SlashID × Teleskope: A New Partnership to Unify Identity and Data Security
Company News

Today, we’re excited to announce a new partnership between SlashID and Teleskope, bringing together industry-leading identity security and data security in a seamless, intelligence-driven integration.
Modern organizations are generating and sharing more data than ever—while identities (human, non-human, and AI agents) have become the primary attack vector. Sensitive data lives across cloud, SaaS, and internal systems, while access patterns shift daily. Security teams must understand not only who has access, but also what kind of data they’re accessing, how sensitive it is, and whether that access is appropriate.
The SlashID × Teleskope partnership delivers exactly this visibility—combining Teleskope’s advanced data classification and security findings with SlashID’s identity graph, 500+ out-of-the-box detections, and automated remediation workflows.
What This Integration Makes Possible
For SlashID Customers: Deep DSPM Enrichment From Teleskope
SlashID customers can now ingest Teleskope’s AI-powered data classification and document tags directly into SlashID, enriching identity intelligence with real-time sensitivity context.
Teleskope automatically discovers and classifies sensitive data across cloud, SaaS, structured and unstructured environments—scaling to classify 150+ data entity types and leveraging generative AI to summarize, categorize, and group sensitive data at the business level, such as contracts, employment documents, and intellectual property. By bringing these classification tags into the SlashID Identity Graph, customers can:
- Instantly understand the sensitivity of resources: Teleskope’s DSPM tags give SlashID users clear visibility into which identities touch sensitive or regulated datasets.
- Prioritize access reviews based on real data risk: SlashID’s investigation workflows and automated remediation can now be driven by DSPM context—helping teams eliminate unnecessary access to sensitive datasets faster.
- Strengthen Zero Trust policies with data-aware identity signals: This elevates identity checks beyond entitlements, combining them with the true underlying data risk.
- Automated Remediation Workflows: Teleskope provides fine-grained remediation at the data level, including redaction, anonymization, and encryption of sensitive information. This enables SlashID users not only to understand which identities have access to sensitive data, but also to dynamically mask that data based on identity, purpose, or policy.
Together, customers gain a unified view of who is accessing what, how often, and how risky that access truly is.
For Teleskope Customers: Identity Lineage and Access Intelligence From SlashID
Teleskope customers will now see SlashID-powered identity insights directly in Teleskope, including:
- Identity Lineage: SlashID’s Identity Graph—built from continuous ingestion of IDPs, cloud providers, SaaS apps, and workloads—shows the full entitlement chain behind any identity (human or non-human).
- Last Access Visibility: Know exactly when sensitive resources were last accessed and by whom, enabling teams to identify unused, stale, or risky access instantly.
- Automated Remediation Workflows: From enforcing MFA to suspending/quarantining identities, killing sessions, rotating keys, or opening tickets, SlashID offers one-click remediation, via UI, API, or SIEM/SOAR integrations.
This allows Teleskope users to not only find sensitive data exposure risks—but to fix them with identity-aware precision.
Why This Matters
Security teams have long struggled with two disconnected pictures:
- DSPM tools reveal sensitive data but cannot determine whether identity access is appropriate.
- Identity tools reveal entitlements but lack understanding of the data’s sensitivity.
SlashID × Teleskope brings identity and data together into a single, actionable workflow.
With the combined solution, organizations can:
- Eliminate unnecessary or risky access: Supported by SlashID’s detections (500+) and identity graph visibility.
- Prioritize remediation that meaningfully reduces real data exposure: Risk is no longer abstract—it's contextual and measurable.
- Enforce least privilege at scale: Now based on both who the identity is and what data they actually access.
- Accelerate audit readiness and compliance: SlashID’s compliance drift detection and automated fixes can now be paired with Teleskope’s data classification and governance.
This partnership creates one of the industry’s most complete views of data risk—rooted in identity behavior, lineage, access patterns, and the sensitivity of the data identities interact with.
Looking Ahead
SlashID and Teleskope share a vision of practical, scalable, intelligence-driven security.
This integration is just the beginning. Future enhancements will deepen:
- Automated identity + data workflows
- Cross-platform investigations
- Remediation orchestration
- AI-powered detection and response
Our shared goal:
Give organizations a unified layer of truth across identities, data, and access so they can prevent breaches before they happen.
Introduction
Kyte unlocks the freedom to go places by delivering cars for any trip longer than a rideshare. As part of its goal to re-invent the car rental experience Kyte collects sensitive customer data, including driver’s licenses, delivery and return locations, and payments information. As Kyte continues to expand its customer base and implement new technologies to streamline operations, the challenge of ensuring data security becomes more intricate. Data is distributed across both internal cloud hosting as well as third party systems, making compliance with privacy regulations and data security paramount. Kyte initially attempted to address data labeling and customer data deletion manually, but this quickly became an untenable solution that could not scale with their business. Building such solutions in-house didn’t make sense either, as they would require constant updates to accommodate growing data volumes which would distract their engineers from their primary focus of transforming the rental car experience.
- list
- list
- list
- list
Continuous Data Discovery and Classification
In order to protect sensitive information, you first need to understand it, so one of Kyte’s primary objectives was to continuously discover and classify their data at scale. To meet this need, Teleskope deployed a single-tenant environment for Kyte, and integrated their third-party saas providers and multiple AWS accounts. Teleskope discovered and crawled Kyte’s entire data footprint, encompassing hundreds of terabytes in their AWS accounts, across a variety of data stores. Teleskope instantly classified Kyte’s entire data footprint, identifying over 100 distinct data entity types across hundreds of thousands of columns and objects. Beyond classifying data entity types, Teleskope also surfaced the data subjects associated with the entities, enabling Kyte to categorize customer, employee, surfer, and business metadata separately. This automated approach ensures that Kyte maintains an up-to-date data map detailing the personal and sensitive data throughout their environment, enabling them to maintain a structured and secure environment.
Securing Data Storage and Infrastructure
Another critical aspect of Kyte’s Teleskope deployment was ensuring the secure storage of data and maintaining proper infrastructure configuration, especially as engineers spun up new instances or made modifications to the underlying infrastructure. While crawling Kyte’s cloud environment, Teleskope conducted continuous analysis of their infrastructure configurations to ensure their data was secure and aligned with various privacy regulations and security frameworks, including CCPA and SOC2. Teleskope helped Kyte identify and fortify unencrypted data stores, correct overly permissive access, and clean up stale data stores that hadn’t been touched in a while. With Teleskope deployed, Kyte’s team will be alerted in real time if one of these issues surfaces again.
End-to-End Automation of Data Subject Rights Requests
Kyte was also focused on streamlining data subject rights (DSR) requests. Whereas their team previously performed this task manually and with workflows and forms, Kyte now uses Teleskope to automate data deletion and access requests across various data sources, including internal data stores like RDS, and their numerous third-party vendors such as Stripe, Rockerbox, Braze, and more. When a new DSR request is received, Teleskope seamlessly maps and identifies the user’s data across internal tables containing personal information, and triggers the necessary access or deletion query for that specific data store. Teleskope also ensures compliance by automatically enforcing the request with third-party vendors, either via API integration or email, in cases where third parties don’t expose an API endpoint.
Conclusion
With Teleskope, Kyte has been able to effectively mitigate risks and ensure compliance with evolving regulations as their data footprint expands. Teleskope reduced operational overhead related to security and compliance by 80%, by automating the manual processes and replacing outdated and ad-hoc scripts. Teleskope allows Kyte’s engineering team to focus on unlocking the freedom to go places through a tech-enabled car rental experience, and helps to build systems and software with a privacy-first mindset. These tangible outcomes allow Kyte to streamline their operations, enhance data security, and focus on building a great, secure product for their customers.


from our blog

