Why Veza?
Product
Product
Product
Explore our product offerings
Access Monitoring
Monitor who has accessed key resources
Access AI
GenAI-based capabilities for all Veza products
Access Search
Visualize and control data access
Access Reviews
Automate user access certifications
Access Requests
Increase user productivity
Access Intelligence
Focus on the most serious risks
Lifecycle Management
Grant and revoke access to employees
NHI Security
Full visibility and control over your Non-Human Identities
Solutions
Solutions
Use Cases
Use Cases
Explore our solutions in diverse use cases
Non-Human Identity Management
Manage access for non-human identities
SaaS Access Security
Secure access to data in SaaS applications
Privileged Access Monitoring
Find and fix privilege violations
Data System Access
Control access to unstructured data
Next-gen IGA
Automation for informed decisions
Cloud Access Management
Securely manage cloud access
Integrations
AWS
Google Cloud
Microsoft Azure
Open Authorization API
Okta
Snowflake
View all integrations
Customers
Customers
insights
Customers
See how our customers thrive with Veza
Wall of Love
See what our customers say about Veza
Company
Sallie Mae
New
Technology – Retail Marketing
PayNearMe
Financial Services
Blackstone
Financial Services
City of Las Vegas
Government
Wynn Resorts
Hospitality
Barracuda Networks
Technology – Security
Snowflake
New
Data Cloud
CopperPoint
Insurance
Deluxe Media
Multimedia & Entertainment
Choice Hotels
Hospitality
Genesys
Technology – Customer Experience
InComm Payments
FinTech
Partners
Resources
Resources
insights
Resources
Access a wealth of valuable resources
Identity Radicals
Conversations with cybersecurity experts
Veza Library
Learn from the brightest minds in Identity Security
Trust & Security
Trust and security comes first at Veza
Company
Virtual Events
In-Person Events
Press Room
About Us
Careers
Blog Topics
Authorization
Company
Data Security
IAM
Industry Events
Product
All topics
Schedule a demo
Open mobile menu
Back
Privileged Access
Authorization
Lessons from the breach: Microsoft and Midnight Blizzard
Veza
Feb 21 2024
Learn more
Authorization
Identity Security Spotlight: Midnight Blizzard’s breach of Microsoft
Veza
Feb 7 2024
Learn more
IAM
The Principle of Least Privilege Explained
Kale Bogdanovs
Aug 3 2023
Learn more
IAM
Cybersecurity’s biggest challenge: The Principle of Least Privilege
Kale Bogdanovs
Jul 3 2023
Learn more
Authorization
What is data security?
Teju Shyamsundar
May 24 2022
Learn more
Privileged Access
Data Security: The Challenge of Securing Service Accounts
AK Khan
May 4 2022
Learn more
Privileged Access
What Least Privilege Means in Practice
Teju Shyamsundar
Apr 25 2022
Learn more
Previous page
1
2