Skip to content

Accelerate & Secure App Development with Cloud Secrets Manager

Britive logo
  • Platform
    • How it works
    • Just In Time Privileges
    • Secrets Governance
    • Privilege Right Sizing
    • Cross Cloud Discovery
    • Proactive Monitoring
    • Use Cases
  • Solutions
    • ServiceNow
    • Salesforce
    • Google Cloud Platform
    • AWS
    • Azure
  • Resources
    • Documentation
    • Webcasts
    • Blog
  • Company
    • Meet the Team
    • About Us
    • News
    • Careers
    • Support
    • Contact Us
  • Partners
  • Free Risk Assessment
Menu
  • Platform
    • How it works
    • Just In Time Privileges
    • Secrets Governance
    • Privilege Right Sizing
    • Cross Cloud Discovery
    • Proactive Monitoring
    • Use Cases
  • Solutions
    • ServiceNow
    • Salesforce
    • Google Cloud Platform
    • AWS
    • Azure
  • Resources
    • Documentation
    • Webcasts
    • Blog
  • Company
    • Meet the Team
    • About Us
    • News
    • Careers
    • Support
    • Contact Us
  • Partners
  • Free Risk Assessment

Blog

Cybersecurity Excellence Award

2022 Cybersecurity Excellence Awards Britive Gold Medal for Cloud Privilege Access Management

The 2022 Cybersecurity Excellence Awards has given Britive the “Cloud Privileged Access Management Gold Medal.” The Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security. With over 900 entries in more than 250 award categories, the 2022 Cybersecurity Excellence Awards program is highly competitive. All winners reflect the

Read More »
Britive 11 February, 2022
Cloud Secrets Manager

Cloud Secrets Manager

“Hard-coded secrets embedded in source code and scattered throughout the DevOps pipeline pose significant risk. Technical professionals responsible for DevSecOps must introduce tools that securely store and manage secrets and enforce access controls without disrupting automated DevOps workflows.” –Gartner Q: What Problem Does Britive Cloud Secrets Manager Solve? A: Secrets sprawl. Secrets Sprawl /see-krits sprawl/

Read More »
Britive 8 February, 2022
Zero Trust
Zero Standing Permissions

How Zero Standing Permissions Clear the Way for Zero Trust

Using Zero Standing Permissions to Achieve a Zero Trust Model There is a reason the security community is embracing the zero trust (ZT) principle with renewed energy – because it helps prevent breaches by eliminating implicit trust from a system’s architecture. Instead of automatically trusting users inside a network, ZT dictates that every access point

Read More »
Britive 2 February, 2022
IAM

Cloud IAM: Using Privilege Right Sizing to Contain Privilege Sprawl

Advancing Cloud IAM The following article was published in betanews. Historically identity and access management has been built around an on-premises model. But with more systems now residing in the cloud the old way of doing things isn’t working. To find out more about why the cloud needs a new approach to IAM we spoke

Read More »
Britive 19 January, 2022
Cloud Access Management

How to Offboard Cloud Users Securely

This article originally appeared in Security Boulevard. Offboard Cloud Users Securely One of the most fundamental challenges of securing the identity-defined perimeter is efficiently managing and securing the cloud identity life cycle. This priority comes into sharpest focus with offboarding users—or, more accurately, the failure of so many organizations to revoke standing access privileges to

Read More »
Britive 11 January, 2022
Cyber Burnout

Cyber Burnout: How to Build Cybersecurity Teams that Are Focused, Optimistic, and Satisfied

The following article originally appeared in eWeek. Cyber Burnout Cloud security professionals are already in short supply. Combine that with alert fatigue, a surge in demand, and the “always-on” nature of the modern workplace, and it is clear why employee burnout is increasing. In 2019, Gartner projected that the cloud market would grow to $355B

Read More »
Britive 8 January, 2022
« Prev Page1 Page2 Page3 Page4 Page5 Page6 Next »

Latest news & blog articles

Watch: How to Enforce Defense-in-Depth

Britive

Authentication and authorization are often bound together – when human and/or non-human IDs are authenticated,

Read More »

Watch the Demo: Just-In-Time Access for Snowflake Roles and Databases

Britive

Just-in-Time Access for Snowflake We are excited to share that Britive now offers Just-in-Time (JIT)

Read More »

New Gartner Report: “Reduce Risk Through a Just-In-Time Approach to Privileged Access Management”

Britive

Privileged Access Management A recent report issued by Gartner encourages organizations to employ a Just-In-Time

Read More »

Request a demo today

Schedule Now
Britive logo square

Platform

  • How it works
  • Just in time Privileges
  • Secrets Governance
  • Cross Cloud Discovery
  • Proactive Monitoring
  • Privilege Right Sizing
  • Use cases

Solutions

  • ServiceNow
  • Salesforce
  • Google Cloud Platform
  • AWS
  • Azure

Resources

  • Content
  • Blog

Company

  • About Us
  • News
  • Careers
  • Partners
  • Contact Us
  • Privacy

Address

Headquarters:

450 North Brand Blvd
Suite 600 Glendale
California 91203
USA

© 2021 Britive. All rights reserved.

Linkedin-in Twitter