Our customers use Veza to
Veza data security platform
Discover all users, groups and service accounts
Visualize roles and permission sets for any identity
Cloud-native permissions systems (Cloud IAM)
Understand hierarchical layers of IAM controls (users to roles and policies) that enable access to cloud data resources
Understand authorization relationships for federated users across Cloud IAM entities, cloud services, and cloud resources
Bring-your-own app or system
Bring custom apps and resources into Veza's platform to understand and control authorization relationships
Discover application-specific authorization structures (roles/groups/permissions) and relationships
Track permissions across code repositories, cloud storage, infrastructure, and more
Data systems & cloud services
Automatically discover system-specific authorization metadata
Parse and collect resource detail across granular data sets - tables, columns, libraries, code repositories, drives etc.
Visualize authorization relationships for granular data sets
Veza’s Open Authorization API for any app
Veza's open and extensible framework enables customers and partners to integrate any data system, service, or application through our Open Authorization API (OAA).
Check out Github’s OAA Community to discover how to build and use OAA integrations, learn about suggested developer tools, and download integrations like GitHub, GitLab, Zendesk, JIRA, and more.
Automate response to data security risks
Veza provides valuable assessments and insights into authorization-based access. Integrate with your existing IT solutions to allow for data, IT, IAM, and security teams to operationalize insights into well-defined business processes and workflows.
Enhance visibility and response to data access risks through alerts, assessments and insights.
Automate actions in enterprise apps (e.g. create a ticket in ServiceNow) as data access requests in Veza are reviewed, approved, granted, and processed.
Get actionable data for business processes associated with security assurance, security engineering, identity lifecycle management, and more.