Orchid Exists Because Identity Lost Its Center
Our Vision
Identity security no longer lives in one system
It spans IAM, applications, infrastructure, and code - each enforcing access in different ways, with no shared source of truth. Orchid’s vision is to make this fragmented identity behavior observable and explainable end to end.
So identity teams can understand how access actually works, bring applications under governance, and prove control over time - without relying on assumptions or manual effort
Our Story
While entrepreneur-in-residence at Team8, one of Israel’s most successful VC funds, Roy Katmor was tasked with exploring emerging theses in the security space. One, in particular, stood out and sparked his quest - the challenge of onboarding applications and adopting the latest identity security controls.
Leveraging its extensive CISO network and over the course of three years, Team8 identified a top-three enterprise concern, a top-three budget investment, and most surprisingly, a top-three source of dissatisfaction all related to identity consumption. The issue appeared to stem from enterprises struggling to integrate and maintain applications within their identity stack, resulting in failure to meet regulatory and security policies within the fragmented identity space.

Yet, just one year later, after extensive research into emerging technologies — primarily LLMs that were not available a few years prior — the team, now joined by Robert Wiseman and Ido Kelson, discovered that utilizing LLMs to interpret application instructions can reveal identity-related context and reasoning in each application’s design, providing the missing piece needed to address the complexity of identity and access management.
With this breakthrough, and a lot of hard work, they succeeded in developing a ground-breaking Identity-first Security Orchestration solution that discovers all applications in use throughout an enterprise, assesses their identity flows to highlight exposure, and enables the remediation of that exposure to strengthen and maintain the organization’s identity security posture.
Careers
We're continually searching for outstanding talent. Join our team of top-notch cybersecurity experts, dedicated to orchestrating identity compliance.








