Blog
-
Identity SecurityUnderstanding ISPM: Closing the Identity Gap with Identity Security Posture Management
ISPM is a new category of identity security designed to help organizations continuously monitor and manage identity risk across cloud, SaaS, and hybrid environments. Learn how Identity Security Posture Management works, why it matters, and how Veza enables it. -
AIVeza Access AI – Applications of Gen AI for Identity Security Use Cases
Veza Access AI transforms identity security by enabling natural language queries to navigate complex access landscapes, empowering organizations to achieve least privilege effectively.
Explore our posts
-

Why Analysts Keep Pointing To Veza as the Leader In The New Identity Security Landscape
Learn more -

AI Agents Are Becoming Your New Privileged Workforce
Learn more -

ServiceNow + Veza: A new chapter in identity security
Learn more -

How Revocation, Remediation, and Reconciliation Work in Veza Access Reviews
Learn more
-

Veza Product Updates – June 2025
Learn more -

Unlocking App Onboarding at Scale: The Power of Veza’s 300+ Integrations and Open Authorization API (OAA)
Learn more -

Veza Product Updates – May
Learn more -

Veza Product Updates – April
Learn more -

Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege
Learn more -

Veza Product Updates – March
Learn more
-

Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation
Learn more -

The Five Tenets of Next-Gen IGA
Learn more -

Posture of Access, 3 Pillars of Least Privilege
Learn more -

Groundhog day in identity security
Learn more -

Charting a Path for the Future of Identity Security
Learn more -

Identity governance in the cloud era
Learn more
-

Six takeaways from the Gartner IT Symposium 2023
Learn more -

Veza @ Gartner Symposium — October 15-19
Learn more -

Join Us at Oktane: Explore “Bad Permissions” and Veza’s Access Solutions
Learn more -

Veza @ Fal.Con 2023
Learn more -

Veza @ Snowflake Summit – June 26-29
Learn more -

Veza @ AWS re:Inforce June 13-14
Learn more
-
The Next Wave of Implementing Zero Trust: Moving from Authentication to Authorization
Learn more -
Authorization, NOT Authentication: the critical backbone for zero-trust security
Learn more -
Data Security: The Challenge of Securing Service Accounts
Learn more -
Why it’s Important to Understand Effective Permissions
Learn more






























