Thursday, April 23, 2026
  • About Web3Wire
  • Web3Wire NFTs
  • .w3w TLD
  • $W3W Token
  • Web3Wire DAO
  • Media Network
  • RSS Feed
  • Contact Us
Web3Wire
No Result
View All Result
  • Home
  • Web3
    • Latest
    • AI
    • Business
    • Blockchain
    • Cryptocurrencies
    • Decentralized Finance
    • Metaverse
    • Non-Fungible Token
    • Press Release
  • Technology
    • Consumer Tech
    • Digital Fashion
    • Editor’s Choice
    • Guides
    • Stories
  • Coins
    • Top 10 Coins
    • Top 50 Coins
    • Top 100 Coins
    • All Coins
  • Exchanges
    • Top 10 Crypto Exchanges
    • Top 50 Crypto Exchanges
    • Top 100 Crypto Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks
  • Events
  • News
    • Latest Crypto News
    • Latest DeFi News
    • Latest Web3 News
  • Home
  • Web3
    • Latest
    • AI
    • Business
    • Blockchain
    • Cryptocurrencies
    • Decentralized Finance
    • Metaverse
    • Non-Fungible Token
    • Press Release
  • Technology
    • Consumer Tech
    • Digital Fashion
    • Editor’s Choice
    • Guides
    • Stories
  • Coins
    • Top 10 Coins
    • Top 50 Coins
    • Top 100 Coins
    • All Coins
  • Exchanges
    • Top 10 Crypto Exchanges
    • Top 50 Crypto Exchanges
    • Top 100 Crypto Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks
  • Events
  • News
    • Latest Crypto News
    • Latest DeFi News
    • Latest Web3 News
No Result
View All Result
Web3Wire
No Result
View All Result
Home Artificial Intelligence

Orchid Launches Identity Audit to Illuminate the Dark Matter of Enterprise Identity Activity

February 5, 2026
in Artificial Intelligence, GlobeNewswire, Web3
Reading Time: 10 mins read
5
SHARES
250
VIEWS
Share on TwitterShare on LinkedInShare on Facebook

NEW YORK, Feb. 05, 2026 (GLOBE NEWSWIRE) — Orchid Security, the company bringing clarity and control to the complexity of enterprise identity, today unveiled Identity Audit, the industry’s first complete picture of identity activity. By combining proprietary audit data captured inside unmanaged applications with audit logs from governed IAM systems, Orchid provides a unified view of identity behavior and business context across the entire application estate, including gaps where centralized identity controls stop – identity dark matter. The result is a provable, end-to-end understanding of how identities are actually used, their intent, and the risks they introduce across both managed and unmanaged applications.

According to Orchid’s analysis of enterprise environments, as much as 46% of enterprise identity activity occurs outside centralized identity and access management (IAM) visibility, spanning overlooked applications, local user accounts, unmanaged permissions, and opaque authentication paths. These growing blind spots – what Orchid refers to as identity dark matter – are invisible to traditional IAM tools. Identity Audit enables organizations to pull back the veil on this activity, and for the first time, teams can fully understand how identity is utilized (as well as coded) and why across the broader landscape.

The Identity Dark Matter Problem

Enterprise identity has reached a critical inflection point as modern enterprises operate hundreds or thousands of applications, each with its own authentication and authorization logic. While IAM platforms govern a portion of this environment, a growing share of identity activity remains embedded directly in application code, infrastructure, and service-to-service interactions, outside centralized visibility and governance. This gap is rapidly widening with the proliferation of non-human identities (NHIs) and agentic AI, which are non-governed by design and increasingly operate beyond traditional IAM controls.

With identity dark matter, identity usage exists without ownership, enforcement, or auditability. As a result, security and governance teams often rely on partial IAM data, documentation reviews, and owner attestations when responding to audits, regulatory requirements, board inquiries, or security incidents – shortcuts that provide an incomplete and frequently inaccurate picture of real identity behavior.

“This ‘identity dark matter’ represents the critical disparity between an organization’s intended security policy and the actual effective access that should exist and be the primary goal of most IAM programs. In the complex landscape of modern cybersecurity, this silent but pervasive threat lurks,” explains Lawrence Pingree, head of data security and AI research at Software Analyst Cyber Research. “Despite massive investment in Identity Access Management (IAM), organizations still often remain vulnerable. The ‘front door’ is locked, but attackers are bypassing it entirely through unmanaged, invisible vectors, often introduced through code or entitlements.”

Pingree added, “Orchid’s Identity Audit surfaces identity activity as it occurs directly inside applications and across unmanaged environments, allowing organizations to distinguish real from expected behavior. This insight can help organizations reduce risk and strengthen governance, finally bringing accountability to areas of identity that have historically gone unseen.”

Key Findings from Early Deployments

Across initial deployments, Orchid Security has found that:

  • 85% of applications have accounts from legacy or external domains; 20% of these are consumer email domains
  • 70% of applications have excessive access privileges; 60% grant broad admin or API access to external third parties
  • 40% of all accounts across applications were found to be orphaned; reaching 60% in some cases

With Orchid Security’s Identity Audit, organizations can now answer critical questions that were previously unprovable:

  1. Is least privilege actually enforced in practice, or only documented in policy while unused permissions quietly accumulate?
  2. Can you prove that identities – human and non-human – are removed, rotated, or suspended when they should be, across every application?
  3. When auditors or executives ask how identity is governed end-to-end, are you answering with evidence or inference and user attestation?

“Identity decisions are only as good as the data behind them,” said Roy Katmor, co-founder and CEO at Orchid Security. “For years, teams have been making high-stake decisions based on fragments of information. Our new capability delivers a cross-estate Identity Audit that shows not just how IAM is implemented, but how identity is actually used in practice across every application, providing real-world visibility into who or what is acting, including agentic AI, the intent behind each action, and the true privilege being exercised. This complete context becomes the data foundation teams need to make confident identity decisions, and Orchid’s platform turns that insight into action with no-code remediation by orchestrating changes across the existing IAM stack.”

How Identity Audit Works

Identity Audit applies Orchid’s observability principles to identity, shifting identity from static configuration into continuous, runtime insight. Rather than inferring risk solely from policies and integrations alone, Orchid observes identity behavior as it unfolds directly within the application.

The new capability expands Orchid observability by surfacing rich application-level telemetry on identity activity, including logins (successful or not), logouts, Joiner/Mover/Leaver changes, and more. By extrapolating insights from this newly generated audit stream, Orchid unlocks visibility directly from applications, not just from IAM tools limited to integrated apps. The result is a complete, end-to-end view of identity usage across the enterprise – not just what happened, but why.

By uncovering patterns, anomalies, and associated risks, Orchid enables teams to move beyond visibility into true identity observability. Signals are enriched with LLM-powered analytics, turning raw telemetry into intent-based intelligence, for deep, actionable insights at machine speed and scale, which traditional identity tools cannot see.

With Identity Audit, organizations can:

  • Gain a complete view of identity activity by collecting telemetry on all identity utilization, human and machine, directly from each application, both managed and unmanaged by your IAM stack.
  • Enforce least privilege with confidence by monitoring real identity activity across all applications and confirming whether accounts actually use the access they’ve been granted.
  • Identify and eliminate orphaned accounts by detecting inactive or unused accounts and correlating them with existing IAM and HR systems to confirm ownership, reducing both compliance risk and attack surface.
  • Accelerate incident investigation and response Trace identity behavior across applications to understand how compromised human or machine identities authenticate, move laterally, and access sensitive systems.
  • Verify security control adoption by monitoring all authentication activity—local or managed—to ensure required controls such as SSO, MFA, and strong password policies are actually being used
  • Shrink audit prep from months to minutes by continuously generating compliance evidence mapped to major regulatory frameworks, removing the manual burden of traditional audits

Together, these capabilities provide a unified, continuously updated view of identity activity across the enterprise, enabling security and governance teams to answer critical questions with certainty during audits, incidents, and executive reviews.

“Identity dark matter is where attackers hide and where audits fail,” said Katmor. “As identity becomes the control plane for the enterprise, including its AI and cloud-native systems, complete visibility- and thus control and governance- is no longer optional. It is essential.”

To learn more about Orchid Security’s identity audit capabilities or to request a demo, visit https://www.orchid.security/platform.

About Orchid Security
Orchid Security sees straight into application code to deliver the industry’s first Identity Control Plane, transforming IAM complexity into clarity, compliance, and control. Its Identity-First Security Orchestration platform continuously discovers enterprise applications, analyzes their native authentication and authorization flows, and accelerates onboarding into governance systems—cutting months of manual work into a single click. By exposing and remediating the ‘identity dark matter’ hidden across modern environments, Orchid helps enterprises reduce risk, lower operational costs, and achieve compliance at scale. Backed by Intel Capital and Team8, Orchid leverages observability, automation, and large language models to unify fragmented identity operations. Global organizations rely on Orchid to, among other things, modernize identity governance, accelerate IGA adoption, and secure the next generation of applications and AI agents.

Media Contact
Chloe Amante
Montner Tech PR
camante@montner.com

Photos accompanying this announcement are available at:

https://www.globenewswire.com/NewsRoom/AttachmentNg/6559a314-dc9d-44f7-8f0d-8f5203d06c02

https://www.globenewswire.com/NewsRoom/AttachmentNg/25cd3be7-04b1-4918-aeff-7139c745220c

https://www.globenewswire.com/NewsRoom/AttachmentNg/4ebf6436-8cda-4440-8070-cc9c42ef4e7e

About Web3Wire
Web3Wire – Information, news, press releases, events and research articles about Web3, Metaverse, Blockchain, Artificial Intelligence, Cryptocurrencies, Decentralized Finance, NFTs and Gaming.
Visit Web3Wire for Web3 News and Events, Block3Wire for the latest Blockchain news and Meta3Wire to stay updated with Metaverse News.

ShareTweet1ShareSendShare2
Previous Post

Operant AI Launches Agent Protector: The First Real-Time Agentic Security Solution Enabling Safe AI Agent Innovation at Scale

Next Post

ControlUp Expands Executive Leadership Team to Power Next Phase of Global Growth

Related Posts

1600W–5500W: Linklieo’s Ruby Server Power Supplies Cover the Full Spectrum of Data Center Applications

NEW YORK, April 23, 2026 (GLOBE NEWSWIRE) -- Linklieo, a leading server power supply supplier and manufacturer, today announced the expansion of its 80 PLUS Ruby certified data center power supply portfolio, covering a power range from 1600W to 5500W. This high-efficiency PSU lineup is designed to meet evolving data center requirements with scalable and reliable power...

Read moreDetails

BitMart Launches Free Financial Literacy Platform: Learn. Trade. Grow.

Mahe, Seychelles, April 23, 2026 (GLOBE NEWSWIRE) -- BitMart, one of the world's leading cryptocurrency exchanges serving over 13 million users across 180+ countries and regions, today announced the launch of its Global Education Initiative under the banner "Learn. Trade. Grow." The initiative centers on learnwithbitto.com - a dedicated expansion...

Read moreDetails

Patton Unveils Powerful New US-Manufactured FiberPlex™ 12G-SDI Fiber Extender Kits

Made in USA, Patton’s unrivaled FiberPlex TKIT-12G Fiber Converter Kits transport broadcast-quality 4K video over optical fiber, reaching distances up to 20 kilometers.Patton®... Let's Connect! "The TKIT-12G proves our commitment to providing broadcast professionals with reliable, problem-solving connectivity solutions." Tim GodbyDirector, Media Transport SystemsPATTON GAITHERSBURG, Md., April 23, 2026 (GLOBE NEWSWIRE)...

Read moreDetails

ESET Research discovers new China-aligned group, GopherWhisper: It abuses messaging services Discord, Slack, and Outlook to spy

ESET Research has uncovered a new China-aligned APT group, which has been named GopherWhisper, that targets governmental institutions in Mongolia. GopherWhisper leverages Discord, Slack, Microsoft 365 Outlook, and file.io for command and control (C&C) communications and exfiltration. The group’s toolset includes custom Go-based backdoors, injectors, exfiltration tools, loader FriendDelivery, and...

Read moreDetails

Mobile Vikings subscriptions hub powered by the Digital Vending Machine® from Bango

CAMBRIDGE, United Kingdom, April 23, 2026 (GLOBE NEWSWIRE) -- Bango (AIM: BGO), the leader in subscription bundling, today announced that Mobile Vikings, a leading MVNO in Belgium owned by Proximus Group, is using the Digital Vending Machine® (DVM™) from Bango to power its subscriptions hub. The first subscription now available...

Read moreDetails

3rd Regional Asian Post Alliance (RAPA) Meeting Concludes in Hanoi, Focused on Cross-Border Retail Cooperation and Digital Innovation

HANOI, Vietnam, April 23, 2026 (GLOBE NEWSWIRE) -- The 3rd Regional Asian Post Alliance (RAPA) Meeting concluded in Hanoi, Vietnam, under the theme “Transforming Retail Through Cross-Border Collaboration.” Representatives from the postal authorities of Vietnam, Thailand, and Indonesia met to discuss the future development of RAPA and opportunities to strengthen...

Read moreDetails

Q.ANT Brings Commercial Photonic Computing to the United States, Appoints Bruno Spruth as CTO

STUTTGART, Germany, April 23, 2026 (GLOBE NEWSWIRE) -- Q.ANT, the pioneer in commercial photonic computing, today announced the opening of its U.S. headquarters in Austin, Texas, and the appointment of semiconductor veteran Bruno Spruth as Chief Technology Officer. Spruth, who previously served as Vice President of Power Processor Development at...

Read moreDetails

Institutional Digital Asset Infrastructure: The Maturation of Yield Routing and Restaking Rails

NEW YORK CITY, NY / ACCESS Newswire / April 23, 2026 / Black Titan Corporation (NASDAQ:BTTC) Executive Summary As we enter the latter half of April 2026, the "DeFi-as-a-Service" (DaaS) ecosystem is experiencing a rapid horizontal expansion driven by global payment aggregators and institutional custodians. The narrative has decisively shifted...

Read moreDetails

Aokah Launches Explorer and Builder: The First AI-Powered Platform to Take Enterprises from GCC Strategy to Execution

Three global enterprises in consumer goods, diversified manufacturing, and logistics are already using Explorer and Builder to make faster, more defensible location decisions and build GCCs with execution confidenceNEW YORK, April 23, 2026 /PRNewswire/ -- Aokah, the GCC Operating Systemˢᴹ purpose-built to orchestrate Global Capability Centers from strategy through scale,...

Read moreDetails

Global Telecom Leaders to Convene in Singapore for Definitive Summit on AI-Native Transformation and Industry Reinvention

MUMBAI, India and SINGAPORE, April 23, 2026 /PRNewswire/ -- Twimbit, the global research and advisory firm, has finalized the strategic agenda for the Twimbit Telecom Summit & Awards 2026 , scheduled for 21 May 2026 at the Capitol Theatre, Singapore. This high-level forum serves as the industry's primary catalyst for addressing...

Read moreDetails
Web3Wire NFTs - The Web3 Collective

Web3Wire, $W3W Token and .w3w tld Whitepaper

Web3Wire, $W3W Token and .w3w tld Whitepaper

Claim your space in Web3 with .w3w Domain!

Web3Wire

Trending on Web3Wire

  • FlipHTML5’s Flipbook Maker Creates Interactive Digital Publications Easily

    8 shares
    Share 3 Tweet 2
  • Discover 2025’s Top 5 Promising Low-Cap Crypto Gems

    97 shares
    Share 39 Tweet 24
  • Understanding Soulbound Tokens SBT Their Definition and Significance

    53 shares
    Share 21 Tweet 13
  • Unifying Blockchain Ecosystems: 2024 Guide to Cross-Chain Interoperability

    159 shares
    Share 64 Tweet 40
  • Mango AI Unveils AI Kissing Generator Free for Seamless Kiss Animation

    5 shares
    Share 2 Tweet 1
Join our Web3Wire Community!

Our newsletters are only twice a month, reaching around 10000+ Blockchain Companies, 800 Web3 VCs, 600 Blockchain Journalists and Media Houses.


* We wont pass your details on to anyone else and we hate spam as much as you do. By clicking the signup button you agree to our Terms of Use and Privacy Policy.

Web3Wire Podcasts

Upcoming Events

There are currently no events.

Latest on Web3Wire

  • 1600W–5500W: Linklieo’s Ruby Server Power Supplies Cover the Full Spectrum of Data Center Applications
  • BitMart Launches Free Financial Literacy Platform: Learn. Trade. Grow.
  • Patton Unveils Powerful New US-Manufactured FiberPlex™ 12G-SDI Fiber Extender Kits
  • ESET Research discovers new China-aligned group, GopherWhisper: It abuses messaging services Discord, Slack, and Outlook to spy
  • Mobile Vikings subscriptions hub powered by the Digital Vending Machine® from Bango

RSS Latest on Block3Wire

  • The Algorithmic Monographs: A Five-Volume Civil Code for the Age of Autonomous Intelligence
  • Ali Sadhik Shaik: Practitioner, Scholar, and Author – Focused on the Governance of Intelligent Systems
  • The Klyrox Protocol: A Decentralized Framework to Close the AI Accountability Gap
  • Covo Finance: Revolutionary Crypto Leverage Trading Platform
  • WorldStrides and HEX Announce Partnership to Offer High School and University Students Innovative Courses Designed to Improve Their Outlook in the Digital Age

RSS Latest on Meta3Wire

  • The Algorithmic Monographs: A Five-Volume Civil Code for the Age of Autonomous Intelligence
  • Ali Sadhik Shaik: Practitioner, Scholar, and Author – Focused on the Governance of Intelligent Systems
  • The Klyrox Protocol: A Decentralized Framework to Close the AI Accountability Gap
  • Thumbtack Honored as a 2023 Transform Awards Winner
  • Accenture Invests in Looking Glass to Accelerate Shift from 2D to 3D
Web3Wire

Web3Wire is your go-to source for the latest insights and updates in Web3, Metaverse, Blockchain, AI, Cryptocurrencies, DeFi, NFTs, and Gaming. We provide comprehensive coverage through news, press releases, event updates, and research articles, keeping you informed about the rapidly evolving digital world.

  • About Web3Wire
  • Founder’s Note
  • Web3Wire NFTs – The Web3 Collective
  • .w3w TLD
  • $W3W Token
  • Web3Wire DAO
  • Event Partners
  • Community Partners
  • Our Media Network
  • Media Kit
  • RSS Feeds
  • Contact Us

Crypto Coins

  • Top 10 Coins
  • Top 50 Coins
  • Top 100 Coins
  • All Coins – Marketcap
  • Crypto Coins Heatmap

Crypto Exchanges

  • Top 10 Exchanges
  • Top 50 Exchanges
  • Top 100 Exchanges
  • All Crypto Exchanges

Crypto Stocks

  • Blockchain Stocks
  • NFT Stocks
  • Metaverse Stocks
  • Artificial Intelligence Stocks

Web3Wire Whitepaper | Tokenomics

Web3 Resources

  • Top Web3 and Crypto Youtube Channels
  • Latest Crypto News
  • Latest DeFi News
  • Latest Web3 News

Blockchain Resources

  • Blockchain and Web3 Resources
  • Decentralized Finance (DeFi) – Research Reports
  • All Crypto Whitepapers

Metaverse Resources

  • AR VR and Metaverse Resources
  • Metaverse Courses
Claim your space in Web3 with .w3w!

The Klyrox Protocol | The Algorithmic Monographs

Top 50 Web3 Blogs and Websites
Web3Wire Podcast on Spotify Web3Wire Podcast on Amazon Music 
Web3Wire - Web3 and Blockchain - News, Events and Press Releases | Product Hunt
Web3Wire on Google News

Media Portfolio: Block3Wire | Meta3Wire

  • Privacy Policy
  • Terms of Use
  • Disclaimer
  • Sitemap
  • For Search Engines
  • Crypto Sitemap
  • Exchanges Sitemap

© 2024 Web3Wire. We strongly recommend our readers to DYOR, before investing in any cryptocurrencies, blockchain projects, or ICOs, particularly those that guarantee profits.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Coins
    • Top 10 Cryptocurrencies
    • Top 50 Cryptocurrencies
    • Top 100 Cryptocurrencies
    • All Coins
  • Exchanges
    • Top 10 Cryptocurrency Exchanges
    • Top 50 Cryptocurrency Exchanges
    • Top 100 Cryptocurrency Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks

© 2024 Web3Wire. We strongly recommend our readers to DYOR, before investing in any cryptocurrencies, blockchain projects, or ICOs, particularly those that guarantee profits.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.