Identity Science
Raj Mallempati's work experience begins in 2002 at Adobe, where they worked in product marketing and management roles. Raj then moved on to VMware in 2007, holding various positions in sales, marketing, and strategy until 2013. From there, they joined Riverbed Technology as the Vice President of Marketing for a brief period before transitioning to MobileIron as the Vice President of Global Marketing & Demand Generation. In 2017, they joined Malwarebytes as the Senior Vice President of Marketing and later served as the Chief Operating Officer at CloudKnox Security Inc. until 2021 when it was acquired by Microsoft. Raj then took on the role of Chief Operating Officer for Microsoft's CIEM division until 2022. Raj is currently the Chief Executive Officer and Co-founder of Identity Science. Additionally, Raj has been an official member of the Forbes Business Council since 2020 and an Entrepreneur In Residence at Maverick Ventures since 2022.
Raj Mallempati has a strong education background. Raj attended the Indian Institute of Technology, Madras from 1991 to 1995 and obtained a B.Tech degree in Engineering. Following that, they pursued a Master's degree in Computer Science from The University of Texas at Dallas, graduating in 1997. Seeking further knowledge and expertise, they then enrolled at The Wharton School from 2000 to 2002 and graduated with an MBA, specializing in Strategy, Finance, and Marketing.
This person is not in any teams
This person is not in any offices
Identity Science
Identity Science is an identity-based SDLC security company. Product Agentless security platform to manage developer security posture, entitlements, risky behaviors, and open-source software risk from code-to-deployment Customer Value With the Identity Science platform, security teams can manage a Zero Trust SDLC process via integrated visibility, monitoring, and automated remediation capabilities. The platform provides organizations consolidated executive level and detailed dashboards to manage and prioritize their SDLC risks in real time. Why is this important? 1) The SDLC process is an identity centric process which is highly complex and has significant inherent risk through disjointed software development processes and tools 2) Security teams are grappling with the lack of visibility, inability to monitor and control risks in these highly dynamic developer environments. Examples of challenges: a. Overprivileged Developer Entitlements: Developers, service accounts typically have admin permissions across tools and broad scope access across assets b. Weak Security Posture: Misconfigurations across SDLC tools and services. c. Risky Developer Behavior: Anomalous activity due to external or malicious insider users leading to security breaches like stolen source code, critical vulnerabilities in software assets d. Secrets/Tokens Leakage Detection: Undetected password and secret credentials leaks through code & software release pipelines e. Open-Source Supply Chain Risk: Critical Vulnerabilities through risky external packages f. Lack of Continuous Compliance: Security best practices, guardrails and standards to ensure the SDLC process is Secure by Design (Federal Cybersecurity Strategy mandate - April 23, 2023) g. Integrated SDLC Risk Visibility and Remediation Framework: Lack of consolidated risk dashboard, alert fatigue from multiple disconnected security tools unaware of organizational context and lack of prioritized remediation