ServiceNow confirms earlier reports in the media that it wanted to acquire Veza. Veza is an American specialist in identity security. ServiceNow has announced the proposed deal without disclosing any financial details. American media report that, according to sources, the value could exceed $1 billion. With this acquisition, ServiceNow is focusing explicitly on identity security, an area that cybersecurity experts say is playing an increasingly central role in data breaches.
Coming out of last year we had an important shift in strategy. We'd realised that going out to Q4 [1 November 2024 - 31 January 2025] our product innovation had accelerated to the point where it was putting a burden on our sales organisation to have to sell all products to all people.
Sublime Security - $150.0M Washington-based Sublime Security develops an email security platform to write and run custom detection and response rules to block phishing attacks. Founded by Ian Thiel and Joshua Kamdjou in 2019″>Sublime Security has now raised a total of $239.8M in total equity funding and is backed by 01 Advisors, Avenir, Citi Ventures, Georgian, Index Ventures, IVP, Jonathan Oberheide, Nicole Perlroth, Silver Buckshot Ventures, and Slow Ventures.
Every enterprise today runs on more than users. Behind the scenes, thousands of non-human identities, from service accounts to API tokens to AI agents, access systems, move data, and execute tasks around the clock. They're not new. But they're multiplying fast. And most weren't built with security in mind. Traditional identity tools assume intent, context, and ownership. Non-human identities have none of those.
In an announcement, Okta's chief technology officer Abhi Sawant said the addition of Axiom will help solve more use cases through additional security controls and connectors to critical infrastructure resources such as databases and Kubernetes. "Axiom's technology will be integrated into Okta Privileged Access, expanding access controls to more sensitive resources that Okta customers can use to further strengthen their identity security fabric, so they can manage the types of privileged access across resources and use cases in their environment," he explained.