GCP Security: 3 Ways to Reduce Risks

GCP Security Many developers prefer Google Cloud Platform (GCP) because it is easy to use and has a positive, seamless user experience. Overall, it has more engineering finesse than AWS and Azure. These are hugely valuable features to DevOps teams – after all, they support speed and collaboration, which is a big deal if you’re … Read more

Managing Hardcoded Secrets to Shrink Your Attack Surface

This article originally appeared in DevOps.com Secrets Management in the Cloud The practice of hardcoding secrets—such as authentication credentials, passwords, API tokens and SSH Keys—as non-encrypted plain text into source code or scripts has been common in software development for many years. It is an easy way to save time and labor, but it is … Read more

Britive Named Winner of Global InfoSec Awards at RSA 2022

Company recognized as ‘Hot Company in Identity & Access Management’ LOS ANGELES, June 14, 2022 /PRNewswire/ — Britive, a cloud-native dynamic access management platform, announced today that it has been awarded a Global InfoSec Award as ‘Hot Company in Identity & Access Management‘. Britive’s Dynamic Permissioning Platform takes the complexity and time out of securing … Read more

Britive Events: June 2022

Britive Events In-Person Events are Back: Connect with Britive at RSA 2022, Gartner Security & Risk Management Summit, Snowflake Summit and Identiverse this June This summer will play host to some of the biggest events in the industry, including the RSA Conference, Black Hat, and Identiverse – just to name a few. Clearly, we’re not … Read more

Watch: How to Enforce Defense-in-Depth

Authentication and authorization are often bound together – when human and/or non-human IDs are authenticated, their permissions are automatically authorized. This gives the user elevated standing privileges to access data, apps, active directories, and more. To enforce defense in depth, Britive separates authorization and authentication, effectively decoupling permissions and adding an extra security layer between … Read more

Watch the Demo: Just-In-Time Access for Snowflake Roles and Databases

Just-in-Time Access for Snowflake We are excited to share that Britive now offers Just-in-Time (JIT) temporary access for Snowflake administrative roles and databases. Britive delivers the visibility and control you need to secure data access and eliminate standing privileges. In this blog post, we will explain how JIT access for Snowflake works, and why it … Read more

New Gartner Report: “Reduce Risk Through a Just-In-Time Approach to Privileged Access Management”

Privileged Access Management A recent report issued by Gartner encourages organizations to employ a Just-In-Time (JIT) approach to improve privileged access management. The report states: “Privileged access carries significant risk. Even with PAM tools in place, the residual risk of users with standing privileges remains high. IAM leaders must implement just-in-time strategies to pursue zero … Read more

New Platform Feature: Policy-Driven Workflow Approvals

My Access AWS S3 Full Developer Profile

Policy-Driven Workflow Approvals As part of our continued effort to bridge the gap between privileged access management and business objectives in the cloud, we are excited to announce this important new feature of Britive’s Dynamic Permissionsing Platform. Here’s how it works: Leverage Just-In-Time (JIT) permissioning capabilities to approve or reject privilege access requests by users … Read more

Using Dynamic Cloud Secrets to Achieve a Zero Trust Model

Cloud Secrets The following article originally appeared in Dark Reading. If every application, device, and bot need access and authentication at some point, the need for managing and controlling the confidential data that allows those functions gets staggeringly large. In today’s digital businesses, we rely on commercially procured or internally developed applications. Because of the … Read more

Improve Visibility with Dynamic Privileged Access Governance

Cross-Cloud Visibility As businesses have replaced on-premise software and infrastructure with cloud applications and infrastructure-as-a-service (IaaS), identity and access management has become more and more difficult for companies to control. While implementing Single Sign-On (SSO), Multi-Factor Authentication (MFA) and identity provisioning are good first steps to strengthen and secure the authentication process at cloud services, … Read more