" data-name="Inbound Lead Form" method="get" class="form" data-wf-page-id="628d1948d7eddf619e8a04b1" data-wf-element-id="49abc58f-bef0-a138-a349-017fc53a6b4c"
aria-label="Inbound Lead Form" data-hs-cf-bound="true">
<div class="inputs-wrapper _20">
<div id="w-node-_49abc58f-bef0-a138-a349-017fc53a6b4e-9e8a04b1" class="input _1">
<div><input class="text-field _2 amplitude-event is-centered w-input" maxlength="256" name="Work-email" data-name="Work email" placeholder="Work email" data-event-category="Work Email" type="email" id="Work-email-3" required=""></div>
</div>
<div class="w-form-formrecaptcha recaptcha g-recaptcha g-recaptcha-error g-recaptcha-disabled g-recaptcha-invalid-key"></div><input id="opal-submit" type="submit" data-wait="Please wait..." data-event-category="Sumbit Schedule a Demo"
class="button is-submit amplitude-event w-node-_49abc58f-bef0-a138-a349-017fc53a6b51-9e8a04b1 w-button" value="Submit">
</div>
<div class="margin-top margin-small">
<div class="text-size-small text-color-grey">Request a demo in under a minute.</div>
</div>
</form>
Name: email-form — GET
<form id="cta-email-form" name="email-form" data-name="Email Form" method="get" class="header31_form" data-wf-page-id="628d1948d7eddf619e8a04b1" data-wf-element-id="ccc9d6a4-a3e9-5712-5fdd-d1c8d539eb68" aria-label="Email Form"
data-hs-cf-bound="true"><input class="form_input centered-text text-color-white w-input" maxlength="256" name="email-2" data-name="Email 2" placeholder="Enter your work email" type="email" id="email-2" required=""><input type="submit"
data-wait="Please wait..." class="button is-submit-white w-button" value="Schedule a Demo"></form>
Name: wf-form-Cookie-Preferences — GET
<form id="cookie-preferences" name="wf-form-Cookie-Preferences" data-name="Cookie Preferences" method="get" class="fs-cc-prefs2_form" data-wf-page-id="628d1948d7eddf619e8a04b1" data-wf-element-id="47f3ce66-891f-b9c0-e5be-b9faba6f5ed5"
aria-label="Cookie Preferences" data-hs-cf-bound="true">
<div fs-cc="close" class="fs-cc-prefs2_close" role="button" tabindex="0">
<div class="fs-cc-preferences2_close-icon w-embed"><svg fill="currentColor" aria-hidden="true" focusable="false" viewBox="0 0 16 16">
<path d="M9.414 8l4.293-4.293-1.414-1.414L8 6.586 3.707 2.293 2.293 3.707 6.586 8l-4.293 4.293 1.414 1.414L8 9.414l4.293 4.293 1.414-1.414L9.414 8z"></path>
</svg></div>
</div>
<div class="fs-cc-prefs2_content">
<div class="fs-cc-prefs2_space-small">
<div class="fs-cc-prefs2_title">Privacy Preferences</div>
</div>
<div class="fs-cc-prefs2_option">
<div class="fs-cc-prefs2_toggle-wrapper">
<div class="fs-cc-prefs2_label">Essential cookies</div>
<div class="text-size-small">Required</div>
</div>
</div>
<div class="fs-cc-prefs2_option">
<div class="fs-cc-prefs2_toggle-wrapper">
<div class="fs-cc-prefs2_label">Marketing cookies</div><label class="w-checkbox fs-cc-prefs2_checkbox-field">
<div class="w-checkbox-input w-checkbox-input--inputType-custom fs-cc-prefs2_checkbox"></div><input type="checkbox" id="marketing-2" name="marketing-2" data-name="Marketing 2" fs-cc-checkbox="marketing"
style="opacity:0;position:absolute;z-index:-1"><span for="marketing-2" class="fs-cc-prefs2_checkbox-label w-form-label">Essential</span>
</label>
</div>
</div>
<div class="fs-cc-prefs2_option">
<div class="fs-cc-prefs2_toggle-wrapper">
<div class="fs-cc-prefs2_label">Personalization cookies</div><label class="w-checkbox fs-cc-prefs2_checkbox-field">
<div class="w-checkbox-input w-checkbox-input--inputType-custom fs-cc-prefs2_checkbox"></div><input type="checkbox" id="personalization-2" name="personalization-2" data-name="Personalization 2" fs-cc-checkbox="personalization"
style="opacity:0;position:absolute;z-index:-1"><span for="personalization-2" class="fs-cc-prefs2_checkbox-label w-form-label">Essential</span>
</label>
</div>
</div>
<div class="fs-cc-prefs2_option">
<div class="fs-cc-prefs2_toggle-wrapper">
<div class="fs-cc-prefs2_label">Analytics cookies</div><label class="w-checkbox fs-cc-prefs2_checkbox-field">
<div class="w-checkbox-input w-checkbox-input--inputType-custom fs-cc-prefs2_checkbox"></div><input type="checkbox" id="analytics-2" name="analytics-2" data-name="Analytics 2" fs-cc-checkbox="analytics"
style="opacity:0;position:absolute;z-index:-1"><span for="analytics-2" class="fs-cc-prefs2_checkbox-label w-form-label">Essential</span>
</label>
</div>
</div>
<div class="fs-cc-prefs2_buttons-wrapper">
<a fs-cc="deny" href="#" class="fs-cc-prefs2_button fs-cc-button-alt w-button" role="button" tabindex="0">Reject all cookies</a><a fs-cc="allow" href="#" class="fs-cc-prefs2_button w-button" role="button" tabindex="0">Allow all cookies</a><a fs-cc="submit" href="#" class="fs-cc-prefs2_submit w-button" role="button" tabindex="0">Save preferences</a>
</div>
</div>
</form>
Text Content
Meet us at Black hat 2024 in Vegas! Learn More > 🤝 Meet the Opal Team at Booth 1786 for Black Hat 2023 Register Today Platform PLATFORM Least Privilege Accelerated access Continuous Compliance Integrations USE CASES Threat detection and response Just-in-time access to production Customer data access Accelerate access requests Automate on-call access Streamline employee onboarding Automate user access reviews Employee transfer review Customers Learn Guides Blog Docs Company About Security Contact Careers Sign InSchedule a Demo Sign In Schedule a Demo OPAL SECURITY IS A MODERN, DATA-CENTRIC IDENTITY SECURITY PLATFORM Opal helps organizations reduce access sprawl, manage identity attack surfaces, and enforce policies that are secure by default. Schedule a Demo Request a demo in under a minute. Thanks for getting in touch with us! We'll reach out to you as soon as possible. Oops! Something went wrong while submitting the form. Visit us on G2 OPAL SECURES YOUR IDENTITY PERIMETER Opal's identity and access management platform offers a consolidated view and control of your whole ecosystem - one surface to implement secure-by-default policies, assess identity risk, and remediate. Data Source Identity Providers HRIS ITSM On-Call Opal Platform Security Enforce Least Privilege IT & Engineering Accelerate Employee Access Compliance Continuous Compliance Applications Cloud Apps SaaS Opal API FULL OBSERVABILITY + REMEDIATION View the complete state of identity + access in your whole ecosystem, from on-prem to cloud and SaaS. Remediate risks with one click. Learn More Least privilege access sits at the core of our engineering strategy at Valon. Opal helps us improve that access with workflows that developers actually enjoy using. The developer-centric experience makes the posture of secure by default feel effortless Paul Veevers Senior Engineering Manager SCALABLE, ADAPTABLE JUST-IN-TIME WORKFLOWS 75% of “compromised credential” incidents stem from misconfigured or mismanaged access. Reduce access sprawl and move towards least privilege. Learn More “At Scale, we believe Opal is the right way to do least privilege. As a Terraform shop, it's important for us to be able to use our current workflows to implement privileged access management on resources with granular and robust security and approval policies.” Loui Barrett Lead Product Security Engineer EFFICIENT AND FRICTIONLESS LEAST-PRIVILEGE Build highly configurable guardrails for just-in-time access that scales with you as business needs change. Keep your people happy with workflows that meet them where they work. Learn More “With Opal, we were able to shift our engineering team's time towards Blend's products and focus less on business processes for granting and calibrating access. With Opal's developer extensibility and intuitive user experience, we are able to scale our identity security strategy and ensure our users have the guardrails to be secure by default on our most sensitive systems.” Paul Gutherie Information Security Officer SIMPLIFY COMPLIANCE WITHOUT MANUAL OVERHEAD Kill the spreadsheet(s). Opal streamlines process and output for user access reviews, protecting your team's time. Learn More “Opal has redefined how we approach identity governance at scale. The product and roadmap align closely with the needs of our hyper-growth business. With their rich API's and Terraform support, we can modernize and automate IAM and assurance in ways that are aligned with other mature facets of our infrastructure.” Andrew McAllister Head of Corporate Engineering ADMIN AND SECURITY Deploy with ease, trust with confidence DEPLOY IN MINUTES By integrating with native APIs, Opal can be set up in minutes without agents or proxies FLEXIBLE DEPLOYMENT METHODS Opal offers the flexibility of SaaS or self-hosted deployment with a seamless management interface SCALE INFINITELY With robust APIs, Opal admins can manage access policies at scale using Infrastructure-as-Code TRUST AT THE CORE Opal SOC-2 Type 2’s report attests to our enterprise-grade system and robust organizational controls INTERNAL DOGFOODING We use Opal internally to ensure all privileged access requests keep up with leading best practices SECURITY FIRST Opal leverages AES 256-bit encryption using hardware security models for data at-rest and in-transit and regularly undergoes penetration testing Learn More LOVED BY THE SECURITY COMMUNITY Opal celebrates security leaders who want to embrace positive change, not check boxes. Opal provides an efficient and intuitive solution for managing user access and access reviews. Opal's straightforward design and logically organized layout streamlines the process and allows me to quickly and easily understand what requires attention and why. Alfredo Hickman Head of Information Security We wanted to increase our security posture by limiting who at our company had data to what, and Opal has been very effective at allowing us to do that as we grow quickly. Opal has become a critical part of our daily workflows. We use the Opal Slack feature a lot, and it's helped speed up access requests. Shensi DIng Chief Executive Officer Opal has become a core pillar of our IAM strategy and is the primary method of granting access. Mathew Jackson Security Operations and Architecture Manager Critical app for robust access management. Opal has been a great cornerstone for our identity and access program, enabling robust authorization controls in a super user-friendly manner. It's super easy to review and approve requests right from slack. Jacob Brackett Head of Security Access management is not just a technology problem—it’s also about people, process and most of all, scale. Opal’s approach to decentralize approvals and automate time-bounded provisioning via popular productivity platforms. This approach enables organizations to move move beyond compliance and adopt true least privilege at scale Yassir Abousselham Chief Information Security Officer Great product with a promising future. We like the ability to manage access approval workflows, time-restricted access, automate access provisioning, break-the-glass access. User access reviews via Opal make things streamlined and easy. Out of the box, it helps us save time on User Access Management. Evgeny Lazarev Head of Cyber Security Implementing traditional access management solutions are typically large and complex projects with the potential to slow down employees. With Opal, enterprises can improve internal security posture and accelerate employee productivity. Brian Johnson Chief Information Security Officer Excellent product with even better customer service. The highlight for my team is how attentive Opal has been to implementing the product and how responsive their team has been to issues we encountered while setting Opal up in our environment. Brandon Pearce Enterprise Security Manager Opal is the foundation of Switchboard’s infrastructure security. Chris Jones Chief Technology Officer With deep integrations for both engineering infrastructure and SaaS applications, Opal provides enterprises with one interface to visualize and orchestrate access, protecting and enabling the organization all at once Steve Dotson Chief Information Security Officer Opal just makes things so much easier. The reduction in time necessary between an access request and provisioning has been reduced dramatically. This helps us meet our internal SLAs across the organization. Effective, time-limited, auto revoked access is the ideal state for any access management program. Mike Walsh Sr. Director of Security Drata uses Opal to automate access requests across the company. The platform is lowering helpdesk volume and saving headcount by delivering a seamless access experience. Ross Hosman Chief Information Security Officer Opal isn't just another security tool that produces too many warnings. Opal has enabled us to reduce risk by minimizing privilege across Engineering, while making it easy to obtain admin when needed. So far we've used it to minimize privilege on Kubernetes, IAM roles, breakglass, self-management of low-risk accounts, OpsGenie on-call integration, and the list goes on. Jon Anderson Senior Application Security Engineer Implementing least privilege is really hard. The Opal platform tackles this problem in the right way – granting access that is granular, short-lived, and fully audited John Abel Chief Information Security Officer INTERESTED IN OPAL? Get in touch with our team to learn more! Schedule a Demo Thank you! Your submission has been received! Oops! Something went wrong while submitting the form. We are a proudly hybrid workplace, working where we work best ❤ Headquartered in SF and NYC. * San Francisco 77 Geary St San Francisco, CA 94108 * New York 41 E 11th St New York, NY 10003 * hello@opal.dev PLATFORM Least PrivilegeEmployee AccessContinuous ComplianceIntegrations COMPANY AboutSecurityContactCareersCustomers CONTACT US sales@opal.devpress@opal.devsupport@opal.dev FOLLOW US Updates Twitter LinkedIn USE CASES Threat detection and responseJust-in-time access to productionCustomer data accessAccelerate access requestsAutomate on-call accessStreamline employee onboardingAutomate user access reviewsEmployee transfer review CONTENT AWS Multi-Account ManagementIdentity and Access Management using Infrastructure-as-Code (Terraform)Internal tool access controlAutomated On-Call AccessProduct Overview – User Access Review Software Product Overview – Access ManagementHow Opal fits in Zero TrustImplement SOC-2 controls with Opal RESOURCES BlogGuidesAPI ReferenceProduct DocsChangelogOpal Terraform Registry Copyright © 2024 Perma Security Inc DBA Opal Security | All Rights Reserved | Not affiliated with Opal Labs * Data Protection * Status * Subprocessors * Privacy Policy * Terms of Service * Brand Kit We use cookies to improve your experience on our site. By using our site, you are agreeing to the collection and use of data as described in our our Privacy Policy By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information. DenyAccept Privacy Preferences Essential cookies Required Marketing cookies Essential Personalization cookies Essential Analytics cookies Essential Reject all cookiesAllow all cookiesSave preferences 🤝 Meet the Opal Team at Booth 1786 for Black Hat 2023 Register Today 🤝 Meet the Opal Team at Booth 1786 for Black Hat 2023 Register Today August 9, 2023 Aug 9 - Aug 10, 2023 | Las Vegas, Nevada BLACK HAT 2023 Wednesday, August 9 2023 – Thursday, August 10 2023 Mandalay Bay Convention Center, Las Nevas, NV Register