Photo Gallery
![]() |
Hush Security Non Human Identity Runtime Platform

Additional Info
Company | Hush Security |
Company size | 40-69 employees |
World Region | Middle East |
Website | https://www.hush.security |
NOMINATION HIGHLIGHTS
Hush Security is reinveting how organizations secure and manage workload and non-human identities (NHIs).
We replace secret-based access with just-in-time, policy-driven controls—eliminating the need to manage secrets. Hush locks down NHI access using real-time policies and correlates posture with live behavior to surface only the most critical risks.
Our Platform Is Built on Three Core Pillars:
🔹 Discovery & Inventory – Unified, real-time mapping of all NHIs and secrets across environments.
🔹 Runtime Risk Correlation – Lightweight sensors link identity and usage data to prioritize real threats.
🔹 Secretless Access Enforcement – No static secrets. Just-in-time, least-privileged access governed by policy.
Our patent-pending tech gathers static and runtime telemetry to create a live, risk-ranked inventory. At access time, our eBPF sensor validates requests and issues short-lived credentials with only the permissions needed—no more standing access or hardcoded secrets.
Vote by Sharing
- Like
- Digg
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- SMS
- Viber
- Telegram
- Subscribe
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Each completed social share counts as a vote for this award nomination.