Why Veza?

The scope, scale, and complexity of access control has skyrocketed, creating new surface area for identity-based cyber threats. And with the frequency and cost of data breaches also accelerating, the stakes have never been higher. Old tools, built on old technology are no longer enough. You need Intelligent Access.

Trust and Security

Data Privacy and Compliance

Veza recognizes the immense importance our customers place on data privacy. We are committed to processing personal data responsibly and in full compliance with applicable regulations around the world.

Our privacy team oversees our data protection program, conducts regular privacy impact assessments, and is available to assist customers with privacy inquiries. Please refer to our Privacy Policy for complete details on how we collect, use and protect personal data.

GDPR and CCPA compliance

Veza is fully compliant with the EU General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA). We adhere to the core data protection principles of these regulations globally.

Privacy by design

From the earliest stages of product development through launch and beyond, we build privacy considerations and data minimization into our technologies and practices. We aim to collect and process the minimum personal data required.

SOC 2 and ISO 27001 Certified

Veza has earned the widely-recognized SOC 2 and ISO 27001 certifications after rigorous and recurring third-party audits validating the design and operational effectiveness of our security and privacy controls.

Our Trust and Security Values

At Veza, establishing trust is core to everything we do. We aim to continuously demonstrate and deepen our trustworthiness through our steadfast commitment to security best practices.

By weaving security into the very fabric of our organization, we aim to earn the trust you place in us every single day. Safeguarding your data isn’t just a compliance obligation for Veza – it’s an utmost priority and core company value.

Proactive, continuous monitoring

We maintain constant vigilance over our systems and customer data and we proactively hunt for potential threats.

Regular audits and penetration testing

We engage independent third-party security experts to conduct regular audits and penetration tests of our systems. This allows us to validate the effectiveness of our controls and quickly remediate any gaps.

Rigorous access controls

We adhere to the principle of least privilege, ensuring employees only have access to the specific systems and data required for their roles. All access is strictly logged and monitored.

Employee security training

Every Veza employee undergoes comprehensive security awareness training during onboarding and on an ongoing basis. We ingrain a culture of shared responsibility for protecting customer data.

Incident response readiness

While we work diligently to prevent incidents, we are prepared to respond rapidly and effectively to contain, investigate and remediate any potential breaches.