How Multi-Profile Checkouts Empower Users and Enforce Security
Multi-Profile Checkout for AWS, Azure, GCP, & OCI We’re pleased to announce an exciting new feature to Britive’s Multi-Cloud Privilege Management Platform: multi-profile checkouts for Just-In-Time (JIT) access. Multi-profile checkouts allow users to access more than one profile concurrently to get their jobs done faster. Why We Did It A Britive customer came to us
Crisis Management: How Organizations Can Improve Responses and Outcomes
Understanding Crisis Management An organization’s ability to understand, strategize, and respond to a crisis is critical. After all, this is the moment when a team’s strengths and weaknesses are laid bare. If employees lack the skills needed to resolve the crisis, the situation will likely worsen. If the team does not have a remediation plan,
NOBELIUM Attack Targets CSPs & Downstream Customers
About the Latest NOBELIUM Compromise The threat actor behind the 2020 SolarWinds compromise, tracked by the Microsoft Threat Intelligence Center (MSTIC) as NOBELIUM, has been identified as attempting to gain access to customers using various cloud service providers (CSP), managed service providers, and IT service organizations. According to MSTIC, NOBELIUM’s campaign attempts to exploit relationships
Multi-Cloud is Here: How Audits and Least Privilege Access Help Enterprises Meet Compliance Regulations
Audits & Compliance Regulations in the Cloud For enterprises in the cloud, privileged user audits can be a source of fear and frustration. Why? The most common reason is that audits discover abnormalities, errors, and in some cases, malicious behavior. Turning up these things, in and of itself, is beneficial. It provides insight and helps
Off-boarding Matters: How to Protect Your Company and Customers from Employees with Bad Intentions
Off-boarding in the Cloud Stop me if you’ve heard this one before: an employee is terminated and, fueled by resentment, seeks revenge on the employer. In the digital age, revenge takes various forms, but many times it involves stealing, sharing, or maligning valuable data that hurts the organization and exposes customer information. Well, it has
Learn How Britive Can Work with IGA for Improved Access Requests
A modern Identity Governance and Administration (IGA) solution lets organizations monitor user access levels and understand what actions users can take while working within various applications. Gartner defines IGA as an “activity within the identity and access management (IAM) function that concerns the governance and administration of a unique digital representation of a user,
Latest news & blog articles
GCP Security: 3 Ways to Reduce Risks
GCP Security Many developers prefer Google Cloud Platform (GCP) because it is easy to use
Managing Hardcoded Secrets to Shrink Your Attack Surface
This article originally appeared in DevOps.com Secrets Management in the Cloud The practice of hardcoding
Britive Named Winner of Global InfoSec Awards at RSA 2022
Company recognized as ‘Hot Company in Identity & Access Management’ LOS ANGELES, June 14, 2022