1Password’s cover photo
1Password

1Password

Computer and Network Security

Toronto, ON 112,325 followers

Productive businesses use 1Password to secure employees at scale.

About us

Trusted by more than 180,000 businesses to protect their data, 1Password gives you complete control over passwords and other sensitive business information. As an integral layer of the Identity and Access Management (IAM) stack, 1Password protects all employee accounts – even those you aren’t aware of. Give employees secure access to any app or service and safely share everything you need to work together – including logins, documents, credit cards, and more – while keeping everything else private. 1Password is easy to deploy and integrates with Azure AD, Okta, OneLogin, and Slack, so you can automatically provision employees using the systems you already trust. It’s simple to manage and fits seamlessly into your team’s workflow, so you can secure your business without compromising productivity.

Website
https://1password.com/
Industry
Computer and Network Security
Company size
1,001-5,000 employees
Headquarters
Toronto, ON
Type
Privately Held
Founded
2005

Locations

Employees at 1Password

Updates

  • AI isn’t just introducing new risks, it’s exposing how quickly the traditional security models break down. In a conversation with Rob Pegoraro at Fast Company, 1Password’s CTO, Nancy Wang, put it simply: “AI is both a threat and a tool, and companies have to approach it as both.” Employees are adopting tools faster than security can keep up, and agents are starting to act on their behalf. That’s the tension organizations are navigating now as AI is changing who and what gets access. But the answer isn’t to slow AI down. It’s to rethink access across both human and non-human identities, in a way that adapts in real time. Security can no longer rely on static controls, it has to move at the speed of work. Read the full feature: https://lnkd.in/e4ew2wcX #AI #Cybersecurity #AIsecurity #1Password

  • 1Password reposted this

    I recently spoke at HumanX San Francisco alongside Nancy Wang, CTO of 1Password, and Edo Segal, CTO of Napster Corp., with Michael Nuñez from VentureBeat moderating. One idea that stood out from the conversation is that most of us are still underestimating how fast AI autonomy will evolve over the next few years. Right now, AI agents are largely reactive, meaning a user asks and it responds. But my sense is that we're moving toward a world where agents act without waiting to be prompted, surface issues before you notice them, take action in the background, and own entire workflows end-to-end. I think that shift is happening faster than most people expect, and it brings real challenges with it. Knowing when to let an agent run, when to have a human step in, and how to build the right guardrails around autonomous action is a muscle most organizations haven't had to develop yet. That's the work ahead and something we’re thinking a lot about at Decagon. Really appreciate the conversation and the perspectives shared across the group.

    • No alternative text description for this image
  • 1Password reposted this

    AI is changing how engineering teams build. But the harder question for leaders is: how do we support teams in becoming AI-first? 🤔 Spent a packed day in SF last week exploring this with engineering leaders - on stage at DX Annual with Tim Bozarth and Nancy Wang, and at Cursor Conversations with Chris Kasten and Ryan Sokol. A few themes that emerged in those conversations: 1️⃣ The bottleneck has moved. Now that AI helps everyone build faster, the constraint is alignment and clarity. 2️⃣ It's not just about coding - it's the full SDLC. Coding accounts for ~10–20% of an engineer’s time. The real opportunity spans (1) planning, (2) technical design, (3) validation & testing, (4) and production ops. Rethink how can AI reshape the full system of work. 3️⃣ Engineers are becoming orchestrators. The role is shifting from writing code to orchestrating systems, agents, and workflows. Leaders need to rethink how work is structured, what "good" looks like, and how teams are enabled 4️⃣ The ideal engineer profile is changing. The product-minded generalist is rising - curious, high agency, comfortable across the stack. This will have implications for hiring and career growth. 5️⃣ We need new ways to measure impact - even if imperfect. It’s still too early to determine a clear and definitive AI ROI. Dont let that deter aggressive experimentation with AI. Listen to qualitative signals and iterate: Are engineers more effective? Unblocked? Building things that weren't possible before? 👏🏽 Big thanks to DX, Cursor, and moderators Abi Noda and Jordan Topoleski. We're all figuring this out in real time.

    • No alternative text description for this image
    • No alternative text description for this image
  • OAuth connections may be fast and familiar, but they can also unintentionally fast-track a breach. When a connected third-party service is compromised, attackers don't need to bypass authentication. The token is valid. The permissions are already in place. Recent incidents following this pattern demonstrate how credential sprawl can become a supply chain risk. Our latest blog outlines more durable approach with a few key shifts: 🔹 Treat discovery as ongoing, not periodic. You need a continuous view of what's connected via OAuth and how it's being used. 🔹 Shorten credential lifetimes. A token that expires quickly is far less useful if it's exposed. 🔹 Keep environments separate. Development credentials should never carry over into production. 🔹 Centralize credential storage and issuing access at the moment it is needed helps contain the spread of credentials into uncontrolled spaces. 🔹 Monitor how access is used, not just granted. Valid credentials used in unexpected ways won't trigger traditional detection. Build a baseline so deviations are easier to spot. The answer isn't preventing every connection. It's understanding where those connections exist, how much access they carry, and how that access is being used over time. Read the full breakdown: https://bit.ly/4u6GX8L #Cybersecurity #IdentitySecurity #ZeroTrust #AccessManagement

    • No alternative text description for this image
  • At 1Password, we applied agentic tooling to refactor a multi-million-line Go monolith. Here, we share what worked, what broke, and what it means for teams adopting AI in production systems ⤵️ 🔹 Agents excel at well-defined, bounded tasks. We migrated 3,000+ call sites in hours, work that had been in the backlog for months. The key was a fully specified playbook with explicit failure modes and clear escalation paths. 🔹 Incomplete specifications don't produce no output. They produce implicit ones. When context is missing, agents fill the gaps, and those assumptions can cascade quickly. In one case, requiring a full session rollback. 🔹 The bottleneck isn't code generation. It's managing decisions that have ordering constraints and are hard to reverse. There's a bigger shift here too. AI agents are becoming a new class of actor in production systems, introducing non-determinism, persistence, and scale that traditional security models weren't designed to handle. That has implications for engineering workflows and for how access and trust are managed across systems. Read the full breakdown: https://bit.ly/3Otpecv #AIAgents #SoftwareEngineering #Cybersecurity #TechnicalLeadership #AI

    • No alternative text description for this image
  • 1Password reposted this

    Balancing speed and risk has always been a part of the CISO role, and AI only makes that balance more visceral. We’re at a point where adopting AI too slowly can be just as risky as adopting it too quickly. Threat actors are already using AI to automate attacks and hunt for vulnerabilities, so defenders must adopt AI capabilities to keep pace. I sat down with Brianna Monsanto at IT Brew to talk about how we’re approaching this at 1Password . We’re focused on giving teams a way to experiment, with guardrails around access and data use. We’re learning and adjusting weekly. You can read more about it here: https://lnkd.in/eexjkDFs

  • Browsers can store passwords. That doesn't mean they should. 🔐 Browser-based password managers weren't built to scale with your team. The result? Credential sprawl, visibility gaps, and admin headaches. 1Password Enterprise Password Manager secures access for growing teams with centralized control, clear visibility into access and risk, and seamless onboarding and offboarding. And, migrating is easier than you think. Swipe to learn where browser-based password managers fall short, and see what IT admins actually need to close the security gaps 👉 https://bit.ly/48bFXHS #1Password #AccessManagement #IdentitySecurity #ITSecurity

  • 1Password reposted this

    The AI abstractions you choose now will have concrete ramifications going forward. I was on a panel at DX Annual with Tim Bozarth (CVP, Microsoft Core AI Engineering) and Taroon Mandhana (CTO, Atlassian) yesterday, and we kept coming back to this idea: the decisions leaders make today will shape whether AI actually helps their systems or just makes them harder to manage. Three things to pay attention to: 👉 Where your engineers spend their time. Taroon put it plainly: don’t scale output before you can trust it. If you don’t have solid test harnesses in place, more AI-generated PRs just mean more cleanup later. The question isn’t how much code your agents can produce. It’s how much of that code your team has to babysit. 👉 Whether today’s progress is tomorrow’s tech debt. Tim said something that stuck with me. We’re effectively building a new kind of compiler where the input is intent and the output is code. But unlike traditional compilers, most AI systems today don’t have clear contracts or reliable failure modes. Without those, every shipped feature is a deposit in a debt account nobody is tracking. 👉 Whether a rapidly expanding code surface is safe. Agents are acting on behalf of users and systems. They’re calling APIs, using credentials, making decisions, usually with far more access than they need and very little visibility into what they’re actually doing. We wouldn’t run a team of engineers that way. We shouldn’t run agents that way either. The patterns are familiar: limit access, make it short-lived, keep a clear record of what happened. Get these right now and AI compounds in your favor. Get them wrong and you’re paying interest on decisions you didn’t know you were making. Thanks Abi Noda Greyson Junggren for the opportunity!

    • No alternative text description for this image
    • No alternative text description for this image
  • Anthropic revealed Mythos, a frontier AI model capable of autonomously discovering and exploiting vulnerabilities at scale. The window between vulnerability discovery and time-to-exploit has collapsed to hours, or less. But speed isn't the whole story. Breaches don't happen simply because AI collapses the time-to-exploit. Breaches happen when a vulnerability leads to credentials, tokens, or keys that give an attacker access. Trying to patch every vulnerability will prove impossible. Access is the defining control point. Dave Lewis, 1Password Global Advisory CISO, contributed to a new industry paper led by Cloud Security Alliance that explores what happens when AI can find and exploit vulnerabilities faster than humans can respond, and how organizations should adapt. As organizations work toward “Mythos-ready” resilience, here are the priorities ⤵️ 🔹 Invest in patch management and access management = blast radius containment 🔹 Implement hardware-backed authentication 🔹 Treat AI agents as a distinct identity class, with scoped, least-privilege permissions 🔹 Automate secret rotation: Replace long-lived credentials with short-lived tokens This isn't a storm that will pass. It's a permanent shift in the threat landscape, and the best time to prepare is now. 👉 https://bit.ly/4tiBqfm #Cybersecurity #AISecurity #IdentitySecurity #Mythos #AccessManagement

    • No alternative text description for this image
  • Last quarter, we donated $12K USD to 29 non-profit organizations nominated by our team members, supporting local communities around the world. Through our Giving Fund program, we’re proud to empower our people to give back to causes that matter most to them, from poverty reduction and healthcare to animal welfare. 💙 Hear from Weston Fillman, Director, People Operations and Employee Relations, about what being able to support Tandem, Partners in Early Learning an organization creating equitable early learning experiences in the Bay Area, means to him. #1Passwordforgood #1Passwordlife #givingback #corporategiving #socialimpact

Similar pages

Browse jobs

Funding

1Password 4 total rounds

Last Round

Secondary market

US$ 100.0M

See more info on crunchbase