Umaimah Khan
👤 PersonAppearances Over Time
Podcast Appearances
And then really tying that back to looking at our like cohort of early customers and making sure it resonated with all of our other customers who are in the same direction and looking for the same sort of like product vision.
And then really tying that back to looking at our like cohort of early customers and making sure it resonated with all of our other customers who are in the same direction and looking for the same sort of like product vision.
And then really tying that back to looking at our like cohort of early customers and making sure it resonated with all of our other customers who are in the same direction and looking for the same sort of like product vision.
To me, like the way I think about this philosophically is it comes back to positioning. So access touches a lot of different stakeholders in an organization and a lot of different departments and economic buyers. Like you can think that if you just think about it, right, like access is about it's a workforce issue, right? It's not just like directly security or engineering issue.
To me, like the way I think about this philosophically is it comes back to positioning. So access touches a lot of different stakeholders in an organization and a lot of different departments and economic buyers. Like you can think that if you just think about it, right, like access is about it's a workforce issue, right? It's not just like directly security or engineering issue.
To me, like the way I think about this philosophically is it comes back to positioning. So access touches a lot of different stakeholders in an organization and a lot of different departments and economic buyers. Like you can think that if you just think about it, right, like access is about it's a workforce issue, right? It's not just like directly security or engineering issue.
It's also a security issue. It's also a compliance issue. when we think about our positioning and what's unique about us at Opal Security is that we are a security company first and foremost. And that means that like from day one, we have to build a lot of trust and that has to show through in our features.
It's also a security issue. It's also a compliance issue. when we think about our positioning and what's unique about us at Opal Security is that we are a security company first and foremost. And that means that like from day one, we have to build a lot of trust and that has to show through in our features.
It's also a security issue. It's also a compliance issue. when we think about our positioning and what's unique about us at Opal Security is that we are a security company first and foremost. And that means that like from day one, we have to build a lot of trust and that has to show through in our features.
So we made very specific choices on what we would prioritize from that perspective, such as being able to work in hybrid environments, because we knew that even as a small company, if we wanted to be the backbone of people's access management and least privilege like infrastructure that they needed to feel like they could manage us entirely and work in these complex environments.
So we made very specific choices on what we would prioritize from that perspective, such as being able to work in hybrid environments, because we knew that even as a small company, if we wanted to be the backbone of people's access management and least privilege like infrastructure that they needed to feel like they could manage us entirely and work in these complex environments.
So we made very specific choices on what we would prioritize from that perspective, such as being able to work in hybrid environments, because we knew that even as a small company, if we wanted to be the backbone of people's access management and least privilege like infrastructure that they needed to feel like they could manage us entirely and work in these complex environments.
Another example of this is like building in our back in our product itself, which is something that you will often see in like B2C or product led companies gets left until way too late.
Another example of this is like building in our back in our product itself, which is something that you will often see in like B2C or product led companies gets left until way too late.
Another example of this is like building in our back in our product itself, which is something that you will often see in like B2C or product led companies gets left until way too late.
There's like these things that I think got prioritized very early on the integration side, just like doubling down and like the cloud security space and building like really first class native integrations into the hyperscalers because we knew that while folks wanted to figure out what was happening in like their lower priority SaaS.
There's like these things that I think got prioritized very early on the integration side, just like doubling down and like the cloud security space and building like really first class native integrations into the hyperscalers because we knew that while folks wanted to figure out what was happening in like their lower priority SaaS.
There's like these things that I think got prioritized very early on the integration side, just like doubling down and like the cloud security space and building like really first class native integrations into the hyperscalers because we knew that while folks wanted to figure out what was happening in like their lower priority SaaS.
applications today, they had no visibility or ability to remediate in these mission-critical production systems. There's no vendor serving that. It was flowing directly from that positioning again. What does it mean to be a security and infrastructure company solving access? And then once you've got that, you can start to engage and think about what do the other stakeholders need?
applications today, they had no visibility or ability to remediate in these mission-critical production systems. There's no vendor serving that. It was flowing directly from that positioning again. What does it mean to be a security and infrastructure company solving access? And then once you've got that, you can start to engage and think about what do the other stakeholders need?