About Stack Identity

Explosive data sharing in the Cloud and AI era proliferates identities and entitlements resulting in Shadow Access risks

Automated Infrastructure as Code (IaC) processes create an explosion of over-privileged access and entitlements. At the same time, zettabytes of data are being shared with cloud apps, services, third parties, and AI. The intersection of these two trends has given rise to a new concern: Shadow Access.

Shadow Access is unauthorized, unmonitored, unintended and invisible access to sensitive data, applications and software and leads to data breaches, compliance violations, operational disruptions, and security vulnerabilities.

Addressing Shadow Access demands transforming
Cloud IAM to secure the Cloud

Everything in the modern cloud has an identity, bestowed with powerful privileges and permissions. This creates invisible data access risks across infrastructure, applications, and data stacks.

However, unlike software vulnerabilities, malware, or new ransomware, identity is a security vector where enterprises can have complete control and accurately answer questions of:

  • Who has access to what?
  • Who is actively using these permissions?
  • Are they authorized for such access?
  • What unauthorized activities are happening beneath the surface?

Stack Identity’s unified platform continuously detects and eliminates Shadow Access before an attacker can exploit it

Stack Identity provides a live data attack map that reveals a prioritized view of Shadow Access vulnerabilities to enable continuous access reviews and prevent data exfiltration, rogue access, or unauthorized data sharing.

We empower Cloud SecOps, DevOps and Compliance teams with an integrated approach to CIEM, ITDR and Cloud IGA with the comprehensive visibility needed to assess, review, remediate, and refine their cloud identity and access controls.

Leadership Team​

Venkat Raghavan


Ambrish Deshpande


Sanjay Kale


Amol Patil


Investors And Advisors

Alireza Masrour


Al Ghous

Experienced CISO, venture advisor, and co-founder of SVCI (Silicon Valley CISO Investments)

Amol Kulkarni

ex-CPO of Crowdstrike

Heather Hinton

CISO of Pager Duty, former CISO of RingCentral and former vice president, distinguished engineer, and CISO of IBM Hybrid Cloud

Kenneth Foster

VP of IT governance, risk and compliance at FLEETCOR

Rohan Puranik

Partner, WestWave Capital

Sachin Aggarwal

Builder, Entrepreneur, CEO, appCD

Shinesa Cambric

Board member, entrepreneur, and principal product manager at Microsoft

Sonal Puri

Board member and advisor, entrepreneur, former CEO, and vice president of global business operations at Checkpoint

Steven Schoenfeld

Board advisor, former SVP of products of Imperva, Blue Coat and Symantec

Yashwanth Hemaraj


Seed Investment by Top Silicon Valley VCs