Wednesday, February 12, 2025
HomePress ReleaseMichael Trites Joins Aembit as Senior Vice President of Global Sales

Michael Trites Joins Aembit as Senior Vice President of Global Sales

Published on

SIEM as a Service

Follow Us on Google News

Aembit, the non-human identity and access management (IAM) company, today announced that Michael Trites has joined the company as senior vice president of global sales. In this role, Trites will lead Aembit’s global sales strategy, driving adoption of its industry-first Workload IAM Platform.

Trites brings over two decades of experience scaling sales organizations at high-growth security companies. He previously served as executive vice president of global sales at Dig Security, a provider of data security posture management, where he helped drive the company’s expansion and go-to-market strategy, leading to its acquisition by Palo Alto Networks.

“Michael’s track record spearheading adoption in emerging cybersecurity markets makes him the ideal leader to accelerate Aembit’s growth,” said David Goldschlag, co-founder and CEO of Aembit. “His expertise will be essential as we help organizations recognize the importance of securing and managing their rapidly growing mix of client workloads, AI agents, and service accounts.”

Prior to Dig, Trites held sales executive roles at CyCognito, BigID (recognized by Deloitte as one of North America’s fastest-growing companies from 2020 to 2024), and Zimperium, where he helped expand market reach and drive revenue growth. He also spent more than a decade at Riverbed Technology, where he advanced through multiple sales leadership roles, ultimately overseeing sales for the Americas East region. Most recently, he led global sales at MineOS, focusing on data privacy and compliance solutions.

Now at Aembit, he is focused on helping organizations secure non-human identities by authenticating client workloads, enforcing access rights, and issuing short-lived credentials – eliminating static secrets and reducing an attack surface increasingly implicated in high-profile data breaches.

“Aembit’s approach to non-human identity management fills a major gap in modern security,” Trites said. “Many solutions highlight the risk, but almost none actually solve it. Unlike tools that only provide visibility into service accounts, Aembit enforces policy-based, secretless access and removes the need for developers to build authentication into applications. That lets companies move faster and build with confidence. I’m excited to help bring this model to more organizations.”

For more information about Aembit, users can visit www.aembit.io.

About Aembit

Aembit is the leading provider of workload identity and access management solutions, designed to secure non-human identities like applications, AI agents, and service accounts across on-premises, SaaS, cloud, and partner environments. Aembit’s no-code platform enables organizations to enforce access policies in real time, ensuring the security and integrity of critical infrastructure. Users can visit the official website aembit.io and LinkedIn.

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Hackers Manipulate Users Into Running PowerShell as Admin to Exploit Windows

Microsoft Threat Intelligence has exposed a novel cyberattack method employed by the North Korean...

Windows Driver Zero-Day Vulnerability Let Hackers Remotely Gain System Access

Microsoft has confirmed the discovery of a significant zero-day vulnerability, tracked as CVE-2025-21418, in the...

FortiOS & FortiProxy Vulnerability Allows Attackers Firewall Hijacks to Gain Super Admin Access

A critical vulnerability in Fortinet's FortiOS and FortiProxy products has been identified, enabling attackers...

Fortinet’s FortiOS Vulnerabilities Allow Attackers Trigger RCE and Launch DoS Attack

Fortinet’s FortiOS, the operating system powering its VPN and firewall appliances, has been found...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Gcore Radar Report Reveals 56% Year-on-year Increase in DDoS Attacks

Gcore, the global provider of edge AI, cloud, network, and security solutions has released...

SpyCloud Leads the Way in Comprehensive Identity Threat Protection

SpyCloud, a leading identity threat protection company, has unveiled key innovations in its portfolio,...

Doppler Announces Integration with Datadog to Streamline Security and Monitoring

Doppler, the leading provider of secrets management solutions, announced a new integration with Datadog,...