Blog
-
Company
Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege
How do you achieve the principle of least privilege? One access permission at a time. Today, I am thrilled to share a significant milestone in Veza’s journey: we have raised $108 million dollars in Series D funding, led by New Enterprise Associates (NEA) with participation from all our existing investors—including Accel, GV (Google Ventures), True […] -
Identity Security
Veza Access AI – Applications of Gen AI for Identity Security Use Cases
Veza Access AI transforms identity security by enabling natural language queries to navigate complex access landscapes, empowering organizations to achieve least privilege effectively.
Explore our posts
-
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more -
Application Risk Scoring: Enhance Identity Security
Learn more -
Charting a Path for the Future of Identity Security
Learn more -
Automated Access Revocation & Remediation at Scale
Learn more -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets
Learn more -
Separation of Duties: Combating Toxic Combinations with SoD Controls
Learn more
-
What Are Non-Human Identities?
Learn more -
Identity is Eating Security: Why Access Is the New Perimeter
Learn more -
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more
-
I Attended the Verizon Data Breach Session at RSA So You Don’t Have To:
Learn more -
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more
-
Identiverse 2022 – where are we after a rapid move to cloud data?
Learn more -
The Next Wave of Implementing Zero Trust: Moving from Authentication to Authorization
Learn more -
Authorization, NOT Authentication: the critical backbone for zero-trust security
Learn more -
Data Security: The Challenge of Securing Service Accounts
Learn more