Skip to content

Accelerate & Secure App Development with Cloud Secrets Manager

Britive logo
  • Platform
    • How it works
    • Just In Time Privileges
    • Secrets Governance
    • Privilege Right Sizing
    • Cross Cloud Discovery
    • Proactive Monitoring
    • Use Cases
  • Solutions
    • ServiceNow
    • Salesforce
    • Google Cloud Platform
    • AWS
    • Azure
  • Resources
    • Documentation
    • Webcasts
    • Blog
  • Company
    • Meet the Team
    • About Us
    • News
    • Careers
    • Support
    • Contact Us
  • Partners
  • Free Risk Assessment
Menu
  • Platform
    • How it works
    • Just In Time Privileges
    • Secrets Governance
    • Privilege Right Sizing
    • Cross Cloud Discovery
    • Proactive Monitoring
    • Use Cases
  • Solutions
    • ServiceNow
    • Salesforce
    • Google Cloud Platform
    • AWS
    • Azure
  • Resources
    • Documentation
    • Webcasts
    • Blog
  • Company
    • Meet the Team
    • About Us
    • News
    • Careers
    • Support
    • Contact Us
  • Partners
  • Free Risk Assessment

Blog

Defense in Depth

Watch: How to Enforce Defense-in-Depth

Authentication and authorization are often bound together – when human and/or non-human IDs are authenticated, their permissions are automatically authorized. This gives the user elevated standing privileges to access data, apps, active directories, and more. To enforce defense in depth, Britive separates authorization and authentication, effectively decoupling permissions and adding an extra security layer between

Read More »
Britive 15 May, 2022
Data Access

Watch the Demo: Just-In-Time Access for Snowflake Roles and Databases

Just-in-Time Access for Snowflake We are excited to share that Britive now offers Just-in-Time (JIT) temporary access for Snowflake administrative roles and databases. Britive delivers the visibility and control you need to secure data access and eliminate standing privileges. In this blog post, we will explain how JIT access for Snowflake works, and why it

Read More »
Britive 14 May, 2022
Gartner

New Gartner Report: “Reduce Risk Through a Just-In-Time Approach to Privileged Access Management”

Privileged Access Management A recent report issued by Gartner encourages organizations to employ a Just-In-Time (JIT) approach to improve privileged access management. The report states: “Privileged access carries significant risk. Even with PAM tools in place, the residual risk of users with standing privileges remains high. IAM leaders must implement just-in-time strategies to pursue zero

Read More »
Britive 3 May, 2022
My Access AWS S3 Full Developer Profile
Workflow Approvals

New Platform Feature: Policy-Driven Workflow Approvals

Policy-Driven Workflow Approvals As part of our continued effort to bridge the gap between privileged access management and business objectives in the cloud, we are excited to announce this important new feature of Britive’s Dynamic Permissionsing Platform. Here’s how it works: Leverage Just-In-Time (JIT) permissioning capabilities to approve or reject privilege access requests by users

Read More »
Britive 30 April, 2022
Cloud Secrets

Using Dynamic Cloud Secrets to Achieve a Zero Trust Model

Cloud Secrets The following article originally appeared in Dark Reading. If every application, device, and bot need access and authentication at some point, the need for managing and controlling the confidential data that allows those functions gets staggeringly large. In today’s digital businesses, we rely on commercially procured or internally developed applications. Because of the

Read More »
Britive 23 April, 2022
IAM

Improve Visibility with Dynamic Privileged Access Governance

Cross-Cloud Visibility As businesses have replaced on-premise software and infrastructure with cloud applications and infrastructure-as-a-service (IaaS), identity and access management has become more and more difficult for companies to control. While implementing Single Sign-On (SSO), Multi-Factor Authentication (MFA) and identity provisioning are good first steps to strengthen and secure the authentication process at cloud services,

Read More »
Britive 16 April, 2022
« Prev Page1 Page2 Page3 Page4 Page5 Page6 Next »

Latest news & blog articles

Watch: How to Enforce Defense-in-Depth

Britive

Authentication and authorization are often bound together – when human and/or non-human IDs are authenticated,

Read More »

Watch the Demo: Just-In-Time Access for Snowflake Roles and Databases

Britive

Just-in-Time Access for Snowflake We are excited to share that Britive now offers Just-in-Time (JIT)

Read More »

New Gartner Report: “Reduce Risk Through a Just-In-Time Approach to Privileged Access Management”

Britive

Privileged Access Management A recent report issued by Gartner encourages organizations to employ a Just-In-Time

Read More »

Request a demo today

Schedule Now
Britive logo square

Platform

  • How it works
  • Just in time Privileges
  • Secrets Governance
  • Cross Cloud Discovery
  • Proactive Monitoring
  • Privilege Right Sizing
  • Use cases

Solutions

  • ServiceNow
  • Salesforce
  • Google Cloud Platform
  • AWS
  • Azure

Resources

  • Content
  • Blog

Company

  • About Us
  • News
  • Careers
  • Partners
  • Contact Us
  • Privacy

Address

Headquarters:

450 North Brand Blvd
Suite 600 Glendale
California 91203
USA

© 2021 Britive. All rights reserved.

Linkedin-in Twitter