Role

Brand

Brand

Website

Website

Marketing

Marketing

Website

Website

opal.dev

Date

2025–present

Location

Location

New York

New York

Leading security and engineering teams rely on Opal for access management across the modern enterprise, encompassing employees, contractors, service accounts, and AI agents. We partner with Opal Security as an integrated design team, focusing on their visual design system and interactive website built on Framer.

Leading security and engineering teams rely on Opal for access management across the modern enterprise, encompassing employees, contractors, service accounts, and AI agents. We partner with Opal Security as an integrated design team, focusing on their visual design system and interactive website built on Framer.

Visual Highlights

Visual Highlights

Visual Highlights

Webpage showing "Our Customers" and logos of leading companies like Grammarly, Sophos, and Figma. Featured stories are also shown.
Webpage showing "Our Customers" and logos of leading companies like Grammarly, Sophos, and Figma. Featured stories are also shown.
Webpage showing "Our Customers" and logos of leading companies like Grammarly, Sophos, and Figma. Featured stories are also shown.
Identity Drift: How Authorization Became the Quiet Breach Vector - Security and Trust Officer by Jesse Scott
Identity Drift: How Authorization Became the Quiet Breach Vector - Security and Trust Officer by Jesse Scott
Identity Drift: How Authorization Became the Quiet Breach Vector - Security and Trust Officer by Jesse Scott
Grammarly case study: Reducing access risk and enhancing end-user experience. Learn more about their transformation.
Grammarly case study: Reducing access risk and enhancing end-user experience. Learn more about their transformation.
Grammarly case study: Reducing access risk and enhancing end-user experience. Learn more about their transformation.
Cover for the Opal Security publication "Identity Drift: How Authorization Became the Quiet Breach Vector."
Cover for the Opal Security publication "Identity Drift: How Authorization Became the Quiet Breach Vector."
Cover for the Opal Security publication "Identity Drift: How Authorization Became the Quiet Breach Vector."

Related Work

Related Work

Related Work

Related Work