Full-Time

Enterprise Account Executive

Obsidian Security

Obsidian Security

201-500 employees

SaaS security platform for risk management

Compensation Overview

$164k - $170k/yr

+ Equity Awards + Sales Commission

Remote in USA

Remote

Remote role; preference for Greater NY tri-state region with travel within/outside the region.

Category
Sales & Account Management (1)
Required Skills
Forecasting
Requirements
  • Five or more years of enterprise sales experience
  • Working knowledge of sales concepts, methods and techniques
  • Experience evangelizing new technology into Fortune 1000 accounts
  • Ability to maintain and manage existing client relationships and accounts
  • Ability to utilize existing client and/or C-Level relationships, as well as build new relationships across information technology security and other lines of business
  • Self starter who creates and maintains a sales pipeline by capturing accurate information in customer relationship management databases including activity, closing, project forecast, close ratios and market intelligence
  • Strong ability to understand a customer’s business issues and needs and articulate and map back value to a solution
  • Strong prospecting skills, deal qualification, and point of view management skills leading to acquisition of new business
  • Team player with the ability to collaborate with internal stakeholders or partners to drive opportunities to closure
  • Ability to stay up to date with market trends, competitor analysis, and market conditions which may impact customers
  • Able to learn quickly and ramp to effectively articulate and differentiate the value of the product to prospective clients
Responsibilities
  • Proactively identify, qualify and close sales pipeline across territory and accounts
  • Close business to meet and exceed monthly, quarterly and annual business targets
  • Demonstrate an extensive understanding of the Obsidian Security offering and its value to customers
  • Align with partners and alliances to optimize opportunities
  • Partner with internal resources across Sales Engineering, Customer Success and Customer Support
  • Demonstrate accurate pipeline forecasting and management
  • Actively participate in sales enablement training

Obsidian Security provides a unified SaaS security platform for large organizations. It offers continuous compliance monitoring, SaaS incident response, and third-party SaaS risk monitoring from a single platform. The product collects and normalizes data from all SaaS apps into a knowledge graph of user activity, integrations, privileges, and in‑app posture to support risk assessment and investigation. It differentiates itself with cross‑app data linkage via the knowledge graph, continuous learning from every threat mitigated, and a track record with Fortune 1000 customers and partners like CrowdStrike, aiming to reduce SaaS risk and stay compliant cost‑effectively.

Company Size

201-500

Company Stage

Series C

Total Funding

$119.5M

Headquarters

Newport Beach, California

Founded

2017

Simplify Jobs

Simplify's Take

What believers are saying

  • Obsidian detected Salesloft breach ahead of Mandiant, preventing customer data loss.
  • Ranked on 2025 Deloitte Technology Fast 500 for rapid North American growth.
  • Partnership with SentinelOne expands endpoint-SaaS threat protection reach.

What critics are saying

  • Salesforce embeds native token attestation in Einstein AI by Q3 2026, eliminating demand.
  • Zscaler acquires browser SaaS startup in Q3 2026, undercutting Obsidian pricing.
  • Gurucul's analytics outpace Obsidian's graph by Q2 2027, eroding anomaly detection.

What makes Obsidian Security unique

  • Obsidian uses unified knowledge graph for SaaS user and integration activity.
  • Integration Attestation cryptographically verifies bearer token origins in real-time.
  • Browser extension detects shadow AI usage across SaaS applications instantly.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Health Insurance

Dental Insurance

Vision Insurance

401(k) Retirement Plan

401(k) Company Match

Unlimited Paid Time Off

Paid Holidays

Parental Leave

Professional Development Budget

Growth & Insights and Company News

Headcount

6 month growth

1%

1 year growth

2%

2 year growth

1%
Obsidian Security
Mar 11th, 2026
The bearer token problem hidden inside your AI Agent strategy

The bearer token problem hidden inside your AI agent strategy. PUBlished on March 11, 2026 updated on March 12, 2026 Sophie Zhu Token theft has always been a risk. But two recent breaches have made the scale of the impact much harder to ignore. In the Salesloft-Drift and Gainsight incidents, the ShinyHunters threat group leveraged stolen bearer tokens to access the Salesforce environments of more than 700 organizations, without triggering a single authentication alert. Bearer tokens function like universal keys: if you have the token, the system assumes you're authorized, no questions asked. This trust-based model has powered machine-to-machine communication across enterprise systems for years. Now, AI agents are inheriting the same design. As enterprises race to deploy autonomous agents across their environments, every new integration expands the potential blast radius of a single token compromise. The bearer-token model that made enterprise automation possible was never built for the scale of what's coming. That's why Obsidian is introducing runtime defense for SaaS supply chain token compromise, shifting security away from blind trust and towards evidence-based access. Bearer tokens: the architecture of blind trust. Bearer tokens operate on a simple principle: possession = authorization. If a valid token is presented, the receiving platform automatically authenticates the request. There's no verification of the user or system actually holding it. This design is what makes automation possible. Bearer tokens allow systems to communicate with each other, without a human in the loop. For example, a Salesforce integration syncing data to a data warehouse every hour would be impractical if it required a person to re-authenticate each interaction. Bearer tokens solve that problem elegantly. This convenient design also introduces a tradeoff. When attackers steal a bearer token, they inherit the same access as the legitimate system, creating, reading, uploading or deleting data, until the token is revoked or expires. The platform receiving these requests has no way to tell the difference. Another way to think about it: Imagine bearer tokens like a house key. Frodo gives Sam, whom he trusts, a key to his house. Sam can come and go freely. But if that key is stolen, the front door has no other verification method to tell who's holding it. No face recognition, no fingerprint scanner, no alarm. Just a key that fits the lock. This model worked reasonably well when automation was limited to a handful of integrations. But today, enterprises are deploying AI agents and automated workflows across their entire ecosystem. Each agent relies on bearer tokens to access business systems, and most are granted broad permissions within them. If a single agent or integration is compromised, the attacker may inherit access to every application connected to it. The blast radius of a single compromise has never been larger. What a bearer token breach actually looks like. The Salesloft-Drift breach is worth examining closely. Salesloft's Drift is a conversational AI chatbot that commonly integrates with Salesforce. During the initial setup, Salesforce issues bearer tokens that allow Drift to access customer data going forward. When ShinyHunters gained access to Drift's infrastructure, they were able to steal those tokens, and with them, pathways into the Salesforce environments of more than 700 organizations. For affected companies, detection wasn't straightforward. Every API request looked legitimate: it was authenticated and signed by a known integration. Teams were hearing reports of a vendor compromise, but even Salesloft-Drift itself didn't have visibility into the token usage logs, as those lived in each customer's own SaaS tenant. That left security teams facing an impossible call: combing through logs that could represent either legitimate integration activity or malicious use of stolen tokens, with no clear signal to distinguish between them. Acting too fast risked disabling a business-critical integration. Waiting too long meant attackers might still be in the environment and had full access to export data. The logs could only verify the token. They couldn't verify the system that generated the request. Some investigations took weeks to resolve. And others, for those organizations without the logs or context to trace the activity back to the original compromise, were never resolved at all, leaving teams uncertain whether the threat had passed or simply gone quiet Obsidian security's integration attestation: prove that a request is exactly what it claims to be. Integration Attestation addresses the architectural flaw that makes token theft hard to detect, by adding cryptographic proof of origin to API requests made with bearer tokens. Let's unpack what that means. Before a vendor sends an API request to access a third-party application, their system stamps the request with a unique, unforgeable signature. Think of it like a wax seal on a letter. The secret used to generate that signature is stored inside secure hardware, where it cannot be copied or extracted. Only the vendor's real systems can produce a valid signature. Obsidian continuously verifies these signatures as API requests occur. If a request arrives with a missing or invalid signature, it's immediately flagged for investigation. Security teams can now answer a question bearer tokens alone can never resolve: Did this request actually originate from the vendor's environment, or is someone impersonating them? Critically, this verification signal appears directly in the existing SaaS activity logs that organizations already use. Security teams don't need a new monitoring system to deploy, no separate logging pipeline to maintain. The proof is embedded alongside normal integration activity, giving analysts immediate, in-context visibility during investigations. What security teams can do now that they couldn't before. For the first time, teams have a reliable, real-time signal that distinguishes legitimate integration activity from stolen-token use, without waiting for behavioral anomalies to accumulate or for a vendor to issue a disclosure. That changes the mat on three things that have historically made bearer token compromise so damaging. * Detection intrusion at the moment of SaaS supply chain token compromise: Because signatures are verified continuously and appear in standard SaaS logs, suspicious activity is flagged in near-real time. The window attackers rely on, operating undetected inside a trusted integration, shortens significantly. * Operate independently of vendor disclosures: Organizations no longer have to wait for a vendor to investigate their own infrastructure before they can understand whether their environment is affected. The evidence is in their own logs, immediately accessible. * Reduce containment time for supply chain incidents to minutes: With clear proof of origin, analysts can escalate and revoke compromised tokens quickly, or confidently confirm that activity is legitimate. Either way, they have the evidence to support the decision to the rest of the business. A foundation built for the autonomous future. The enterprise automation model wasn't designed for the scale of machine activity Obsidian Security Inc. is about to see. As AI agents and autonomous workflows expand across business systems, bearer tokens will increasingly become the connective tissue holding applications together. The underlying assumption - that possession of a token equals trust - will be tested in ways the original architecture never anticipated. Integration Attestation introduces a missing layer of verification. Instead of trusting the token alone, organizations can now verify where a request actually originated. That additional signal gives security teams what they've never had: the ability to detect stolen-token activity, investigate incidents with confidence, and respond quickly before damage compounds. The bearer token era isn't over. But the era of blind trust in them is! Get started. Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

Obsidian Security
Mar 10th, 2026
Shadow AI isn't just new tools, it's hiding in the SaaS you already trust

Shadow AI isn't just new tools, it's hiding in the SaaS you already trust. PUBlished on March 10, 2026 updated on March 10, 2026 Last month Obsidian Security Inc. launched a new capability to detect AI usage in SaaS applications. What Obsidian Security Inc. found was striking. In just 30 days, Obsidian Security observed 69,749 interactions between users and corporate data with SaaS embedded AI features, most of which would have gone unnoticed without in-browser detection. As organizations race to adopt the latest AI features to boost productivity, you cannot afford to play catch up. Your legal and compliance teams are now turning to security to answer a question you may not yet be able to answer: are your AI-enabled SaaS vendors accessing data outside what was authorized in data processing agreements? Without clear visibility into how shadow AI models interact with enterprise data, you risk unknowingly exposing sensitive IP and customer information to third parties, often through tools you and your users already trust. Shadow AI is being embedded across your existing SaaS stack. When you think of AI, you probably picture standalone products like ChatGPT or Glean - tools your teams deliberately chose, evaluated, and connected to business data - that automate workflows and boost productivity using built-in AI models. But these third-party tools are not the only places where AI is interacting with enterprise data and where exposure lives. Traditional SaaS platforms, from Atlassian to Twilio, Zendesk to Airtable, are rapidly and quietly embedding AI features directly into applications your teams already use every day. This shift fundamentally changes how data is accessed, processed, and retained. Yet unless you are constantly reviewing product updates and release notes, it may take months before you realize that sensitive data is being sent to an external AI model - one that wasn't part of your original vendor review. The quiet AI takeover of SaaS and what it means for your data. Because SaaS is controlled by end users, new AI features can often be enabled without triggering security reviews or approval workflows. And unlike the AI tool your teams intentionally adopted, embedded AI arrives pre-installed in applications that already passed your last security review. Consider what this looks like in practice: * A user enables Slack's built-in AI to summarize conversations, granting the model access to message history * An employee uses Zendesk AI to turn internal knowledge base content into articles * AI assistants in Airtable analyze customer data to automatically generate new project workflows Each of these scenarios represents a real, active transfer of enterprise data to an AI model that may not have been part of any risk assessment. More importantly, many of these capabilities are shipped without mature configuration controls or robust logging APIs, leaving you with limited ability to govern or monitor their use, after the fact. Real world risk. A single employee experimenting with a new AI feature could inadvertently put your organization in breach of contract, out of compliance with regulatory obligations, or in violation of customer MSAs, without anyone in your security team knowing it happened. While productivity is real with these features, so are the contractual or compliance consequences. Your organization likely has explicit policies prohibiting AI models from processing or training on certain categories of data. In some cases, these restrictions are explicitly defined in customer agreements or MSAs. These restrictions don't disappear because a vendor quietly shipped a new feature. And relying on manual reviews, vendor assurances, or user reporting is simply not fast enough to catch this activity before it becomes a compliance problem. You need stronger controls and real-time visibility into how AI features are interacting with their data. Secure shadow AI at the speed of adoption. Continuous SaaS releases are breaking point-in-time TPRM reviews. Your Third-Party Risk Management (TPRM) processes were built to enforce security and compliance policies at the time of procurement. When a new SaaS tool is adopted, it typically undergoes an extensive review. Your team evaluated the risks, decides what data the system can access, and documents the outcome to ensure it does not introduce unacceptable risk to the business. With standalone AI tools, this pattern holds. Your teams intentionally select the product, evaluate the risks, and set boundaries Embedded AI is different, and it's breaking the TPRM model. Once a SaaS application passes its initial review, those security assumptions often remain unchanged for years. But when vendors later introduce new AI capabilities, the same level of scrutiny rarely happens, even though the potential risks can be just as significant. The result: AI features gain access to sensitive data, generate outputs based on proprietary information, or perform automated actions inside platforms that you've already "approved" and stopped watching. A growing gap. The challenge isn't just knowing which SaaS applications offer AI features. You need evidence of how those features are actively being used, in real time. A static list of vendor capabilities doesn't tell you whether your employees are using them right now. Other approaches in the market attempt to spot when users deploy AI by scanning OAuth permissions, reviewing app configurations, or flagging AI tools at the network layer. These approaches can identify that an AI tool exists, but they can't tell you when an AI feature inside an already-approved application is being invoked. That level of visibility requires monitoring at the point of interaction: the browser. Shadow AI detection: monitoring AI features at the browser level. Obsidian Security helps you detect and manage these emerging risks, enabling safe and responsible use of AI across your business. By deploying the Obsidian Security Browser Extension, you gain visibility at the exact point where users engage with SaaS. The browser is where AI features are enabled, where your data is entered, and where AI outputs are generated. And it's the only place where you can observe what's actually happening, rather than infer it from logs or configurations. Monitoring these interactions with Obsidian allows you to detect when AI features are used inside popular applications, and surface that activity directly to security teams. With Obsidian, you can: * Detect when AI features are activated inside popular SaaS applications * Identify which users are interacting with AI systems * Surface that activity directly to security teams in real time Why this matters for compliance. Real-time activity monitoring isn't just a security control, it's the evidence layer legal and compliance teams need to demonstrate that AI interactions with sensitive data were authorized, understood, and governed under applicable policy. Without it, you're attesting to controls you can't actually verify. With this insight, you can govern SaaS applications that embed AI capabilities with the same rigor as net-new tool adoption. Meaning you can implement evidence-based controls for the users enabling them, the data they access, and the integrations they rely on. What's next: from shadow AI detection to AI governance. Visibility into AI feature activity is the foundation, but it's only the beginning. As your SaaS vendors continue to embed AI capabilities at an accelerating pace, your exposure will keep expanding whether or not your policies do. The organizations staying ahead of this challenge aren't just detecting AI activity after the fact. They're building the governance layer that lets them define which AI features are permitted, on which data, for which users, and enforce those policies continuously, not just at the point of procurement. Because in a world where your SaaS vendor can turn on a new AI model next Tuesday, point-in-time reviews are a policy fiction. Real governance has to be continuous. Curious what AI activity is already happening in your SaaS environment? Get started. Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

SiliconANGLE Media
Jan 22nd, 2026
Obsidian Security targets rising tide of SaaS integration threats

Obsidian Security targets rising tide of SaaS integration threats. Obsidian Security Inc. today released a new suite of capabilities aimed at securing the software-as-a-service supply chain, offering what the company calls the first end-to-end protection for integrations between cloud-based applications. The release comes as businesses increasingly rely on interconnected SaaS environments and autonomous artificial intelligence agents embedded in workflows. The company said such integrations, while valuable for automation and efficiency, have become a growing target for attackers exploiting blind spots in traditional security tools. Obsidian pointed to last summer's breach of Salesloft Inc.'s cloud sales platform as one of the largest and most recent examples of vulnerabilities created by SaaS integrations. Attackers reused stolen OAuth tokens to move laterally between applications, affecting more than 700 organizations. "Every integration extends trust, often far beyond what security teams can easily see," Khanh Tran, chief product officer at Obsidian Security, said in a statement. "As AI agents gain autonomous access and link multiple SaaS applications together, the blast radius of a single compromised integration grows exponentially." Real-time detection and response. The new capabilities focus on three areas: visibility into SaaS-to-SaaS integration risks, early breach detection and rapid incident containment. Obsidian leverages a knowledge graph of usage patterns gathered from hundreds of customers to normalize identity and activity data across human and nonhuman users in various SaaS environments. "We correlate and normalize identity across all SaaS applications," said Chief Executive Hasan Imam (pictured). "If you understand that the Hasan in Salesforce is the same as the Hasan in Workday, you can baseline Hasan across platforms." The company claims its system can detect breaches in near-real-time by identifying anomalies in OAuth scopes, application programming interface behavior and user activity patterns. Alerts can be fed into an organization's existing operations platforms, such as security information and event management and security orchestration, automation, and response. Obsidian said the new capabilities also address "shadow integrations," which are unauthorized connections between SaaS applications created without information technology department oversight. "It's an integration that an enterprise never allowed, never approved, and that didn't go through a governance process," Imam said. "We discover that for them." He estimated that between 50% and 60% of integrations aren't used. Obsidian said AI agents, which interact autonomously across applications, further increase the attack surface. Agents typically use the same APIs and OAuth tokens as traditional SaaS integrations, making them difficult to distinguish and secure. Though human access controls are relatively easy to enforce because humans move slowly, AI agents can cause significantly more damage in a short time period. Early endorsements. Obsidian provided endorsements from early customers Wyndham Hotel Group LLC and Seagate Technology Holdings PLC, which said the new capabilities address a pressing need. "In the absence of continuous visibility into the entire SaaS ecosystem, especially unauthorized activity between SaaS applications, we are looking at a huge data breach waiting to happen," Joseph Gothelf, Wyndham's vice president of cybersecurity, said in a statement. Imam said Obsidian was able to detect signs of the Salesloft breach "earlier than anybody else," in near real-time and in parallel with incident response firm Mandiant Corp. "We were able to get ahead of this," he said. "None of our customers lost any data due to this breach." He said SaaS-to-SaaS security requires a new layer in enterprise defense and focused investment. "Architecturally, it's separated from all the things we have been thinking about," Imam said, citing endpoint, network and user access controls. "It requires a novel approach and focus to truly solve this problem." Photo: Obsidian Security. A message from John Furrier, co-founder of SiliconANGLE: Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE's Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities. * 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more * 11.4k+ theCUBE alumni - Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network. SiliconANGLE Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios - with flagship locations in Silicon Valley and the New York Stock Exchange - SiliconANGLE Media operates at the intersection of media, technology and AI. Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.

Obsidian Security
Nov 4th, 2025
Obsidian Closes the SaaS Security Coverage and Intelligence Gap Amid Expanding Attack Surface

Obsidian closes the SaaS security coverage and intelligence gap amid expanding attack surface. PALO ALTO, CA - November 4, 2025 - Obsidian Security, leader in SaaS security, today announced a major expansion of its platform to secure the next frontier of SaaS and AI. The release brings together community-built integrations, deep data context, and AI-driven intelligence to help organizations secure their expanding SaaS environment at enterprise scale. SaaS has become the backbone of the modern enterprise and attackers are moving faster than most security teams can respond. SaaS breaches have surged 300% in the past year as adversaries target SaaS supply chains and AI agents by exploiting service accounts, exposed tokens, over-privileged integrations, and unsupervised AI agents to move laterally and exfiltrate data. With more than 30,000 SaaS applications in the market, the challenge isn't just scale, it's fragmentation. Every enterprise runs on a unique mix of apps with thousands of custom integrations and very little overlap, making it impossible for a single vendor to deliver complete SaaS security fast enough. As SaaS adoption accelerates, each new app and integration compounds the problem, expanding interconnect risk and multiplying the attack surface. The only way to keep up is to rethink how SaaS security coverage is built. Instead of relying on a single vendor to integrate every app, security needs to scale the way SaaS itself does, through open, shared and certified development. With the launch of the Community SDK, Obsidian is addressing this gap head-on, enabling customers, partners, and vendors to build, share, and standardize security integrations that extend protection across the full SaaS and AI landscape. This community-driven approach breaks the capacity bottleneck, accelerating the speed of reliable protection and ensuring no app, integration or agent goes unseen. Together with Obsidian's next-gen Knowledge Graph and AI Assistant, these innovations deliver the visibility, context and intelligence security teams need to zero in on SaaS threats before they become breaches. "SaaS is now the new enterprise operating system, and its attack surface is expanding faster than most teams can defend it," said Khanh Tran, Chief Product Officer at Obsidian Security. "With the latest additions to our platform, we're giving organizations what they've been missing: a way to secure SaaS at enterprise scale. From our new community SDK and connectors to enhanced Knowledge Graph and AI Assistant, we're turning SaaS security from a patchwork of blind spots into a connected, intelligent defense system built for the age of AI." Full SaaS coverage with the new Obsidian Community SDK and connectors. Security teams can't protect what they can't connect. With thousands of SaaS apps and integrations in every enterprise, the biggest gap in SaaS security today is coverage. Without full connector coverage, teams can't see how data moves or what actions take place inside the SaaS supply chain, yet no single vendor can keep up with that speed and scale. Obsidian's new community SDK and connectors democratize integration development, giving security teams the power to build, reuse and scale SaaS visibility on demand, ensuring nothing in the SaaS chain goes unprotected. In just 30 days, Obsidian customers and partners have already built 40 new integrations, proving how quickly SaaS security can evolve with an open, collaborative model. * Instant coverage: Access enterprise-grade connectors that provide deep visibility into critical SaaS apps, capturing deep telemetry needed to monitor, investigate, and secure them from day one. * Custom at scale: Build or adapt connectors for any niche, custom, or emerging SaaS app in days, aligning with your unique security and compliance frameworks. * Ecosystem-powered expansion: A community-driven connector ecosystem built with customers, partners and SaaS vendors, that's verified, hosted, and fully supported by Obsidian, accelerating coverage, ensuring reliability, and expanding visibility across the SaaS and AI landscape. Next-gen Knowledge Graph connecting every identity, account, agent and action. Most security graphs were built for endpoints and networks, not SaaS. In SaaS environments, shadow apps, unmonitored integrations, overprivileged access, and AI agent activity quietly expand the attack surface beyond traditional visibility. Even when identities are mapped, what's missing is context on how they behave, what data they touch and how they interact across environments. The Obsidian Knowledge Graph, purpose-built for SaaS, creates a dynamic, stateful model of how access and data move across applications. It connects people, accounts, and activity with the context of roles, tokens, and integrations to reveal where risks emerge and accumulate through the SaaS mesh. The latest release strengthens this even further, mapping the full chain from account to identity to activity mapping across every SaaS tenant and application. Key advantages include: * Unified, time-aware SaaS risk model: Brings together identities, accounts, roles, permissions, tokens, integrations, scopes, resources, and activity into a single, living graph, keeping both history and current status so everything is traceable. * Rapid graph traversal for exposure insight: Follows consent chains and token-to-scope-to-resource paths in seconds to reveal blast radius, shadow integrations, risky data flows, privilege drift, and anomalous AI agent behavior across tenants. * Actionable outcomes at scale: Powers detections, risk-based prioritization, and faster remediation, such as rapid revocation of stale tokens, quarantining toxic permissions, and more, accelerating investigations and enforcing least privilege with verifiable evidence. "You can't protect what you don't understand, and until now, SaaS has been a black box," Khanh continued. "The new Obsidian Knowledge Graph changes that. It maps every human and AI identity, account, and action into one living model of behavior, showing not just where access exists, but how risk spreads inside these applications. It's the clarity that's been missing from SaaS defense up until now." From data overload to decisive action with Obsidian AI Assistant. Security teams are buried in alerts, posture rules, and SaaS sprawl. Every new app, integration, or AI agent adds more noise, manual work, and risk for human error, while existing tools flood teams with data and alerts instead of clarity. Obsidian AI Assistant changes that. It brings intelligence and explainability to SaaS defense, translating complex policies into plain language, prioritizing what matters most and guiding analysts to investigate and protect with speed and confidence. Powered by a governed multi-agent system, AI Assistant connects specialized agents for posture management, threat detection and investigation and SaaS and AI integrations, delivering trusted, explainable answers in seconds through natural language interaction. * Faster investigations: Reduces false positives, identifies root causes faster and cuts mean time to resolution, all while maintaining traceable, explainable reasoning for every decision. * Expertise democratized: Provides clear context and guidance in every security analyst's hands, regardless of experience level, to operate with consistency and confidence. * Efficient operations: Enables small teams to operate like large ones, scaling expertise, not just effort, and ensuring every action aligns with governance and compliance requirements. * Blog: Read the launch article for an in-depth look at the new platform capabilities * Webpage: Explore its platform differentiators * Webinar: Join a panel of leading CISOs as they discuss how they're tackling SaaS and AI security * Follow Obsidian Security Inc.: LinkedIn | X About Obsidian Security. Obsidian Security is the leading SaaS security platform, trusted by global enterprises like Snowflake, T-Mobile, and S&P Global. Obsidian Security Inc. protect over 250 global organizations, including many of the world's largest Fortune 1000 and Global 2000 companies, with data center availability in North America, EMEA, and APAC. Backed by top investors including Greylock, Norwest Venture Partners, and IVP, Obsidian Security Inc. is closing a critical gap: securing the SaaS and AI tools that organizations rely on. Its platform reduces risk, detects and responds to threats, and prevents breaches at the source. Obsidian was built by leaders who redefined endpoint and identity security at CrowdStrike, Okta, Cylance, and Carbon Black.

Business Wire
Sep 23rd, 2025
Obsidian Security Unveils AI Agent Defense to Secure SaaS Data Access

Obsidian Security unveils AI Agent defense to secure SaaS data access.