Customers

Customers

Case Studies

Case Studies

Proud to partner with modern, tech-forward enterprises committed to securing the fasted growing attack surface: identity

Proud to partner with modern, tech-forward enterprises committed to securing the fasted growing attack surface: identity

Blend Uses Opal to Transform Identity Security with Deterministic Logic

Blend Uses Opal to Transform Identity Security with Deterministic Logic

Blend turned to Opal to implement a deterministic access management solution grounded in clear, transparent boolean logic.

Blend turned to Opal to implement a deterministic access management solution grounded in clear, transparent boolean logic.

How Grammarly Reduced Access Risk While Enhancing End-User Experience

How Grammarly Reduced Access Risk While Enhancing End-User Experience

Grammarly selected Opal to transform its access management, boosting security while improving productivity.

Grammarly selected Opal to transform its access management, boosting security while improving productivity.

From Three Brutal Days to Three Quick Minutes: How Obsidian Accelerated and Improved User Access Reviews With Opal

From Three Brutal Days to Three Quick Minutes: How Obsidian Accelerated and Improved User Access Reviews With Opal

With Opal, Obsidian significantly improved its user access security posture and significantly accelerated quarterly user access reviews.

With Opal, Obsidian significantly improved its user access security posture and significantly accelerated quarterly user access reviews.

Sophos Scales Phishing-Resistant MFA and Just-in-Time Access with Opal

Sophos Scales Phishing-Resistant MFA and Just-in-Time Access with Opal

Sophos enhanced its cloud security with Opal's user-friendly, phishing-resistant MFA and just-in-time access to protect its AWS environment at scale.

Sophos enhanced its cloud security with Opal's user-friendly, phishing-resistant MFA and just-in-time access to protect its AWS environment at scale.

How Valon Improved Security with Timed Access to Sensitive Permissions

How Valon Improved Security with Timed Access to Sensitive Permissions

Using Opal for just-in-time access to sensitive resources, Valon saw the average access request go from 3 days to 5 minutes

Using Opal for just-in-time access to sensitive resources, Valon saw the average access request go from 3 days to 5 minutes

Switchboard Accelerates Growth With Automated Security Solution

Switchboard Accelerates Growth With Automated Security Solution

I was worried the team would be skeptical of using an access management tool. No one wants to get slowed down. But Opal has actually helped us work faster—our infrastructure feels like a Ferrari.

I was worried the team would be skeptical of using an access management tool. No one wants to get slowed down. But Opal has actually helped us work faster—our infrastructure feels like a Ferrari.

How Merge is Adopting the Future of Access Management

How Merge is Adopting the Future of Access Management

Trusted with the data of hundreds of customers, Merge takes their permissions management to the next level.

Trusted with the data of hundreds of customers, Merge takes their permissions management to the next level.

CoinList Fortifies Security With Opal's Automated Access Management

CoinList Fortifies Security With Opal's Automated Access Management

CoinList, one of the fastest growing platforms for new crypto, upgrades their access management process to boost their security posture and improve their compliance tech stack.

CoinList, one of the fastest growing platforms for new crypto, upgrades their access management process to boost their security posture and improve their compliance tech stack.

Future-Proof Authorization Starts Here

Future-Proof Authorization
Starts Here

Future-Proof Authorization Starts Here