Access Management
,
Identity & Access Management
,
Privileged Access Management
Benny Porat of Twine Security on Automating IAM With AI, Trusting Digital Agents
Traditional identity and access management solutions were not built for today’s sprawling digital environments, where identities multiply across humans, machines and APIs. Enterprises have the tools ranging from privileged access management to individual development plan to identity governance and administration, but not the bandwidth to use them meaningfully. That’s where IAM breaks.
See Also: Identity and Access Management (IAM) Market Guide 2025
“We didn’t need more buttons. We needed someone who could press them and know why,” said Benny Porat, co-founder and CEO of Twine Security. “Alex isn’t just another automation script. He’s a digital employee, who understands your business context, talks to stakeholders and gets the job done.”
Twine Security is taking a radically agentic approach to identity management. Alex, its AI-powered “digital worker,” is designed to offload high-friction IAM operations that security teams don’t have the time or clarity to handle – from stale account remediation to contextual ownership discovery.
“The real bottleneck wasn’t technology. It was people spending cycles just chasing context,” Porat said. “We wanted to free up humans to design architecture and strategy, while Alex handles the operational sprawl.”
In this video interview with Information Security Media Group, Porat also discussed:
- Why IAM is now the number one attack surface, and why enterprises are struggling to scale it;
- How Twine’s multi-agent architecture enables Alex to think, plan and act like a real teammate;
- Why big enterprises – not startups – are Twine’s initial focus, and where the pain is greatest.
With a background as co-founder and CTO of Claroty, Porat has 15 years of deep cybersecurity experience into Twine’s mission to eliminate the execution gap between security tools and real-world business risk. Porat specializes in adversary tracking, red-blue collaboration and threat actor behavior analysis. He has held leadership positions in cybersecurity at IBM and Imperva, where he developed frameworks to counter advanced persistent threats.

