• platform Platform Overview
    See all
    Product
    • Core Authorization Platform Understand and control identity-to-data relationships
    • Access Review Workflows Streamline access certifications
    • Getting Started with Veza Simple steps to take back control over data security
    • Trust & Security Our security principles
    Platform Overview See all
    Product
    • Core Authorization Platform Understand and control identity-to-data relationships
    • Access Review Workflows Streamline access certifications
    • Getting Started with Veza Simple steps to take back control over data security
    • Trust & Security Our security principles
  • Use Cases Use Cases
    See all
    USE CASES
    • Privileged Access Monitoring Find and fix privilege violations across all systems
    • SaaS Access Security & Governance Reduce the risk of breach in SaaS apps
    • Access Review Automation Reinvent access reviews and certifications with automation and access intelligence
    Use Cases See all
    USE CASES
    • Privileged Access Monitoring Find and fix privilege violations across all systems
    • SaaS Access Security & Governance Reduce the risk of breach in SaaS apps
    • Access Review Automation Reinvent access reviews and certifications with automation and access intelligence
  • Integrations Integrations
    See all
    Integrations
    • Integration Catalog See our full list of integrations
    CLOUD PROVIDERS
    • Google Cloud Learn more
    • AWS Learn more
    • Microsoft Azure Learn more
    Open Authorization API
    • Veza for any app with Open Authorization API Vizualize identity-to-data relationships, track violations & misconfigurations and review & certify access for any app, including custom apps
    Integrations See all
    Integrations
    • Integration Catalog See our full list of integrations
    CLOUD PROVIDERS
    • Google Cloud Learn more
    • AWS Learn more
    • Microsoft Azure Learn more
    Open Authorization API
    • Veza for any app with Open Authorization API Vizualize identity-to-data relationships, track violations & misconfigurations and review & certify access for any app, including custom apps
  • Customers Customers Overview
    See all
    Customer Journeys
    • ATN International ATN International
    • Barracuda Networks Barracuda Networks
    • Choice Hotels Choice Hotels
    • InComm InComm
    • PayNearMe PayNearMe
    • Wynn Resorts Wynn Resorts
    • Bluecore Bluecore
    Customers Overview See all
    Customer Journeys
    • ATN International ATN International
    • Barracuda Networks Barracuda Networks
    • Choice Hotels Choice Hotels
    • InComm InComm
    • PayNearMe PayNearMe
    • Wynn Resorts Wynn Resorts
    • Bluecore Bluecore
  • Resources
  • Company Company Overview
    See all
    • About Us About Us
    • Careers We believe talent has no boundaries. See open positions.
    • Manifesto Our beliefs to modernize data security for decades ahead
    • Press Room Press Room
    • Events Events
    • Contact Us Contact Us
    Social
    • Twitter Follow us on Twitter
    • LinkedIn Follow us on LinkedIn
    • YouTube Subscribe to our YouTube channel
    Company Overview See all
    • About Us About Us
    • Careers We believe talent has no boundaries. See open positions.
    • Manifesto Our beliefs to modernize data security for decades ahead
    • Press Room Press Room
    • Events Events
    • Contact Us Contact Us
    Social
    • Twitter Follow us on Twitter
    • LinkedIn Follow us on LinkedIn
    • YouTube Subscribe to our YouTube channel
  • Blog
Free trial Schedule a demo

Blog

  • All Posts
  • Company
  • Product
  • Thought Leadership
  • Industry News
  • Technical Thought Leadership
  • Authorization
  • Multi-Cloud
  • Privileged Access
  • Data Security
  • Industry Events
  • Employee Spotlight
  • Reports
  • IAM
  • SaaS
May 19, 2023

Five ways to stop ransomware attacks

Modern, sophisticated ransomware attacks are: Rising in number Evolving in complexity Costing…

Kale Bogdanovs
Kale Bogdanovs
Group Product Marketing Manager
February 28, 2023

Snowflake security: how to manage entitlement creep

How to prevent Snowflake entitlement creep with Veza Veza is an authorization platform for data…

Kale Bogdanovs
Kale Bogdanovs
Group Product Marketing Manager
February 27, 2023

Understanding and protecting against the rising threat of Whale Phishing

Since the days of mass email scams, phishing has branched out into newer categories, including…

Ellen Falltrick
Digital Marketing Strategist
February 21, 2023

Snowflake security: how to manage and secure data access at scale

If you use a data warehouse or data lake tool such as Snowflake, you already know that as…

Kale Bogdanovs
Kale Bogdanovs
Group Product Marketing Manager
June 7, 2022

The Fundamentals of a Data-Centric Approach to Cloud Security

But maintaining data security and integrity throughout the transformation is mission critical…and…

Teju Shyamsundar, Head of Product Marketing at Veza
Teju Shyamsundar
Head of Product Marketing
May 24, 2022

What is data security?

As data increasingly moves to the cloud, organizations need more effective ways to manage access,…

Teju Shyamsundar, Head of Product Marketing at Veza
Teju Shyamsundar
Head of Product Marketing
Platform
Product
Core Authorization Platform
Access Review Workflows
Getting started
Integrations
Trust & Security
Use Cases
Privileged Access Monitoring
SaaS Access Security & Governance
Access Review Automation
Customers
ATN International
Barracuda Networks
Choice Hotels
PayNearMe
Wynn Resorts
About Us
Newsroom
Careers
Events
Contact Us
Resources
Blog
Legal
  • Privacy Policy
  • Terms of Service