Opal Security
Backed by
The best security and engineering teams use Opal to manage access for everyone and everything in the modern enterprise — from employees and contractors to service accounts and AI agents. Recognizing that access moves rapidly, touches everything, and changes constantly, our AI-proofed authorization control plane is built for how identity works (and what identity security needs) today and tomorrow: scale, speed, and intelligence.
Explore similar companies to Opal Security

Cloaked
Protect your data by generating unlimited identities.
Cybersecurity · Series B · Onsite · Based in New York

Cape
Cape is the privacy-first mobile network.
Cybersecurity · Series C · Onsite · Based in Washington, DC

Tracebit
The answer to Assume Breach.
Cybersecurity · Series A · Onsite · Based in San Francisco

Evervault
Flexible payments security and compliance.
Cybersecurity · Series B · Remote · Based in Dublin

depthfirst
An applied AI lab securing production
Cybersecurity · Series A · Remote · Based in San Francisco

Vega
AI-native security analytics.
Cybersecurity · Series B · Onsite · Based in New York

Duna
AI-native KYB.
Cybersecurity · Series A · Remote · Based in Berlin

Daylight Security
Managed agentic security services.
Cybersecurity · Series A · Remote · Based in New York

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv
Industries
Investors
Cities

