Permiso is an Identity Threat Detection and Response (ITDR) platform that combines Identity Security Posture Management (ISPM) with threat detection capabilities. The platform offers: 1. Multi-environment identity risk and threat visibility for both human and non-human identities. 2. A Universal Identity Graph that tracks identities across various authentication boundaries. 3. Activity attribution to trace actions performed through shared credentials back to specific identities. 4. Detection of cloud-based threats using a library of known TTPs and machine learning models. 5. Inventory and monitoring of identities across identity providers, IaaS, SaaS, and CI/CD environments. 6. Advanced attribution capabilities to determine the who, what, when, and where of suspicious activities. 7. Integration of threat research from P0 Labs, providing over 900 detection signals. 8. Custom rule tuning and environment scanning for proactive threat detection.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Helm plugin for decrypting encrypted Helm value files on the fly and integrating with cloud native secret managers.
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.
A fully automated AD build script that configures a domain fully with adjustable XML files.
Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.