Umaimah Khan
👤 PersonAppearances Over Time
Podcast Appearances
We are a security company, first and foremost. From day one, we have to build a lot of trust, and that has to show through in our features.
We are a security company, first and foremost. From day one, we have to build a lot of trust, and that has to show through in our features.
We are a security company, first and foremost. From day one, we have to build a lot of trust, and that has to show through in our features.
So we made very specific choices on what we would prioritize from that perspective, such as being able to work in hybrid environments, because we knew that even as a small company, if we wanted to be the backbone of people's access management and least privilege infrastructure, that they needed to feel like they could manage us entirely and work in these complex environments.
So we made very specific choices on what we would prioritize from that perspective, such as being able to work in hybrid environments, because we knew that even as a small company, if we wanted to be the backbone of people's access management and least privilege infrastructure, that they needed to feel like they could manage us entirely and work in these complex environments.
So we made very specific choices on what we would prioritize from that perspective, such as being able to work in hybrid environments, because we knew that even as a small company, if we wanted to be the backbone of people's access management and least privilege infrastructure, that they needed to feel like they could manage us entirely and work in these complex environments.
Another example of this is like building in our back end, our product itself, which is something that you will often see in like B2C or product-led companies gets left until way too late. I'm Umema Khan, also known as UK, the co-founder and CEO of Opal Security.
Another example of this is like building in our back end, our product itself, which is something that you will often see in like B2C or product-led companies gets left until way too late. I'm Umema Khan, also known as UK, the co-founder and CEO of Opal Security.
Another example of this is like building in our back end, our product itself, which is something that you will often see in like B2C or product-led companies gets left until way too late. I'm Umema Khan, also known as UK, the co-founder and CEO of Opal Security.
So Opal Security is at the highest level. I like to think of it as an identity security platform. And what we really do is basically build the data layer and the workflows and then threat detection and response to actually understand who has access to what in your organization and how to calibrate that and eventually fully automate that in a way that actually scales with your work.
So Opal Security is at the highest level. I like to think of it as an identity security platform. And what we really do is basically build the data layer and the workflows and then threat detection and response to actually understand who has access to what in your organization and how to calibrate that and eventually fully automate that in a way that actually scales with your work.
So Opal Security is at the highest level. I like to think of it as an identity security platform. And what we really do is basically build the data layer and the workflows and then threat detection and response to actually understand who has access to what in your organization and how to calibrate that and eventually fully automate that in a way that actually scales with your work.
I did more academic security in a past life. I studied some cryptography and I did a bunch of math and found myself repeatedly drawn to real world problems at the same time. I enjoyed the technical challenge, but then would have this desire to fix things that I saw happening in the real world. And one of those things was access management was this incredibly messy, fragmented issue at every scale.
I did more academic security in a past life. I studied some cryptography and I did a bunch of math and found myself repeatedly drawn to real world problems at the same time. I enjoyed the technical challenge, but then would have this desire to fix things that I saw happening in the real world. And one of those things was access management was this incredibly messy, fragmented issue at every scale.
I did more academic security in a past life. I studied some cryptography and I did a bunch of math and found myself repeatedly drawn to real world problems at the same time. I enjoyed the technical challenge, but then would have this desire to fix things that I saw happening in the real world. And one of those things was access management was this incredibly messy, fragmented issue at every scale.
tiny 10-person startups to open source to big government labs. And it just felt like a strange thing. It's clear that this matters. It's important. It's almost ignored until it's too late. And I think a huge part of that is because people aren't willing to look under the surface and ask themselves, how did we get here? A huge part of that is the reality of how businesses grow and how they scale.
tiny 10-person startups to open source to big government labs. And it just felt like a strange thing. It's clear that this matters. It's important. It's almost ignored until it's too late. And I think a huge part of that is because people aren't willing to look under the surface and ask themselves, how did we get here? A huge part of that is the reality of how businesses grow and how they scale.
tiny 10-person startups to open source to big government labs. And it just felt like a strange thing. It's clear that this matters. It's important. It's almost ignored until it's too late. And I think a huge part of that is because people aren't willing to look under the surface and ask themselves, how did we get here? A huge part of that is the reality of how businesses grow and how they scale.
Security sometimes ends up being an afterthought, especially in product-led organizations, when it hinders the business. You just get to a point where you got this like insane wild west of like authentication and authorization and you don't really know what's going on in your org and you're a little bit scared to pull the trigger anywhere because of what could happen down the line.
Security sometimes ends up being an afterthought, especially in product-led organizations, when it hinders the business. You just get to a point where you got this like insane wild west of like authentication and authorization and you don't really know what's going on in your org and you're a little bit scared to pull the trigger anywhere because of what could happen down the line.