Oasis Security Analysis: $35M Raised
What is Oasis Security?
Product Features & Capabilities
- Oasis NHI Security Cloud
- Identity inventory management
- Security posture assessment
- Contextual identity analysis
- Threat and anomaly detection
- Ownership tracking
- Lifecycle management
- Remediation services
- Safe secret rotation
How much Oasis Security raised
Funding Round - $35.0M
RecentOther Considerations
Reported Clients
Oasis Security has reported several notable clients on their website, including:
- A Fortune-50 healthcare provider that successfully eliminated a critical exposure, avoiding a potential $3–5 million HIPAA breach fine.
- A Fortune-500 logistics company that achieved a 35% reduction in secret-rotation efforts.
- A Fortune-500 insurance company that managed to cap an outage affecting 50% of their production workloads.
- A Fortune-300 consumer packaged goods company that reduced its attack surface by 60% within days during a proof of value (POV) assessment.
- A Fortune-200 manufacturing company that enforced compliance on newly acquired environments following a merger or acquisition.
Trade Show Presence
- FS-ISAC Americas Fall Summit 2025 - **Date**: October 5, 2025 - October 8, 2025 - **Location**: Scottsdale, AZ
- HOU.SEC.CON - **Date**: September 30, 2025 - October 1, 2025 - **Location**: Houston, TX
- Atlantic City Hard Rock Retreat: Eagles vs. Giants - **Date**: October 9, 2025 - October 10, 2025 - **Location**: Atlantic City, NJ
- NYSE Tech Summit NYC - **Date**: October 13, 2025 - October 14, 2025 - **Location**: New York, NY
- GPSEC Security Forum - **Date**: October 29, 2025 - **Location**: Philadelphia, PA
- Microsoft Ignite 2025 - **Date**: November 18, 2025 - November 21, 2025 - **Location**: San Francisco, CA
- Identiverse 2025 - **Date**: November 19, 2025 - November 20, 2025 - **Location**: Washington, D.C.
- Gartner IAM Summit 2025 - **Date**: December 8, 2025 - December 10, 2025 - **Location**: Grapevine, TX Notable presentations or booths were not specified on the events page.
Gtm Strategy
Oasis Security employs a hybrid go-to-market (GTM) strategy that combines elements of both product-led growth (PLG) and sales-led growth.
Upon analyzing the Oasis Security website, it is evident that they prioritize user engagement through a demo request option prominently featured on the homepage, which allows potential customers to experience their solutions firsthand. This indicates a focus on providing a hands-on experience typical of PLG strategies. However, there is no explicit pricing information available on the site, suggesting that they may prefer to engage in direct sales conversations, which aligns with a sales-led approach.
The absence of customer testimonials on the homepage is notable, but the company does highlight significant outcomes achieved by clients, such as reducing risks associated with over-privileged access. This suggests a focus on enterprise-level sales cycles where results and ROI are critical.
Additionally, Oasis Security offers educational resources, including a certification program for Non-Human Identity Management and a blog with relevant articles. This investment in self-service learning materials indicates a PLG aspect, as it empowers users to understand and utilize the product effectively.
Overall, Oasis Security's strategy reflects a balance between facilitating rapid user adoption through demos and educational resources while also engaging in structured sales processes for enterprise clients. This hybrid approach allows them to cater to both individual users and larger organizations, optimizing for both user engagement and high-value contracts.
Tech Stack 1
- Technical Account Manager
- Senior Product Marketing Manager - While specific technologies are not detailed, the role requires expertise in cybersecurity, IAM (Identity Access Management), PAM (Privileged Access Management), and cloud security, suggesting a strong emphasis on security technologies.
- Senior Product Manager
- Engineering Team Lead - The job listing specifies modern cloud infrastructure technologies such as Kubernetes (K8s), Docker, relational and NoSQL databases, and AI infrastructure tools, indicating a strong technical foundation in cloud and AI technologies.
- Solution Architect