Updated Apr 22, 2026
Score 33
Aorato logo

Aorato

Ranked #337 of 1,000+ cybersecurity companies
Profile
INITIALIZING DATA STREAM...

Overview

Acquired By
Microsoft
Legal Name
Aorato Ltd.
Founded
2012
Crunchbase Rank
#851659

Aorato, acquired by Microsoft in 2014, provides a non-intrusive Directory Services Application Firewall for Active Directory that uses machine learning and a continuously updated Organizational Security Graph to learn, profile, and predict behavior across users, devices, and servers in on-premises and cloud environments, detecting anomalies and advanced attacks to protect organizations.

Industries
Computer and Network Security
Type
Privately Held

Company Size

Employees
 
2
Range1–10 employees
110K+

Affiliated Organizations

MicrosoftAffiliate

Similar Organizations

ApiiroDiversion - Scalable Version ControlMicrosoftZero NetworksDecartExceed.ai by GenesysAireyeSedricDragonflyStream.Security

Headquarters

250 Greenwich St, New York, NY 10007

Followers

 
3,764

Press Coverage

DateArticlePublisher
Sep 2, 2025Glilot Capital sees handsome returns on startup investmentsGlobes
Mar 17, 2022Google Sets The Pace In What Could Be A Record Year For Cyber M&ACrunchbase News
Mar 10, 2021Security platform replaces manual risk assessment with on-the-fly analysis during the build processTechRepublic
Oct 13, 2020Israeli code risk co apiiro raises $35mGlobes
May 3, 2018Cybersecurity Entrepreneur Makes a Sharp Turn Towards Screenagers to Create a Positive Vibe in Social NetworksPRNewswire
Jan 5, 2017This Middle Eastern Country Is Tech’s Best-Kept SecretNew York Observer
Jun 10, 2016Nir Blumberger Joins Accel as Venture PartnerFinSMEs
Jun 8, 2016Accel appoints ex-Facebooker Nir Blumberger as Venture Partner to focus on IsraelTechCrunch
Jun 8, 2016Accel hires Facebook corporate development executive for Israel team: CORRECTEDPE HUB
Jun 8, 2016Facebook's Nir Blumberger joining Accel as venture partner to open Tel Aviv officeBoston Tech Flash

Specialties

Security and IntelligenceActive DirectoryAPTIdentity and AccessBehaviorally suspicious entity activitySensitive actionsForensicsBehavioral Analysis

Categories

ComputerNetwork SecuritySecurity