Enzoic Detect Compromised Credentials 2019

Enzoic Detect Compromised Credentials 2019

I interviewed to Josh Horwitz (COO of Enzoic). Enzoic is an enterprise-focused cybersecurity startup committed to preventing account takeover and fraud through compromised credential detection.

About Josh Horwitz.

Josh Horwitz is an enterprise software executive and entrepreneur with over 25 years of experience.  He is currently the COO of Enzoic, an enterprise-focused cybersecurity company committed to preventing account takeover through compromised credential detection on the web and in Active Directory.

Previous to Enzoic, Josh was the founder of the cloud-based, enterprise customer-marketing platform, Boulder Logic, whose clients included Microsoft, Siemens, Dell, and CSC.

Josh grew the company as CEO over 46 consecutive profitable quarters and ultimately lead the company’s exit in 2015.  Prior to founding Boulder Logic, Josh held senior technology and sales positions with both start-ups and Fortune 500 companies, including IBM where he developed marketing programs to help build Lotus Domino to over 40 million users. Josh earned his MBA from Babson’s F.W. Olin Graduate School of Business and his BA from Washington University in St. Louis.

Why did you join PasswordPing (now known as Enzoic)?

“I was looking at start-up opportunities where we could make a big impact on an important problem. Cyber-security definitely fits that and has been an area of interest for me.”- explains Mr Horwitz.

Enzoic’s CTO relationship – Mike Wilson.

“Earlier in my career, I did some work with Webroot and that’s where I originally met Mike Wilson.  Mike is one of the most talented software professionals in the security industry.”- highlights Josh Horwitz.

“I was immediate interested in the idea he had to protect organizations from compromised credentials attacks. Password reuse is such a common practice, but it creates a vulnerability for business that is otherwise very difficult to detect or prevent.  It was an easy decision to join up on solving this problem.”- Josh ends up explaining

What do you see as the vision for Enzoic?

Enzoic is fundamentally about protecting businesses from cyber-attack and fraud.  Today our clear focus is risks related compromised credentials.

Context background.

Unfortunately, 3rd party data breaches have become everyday occurrences and the tools for bad actors to take advantage of exposed credentials have created a low barrier. This has created a large opportunity for Enzoic to help solve.

Enzoic’s roadmap.

Over time I see Enzoic expanding the types of cyber-attack and fraud we protect against.  Cyber-security is a continually evolving landscape and I see us continuing to be at the forefront.

How does Enzoic help its customers?

We basically turn the ammunition used by attackers, compromised credentials, into a defensive tool for organizations.  Our clients span the range of industries and sizes but break down into two main types.  First, we help internal IT departments to protect their network from using vulnerable passwords.  Second, we help customer facing services and sites to protect their users from account takeover.

What do you think makes Enzoic different from its competitors?

There are variety of services that let individuals and organizations check for their exposure in 3rd party data breaches, however the information is not particularly actionable.

Enzoic combines proprietary technology and good old human intelligence.

Enzoic is designed so detection can be part of a defensive posture. Other services that use this model generally rely on fairly static, generally available data sources. Enzoic is different in that use a combination of proprietary technology and good old human intelligence to collect data and update our database multiple times each day. For this type of tool to be effective, it requires keeping up with the rapidly changing data breach landscape.

Lastly, we differ in that we use secure methods for checking credentials that don’t actually require sending credentials in either direction. Integrity and security around this type of service is paramount.

If you are interested in more Tech Startups, you can find in our Web Section of TECH STARTUPS or if you are interested to be featured on our Cybersecurity Worldwide Directory you can contact us by email or write a comment below, so we will contact you.




Javier Nieto León

When I started as a Business Development Manager at a Tech Startup Vendor in 2014, I faced the issues and the pains about how hard it is becoming a global Tech Startups. The Startups Tips mission is to help your Tech Startups to go from Local to Global.

Leave a Reply

KEEP UPDATED with our latest Tech Startups and Tips.