WebsiteGear Logo Log In
New User? Sign Up
About | Contact | FAQ
  Home News Web Hosting Computer Hardware Saturday, May 2, 2026 
Add Press Release News | News Feeds Feeds | Email This News Email


Reveal Security Unveils the Reveal Platform: Preemptive Identity Security Across Human and Non-Human Behaviors
Wednesday, August 13, 2025

NEW YORK, Aug. 5, 2025 /PRNewswire/ -- Reveal Security today announced the release of the Reveal Platform, the first solution to deliver preemptive identity security across SaaS, cloud, and custom applications. Designed for modern hybrid enterprises, the platform provides end-to-end visibility into both human and non-human identity behaviors, empowering security teams to stop threats before damage is done.

"Credentials are compromised all the time; it's a reality in how we have to defend, and now we're seeing insider and non-human identity threats increasing," said Kevin Hanes, CEO, Reveal Security. "The problem is once the identity is authenticated and now inside the applications, conventional detection methods which rely on signature and rule-based methods leveraging known Indicators of Compromise become far less effective, as they often struggle to differentiate between legitimate and malicious activity executed by a seemingly 'trusted' identity."

"We built the Reveal Platform to shift the balance of power back to defenders by monitoring all identity behavior after authentication, uncovering activity that indicates compromise or insider threat, layering in predictive intelligence and enabling instant, automated response," Hanes said.

Go Beyond Login: From Detection to Anticipation

According to GartnerĀ® Research, "Without preemptive cybersecurity, no organization is safe. The increasing speed, sophistication and scope of AI-enabled threats is destroying the reliability of existing stand-alone detection and response (DR) cybersecurity methods."(1)

But most security tools monitor identity at the point of login. Reveal goes further - tracking identity behavior across applications and clouds, correlating signals, and detecting anomalies both at and after authentication. With identity attribution, stories of identity behavior, and one-shot response automations, security teams can act quickly and preempt threats.

With its innovative core technology, including rich data, application threat modeling, ML, and AI, Reveal simultaneously protects against account takeover attacks and insider threats in a single platform without overwhelming the SOC with alerts or the need to write detection rules.

Key capabilities include:

    --  Post-Authentication Visibility: Uncovers what identities do after login
        across applications like Box, Salesforce, Okta, Microsoft 365, Google
        Workspace, AWS, Azure, and more.
    --  Cross-App Behavioral Analytics: Provides the full picture of what
        identities are doing across the many enterprise applications they use
        daily.
    --  Credential Abuse Detection: Identifies unauthorized access and
        post-login activity resulting from stolen or exploited credentials.
    --  Insider Threat Protection: Monitors risky users and detects malicious or
        negligent insider activity.
    --  Human and Non-Human Behavior Monitoring: Profiles bots, APIs, and GenAI
        agents just like human users.
    --  Preemptive Identity Security: Through identity attribution and
        predictive intelligence, Reveal determines who is acting and why, so
        security teams can take action before damage occurs.
    --  One-Shot Response Automations: Instantly suspends accounts, revokes
        sessions, or updates risk scores based on policy.
    --  Seamless SOC Integration: Works with SIEM, SOAR, and Slack for
        contextual alerting and streamlined response. No endpoint agents
        required.

Built for the Front Lines of Cyber Defense

Reveal's high-fidelity behavioral intelligence prioritizes alerts by severity and confidence, reducing noise while increasing precision. The platform supports hybrid identity environments, flags risky behavior across user and service accounts, and arms security teams with actionable context.

Real-world examples of Reveal's behavior-based detections, without rule creation, include:

    --  Detect Recon of Threat Actor Using Stolen CredentialsReveal detected a
        coordinated series of suspicious actions across multiple applications
        affecting cloud file-sharing (BOX) and identity access (OKTA) systems,
        indicating reconnaissance. Showing deviation from normal identity
        behavior, these anomalies included account deletions, unauthorized
        collaboration removals, and unexpected identity verification attempts
        from the Southern Asia subcontinent. The threat was contained.

    --  Privilege Abuse in Microsoft 365The Reveal Platform detected a
        coordinated series of mailbox-related administrative operations within
        Microsoft 365. This activity was immediately flagged due to the
        identity's atypical behavior and the security-sensitive nature of the
        actions, consistent with potential data exfiltration. While each
        operation was individually valid, their combination exhibited a
        high-risk pattern, indicative of either an insider threat or the
        malicious exploitation of elevated privileges, potentially stemming from
        a compromised administrator account. The account was immediately
        suspended, and the security team launched a full investigation.

    --  Suspicious Insider Activity in a Custom ApplicationLegacy and custom
        applications are often not well protected by organizations and usually
        have minimal controls in place.  Reveal detected a highly trusted
        identity logging into a "crown jewel" critical business application and
        accessing confidential data abnormally. The SOC investigated and
        determined that a company leader was being specifically targeted by a
        financially motivated cybercrime group.

    --  CEO Impersonation Using Legitimate CredentialsReveal detected that a
        company's top executive was accessing Confluence and browsing content on
        critical information and business systems. Reveal detected the identity
        performing anomalous behaviors involving this proprietary information
        and notified the security team.  The information security analysts
        revoked sessions for that identity to protect the data and to stop the
        attacker. The executive's laptop had been stolen while he was already
        logged into multiple applications.

Availability

The Reveal Platform is available immediately. Existing customers will receive upgrade support. New customers can request a demo at www.reveal.security.

(1 )Gartner, "Tech FutureSight: Preemptive Cybersecurity Is the Only Way to Secure Emerging AI Attack Surfaces," Carl Manion, Luis Castillo, Matt Milone, Charanpal Bhogal, Mark Wah, Travis Lee, Esha Bhatia, Walker Black, Elizabeth Kim, David Senf, Tom Powledge, Isy Bangurah, 9 May 2025 - ID G00833236.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

About Reveal Security

Reveal Security is the preemptive identity security company helping enterprises stop identity-based threats before they cause harm. By applying ML- and AI-powered identity behavior analytics across enterprise applications, Reveal brings visibility, precision, and automation to identity security. Learn more at www.reveal.security.

Media Contact
Danielle Ostrovsky
Hi-Touch PR
410-302-9459
ostrovsky@Hi-TouchPR.com

View original content to download multimedia:https://www.prnewswire.com/news-releases/reveal-security-unveils-the-reveal-platform-preemptive-identity-security-across-human-and-non-human-behaviors-302519201.html

SOURCE Reveal Security



Email This News Email | Submit To Slashdot Slashdot | Submit To Digg.com Digg | Submit To del.icio.us Del.icio.us | News Feeds Feeds

RELATED NEWS ARTICLES
Nav Energy Toolbase Launches Energy Storage Partnership with Sungrow to Support PowerStack 255CS and PowerTitan 2.0 | Jan 22, 2026
Nav RS now offers Phoenix Contact's pioneering new NearFi technology | Jan 22, 2026
Nav MetaOptics to Showcase Five Breakthrough Metalens-Powered Products at CES 2026 | Jan 22, 2026
Nav Quantum Art Raises $100 Million in Series A Round to Drive Scalable, Multi-Core Quantum Computing | Jan 22, 2026
Nav SCAILIUM Debuts "AI Production Layer" to Overcome GPU Starvation and Slash AI Energy Waste | Jan 22, 2026
Nav Fresco Raises EUR15m Series C to Power the Future of AI-Driven Cooking and the Connected Kitchen Ecosystem | Jan 22, 2026
Nav Einride and IonQ Partnership Uses Quantum Computing to Optimize the Logistics of Electric and Autonomous Freight | Jan 22, 2026
Nav No Assembly Required: Barrett Distribution Centers Powers Maxwood Furniture's West Coast DTC Expansion | Jan 22, 2026
Nav Hesai Recognized as the Only Lidar Company on Morgan Stanley's "Humanoid Tech 25" of Global Robotics Leaders | Jan 22, 2026
Nav Ekinops New C700HC Chassis Efficiently Connects the Data Center and the Central Office | Jan 22, 2026
NEWS SEARCH

FEATURED NEWS | POPULAR NEWS
Submit News | View More News View More News