Sunday, February 15, 2026
  • About Web3Wire
  • Web3Wire NFTs
  • .w3w TLD
  • $W3W Token
  • Web3Wire DAO
  • Media Network
  • RSS Feed
  • Contact Us
Web3Wire
No Result
View All Result
  • Home
  • Web3
    • Latest
    • AI
    • Business
    • Blockchain
    • Cryptocurrencies
    • Decentralized Finance
    • Metaverse
    • Non-Fungible Token
    • Press Release
  • Technology
    • Consumer Tech
    • Digital Fashion
    • Editor’s Choice
    • Guides
    • Stories
  • Coins
    • Top 10 Coins
    • Top 50 Coins
    • Top 100 Coins
    • All Coins
  • Exchanges
    • Top 10 Crypto Exchanges
    • Top 50 Crypto Exchanges
    • Top 100 Crypto Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks
  • Events
  • News
    • Latest Crypto News
    • Latest DeFi News
    • Latest Web3 News
  • Home
  • Web3
    • Latest
    • AI
    • Business
    • Blockchain
    • Cryptocurrencies
    • Decentralized Finance
    • Metaverse
    • Non-Fungible Token
    • Press Release
  • Technology
    • Consumer Tech
    • Digital Fashion
    • Editor’s Choice
    • Guides
    • Stories
  • Coins
    • Top 10 Coins
    • Top 50 Coins
    • Top 100 Coins
    • All Coins
  • Exchanges
    • Top 10 Crypto Exchanges
    • Top 50 Crypto Exchanges
    • Top 100 Crypto Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks
  • Events
  • News
    • Latest Crypto News
    • Latest DeFi News
    • Latest Web3 News
No Result
View All Result
Web3Wire
No Result
View All Result
Home Artificial Intelligence

Orchid Launches Identity Audit to Illuminate the Dark Matter of Enterprise Identity Activity

February 5, 2026
in Artificial Intelligence, GlobeNewswire, Web3
Reading Time: 10 mins read
5
SHARES
244
VIEWS
Share on TwitterShare on LinkedInShare on Facebook

NEW YORK, Feb. 05, 2026 (GLOBE NEWSWIRE) — Orchid Security, the company bringing clarity and control to the complexity of enterprise identity, today unveiled Identity Audit, the industry’s first complete picture of identity activity. By combining proprietary audit data captured inside unmanaged applications with audit logs from governed IAM systems, Orchid provides a unified view of identity behavior and business context across the entire application estate, including gaps where centralized identity controls stop – identity dark matter. The result is a provable, end-to-end understanding of how identities are actually used, their intent, and the risks they introduce across both managed and unmanaged applications.

According to Orchid’s analysis of enterprise environments, as much as 46% of enterprise identity activity occurs outside centralized identity and access management (IAM) visibility, spanning overlooked applications, local user accounts, unmanaged permissions, and opaque authentication paths. These growing blind spots – what Orchid refers to as identity dark matter – are invisible to traditional IAM tools. Identity Audit enables organizations to pull back the veil on this activity, and for the first time, teams can fully understand how identity is utilized (as well as coded) and why across the broader landscape.

The Identity Dark Matter Problem

Enterprise identity has reached a critical inflection point as modern enterprises operate hundreds or thousands of applications, each with its own authentication and authorization logic. While IAM platforms govern a portion of this environment, a growing share of identity activity remains embedded directly in application code, infrastructure, and service-to-service interactions, outside centralized visibility and governance. This gap is rapidly widening with the proliferation of non-human identities (NHIs) and agentic AI, which are non-governed by design and increasingly operate beyond traditional IAM controls.

With identity dark matter, identity usage exists without ownership, enforcement, or auditability. As a result, security and governance teams often rely on partial IAM data, documentation reviews, and owner attestations when responding to audits, regulatory requirements, board inquiries, or security incidents – shortcuts that provide an incomplete and frequently inaccurate picture of real identity behavior.

“This ‘identity dark matter’ represents the critical disparity between an organization’s intended security policy and the actual effective access that should exist and be the primary goal of most IAM programs. In the complex landscape of modern cybersecurity, this silent but pervasive threat lurks,” explains Lawrence Pingree, head of data security and AI research at Software Analyst Cyber Research. “Despite massive investment in Identity Access Management (IAM), organizations still often remain vulnerable. The ‘front door’ is locked, but attackers are bypassing it entirely through unmanaged, invisible vectors, often introduced through code or entitlements.”

Pingree added, “Orchid’s Identity Audit surfaces identity activity as it occurs directly inside applications and across unmanaged environments, allowing organizations to distinguish real from expected behavior. This insight can help organizations reduce risk and strengthen governance, finally bringing accountability to areas of identity that have historically gone unseen.”

Key Findings from Early Deployments

Across initial deployments, Orchid Security has found that:

  • 85% of applications have accounts from legacy or external domains; 20% of these are consumer email domains
  • 70% of applications have excessive access privileges; 60% grant broad admin or API access to external third parties
  • 40% of all accounts across applications were found to be orphaned; reaching 60% in some cases

With Orchid Security’s Identity Audit, organizations can now answer critical questions that were previously unprovable:

  1. Is least privilege actually enforced in practice, or only documented in policy while unused permissions quietly accumulate?
  2. Can you prove that identities – human and non-human – are removed, rotated, or suspended when they should be, across every application?
  3. When auditors or executives ask how identity is governed end-to-end, are you answering with evidence or inference and user attestation?

“Identity decisions are only as good as the data behind them,” said Roy Katmor, co-founder and CEO at Orchid Security. “For years, teams have been making high-stake decisions based on fragments of information. Our new capability delivers a cross-estate Identity Audit that shows not just how IAM is implemented, but how identity is actually used in practice across every application, providing real-world visibility into who or what is acting, including agentic AI, the intent behind each action, and the true privilege being exercised. This complete context becomes the data foundation teams need to make confident identity decisions, and Orchid’s platform turns that insight into action with no-code remediation by orchestrating changes across the existing IAM stack.”

How Identity Audit Works

Identity Audit applies Orchid’s observability principles to identity, shifting identity from static configuration into continuous, runtime insight. Rather than inferring risk solely from policies and integrations alone, Orchid observes identity behavior as it unfolds directly within the application.

The new capability expands Orchid observability by surfacing rich application-level telemetry on identity activity, including logins (successful or not), logouts, Joiner/Mover/Leaver changes, and more. By extrapolating insights from this newly generated audit stream, Orchid unlocks visibility directly from applications, not just from IAM tools limited to integrated apps. The result is a complete, end-to-end view of identity usage across the enterprise – not just what happened, but why.

By uncovering patterns, anomalies, and associated risks, Orchid enables teams to move beyond visibility into true identity observability. Signals are enriched with LLM-powered analytics, turning raw telemetry into intent-based intelligence, for deep, actionable insights at machine speed and scale, which traditional identity tools cannot see.

With Identity Audit, organizations can:

  • Gain a complete view of identity activity by collecting telemetry on all identity utilization, human and machine, directly from each application, both managed and unmanaged by your IAM stack.
  • Enforce least privilege with confidence by monitoring real identity activity across all applications and confirming whether accounts actually use the access they’ve been granted.
  • Identify and eliminate orphaned accounts by detecting inactive or unused accounts and correlating them with existing IAM and HR systems to confirm ownership, reducing both compliance risk and attack surface.
  • Accelerate incident investigation and response Trace identity behavior across applications to understand how compromised human or machine identities authenticate, move laterally, and access sensitive systems.
  • Verify security control adoption by monitoring all authentication activity—local or managed—to ensure required controls such as SSO, MFA, and strong password policies are actually being used
  • Shrink audit prep from months to minutes by continuously generating compliance evidence mapped to major regulatory frameworks, removing the manual burden of traditional audits

Together, these capabilities provide a unified, continuously updated view of identity activity across the enterprise, enabling security and governance teams to answer critical questions with certainty during audits, incidents, and executive reviews.

“Identity dark matter is where attackers hide and where audits fail,” said Katmor. “As identity becomes the control plane for the enterprise, including its AI and cloud-native systems, complete visibility- and thus control and governance- is no longer optional. It is essential.”

To learn more about Orchid Security’s identity audit capabilities or to request a demo, visit https://www.orchid.security/platform.

About Orchid Security
Orchid Security sees straight into application code to deliver the industry’s first Identity Control Plane, transforming IAM complexity into clarity, compliance, and control. Its Identity-First Security Orchestration platform continuously discovers enterprise applications, analyzes their native authentication and authorization flows, and accelerates onboarding into governance systems—cutting months of manual work into a single click. By exposing and remediating the ‘identity dark matter’ hidden across modern environments, Orchid helps enterprises reduce risk, lower operational costs, and achieve compliance at scale. Backed by Intel Capital and Team8, Orchid leverages observability, automation, and large language models to unify fragmented identity operations. Global organizations rely on Orchid to, among other things, modernize identity governance, accelerate IGA adoption, and secure the next generation of applications and AI agents.

Media Contact
Chloe Amante
Montner Tech PR
camante@montner.com

Photos accompanying this announcement are available at:

https://www.globenewswire.com/NewsRoom/AttachmentNg/6559a314-dc9d-44f7-8f0d-8f5203d06c02

https://www.globenewswire.com/NewsRoom/AttachmentNg/25cd3be7-04b1-4918-aeff-7139c745220c

https://www.globenewswire.com/NewsRoom/AttachmentNg/4ebf6436-8cda-4440-8070-cc9c42ef4e7e

About Web3Wire
Web3Wire – Information, news, press releases, events and research articles about Web3, Metaverse, Blockchain, Artificial Intelligence, Cryptocurrencies, Decentralized Finance, NFTs and Gaming.
Visit Web3Wire for Web3 News and Events, Block3Wire for the latest Blockchain news and Meta3Wire to stay updated with Metaverse News.

ShareTweet1ShareSendShare2
Previous Post

Operant AI Launches Agent Protector: The First Real-Time Agentic Security Solution Enabling Safe AI Agent Innovation at Scale

Next Post

ControlUp Expands Executive Leadership Team to Power Next Phase of Global Growth

Related Posts

Mobile Identity Management Market to Reach US$ 16.97 Billion by 2030 Growing at 26.8% CAGR Driven by Multi-Factor and Biometric Authentication with Cloud Deployment Leading 65% Share and Key Players Microsoft, IBM, Okta, Ping Identity, and Cisco

Mobile Identity Management Market The Mobile Identity Management Market reached approximately US$ 4.09 billion in 2024 and is expected to grow to around US$ 16.97 billion by 2030, expanding with a CAGR of approximately 26.8 % from 2024 to 2030 as organizations increasingly prioritize secure and seamless mobile authentication and...

Read moreDetails

NuroClean Unveiled: Why NuroClean Mold Remover Gel Sets a New Standard in Mold Elimination for Bathrooms, Kitchens, and Damp Areas

New York City, NY, Feb. 14, 2026 (GLOBE NEWSWIRE) -- Mold remains one of the most persistent and costly household maintenance challenges in modern residential environments. As homes become more airtight and moisture-retentive due to improved insulation and energy-efficient construction, conditions that support mold development have become increasingly common. Bathrooms,...

Read moreDetails

Embedded LLM Launches the EU AI Grid at Munich Cyber Security Conference (MCSC) to Meet EU Demand for Sovereign AI Capability

MUNICH, Feb. 14, 2026 (GLOBE NEWSWIRE) -- Embedded LLM, a leading LLM inference technology provider, today officially launched the EU AI Grid at the Munich Cyber Security Conference. The EU AI Grid treats artificial intelligence like electricity --- a utility that is metered, governed, and delivered through local infrastructure so that...

Read moreDetails

Embedded LLM Launches the EU AI Grid at Munich Cyber Security Conference (MCSC) to Meet EU Demand for Sovereign AI Capability

MUNICH, Feb. 14, 2026 (GLOBE NEWSWIRE) -- Embedded LLM, a leading LLM inference technology provider, today officially launched the EU AI Grid at the Munich Cyber Security Conference. The EU AI Grid treats artificial intelligence like electricity --- a utility that is metered, governed, and delivered through local infrastructure so that...

Read moreDetails

Embedded LLM Launches the EU AI Grid at Munich Cyber Security Conference (MCSC) to Meet EU Demand for Sovereign AI Capability

MUNICH, Feb. 14, 2026 (GLOBE NEWSWIRE) -- Embedded LLM, a leading LLM inference technology provider, today officially launched the EU AI Grid at the Munich Cyber Security Conference. The EU AI Grid treats artificial intelligence like electricity --- a utility that is metered, governed, and delivered through local infrastructure so that...

Read moreDetails

Hiddence.net: Premium Anonymous VPS & VDS Hosting

In today's world of constant digital surveillance, finding a hosting provider that combines high-performance hardware with genuine privacy is rare. Hiddence.net (http://Hiddence.net) redefines hosting by offering powerful VPS and VDS solutions designed to keep your identity completely anonymous. Whether you're running privacy-focused projects, mission-critical applications, or specialized workloads, Hiddence ensures...

Read moreDetails

JIECANG Receives BIS Certification for Electric Height Adjustable Table Controller in India

Certification strengthens compliance capabilities and supports expansion in the Indian office furniture marketXINCHANG, China, Feb. 14, 2026 /PRNewswire/ -- JIECANG, a leading global provider of linear actuator solutions, has obtained mandatory certification from the Bureau of Indian Standards (BIS) for its electric height adjustable table controller, further strengthening its compliance...

Read moreDetails

France showcases its Innovation Leadership at the India AI Impact Summit & Expo 2026

NEW DELHI, Feb. 14, 2026 /PRNewswire/ -- France is stepping up its strategic partnership with India in the fields of innovation, artificial intelligence and future technologies. The year 2026 marks the official launch of the India-France Year of Innovation by French President Emmanuel Macron and Indian Prime Minister Narendra Modi....

Read moreDetails

Rizz Network Inc. Announces Strategic $5M Capital Commitment From Nimbus Capital for $RZTO, Powering the Next Phase of AI-Enabled, DePIN-Driven Rizz Wireless Expansion

KINGSTOWN, Saint Vincent and the Grenadines, Feb. 14, 2026 (GLOBE NEWSWIRE) -- Rizz Network Inc. (“Rizz” or the “Company”), the issuer of RZTO, today announced that Nimbus Capital has entered into a strategic investment commitment in RZTO, marking what industry observers describe as one of the most widely anticipated ecosystem...

Read moreDetails

Mobile TV Market to Reach US$ 22.7 Billion by 2030 | Key Players: AT&T, Comcast, Samsung, Vodafone, Bharti Airtel, Verizon

Mobile TV Market Overview:The Global Mobile TV Market reached US$ 11.5 billion in 2022 and is projected to grow to US$ 22.7 billion by 2030, registering a CAGR of 10.2% during the forecast period 2024-2031. The market growth is driven by the increasing accessibility of international programming via mobile TV,...

Read moreDetails
Web3Wire NFTs - The Web3 Collective

Web3Wire, $W3W Token and .w3w tld Whitepaper

Web3Wire, $W3W Token and .w3w tld Whitepaper

Claim your space in Web3 with .w3w Domain!

Web3Wire

Trending on Web3Wire

  • Quantum Chip Market Boom in Size and Share Redefines Processing | Rigetti Computing • D-Wave Systems • IonQ • Microsoft

    7 shares
    Share 3 Tweet 2
  • Best Crypto Investing App 2026 Announced

    6 shares
    Share 2 Tweet 2
  • Top Cross-Chain DeFi Solutions to Watch by 2025

    80 shares
    Share 32 Tweet 20
  • Unifying Blockchain Ecosystems: 2024 Guide to Cross-Chain Interoperability

    150 shares
    Share 60 Tweet 38
  • Best Gold IRA Companies February 2026 Announced (Top Gold-backed IRA Companies Revealed)

    6 shares
    Share 2 Tweet 2
Join our Web3Wire Community!

Our newsletters are only twice a month, reaching around 10000+ Blockchain Companies, 800 Web3 VCs, 600 Blockchain Journalists and Media Houses.


* We wont pass your details on to anyone else and we hate spam as much as you do. By clicking the signup button you agree to our Terms of Use and Privacy Policy.

Web3Wire Podcasts

Upcoming Events

There are currently no events.

Latest on Web3Wire

  • Mobile Identity Management Market to Reach US$ 16.97 Billion by 2030 Growing at 26.8% CAGR Driven by Multi-Factor and Biometric Authentication with Cloud Deployment Leading 65% Share and Key Players Microsoft, IBM, Okta, Ping Identity, and Cisco
  • NuroClean Unveiled: Why NuroClean Mold Remover Gel Sets a New Standard in Mold Elimination for Bathrooms, Kitchens, and Damp Areas
  • Embedded LLM Launches the EU AI Grid at Munich Cyber Security Conference (MCSC) to Meet EU Demand for Sovereign AI Capability
  • Embedded LLM Launches the EU AI Grid at Munich Cyber Security Conference (MCSC) to Meet EU Demand for Sovereign AI Capability
  • Embedded LLM Launches the EU AI Grid at Munich Cyber Security Conference (MCSC) to Meet EU Demand for Sovereign AI Capability

RSS Latest on Block3Wire

  • Covo Finance: Revolutionary Crypto Leverage Trading Platform
  • WorldStrides and HEX Announce Partnership to Offer High School and University Students Innovative Courses Designed to Improve Their Outlook in the Digital Age
  • Cathedra Bitcoin Announces Leasing of 2.5-MW Bitcoin Mining Facility
  • Global Web3 Payments Leader, Banxa, Announces Integration With Metis to Usher In Next Wave of Cryptocurrency Users
  • Dexalot Launches First Hybrid DeFi Subnet on Avalanche

RSS Latest on Meta3Wire

  • Thumbtack Honored as a 2023 Transform Awards Winner
  • Accenture Invests in Looking Glass to Accelerate Shift from 2D to 3D
  • MetatronAI.com Unveils Revolutionary AI-Chat Features and Interface Upgrades
  • Purely.website – Disruptive new platform combats rising web hosting costs
  • WEMADE and Metagravity Sign Strategic Alliance MOU to Collaborate on Blockchain Games for the Metaverse
Web3Wire

Web3Wire is your go-to source for the latest insights and updates in Web3, Metaverse, Blockchain, AI, Cryptocurrencies, DeFi, NFTs, and Gaming. We provide comprehensive coverage through news, press releases, event updates, and research articles, keeping you informed about the rapidly evolving digital world.

  • About Web3Wire
  • Web3Wire NFTs – The Web3 Collective
  • .w3w TLD
  • $W3W Token
  • Web3Wire DAO
  • Event Partners
  • Community Partners
  • Our Media Network
  • Media Kit
  • RSS Feeds
  • Contact Us

Whitepaper | Tokenomics

Crypto Coins

  • Top 10 Coins
  • Top 50 Coins
  • Top 100 Coins
  • All Coins – Marketcap
  • Crypto Coins Heatmap

Crypto Exchanges

  • Top 10 Exchanges
  • Top 50 Exchanges
  • Top 100 Exchanges
  • All Crypto Exchanges

Crypto Stocks

  • Blockchain Stocks
  • NFT Stocks
  • Metaverse Stocks
  • Artificial Intelligence Stocks

Media Portfolio: Block3Wire | Meta3Wire

Web3 Resources

  • Top Web3 and Crypto Youtube Channels
  • Latest Crypto News
  • Latest DeFi News
  • Latest Web3 News

Blockchain Resources

  • Blockchain and Web3 Resources
  • Decentralized Finance (DeFi) – Research Reports
  • All Crypto Whitepapers

Metaverse Resources

  • AR VR and Metaverse Resources
  • Metaverse Courses
Claim your space in Web3 with .w3w!
Top 50 Web3 Blogs and Websites
Web3Wire Podcast on Spotify Web3Wire Podcast on Amazon Music 
Web3Wire - Web3 and Blockchain - News, Events and Press Releases | Product Hunt
Web3Wire on Google News
  • Privacy Policy
  • Terms of Use
  • Disclaimer
  • Sitemap
  • For Search Engines
  • Crypto Sitemap
  • Exchanges Sitemap

© 2024 Web3Wire. We strongly recommend our readers to DYOR, before investing in any cryptocurrencies, blockchain projects, or ICOs, particularly those that guarantee profits.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Coins
    • Top 10 Cryptocurrencies
    • Top 50 Cryptocurrencies
    • Top 100 Cryptocurrencies
    • All Coins
  • Exchanges
    • Top 10 Cryptocurrency Exchanges
    • Top 50 Cryptocurrency Exchanges
    • Top 100 Cryptocurrency Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks

© 2024 Web3Wire. We strongly recommend our readers to DYOR, before investing in any cryptocurrencies, blockchain projects, or ICOs, particularly those that guarantee profits.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.