Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Stormpath Launches Plug-and-play Login Service, Gets $8.2 Million in Financing

Stormpath, a cloud-based authentication and user management, formally launched its service on Tuesday, and at the same time announced that it has raised $8.2 million in new financing.

Stormpath, a cloud-based authentication and user management, formally launched its service on Tuesday, and at the same time announced that it has raised $8.2 million in new financing.

Stormpath provides a simple API that allows developers to drop, “plug-and-play” style, the entire user login and authentication component, into their Web and mobile applications, Alex Salazar, CEO of Stormpath, told SecurityWeek. The goal is to let Stormpath worry about making sure the user is allowed to access the application, and let the developer focus on actual functionality and features, he said.

Stormpath LogoThe API concept isn’t so strange, as developers already use APIs for other components, such as automated payment processing. The service is generally available as of today, and Stormpath formally exited its beta period with more than 1,000 users, according to Stormpath.

“We’re entering the age of plug-and-play architecture, where developers can easily and securely offload commodity infrastructure – like user management, billing, and logging – to API services,” Salazar said in a statement.

Stormpath generally will have better resources and in-depth expertise to handle security and user authentication better than developers. By offloading the entire process, developers don’t have to deal with login, password reset and account management. Security is critical to cloud applications, and “getting it wrong” can be costly to businesses, as Sony found out only two years ago, Salazar noted.

Developers not having to worry about building the login infrastructure for every new application—whether for the Web or for mobile—mean they can speed up the time-to-market for many of these applications.

The intersection between identity and cloud development, the identity management market, is expected to grow to $12 billion in 2014, according to numbers from Forrester Research. External-facing cloud applications require robust user management and security infrastructure to handle authentication and access. With cloud adoption continuing to grow, Stormpath is betting that there will be a strong demand for its service from developers who don’t want to worry about, or don’t have the resources to deploy and maintain, the back-end infrastructure.

While developers can access the user management service for free, premium features are offered under a subscription-based pricing model.

New Enterprise Associates and Pelion Venture Partners led the $8.2 million in Series A financing round, with participation from Flybridge Capital Partners, the company said. Before the Series A financing, Stormpath had a seed round from NEA and Flybridge, and an angel round led by Andy Rachleff, co-founder of Benchmark Capital and CEO of WealthFront.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.