Identity Science
Ajay Mishra has a diverse work experience, starting in 1998 at Cisco where they led the product management group for in-building wireless solutions and successfully integrated several acquisitions. In 2001, they co-founded Airespace and held various technical and executive roles, working closely with enterprise customers. Airespace was later acquired by Cisco in 2005. After the acquisition, Ajay spent 2.5 years in Cisco's Wireless Networking Business Unit, focusing on solution and market development. In 2007, they co-founded MobileIron and played a crucial role in building the company from the ground up, leading strategic initiatives and holding leadership roles. Ajay served as the CEO and involved in GTM strategy and customer success at Clearedin from 2020 to 2022. Currently, they are working as the VP of Strategic Initiatives at Identity Science, addressing the need for end-to-end visibility into developer activities and modern developer security platforms. Additionally, Ajay has also worked as a startup advisor for multiple ventures in 2022.
Ajay Mishra's education history includes an MBA degree with a specialization in Marketing and Finance from The University of Chicago Booth School of Business. Ajay also holds a Master's degree in Computer Science from The University of Southern Mississippi. Ajay'sundergraduate degree is a Bachelor of Science from the University of Allahabad. Further details such as the start and end years for each educational experience are not provided.
This person is not in any teams
Identity Science
Identity Science is an identity-based SDLC security company. Product Agentless security platform to manage developer security posture, entitlements, risky behaviors, and open-source software risk from code-to-deployment Customer Value With the Identity Science platform, security teams can manage a Zero Trust SDLC process via integrated visibility, monitoring, and automated remediation capabilities. The platform provides organizations consolidated executive level and detailed dashboards to manage and prioritize their SDLC risks in real time. Why is this important? 1) The SDLC process is an identity centric process which is highly complex and has significant inherent risk through disjointed software development processes and tools 2) Security teams are grappling with the lack of visibility, inability to monitor and control risks in these highly dynamic developer environments. Examples of challenges: a. Overprivileged Developer Entitlements: Developers, service accounts typically have admin permissions across tools and broad scope access across assets b. Weak Security Posture: Misconfigurations across SDLC tools and services. c. Risky Developer Behavior: Anomalous activity due to external or malicious insider users leading to security breaches like stolen source code, critical vulnerabilities in software assets d. Secrets/Tokens Leakage Detection: Undetected password and secret credentials leaks through code & software release pipelines e. Open-Source Supply Chain Risk: Critical Vulnerabilities through risky external packages f. Lack of Continuous Compliance: Security best practices, guardrails and standards to ensure the SDLC process is Secure by Design (Federal Cybersecurity Strategy mandate - April 23, 2023) g. Integrated SDLC Risk Visibility and Remediation Framework: Lack of consolidated risk dashboard, alert fatigue from multiple disconnected security tools unaware of organizational context and lack of prioritized remediation