Blog
-
Company
Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege
How do you achieve the principle of least privilege? One access permission at a time. Today, I am thrilled to share a significant milestone in Veza’s journey: we have raised $108 million dollars in Series D funding, led by New Enterprise Associates (NEA) with participation from all our existing investors—including Accel, GV (Google Ventures), True […] -
Identity Security
Veza Access AI – Applications of Gen AI for Identity Security Use Cases
Veza Access AI transforms identity security by enabling natural language queries to navigate complex access landscapes, empowering organizations to achieve least privilege effectively.
Explore our posts
-
From Exposed to Reinvention-Ready: Why Identity Security Is the Foundation of AI Resilience
Learn more -
What is Third Party Risk Management (TRPM)?
Learn more -
Better Together: Augmenting SailPoint with Full-Stack Access Visibility
Learn more -
17 Best data governance tools [2025 review]
Learn more -
12 Best Identity Security Software [2025]
Learn more
-
Identity Security Spotlight: Cisco announces “Identity Intelligence”
Learn more -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more -
The year of Intelligent Access
Learn more -
Why Veza, Why Now?
Learn more -
Veza @ Fal.Con 2023
Learn more -
Veza Secures Strategic Investment from Capital One Ventures and ServiceNow Ventures to Accelerate Identity Security
Learn more
-
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -
Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications
Learn more -
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them
Learn more -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more
-
12 Best Identity Security Software [2025]
Learn more -
What Are Non-Human Identities?
Learn more -
Identity is Eating Security: Why Access Is the New Perimeter
Learn more -
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more
-
Posture of Access, 3 Pillars of Least Privilege
Learn more -
Groundhog day in identity security
Learn more -
Charting a Path for the Future of Identity Security
Learn more -
Identity governance in the cloud era
Learn more -
Identity Security Posture Management
Learn more -
Decoding Data Sovereignty with Jenner Holden | Ep 3
Learn more