Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

WantToCry Ransomware Exploits SMB to Remotely Encrypt Files

May 21, 2026

Critical Breach: Internal Repositories Compromised via Malicious Nx Console Extension

May 21, 2026

Dark Web Brokers Resell Old Breaches as New Corporate Data Leaks

May 21, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » ServiceNow to Acquire Veza: A Strategic Move in Governance

ServiceNow to Acquire Veza: A Strategic Move in Governance

Staff WriterBy Staff WriterDecember 4, 2025No Comments5 Mins Read4 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Essential Insights

  1. Acquisition Announcement: ServiceNow plans to acquire Non-Human Identity (NHI) management provider Veza for approximately $1 billion to enhance its security and governance offerings.

  2. Integration of Technologies: ServiceNow will integrate Veza’s Access Graph into its IT service management, HR, and customer service workflows, improving permission management for machine identities.

  3. Strategic Market Fit: With a growing demand for identity security from CIOs and CISOs, the acquisition aligns with ServiceNow’s strategy to incorporate machine identity governance into its platform.

  4. Unified Architecture Vision: Veza’s CEO emphasized that integrating their identity security capabilities will provide comprehensive visibility and control across the ServiceNow platform, supporting enterprise AI initiatives.

[gptAs a technology journalist, write a short news story divided in two subheadings, at 12th grade reading level about ‘ServiceNow to Acquire NHI Provider Veza in Governance Play’in short sentences using transition words, in an informative and explanatory tone, from the perspective of an insightful Tech News Editor, ensure clarity, consistency, and accessibility. Use concise, factual language and avoid jargon that may confuse readers. Maintain a neutral yet engaging tone to provide balanced perspectives on practicality, possible widespread adoption, and contribution to the human journey. Avoid passive voice. The article should provide relatable insights based on the following information ‘

ServiceNow announced this week plans to acquire non-human identity (NHI) management provider Veza, a move poised to boost the service desk giant’s security, risk, and governance portfolio. 

While terms of the deal were not disclosed, reports indicate ServiceNow will pay roughly $1 billion. Veza had claimed a valuation of $800 million earlier this year when it announced raising $108 million in Series D Funding. 

ServiceNow plans to integrate Veza’s Access Graph into the workflows of its IT service management (ITSM), HR and customer service offerings. The Veza Access Graph helps manage permissions for machine identities, including agents, API keys, and tokens that enable machines or software to access and connect within a system. Further, the Veza Access Graph will provide a unified dashboard, enabling security and risk management teams to discover agents and machines with access to critical data and systems, and to discover and manage permissions. The Veza Access Graph is also designed to help security and risk teams identify potential excessive permissions. 

“We have the opportunity within one platform, with their Access Graph and our Knowledge Graph, to bring those together and expose knowledge that gives you the data from the system of record that we already have, from people that we already support and from integrations, but also bring access into that graph as well,” says ServiceNow’s executive VP Pablo Stern, who is general manager of the company’s technology and workflow products group.

Related:LevelBlue Announces Plans to Acquire XDR Provider Cybereason

Stern says over the past eight years, CIOs and CISOs have repeatedly asked why ServiceNow wasn’t providing native identity security and governance in the ServiceNow platform. ServiceNow’s 22,000 enterprise customers and its NOW platform unifies workflows across ITSM, HR, finance and customer service. 

“Identity is a natural adjacency, and especially as it relates to machine identities, because I’ve got everything in the CMDB — it just seems like such a natural use case driven around security,” Stern says. 

Adding to the need to govern NHIs, ServiceNow launched its AI Control Tower earlier this year, which Stern describes as a centralized command center for governing AI and its lifecycle. 

“It helps manage your AI, like you manage other technology assets in ServiceNow,” Stern says. “And given that these are non-human identities, it’s a natural fit bringing Veza’s non-human identity and access management into that use case.”

Redwood Shores, Calif.-based Veza, founded in 2020, has several large enterprise customers, including alternative asset manager Blackstone, the City of Las Vegas, Sallie Mae, and Snowflake. Stern says many of Veza’s enterprise customers already use ServiceNow. 

Related:Can Shadow AI Risks Be Stopped?

Veza co-founder and CEO Tarun Thakur believes identity has become the foundation of all enterprise AI initiatives. “With Veza and ServiceNow, identity, access governance, workload and human permissions, and workflow automation all converge in a unified architecture, enabling visibility, control, and automation at enterprise scale,” Thakur noted in a blog post announcing the deal. 

“By integrating Veza’s identity security engine, identity becomes not just a point solution but a baked-in capability available across the ServiceNow platform,” he added. 

Veza is among several emerging non-human identity (NHI) management providers that have received investment rounds in recent years. Many of them are likely acquisition targets, Omdia analyst Don Tait predicted last year. Besides Veza, Tait identified Aembit, Astrix, Entro Security, Oasis, and SlashID, among others. 

“The NHI market is still developing, as demonstrated by the fact that most players are startups,” he noted. “Some of these vendors are focused more specifically on NHI security while others provide broader NHIM [NHI management] capabilities, often described as NHI governance.”

Related:SecurityScorecard Buys AI Automation Capabilities, Boosts Vendor Risk Management

‘. Do not end the article by saying In Conclusion or In Summary. Do not include names or provide a placeholder of authors or source. Make Sure the subheadings are in between html tags of

[/gpt3]

Discover More Technology Insights

Stay informed on the revolutionary breakthroughs in Quantum Computing research.

Discover archived knowledge and digital history on the Internet Archive.

CyberRisk-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCyber Attacks Uncovered: Wi-Fi Hacks, npm Worms, DeFi Theft & More
Next Article Inotiv Suffers Ransomware Breach: Personal Data Compromised
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Comments are closed.

Latest Posts

WantToCry Ransomware Exploits SMB to Remotely Encrypt Files

May 21, 2026

Dark Web Brokers Resell Old Breaches as New Corporate Data Leaks

May 21, 2026

Void Botnet Harnesses Ethereum Smart Contracts for Secure C2 Control

May 20, 2026

GitHub: Internal Repositories Affected by Poisoned VS Code Extension Attack

May 20, 2026
Don't Miss

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • WantToCry Ransomware Exploits SMB to Remotely Encrypt Files
  • Critical Breach: Internal Repositories Compromised via Malicious Nx Console Extension
  • Dark Web Brokers Resell Old Breaches as New Corporate Data Leaks
  • Chainguard and FINOS Lead the AI Supply Chain Security Revolution
  • Void Botnet Harnesses Ethereum Smart Contracts for Secure C2 Control
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

WantToCry Ransomware Exploits SMB to Remotely Encrypt Files

May 21, 2026

Critical Breach: Internal Repositories Compromised via Malicious Nx Console Extension

May 21, 2026

Dark Web Brokers Resell Old Breaches as New Corporate Data Leaks

May 21, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202632 Views

Unlock the Power of Free WormGPT: Harnessing DeepSeek, Gemini, and Kimi-K2 AI Models

November 27, 202530 Views

The New Face of DDoS is Impacted by AI

August 4, 202527 Views

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Most Read
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.