Blog
-
Identity Security
Understanding ISPM: Closing the Identity Gap with Identity Security Posture Management
ISPM is a new category of identity security designed to help organizations continuously monitor and manage identity risk across cloud, SaaS, and hybrid environments. Learn how Identity Security Posture Management works, why it matters, and how Veza enables it. -
AI
Veza Access AI – Applications of Gen AI for Identity Security Use Cases
Veza Access AI transforms identity security by enabling natural language queries to navigate complex access landscapes, empowering organizations to achieve least privilege effectively.
Explore our posts
-
The Hidden Cost of Over-Provisioned Access: Identity’s Role in Cloud Optimization
Learn more -
Unlocking App Onboarding at Scale: The Power of Veza’s 300+ Integrations and Open Authorization API (OAA)
Learn more -
Identity Is the Entry Point: How UNC3944 Breached vSphere Without Malware
Learn more -
Inside Gartner’s 2025 Hype Cycle for Digital Identity: Why IVIP and AI for Access Matter Now
Learn more -
Identity is the New Security Perimeter
Learn more
-
Unlocking App Onboarding at Scale: The Power of Veza’s 300+ Integrations and Open Authorization API (OAA)
Learn more -
Veza Product Updates – May
Learn more -
Veza Product Updates – April
Learn more -
Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege
Learn more -
Veza Product Updates – March
Learn more -
Veza Product Updates – February
Learn more
-
Identity Is the Entry Point: How UNC3944 Breached vSphere Without Malware
Learn more -
Inside Gartner’s 2025 Hype Cycle for Digital Identity: Why IVIP and AI for Access Matter Now
Learn more -
Identity Attack Surface Analysis: Securing the New Perimeter
Learn more -
12 Best Identity Security Software [2025]
Learn more
-
The Hidden Cost of Over-Provisioned Access: Identity’s Role in Cloud Optimization
Learn more -
Unlocking App Onboarding at Scale: The Power of Veza’s 300+ Integrations and Open Authorization API (OAA)
Learn more -
Identity Is the Entry Point: How UNC3944 Breached vSphere Without Malware
Learn more -
Identity is the New Security Perimeter
Learn more -
7 user access review software tools to know in 2025
Learn more