Teaserbild Blogbeitrag Neue Partnerschaft: CyberDesk x USO © KI-generiert

CyberDesk & USO: Putting Identity-Centric Data Security Front and Center

Identity-centric data security at the push of a button: with our new partner CyberDesk, that becomes possible.

Growth means progress. That is why we are especially excited to welcome a new startup partner from Germany to our network—and with it, a solution for secure data access by both human and non-human identities, designed for growth-oriented mid-sized companies and organizations pursuing a cloud-first strategy. Welcome to our identity security team, CyberDesk!

And what is the best way to get to know someone? Exactly—by understanding how they think.

Attackers Don’t Hack…

…they log in. In its very first press release, CyberDesk already captured the core issue perfectly. Identity security weaknesses are among the most common entry points exploited by cybercriminals. That alone is reason enough to address identity protection within the company as quickly as possible.

This is exactly where our partner helps bridge the often existing gap between identities and data. Through detailed information about ownership, usage, and permissions, organizations get answers to the key question: who has access to what? With that level of visibility, access decisions can be made faster—and, above all, more reliably.

Most Access Permissions Are Never Actually Needed

In its State of Cloud Permissions Risks Report 2023, Microsoft noted that fewer than 5% of granted permissions are actually used. That figure makes one thing clear: the principle of least privilege has still not truly arrived in most organizations. Users and entities continue to receive far more access rights than they minimally need.

CyberDesk addresses this challenge with its access graph. It visualizes how identities can access data based on their roles and permissions. By mapping data authorization with precision, the successful implementation of least privilege suddenly becomes much more achievable.

Security Does Not Stop with Human Identities

Today, companies are dealing with a vast number of access rights—but not only for people. Non-human identities often fall out of sight, even though they carry just as much risk. A compromised identity—whether human or non-human—can have devastating consequences if taken over by an attacker.

That is why secure access to data by service accounts, secrets, API keys, tokens, and certificates is essential. CyberDesk addresses exactly this point by continuously comparing activity against normal behavior and bringing greater control into the organization. This makes it possible to consistently identify, classify, and remediate security risks. Decision-makers gain precise insight into which data compromised identities can actually access.

About CyberDesk

Munich-based startup CyberDesk helps organizations govern data access adaptively and according to the principle of least privilege through its platform. It focuses attention on authorized identities and answers the question of which data they can access. Contextual information about ownership, usage, and permissions automatically reveals the web of identities and data—and keeps it continuously up to date. This allows weaknesses in data access to be identified, classified, and addressed in a timely manner. The platform is already being used by a number of leading international companies to secure their hybrid multi-cloud environments.

Keeping Data and Identities in View

Identity and data directory, access graph, lifecycle management, access review, and risk monitoring: from the very beginning, CyberDesk delivered strong arguments in favor of a partnership. Now, together, we are moving forward at full speed to help secure your identity management and your data access as effectively as possible—with a modern platform for identity-centric data security.

Would you like to replace complex data security with transparent data security?

CyberDesk’s identity-centric approach to data security is exactly the right fit.