Updated Apr 23, 2026
Score 33
Stack Identity logo

Stack Identity

Ranked #322 of 1,000+ cybersecurity companies
Profile
INITIALIZING DATA STREAM...

Overview

Acquired By
JumpCloud
Legal Name
Stack Identity Inc.
Founded
2020
Crunchbase Rank
#48059

Eliminate exploitable access to cloud infrastructure and data. We reveal and prioritize your cloud IAM blindspots.

Stack Identity transforms cloud IAM by continuously detecting and removing unauthorized, unmonitored “shadow” access across cloud data, applications, and infrastructure, using an industry-first IAM data lake and a Breach Prediction Index to reveal and prioritize toxic identity risks, visualize them via a live attack map, and automate remediation to protect data while streamlining governance and SecOps/DevOps.

Industries
Network Management SoftwareComputer and Network SecurityCybersecurityArtificial Intelligence & Machine Learning
Type
Privately Held
Social Media

Company Size

Employees
 
6
Range1–10 employees
110K+

Similar Organizations

JumpCloudLast9Integral Ad ScienceUptycsResmo (acquired by JumpCloud)LangGuard.AIOktaBGVBrowserStackCrowdStrike

Headquarters

Menlo Park, CA

Followers

 
1,993

Press Coverage

DateArticlePublisher
Jan 31, 2025Identity Management and Information Security News for the Week of January 31st: JumpCloud, Swimlane, Oasis Security, and Moresolutionsreview.com
Jan 30, 2025JumpCloud acquires Stack Identity platformBizWest
Jan 30, 2025JumpCloud Acquires Stack Identitycitybiz
Jan 29, 2025JumpCloud Acquires Stack IdentityFinSMEs
Jan 28, 2025JumpCloud Acquires Stack Identity, Paving The Way For Identity-First SecurityGlobeNewswire News Room
Apr 27, 2024Security budgets are growing, but so is vendor sprawlSiliconANGLE
Mar 28, 2024The Growing Business Of Cybersecurity: How Do These Stocks Stack Up?Forbes
Mar 8, 2024Expanding The Limits Of AI With IdentityForbes
Jan 24, 2024Stack Identity Expands Identity Access Risk Management Platform with Launch of Identity Threat Detection Response CapabilitiesBusiness Wire

Specialties

IAMCloud Data SecurityData ExfiltrationIdentity and Access ManagementCIEMDSPMData Access Governance

Categories

Cloud ManagementCloud SecurityCyber SecurityIdentity Management

Product

NameDescription
Shadow Access Risk Assessment (SARA)A cloud-based tool that detects and prioritizes unauthorized, unmonitored, and invisible access risks in cloud environments.
Cloud Infrastructure Entitlement Management (CIEM)A platform that provides visibility, monitoring, and automated detection to manage and optimize cloud infrastructure access policies.
Identity Threat Detection and Response (ITDR)A service that detects identity-related threats in real time and supports remediation through automated workflows.
Cloud Identity Governance and Administration (IGA)A platform providing real-time access reviews, policy rightsizing, and governance of cloud identities and their permissions.