Office Hours: How we built the new UI for AuthZed Dedicated

Our North Star

We're 100% focused on authorization.

We build the tools companies need to provide performant and scalable authorization for their applications.

Our North Star

Principles

Every request needs to be authorized but never at the expense of user experience.

Secure

Performant

Our solutions need to support 1,000,000 requests per second just as well as 1,000.

Secure

Scalable

Enabling zero-trust architecture starts by enforcing it in our own environments.

Secure

Secure

Founding Team

We’re founded by 3 successful entrepreneurs with expertise in enterprise software, most recently as leaders at Red Hat. Jake and Joey met on the APIs team at Google in 2010. They went on to found Quay, where Jimmy joined as their first hire. Over the past decade, they’ve changed the landscape for building and deploying software.

CoreOSY CombinatorAmazonGoogleRed Hat

Understanding Google Zanzibar: A Comprehensive Overview

/assets/team/jake-moshenko.jpg
Jake Moshenko
September 6, 2024
What is Google Zanzibar? Why did they build it? And why is it important? I'll break down and answer those questions based on the research paper and from our experience building SpiceDB, the open source, fine-grained permissions database inspired by Google Zanzibar.
13 minutes

Authorization (AuthZ): Quick Start Guide for Enterprise Permissions

/images/damian_in_da_house.jpeg
Damian Sieczkowski
November 18, 2024
At AuthZed, we've gotten a great glimpse at how companies are looking to solve their end-user authorization challenges. Find out what solution the market is converging on, the use-cases driving adoption, and what you can expect when moving to a Google Zanzibar like authorization system.
8 minutes

Google-Scale Authorization: Getting to 1 Million QPS on AuthZed Dedicated with CockroachDB

/assets/team/victor-roldan-betancort.jpg
Victor Roldan Betancort
September 19, 2024
Discover how we managed to test 1 million requests per second on AuthZed Dedicated, backed by CockroachDB. The post provides a detailed overview of our setup and methodology, infrastructure considerations, the process of generating test data and load, among other aspects. It also includes comprehensive performance results from our tests.
21 minutes
Secure

Secure First

Our products are built with security as a foundation.
  • Encryption at rest
  • Fully isolated deployments
  • Private VPC interconnectivity
  • Fine-grained API key management
  • Audit logging
  • SOC2 certified
  • GDPR & CCPA
Github Icon

Built in the Open

Open Source, Google Zanzibar-inspired database for scalably storing and querying fine-grained authorization data
GoGitHub Star5146GitHub Fork279
Kubernetes controller for managing instances of SpiceDB
GoGitHub Star65GitHub Fork29
Official command-line tool for managing SpiceDB
GoGitHub Star117GitHub Fork26

Get started for free

Join 1000s of companies doing authorization the right way.