Why Veza?
Product
Product
Product
Explore our product offerings
Activity Monitoring
Explore our product offerings
Access AI
GenAI-based capabilities for all Veza products
Access Search
Visualize and control data access
Access Reviews
Automate user access certifications
Access Requests
Increase user productivity
Access Intelligence
Focus on the most serious risks
Lifecycle Management
Grant and revoke access to employees
Solutions
Solutions
Use Cases
Use Cases
Explore our solutions in diverse use cases
Non-Human Identity Management
Manage access for non-human identities
SaaS Access Security
Secure access to data in SaaS applications
Privileged Access Monitoring
Find and fix privilege violations
Data System Access
Control access to unstructured data
Next-gen IGA
Automation for informed decisions
Cloud Access Management
Securely manage cloud access
Integrations
AWS
Google Cloud
Microsoft Azure
Open Authorization API
Okta
Snowflake
View all integrations
Customers
Customers
insights
Customers
See how our customers thrive with Veza
Wall of Love
See what our customers say about Veza
Company
Sallie Mae
New
Technology – Retail Marketing
PayNearMe
Financial Services
Blackstone
Financial Services
City of Las Vegas
Government
Wynn Resorts
Hospitality
Barracuda Networks
Technology – Security
Snowflake
New
Data Cloud
CopperPoint
Insurance
Deluxe Media
Multimedia & Entertainment
Choice Hotels
Hospitality
Genesys
Technology – Customer Experience
InComm Payments
FinTech
Resources
Resources
insights
Resources
Access a wealth of valuable resources
Identity Radicals
Conversations with cybersecurity experts
Veza Library
Learn from the brightest minds in Identity Security
Trust & Security
Trust and security comes first at Veza
Company
Events
Discover our past and upcoming events
Press Room
Stay informed with our latest news
About Us
Learn about our team
Careers
Join our team
Blog Topics
Authorization
Company
Data Security
IAM
Industry Events
Product
All topics
Schedule a demo
Open mobile menu
Back
Data Security
Data Security
Complete Snowflake Review: Roles, Security & Access Control
Veza
Apr 12 2024
Learn more
Data Security
Key Takeaways: FBI Breach Prevention Tips
Veza
Apr 10 2024
Learn more
Authorization
Invisible keyholders: the importance of Non-Human Identity Management
Mike Towers
Mar 22 2024
Learn more
Authorization
GitHub access control, access management, security, roles, authorization & more
Veza
Mar 15 2024
Learn more
Authorization
Salesforce security, roles, privileged access management, and more
Veza
Mar 14 2024
Learn more
Authorization
Snowflake security: how to manage entitlement creep
Kale Bogdanovs
Feb 28 2023
Learn more
Authorization
Understanding and protecting against the rising threat of Whale Phishing
Ellen Falltrick
Feb 27 2023
Learn more
Authorization
Snowflake security: how to manage and secure data access at scale
Kale Bogdanovs
Feb 21 2023
Learn more
Authorization
The Fundamentals of a Data-Centric Approach to Cloud Security
Teju Shyamsundar
Jun 7 2022
Learn more
Authorization
What is data security?
Teju Shyamsundar
May 24 2022
Learn more
Previous page
1
2