Ajit Sancheti

Ajit Sancheti is CEO and Co-Founder of Preempt and has over 20 years experience in IT security and executive leadership. Previously, he co-founded Mu Dynamics (acquired by Spirent Communications) and performed held various management roles. Before Mu Dynamics, Ajit was part of the Corporate Development Group at Juniper Networks and an integral member of the team that developed the industry’s first Intrusion Detection and Prevention system at OneSecure (acquired by NetScreen). Prior to OneSecure, he spent 7 years at Western Digital, holding various engineering and management positions
Find me on:

Recent Posts

We’ve raised $27.5 million: How Preempt’s funding validates Identity and Access Threat Prevention

Posted by Ajit Sancheti on Jun 27, 2018 6:19:47 AM

Preempt began with a basic premise: Effective security within an enterprise should combine threat detection and real time response within a single solution. As enterprises transition to the cloud and the perimeter disappears, identity is the new perimeter. If identity is the new perimeter, access management from a security standpoint can lead to effective threat prevention. That simple but powerful idea was the genesis of Preempt and has given us the opportunity to solve challenging security problems for our customers.

Read More

Topics: Adaptive Threat Prevention, Threat Detection, Risk

How Identity, Behavior & Risk Enable Security in the New Digital Age

Posted by Ajit Sancheti on Dec 7, 2017 6:07:51 AM

Enterprises are deploying more cloud services, embracing DevOps, leveraging on-premises applications and exploring other productivity and cost optimization solutions. As a result, it is becoming harder for them to know who within the organization has access to what and how that access is being used or, as we found out in our latest survey, being misused.

Read More

Topics: Adaptive Response, Identity, User Behavior, Risk, CARTA

Evolving Employee Security Measures from “Weak Link” to “Front Line Defense”

Posted by Ajit Sancheti on Dec 1, 2017 8:09:38 AM

It's easy to think that attackers have gained an unfair advantage over security professionals. The network perimeter has virtually dissolved, compelling enterprises to simultaneously work to keep the bad guys out while tackling multiple insider threats – naïve employees, malicious insiders, careless third parties, and undetected malware or intruders that have already breached network defenses.

The challenge for security teams today? Legitimate users and activities should not be impeded, but determining what activity to block and what to allow is not always easy.

Read More

Topics: Adaptive Response, Credential Compromise, Informaton Security, User Behavior, Insider Threats

CARTA - The Evolution of IT Security Beyond Black and White

Posted by Ajit Sancheti on Jun 16, 2017 10:04:54 AM

Gartner’s 2017 Security Summit began this week with a keynote from Neil MacDonald, Eric Ahlm and Ramon Krikken introducing a new charter that will transform all areas of information security moving forward. They introduced a new strategic approach called CARTA* – Continuous Adaptive Risk and Trust Assessment.

Read More

Topics: CISO, CARTA, Adaptive Response, Risk

Top IT Security Trends for Law Firms at LS-ISAO

Posted by Ajit Sancheti on May 3, 2017 8:05:28 AM

Last week, I had the opportunity to spend a day at a Legal Services Information Sharing & Analysis Organization(LS-ISAO) workshop in New York City, hosted by a leading law firm. Close to 100 security professionals from law firms around the country participated. While most law firms have small dedicated security teams, what was apparent from the beginning was that the challenges ahead of them were not small.

Read More

Topics: CISO, Law Firms, Insider Threat, Risk

The New IT Security Job Requirements: Scientist, Psychologist, Psychic, Businessman

Posted by Ajit Sancheti on Feb 3, 2017 4:15:39 PM

In a recent article I wrote for ITSP Magazine, I discussed one of the prominent challenges that enterprises are facing today: the IT Security talent shortage. CISOs want to fill their security team bench with specialized engineers. The problem is, they aren’t readily available. In this post, I will share some of the highlights from the article and talk more about how to optimize skill development so we can grow the talent base for IT Security pros.

Read More

Topics: Security Skills, User Behavior, big data

The IT Security Flip: Insider Threats Capturing More Mindshare

Posted by Ajit Sancheti on Dec 9, 2016 10:56:17 AM

Every once in awhile, a survey provides insights that at first glance don’t seem out of the ordinary. They generally validate a hypothesis. That is why we were somewhat surprised when we commissioned a survey of IT security professionals working in enterprises large and small.

Read More

Topics: Insider Threats, CISO

7 Best Practices for Fighting Corporate IT Security Risks

Posted by Ajit Sancheti on Nov 28, 2016 1:37:14 PM

Even though Cyber Security Awareness month has passed, it is important to remain diligent and and stay aware to defend yourself from threats. I recently worked with CSO Magazine to put together a series of best practices that organizations and their users should follow (both in and out of the corporate network) to minimize threats and reduce risk.

While IT security education may be part of an organization’s onboarding process, many people still don’t realize that they shouldn’t open an email from an unidentified source, or even those from a friend or coworker that have uncharacteristic links or text. And inevitably they still do.

Read More

Topics: CISO, Risk, Multi-factor Authentication, Identity Verification

Top 4 Security Themes from Financial CISOs - Insider Threat a Universal Priority

Posted by Ajit Sancheti on Oct 28, 2016 8:35:50 AM

This week, Preempt had the opportunity to participate in the annual FS-ISAC Fall Summit 2016 in Nashville, TN.  FS-ISAC ( which stands for Financial Services Information Sharing and Analysis Center) is the financial industry's go to resource for cyber and physical threat intelligence analysis and sharing. The Fall Summit brought together over 700 C-level and Sr-level financial services professionals as well as Security executives across the globe to discuss the latest information on threats, sharing of best practices and trends across the sector.

Read More

Topics: Insider Threats, Risk, CISO

Enterprise Security in Times of War

Posted by Ajit Sancheti on Sep 8, 2016 7:58:18 AM

Enterprises define security policies that match their business objectives. By setting security policy rules, an organization can better enable the business to achieve its goals while protecting them from advanced threats. They work reasonably well, even allowing for the well publicized breaches and insider threats. Without policies or a set of tools in place for such eventualities, it will be very difficult for the business to operate effectively when under attack.

Read More

Topics: ueba, Behavioral Firewall, CISO, Insider Threats, Credential Compromise, User and Entity Behavior Analytics, Adaptive Response