Skip to content
Watch: Just-In-Time Access for Snowflake
Britive logo
  • Platform
    • How it works
    • Just In Time Privileges
    • Secrets Governance
    • Privilege Right Sizing
    • Cross Cloud Discovery
    • Proactive Monitoring
    • Use Cases
  • Solutions
    • ServiceNow
    • Salesforce
    • Google Cloud Platform
    • AWS
    • Azure
  • Resources
    • Documentation
    • Webcasts
    • Blog
  • Company
    • Meet the Team
    • About Us
    • News
    • Careers
    • Support
    • Contact Us
  • Partners
  • Free Risk Assessment
Menu
  • Platform
    • How it works
    • Just In Time Privileges
    • Secrets Governance
    • Privilege Right Sizing
    • Cross Cloud Discovery
    • Proactive Monitoring
    • Use Cases
  • Solutions
    • ServiceNow
    • Salesforce
    • Google Cloud Platform
    • AWS
    • Azure
  • Resources
    • Documentation
    • Webcasts
    • Blog
  • Company
    • Meet the Team
    • About Us
    • News
    • Careers
    • Support
    • Contact Us
  • Partners
  • Free Risk Assessment

Britive News Room

2022 Cybersecurity Excellence Awards Britive Gold Medal for Cloud Privilege Access Management

11 February, 2022

The 2022 Cybersecurity Excellence Awards has given Britive the “Cloud Privileged Access Management Gold Medal.” The Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security. With over 900 entries in more than 250 award categories, the 2022 Cybersecurity Excellence Awards program is highly competitive. All winners reflect the

Read More »

Cloud Secrets Manager

8 February, 2022

“Hard-coded secrets embedded in source code and scattered throughout the DevOps pipeline pose significant risk. Technical professionals responsible for DevSecOps must introduce tools that securely store and manage secrets and enforce access controls without disrupting automated DevOps workflows.” –Gartner Q: What Problem Does Britive Cloud Secrets Manager Solve? A: Secrets sprawl. Secrets Sprawl /see-krits sprawl/

Read More »

How Zero Standing Permissions Clear the Way for Zero Trust

2 February, 2022

Using Zero Standing Permissions to Achieve a Zero Trust Model There is a reason the security community is embracing the zero trust (ZT) principle with renewed energy – because it helps prevent breaches by eliminating implicit trust from a system’s architecture. Instead of automatically trusting users inside a network, ZT dictates that every access point

Read More »

Cloud IAM: Using Privilege Right Sizing to Contain Privilege Sprawl

19 January, 2022

Advancing Cloud IAM The following article was published in betanews. Historically identity and access management has been built around an on-premises model. But with more systems now residing in the cloud the old way of doing things isn’t working. To find out more about why the cloud needs a new approach to IAM we spoke

Read More »

How to Offboard Cloud Users Securely

11 January, 2022

This article originally appeared in Security Boulevard. Offboard Cloud Users Securely One of the most fundamental challenges of securing the identity-defined perimeter is efficiently managing and securing the cloud identity life cycle. This priority comes into sharpest focus with offboarding users—or, more accurately, the failure of so many organizations to revoke standing access privileges to

Read More »

Cyber Burnout: How to Build Cybersecurity Teams that Are Focused, Optimistic, and Satisfied

8 January, 2022

The following article originally appeared in eWeek. Cyber Burnout Cloud security professionals are already in short supply. Combine that with alert fatigue, a surge in demand, and the “always-on” nature of the modern workplace, and it is clear why employee burnout is increasing. In 2019, Gartner projected that the cloud market would grow to $355B

Read More »

Avoid These Common Multi-Cloud Privilege Access Management Mistakes

17 December, 2021

Britive originally published the following article in Security Magazine. Multi-Cloud Privilege Access Management Organizations are moving to multi-cloud environments in droves, largely because the cloud is fast, agile and powerful. But is it secure? Inherently — no. Just like on-prem, multi-cloud environments have significant security risks that must be addressed if your goal is to

Read More »

Ubiquiti Security Breach: How Zero Standing Privileges Stop Rogue Developers

11 December, 2021

The Ubiquiti Security Breach Last year, Ubiquiti disclosed a security breach involving their AWS and GitHub accounts. During the breach, the attacker accessed AWS via a privileged user account, moved across the company’s cloud environment, and proceeded to clone gigabytes of data repositories from GitHub. Ubiquiti’s disclosure gained massive attention when a so-called whistleblower claimed

Read More »
« Previous Page1 Page2 Page3 Page4 Page5 Page6 Page7 Page8 Next »

in the media

AI-TechPark Interview with CEO, Britive – Art Poghosyan

Art Poghosyan from Britive Talks with AI-TechPark about the changing Information & Data Security Landscape &

Read More »

Britive Welcomes Three Experts In Cloud Security, Data Analytics And Sales To Leadership Team

Experts join Britive leadership team As part of an ongoing effort to add proven technology

Read More »

Britive Raises $10M To Secure Privileged Access For Multi-Cloud Enterprises

Financing round led by Crosslink Capital underscores need for organizations to secure growing cloud-native technology

Read More »

Request a demo today

Schedule Now
Britive logo square

Platform

  • How it works
  • Just in time Privileges
  • Secrets Governance
  • Cross Cloud Discovery
  • Proactive Monitoring
  • Privilege Right Sizing
  • Use cases

Solutions

  • ServiceNow
  • Salesforce
  • Google Cloud Platform
  • AWS
  • Azure

Resources

  • Content
  • Blog

Company

  • About Us
  • News
  • Careers
  • Partners
  • Contact Us
  • Privacy

Address

Headquarters:

450 North Brand Blvd
Suite 600 Glendale
California 91203
USA

© 2021 Britive. All rights reserved.

Linkedin-in Twitter