🌟 New Feature Alert 🌟

Now you can receive threat notifications exactly where your team is already collaborating—in Microsoft Teams! 🎉 Stay ahead of identity threats without ever leaving your Microsoft Teams instance.

What’s New?

  1. Send Threat Notifications to Microsoft Teams: Connect your Microsoft Teams instance to Verosint to receive real-time threat notifications where your team already works.
  2. Select Desired Teams & Channels: Choose which Teams and Channels receive specific threat types or severity levels.
  3. Real-Time Alerts: Get notified the moment suspicious activity is detected, in the tool where your team already works and communicates.
Integrate Microsoft Teams in Settings to get threat notifications

Integrate Microsoft Teams in Settings to get threat notifications

Select the Microsoft Teams & Channels to receive threat notifications

Select the Microsoft Teams & Channels to receive threat notifications

Why Does This Matter?

  • Faster Response Time: Meet threats where your team is, cutting down the time between detection and action.
  • Flexible Delivery: Route different types of threats to different Teams or Channels, so the right people are looped in immediately.
  • Incident Response-Ready: Your team can triage and respond to threats and incidents detected by Verosint directly from within Microsoft Teams.

🌟 New Feature Alert 🌟

You can now use Workflows with your Microsoft Entra integration, bringing the power of automation to one of the most widely used identity providers in the enterprise space.

Workflows for Microsoft Entra

Workflows for Microsoft Entra

What’s New?

  1. Our powerful Workflows feature now supports Microsoft Entra, allowing you to build and automate security workflows based on Entra-driven activity.
  2. Automatically trigger workflows when user events from Entra are ingested by Verosint.

Why Does This Matter?

  • Respond proactively with automated remediation, like blocking compromised accounts.
  • Recognize legitimate users for seamless experiences, and introduce friction only when risks or anomalies arise.
  • Deploy automated prevention fast, with no code to install on webpages, applications, or user devices.

This unlocks huge opportunities for enterprise customers using Microsoft Entra—enabling faster, smarter prevention with the automation power of Workflows. 💪

Getting started? Check out the docs.

✨ New Feature Alert ✨

Chat History is now live in the Vera Agentic AI interface! You can now view your past conversations with Vera, making it easier to pick up where you left off and review previous insights.

View past conversations with Vera in the Chat History panel

View past conversations with Vera in the Chat History panel

What's New?

  1. Chat History Sidebar: See a list of your recent conversations on the left panel of the Vera interface.
  2. Persistent Conversations: Each chat is saved, making it easy to revisit specific conversations.
  3. Click to Resume: Reopen a previous conversation at any time and continue right where you left off.

Why Does This Matter?

  • More context: No more losing track of important questions, responses, or insights—everything is saved.
  • Smoother workflows: Jump back into previous investigations or reuse prompts that worked well.
  • Better collaboration: Easily share or reference past conversations when working across teams.

As always, we're open to feedback. Tell us what you think!

🌟 New Feature Alert 🌟

Verosint supports non-routable IP addresses for workforce use cases!

Customers with internal networks often use non-routable IPs (e.g., 10.x.x.x, 192.168.x.x). Verosint fully supports these addresses when paired with location metadata, unlocking complete ITDR signal enrichment, threat detection, and workflow automation.

What's New?

  1. 🌍 IP Enrichment Works for Non-Routable IPs – When location metadata is provided, Verosint enriches activity from internal IPs just like public ones.
  2. 🔍 Risk Detection & Workflow Accuracy for Non-Routable IPs – Impossible Travel and other location-based detections now function seamlessly for non-routable traffic. Plus, this location context enhances automated decision-making in workflows, enabling smarter access control across your internal user base.
  3. 📊 Unified View of Workforce Risks – Internal employee activity is now visible and actionable within your Verosint environment.

Why Does This Matter?

  • 🛡️ Full ITDR Coverage: Cybercriminals don't break in, they log in. Now, you can detect suspicious behavior across your entire workforce—even behind the firewall.
  • No Gaps in Observability: Just because an IP isn’t public doesn’t mean it should go unanalyzed. With this update, it doesn’t.
  • Insight Activation: If you're already tracking internal IPs with location context, Verosint can make that data work immediately.

Your internal networks just became a whole lot safer. You're welcome.

🌟 New Feature Alert 🌟

Integrate your Slack workspace with Verosint and get notified directly in Slack when threats are detected. Stay on top of suspicious activity without leaving your team's primary communication hub.

What's New?

  1. You can now connect your Slack workspace to Verosint in just a few clicks.
  2. Choose the Slack channels where you want to receive threat alerts.
  3. Get real-time notifications when Verosint detects suspicious activity, including credential stuffing attacks, account takeovers, and other identity threats.
Connect your Slack workspace in the Verosint Account Settings page

Connect your Slack workspace in the Verosint Account Settings page

Configure which Slack channel receive alerts in Threat Notifications

Configure which Slack channel receive alerts in Threat Notifications

Get threat notifications in the Slack channels specified

Get threat notifications in the Slack channels specified

Why Does This Matter?

  1. It reduces response time by notifying your team where they already work.
  2. It keeps security alerts front and center—no more digging through dashboards or inboxes.
  3. It supports faster collaboration across teams during incident response.

Slack is just the beginning. We've got other integrations (e.g., Microsoft Teams, etc.) in the works. Stay tuned! 🚀

🚀 Improvements Alert 🚀

We’ve enhanced prompt suggestions for Vera AI so you can quickly ask about the threats or accounts that matter most.

AI-Driven Prompt Suggestions >> Faster Remediation

AI-Driven Prompt Suggestions >> Faster Remediation

What’s New?

  1. 🔍 Smarter, more relevant prompts surface based on open threats or accounts.
  2. ⬆️ A single click now makes it easier to ask the right questions, faster.
  3. ✨ Cleaner, more intuitive suggestions help you focus on what matters most.

Why Does This Matter?

  1. ⏱️ Spend less time figuring out what to ask and more time acting on threats and insights.
  2. 🚀 Investigate with greater speed and clarity, supported by targeted guidance.
  3. ✅ Journey from detection to response is smoother and more confident.

✨ New Feature Alert ✨

We unveiled Vera to the world a few weeks ago, and she’s been evolving fast with powerful new features and enhancements! 🎉 We’re excited to give you a first look at our identity security agentic AI, built to help you investigate and resolve threats faster and with greater confidence.

First Look at Vera: your new identity security analyst, powered by AI

First look at Vera: your new identity security analyst, powered by AI

What's New?

  1. First Look at Vera

    • Ask Vera questions directly in your workspace, about suspicious accounts, threats, or activity patterns.
    • Get instant answers powered by real-time insights from your Verosint environment.
  2. Take Action, Not Just Notes

    • Vera doesn’t just point out suspicious activity — she helps you resolve it.
    • From suspending accounts to triggering playbooks, Vera can take actions on your behalf with just a prompt.
  3. Early Access Program

Why Does This Matter?

  • Faster Investigations: Reduce time spent digging through dashboards.
  • Smarter Response: Vera surfaces relevant context and helps you take swift action.
  • Operational Efficiency: Empower your entire team to detect and respond (without switching tools).

✨ New Feature Alert ✨

Vera, our AI identity security expert, is now available in Slack as part of our Early Access Program. This means you can talk to Vera right from the tool you're already using every day — no context switching required! 🎉

Talk to Vera where you work, starting with Slack!

Talk to Vera where you work, starting with Slack!

What's New?

  1. 🎯 Slack Integration: You can now interact with Vera directly in your Slack workspace.
  2. 💬 Natural Conversations: Ask questions, assign tasks, and get answers just like you would with a teammate.
  3. 🔄 Seamless Sync: Vera stays in sync with your Verosint workspace — no need to rehash context.
  4. 🚀 More to Come: This is just the beginning. We’re working on integrations with more tools you love.

Why Does This Matter?

  • 🕒 Save Time: Skip the login and switch. Vera is just a message away.
  • 🧠 Stay in Your Flow: Get answers and take action without leaving your current context.
  • 🔒 Secure by Design: All conversations are tied to your Verosint workspace and role permissions.
  • 🌱 Built for Growth: As Vera evolves, expect deeper integrations, smarter automation, and even more intuitive help to guide your security workflows.

✨ New Feature Alert ✨

Meet Vera, the first agentic AI security analyst purpose-built for Identity Threat Detection and Response.

Vera is now available in beta through our early access program.

What's New?

Vera is an agentic AI security analyst that:

  • Understands your environment and user behavior
  • Detects and triages threats in real time
  • Acts directly inside your collaboration tools (Slack, Teams)
  • Investigates and recommends appropriate actions
  • Learns from each interaction and builds automated response playbooks

Vera is fast, contextual, and precise. And most importantly — Vera is useful and designed to improve your productivity and security from the minute you turn her on.

Why Does This Matter?

Vera allows organizations to respond to the onslaught of identity threats without stretching resources thin or expanding their headcount. Here's how Vera changes the game:

  • Continuous Investigation: Investigate new identity security incidents instantly including bulk-analysis of prior events.
  • Live Threat Triage and Response: Direct Vera to take targeted actions such as revoking sessions, suspending users, blocking IPs, or requiring adaptive authentication.
  • On Demand Reporting and Visualization: Vera can generate custom incident reports and visual insights directly within the conversation.
  • Slack and Teams Integration: Engage with Vera without leaving your existing productivity tools, responding as you would to a security analyst team member.
  • Automated Playbook Creation: Vera recommends and builds automated response playbooks to continuously lower risk and improve response times.

If you're ready to set new standards for identity security efficiency and effectiveness, sign up for our Early Access program to get started with Vera.

🌟 New Feature Alert 🌟

You can now search and filter event activity by Source in Event Explorer, giving you more precise control over how you investigate identity events and user behavior.

What's New?

  • A new "Source" field is now available in Event Explorer's search and filter options.
  • You can view and analyze event activity grouped by Source.
Filter by Source in Event Explorer

Filter by Source in Event Explorer

Quickly see source details for each account

Quickly see source details for each account

Why Does This Matter?

  • Investigators and analysts can now pinpoint where activity originated, which is crucial for tracing suspicious behavior or diagnosing integration issues.
  • It enhances threat hunting by allowing you to isolate events from specific sources with ease.
  • It makes it easier to verify legitimate vs. anomalous activity by source context.