Preempt Blog

The latest insights and advice to keep your company protected from insider threats and breaches

A Big Thank You and A Stronger Commitment For The Future

Today is a big day for Preempt Security as we announce CrowdStrike’s intention to acquire Preempt.

At the time Preempt was founded, security and identity were considered very different technologies and disciplines. We based the company on the hypothesis that for effective security, enterprises would need to combine identity with security. In addition, we wanted to build a company that reflected our ideals and a culture that we would be proud of.

Today, our hypothesis has been proven correct and is now a key element of what is now known as Zero Trust security.

As the security market developed, we remained committed to our original vision, and began to see an acceleration of adoption in the last 18 months. This success was based, first and foremost, on our employees, who believed and worked tirelessly to make Preempt’s customers successful. Our customers, investors and well wishers, who believed in us, were also an integral part of helping us get to where we are today. So to everyone who joined us on this journey, we say that without your support and vision, none of this would have been possible.

We are excited to bring Zero Trust security to the next level with CrowdStrike. In fact, when we engaged with CrowdStrike, it became very clear to us that their vision for security and customer success aligned well with ours. Combined with a culture that was very similar, we are excited to see what will be possible to accomplish for our customers, partners, and employees together.

Today’s announcement is a significant step in our efforts to make enterprises more secure and create the best experience for workforce users everywhere. We now renew our commitment to continuing this journey with the same ideals as when we started.

Ajit Sancheti and Roman Blachman

Topics: Uncategorized,

Posted by Ajit Sancheti on September 23, 2020 9:47 PM

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More

Developer

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus...

Read More

Events

A Simplified Approach to Network Segmentation

Network segmentation has long been one of the most valuable tools for protecting ...

Read More

Research

10 Things You Need to Know About Kerberos

As our research team continues to find vulnerabilities in Microsoft that bypass all major

Read More

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More