Veza
Why Veza?
Product
Product
Product
ProductExplore our product offerings
Access Monitoring
Access MonitoringMonitor who has accessed key resources
Access AI
Access AIGenAI-based capabilities for all Veza products
Access Search
Access SearchVisualize and control data access
Access Reviews
Access ReviewsAutomate user access certifications
Access Requests
Access RequestsIncrease user productivity
Access Intelligence
Access IntelligenceFocus on the most serious risks
Lifecycle Management
Lifecycle ManagementGrant and revoke access to employees
NHI Security
NHI SecurityFull visibility and control over your Non-Human Identities
Ready to explore Veza? Schedule a Demo
Solutions
Solutions

Use Cases

Use Cases
Use CasesExplore our solutions in diverse use cases
Non-Human Identity Management
Non-Human Identity ManagementManage access for non-human identities
SaaS Access Security
SaaS Access SecuritySecure access to data in SaaS applications
Privileged Access Monitoring
Privileged Access MonitoringFind and fix privilege violations
Data System Access
Data System AccessControl access to unstructured data
Next-gen IGA
Next-gen IGAAutomation for informed decisions
Cloud Access Management
Cloud Access ManagementSecurely manage cloud access

Integrations

AWS
AWS
Google Cloud
Google Cloud
Microsoft Azure
Microsoft Azure
Open Authorization API
Open Authorization API
Okta
Okta
Snowflake
Snowflake
View all integrations
Ready to explore Veza? Schedule a Demo
Customers
Customers

insights

Customers
CustomersSee how our customers thrive with Veza
Wall of Love
Wall of LoveSee what our customers say about Veza

Company

Sallie Mae
Sallie MaeNewTechnology – Retail Marketing
PayNearMe
PayNearMeFinancial Services
Blackstone
BlackstoneFinancial Services
City of Las Vegas
City of Las VegasGovernment
Wynn Resorts
Wynn ResortsHospitality
Barracuda Networks
Barracuda NetworksTechnology – Security
Snowflake
SnowflakeNewData Cloud
CopperPoint
CopperPointInsurance
Deluxe Media
Deluxe MediaMultimedia & Entertainment
Choice Hotels
Choice HotelsHospitality
Genesys
GenesysTechnology – Customer Experience
InComm Payments
InComm PaymentsFinTech
Partners
Resources
Resources

insights

Resources
ResourcesAccess a wealth of valuable resources
Identity Radicals
Identity RadicalsConversations with cybersecurity experts
Veza Library
Veza LibraryLearn from the brightest minds in Identity Security
Trust & Security
Trust & SecurityTrust and security comes first at Veza

Company

Virtual Events
Virtual Events
In-Person Events
In-Person Events
Press Room
Press Room
About Us
About Us
Careers
Careers

Blog Topics

AuthorizationCompanyData SecurityIAMIndustry EventsProductAll topics
Blog
Securing Snowflake: A CISO’s Guide to Effective Access ControlMike TowersMike Towers
Aug 22, 2024
Blog
Introducing Access AI: The Future of Identity SecurityJared BlisteinJared Blistein
Aug 6, 2024
Blog
Veza Product Updates – October 2024VezaVeza
Nov 22, 2024
Ready to explore Veza? Schedule a Demo
Schedule a demo
Open mobile menu

Blog

  • Company

    Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege

    How do you achieve the principle of least privilege?  One access permission at a time. Today, I am thrilled to share a significant milestone in Veza’s journey: we have raised $108 million dollars in Series D funding, led by New Enterprise Associates (NEA) with participation from all our existing investors—including Accel, GV (Google Ventures), True […]
  • Identity Security

    Veza Access AI – Applications of Gen AI for Identity Security Use Cases

    Introduction Veza has consistently pushed the boundaries of innovation in access and identity security. With the introduction of Access AI, Veza has revolutionized how organizations uncover hidden access insights by combining the power of Generative AI with our Access Graph and Access Intelligence products. Access AI enables users to express their intent and desired insights […]

Explore our posts

  • Achieving, Demonstrating, and Maintaining PCI DSS Compliance with Veza: A Game-Changer for Financial Services Companies

    Mike Towers
    Jun 6 2024
    Learn more
  • AWS Guide: Access Governance, Security, Compliance & Roles [2024]

    Veza
    Jun 5 2024
    Learn more
  • Harnessing the Power of AI: Identity Security as a Key Enabler

    Mike Towers
    May 23 2024
    Learn more
  • What is IGA (Identity Governance & Administration)?

    Veza
    May 23 2024
    Learn more
  • Announcing The State of Access 2024

    Tarun Thakur
    May 22 2024
    Learn more
  • The Veza Voice – Q1 2025

    Mike Torres
    May 17 2024
    Learn more
Previous page
1 … 12 13 14 15 16 … 33
Next page
  • Veza at Gartner IAM

    Regina Soller-Gould
    Mar 20 2023
    Learn more
  • Why I Put My Hoof Down & Joined Veza

    Gertie the Goat
    Mar 20 2023
    Learn more
  • The Veza Voice – February issue

    Mike Bartholomy
    Mar 1 2023
    Learn more
  • The Veza Voice – January Issue

    Mike Bartholomy
    Jan 30 2023
    Learn more
  • The Veza Voice – December Issue

    Kale Bogdanovs
    Dec 15 2022
    Learn more
  • Authorization – The New Age of Cloud Identity

    Cody Sanford
    May 11 2022
    Learn more
Previous page
1 2 3 4 5
Next page
  • Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks

    Santosh Kumar
    Apr 23 2025
    Learn more
  • Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications

    Dr. Maohua Lu
    Apr 14 2025
    Learn more
  • How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them

    Amber Li
    Apr 10 2025
    Learn more
  • The Treasury Access Incident: Five Critical Lessons for Modern Identity Security

    Mike Towers
    Apr 4 2025
    Learn more
  • Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps

    Shanmukh Sista
    Mar 31 2025
    Learn more
  • GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It

    Taylor Parsons
    Mar 25 2025
    Learn more
1 2 3 … 5
Next page
  • History of Hacks: Orphaned Accounts

    Ellen Falltrick
    Aug 1 2023
    Learn more
  • History of Hacks: Outmaneuvering MFA

    Ellen Falltrick
    Jun 7 2023
    Learn more
  • History of Hacks: SSRF attacks on AWS

    Ellen Falltrick
    May 31 2023
    Learn more
  • Identity is Eating Security: Why Access Is the New Perimeter

    Mike Towers
    Apr 30 2025
    Learn more
  • Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks

    Santosh Kumar
    Apr 23 2025
    Learn more
  • Achieving DORA Compliance: A Practical Guide for Financial Organizations

    Mike Towers
    Mar 24 2025
    Learn more
  • Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security

    Rich Dandliker
    Jul 30 2024
    Learn more
  • Principle of Least Privilege Explained: Best Practices

    Kale Bogdanovs
    Jul 3 2024
    Learn more
  • Snowflake Roles Best Practices: Steps to Least Privilege

    Santosh Kumar
    Jul 2 2024
    Learn more
1 2
Next page
  • Identity is Eating Security: Why Access Is the New Perimeter

    Mike Towers
    Apr 30 2025
    Learn more
  • The Third-Party Access Problem: The Elephant in the Room for Every CISO’s Identity Strategy

    Mike Towers
    Apr 25 2025
    Learn more
  • When Logging In Is the New Hacking: Nicole Perlroth on the Evolving Cyber Threat Landscape

    Veza
    Apr 21 2025
    Learn more
  • Simplifying CMMC 2.0 Compliance: Modern Access Control Strategies for Government Contractors

    Mike Towers
    Apr 18 2025
    Learn more
  • The Treasury Access Incident: Five Critical Lessons for Modern Identity Security

    Mike Towers
    Apr 4 2025
    Learn more
  • Achieving DORA Compliance: A Practical Guide for Financial Organizations

    Mike Towers
    Mar 24 2025
    Learn more
1 2 3
Next page
  • Reflections from Gartner IAM London: Visibility Leads to Observability

    Rob Rachwald
    Mar 25 2025
    Learn more
  • Achieving DORA Compliance: A Practical Guide for Financial Organizations

    Mike Towers
    Mar 24 2025
    Learn more
  • Join us at Black Hat USA August 3 – 8, 2024

    Veza
    Jul 17 2024
    Learn more
  • Join us at RSAC May 6-9, 2024

    Veza
    Mar 13 2024
    Learn more
  • Veza @ AWS re:Invent

    Regina Soller-Gould
    Nov 6 2023
    Learn more
  • Six takeaways from the Gartner IT Symposium 2023

    Jason Garoutte
    Oct 27 2023
    Learn more
1 2 3
Next page
  • Veza’s Founding Principles

    Veza
    Apr 6 2022
    Learn more
Previous page
1 … 31 32 33
Search
  • Product
    • Access Search
    • Access Intelligence
    • Activity Monitoring
    • Access Reviews
    • Lifecycle Management
    • Access Requests
    • NHI Security
  • Use Cases
    • Privileged Access Monitoring
    • Non-Human Identities
    • Cloud Access Management
    • Data System Access
    • SaaS Access Security
    • Next-Gen IGA
  • Resources
    • Blog
    • Identity Radicals
    • Glossary
  • About Us
    • Newsroom
    • Careers
    • Events
    • Trust & Security
    • Vulnerability Disclosure
    • Contact Us
  • Privacy Policy
  • Terms of Use
  • X
  • LinkedIn
  • YouTube