Customers
Customers
Case Studies
Case Studies
Proud to partner with modern, tech-forward enterprises committed to securing the fasted growing attack surface: identity
Proud to partner with modern, tech-forward enterprises committed to securing the fasted growing attack surface: identity



Blend Uses Opal to Transform Identity Security with Deterministic Logic
Blend Uses Opal to Transform Identity Security with Deterministic Logic
Blend turned to Opal to implement a deterministic access management solution grounded in clear, transparent boolean logic.
Blend turned to Opal to implement a deterministic access management solution grounded in clear, transparent boolean logic.






How Grammarly Reduced Access Risk While Enhancing End-User Experience
How Grammarly Reduced Access Risk While Enhancing End-User Experience
Grammarly selected Opal to transform its access management, boosting security while improving productivity.
Grammarly selected Opal to transform its access management, boosting security while improving productivity.






From Three Brutal Days to Three Quick Minutes: How Obsidian Accelerated and Improved User Access Reviews With Opal
From Three Brutal Days to Three Quick Minutes: How Obsidian Accelerated and Improved User Access Reviews With Opal
With Opal, Obsidian significantly improved its user access security posture and significantly accelerated quarterly user access reviews.
With Opal, Obsidian significantly improved its user access security posture and significantly accelerated quarterly user access reviews.






Sophos Scales Phishing-Resistant MFA and Just-in-Time Access with Opal
Sophos Scales Phishing-Resistant MFA and Just-in-Time Access with Opal
Sophos enhanced its cloud security with Opal's user-friendly, phishing-resistant MFA and just-in-time access to protect its AWS environment at scale.
Sophos enhanced its cloud security with Opal's user-friendly, phishing-resistant MFA and just-in-time access to protect its AWS environment at scale.






How Valon Improved Security with Timed Access to Sensitive Permissions
How Valon Improved Security with Timed Access to Sensitive Permissions
Using Opal for just-in-time access to sensitive resources, Valon saw the average access request go from 3 days to 5 minutes
Using Opal for just-in-time access to sensitive resources, Valon saw the average access request go from 3 days to 5 minutes






Switchboard Accelerates Growth With Automated Security Solution
Switchboard Accelerates Growth With Automated Security Solution
I was worried the team would be skeptical of using an access management tool. No one wants to get slowed down. But Opal has actually helped us work faster—our infrastructure feels like a Ferrari.
I was worried the team would be skeptical of using an access management tool. No one wants to get slowed down. But Opal has actually helped us work faster—our infrastructure feels like a Ferrari.






How Merge is Adopting the Future of Access Management
How Merge is Adopting the Future of Access Management
Trusted with the data of hundreds of customers, Merge takes their permissions management to the next level.
Trusted with the data of hundreds of customers, Merge takes their permissions management to the next level.






CoinList Fortifies Security With Opal's Automated Access Management
CoinList Fortifies Security With Opal's Automated Access Management
CoinList, one of the fastest growing platforms for new crypto, upgrades their access management process to boost their security posture and improve their compliance tech stack.
CoinList, one of the fastest growing platforms for new crypto, upgrades their access management process to boost their security posture and improve their compliance tech stack.




Future-Proof Authorization Starts Here

Future-Proof Authorization
Starts Here
