Veza Library
Browse our selection of ebooks written by the
finest minds and most experienced practitioners
in the Identity Security space.
A Practitioner’s Guide to Intelligent Access
“Least privilege” is what everyone wants, and very few achieve. Yet, given the onslaught of identity-based attacks, we must answer it.
Tarun and Phil Venables, cybersecurity leader and Veza board member, shed light on practical strategies that will lead your organization toward modern access governance and access control, built on the strong foundation of an enterprise-level privilege management program.
Strategies for Achieving Least Privilege in the Modern Enterprise
Just like a growing plant, identity modernization proceeds through three key phases: Seed, Sprout, and Bloom.
Co-authors Jason Chan (former Netflix VP) and Tarun Thakur explain how to approach these phases and build an enduring identity strategy.
Modernizing Identity with Just-in-Time Access
Mario Duarte, former VP of Security at Snowflake, knows a thing or two about identity access, and helping organizations secure their data, in Snowflake and other systems.
The key to solving this challenge at the enterprise level lies in applying the principles of least privilege and just-in-time access. Available August 13.