Vorlon Press

Media Kit
Vorlon Recognized as a CRN® 2025 Stellar Startup in Security
Press Releases

Vorlon Recognized as a CRN® 2025 Stellar Startup in Security

Nov 11, 2025
Read More
What the Salesloft Drift breaches reveal about 4th-party risk
News

What the Salesloft Drift breaches reveal about 4th-party risk

Sep 10, 2025
Read More
Jaguar Land Rover shuts down systems following cyberattack
News

Jaguar Land Rover shuts down systems following cyberattack

Sep 2, 2025
Read More
A lesson from the Salesforce hacks: SaaS vendors must make access to security logs a basic feature
News

A lesson from the Salesforce hacks: SaaS vendors must make access to security logs a basic feature

Aug 22, 2025
Read More
Black Hat 2025 Insights: Reflections on the Salesforce hacks and our industry’s future
News

Black Hat 2025 Insights: Reflections on the Salesforce hacks and our industry’s future

Aug 12, 2025
Read More
Hidden Risks In SaaS Ecosystems, And How CISOs Can Regain Control
News

Hidden Risks In SaaS Ecosystems, And How CISOs Can Regain Control

Aug 5, 2025
Read More

No Results Found

We couldn't find anything matching your criteria. Try adjusting your filters or search terms to find what you're looking for

Media Kit

About

Company Background

Vorlon was founded in 2022 by Amir Khayat and Amichay Spivak who hold a combined 35+ years of cybersecurity experience. Prior, they developed and sold a Security Orchestration Automation and Response platform called Demisto (now branded XSOAR) which was acquired in 2019 by Palo Alto Networks in its third largest acquisition to date.

While deploying automation solutions for thousands of customers, Amir and Amichay identified a serious problem facing Enterprise organizations. With the rise of automation and continued demand for greater productivity, organizations are increasingly relying on other vendors’ (third-party) applications and services to drive efficiency within their businesses. Every vendor uses Application Programming Interfaces (APIs) to enable their own software to communicate with other systems. This communication is facilitated by ‘secrets' like OAuth, API keys, and user credentials. However, the methods used to transport these secrets continuously pose a security risk to the customer (the one consuming the APIs)—usually by granting over-permissive access to other sensitive data. And while vendors take certain precautions to secure the development of their own APIs, there has been no attention paid to protecting the data in motion from one system to the other.

Today, large enterprises consume an average of 25,500 APIs. While there aren't any good references for the number of APIs a large enterprise publishes, Google itself publishes 246—more than 100X less than what is consumed.

Oftentimes, APIs are granted more access than necessary to perform the task they are designed to do (we call this over-permissive) and the access granted to APIs are able to inadvertently access sensitive data, including Personally Identifiable Information (PII), Protected Health Information (PHI), and even Payment Card Industry (PCI) information. This sensitive data can then be exploited by threat actors in the event of a breach or leak. The APIs themselves are often exploited by threat actors as well.

In fact, 98.3% of organizations have a relationship with a third-party that has experienced a data breach in the last two years. Chances are that you or someone you know is involved in a data breach right now - but you wouldn't even know it because it takes an average of six to seven months to identify, not to mention the two to three months it takes to mitigate.

Our customers use Vorlon to detect, identify, and remediate these threats.

Information

Contact

location marker

650 Castro St, Suite 120-427
Mountain View, California 94041

LOGOS

Branding

Vorlon_Logo_Small_Color Vorlon_Logo_Large_Black vorlon logo

Investors

Supported by:

Accel Logo 1 shield logo