About us

Learn the art and science of building and connecting secure enterprise cloud networks together.

One joint at a time!

Search My Blog Posts

Search my blog posts

Executive Summary Britive Access Builder is a powerful self-service capability that transforms how organizations manage cloud access requests. It empowers developers, DevOps teams, and business users to request and configure their own access profiles while maintaining robust security controls and compliance requirements. Traditional access management processes […]
Setup Total Duration: ~5 minutesNumber of Scenes: 7Target Scene Length: 60-80 seconds each Scene 1: Introduction to Britive Access Broker (70 seconds) Visual Focus: Britive UI – Access Broker Configuration Screen Script: “Welcome to this demonstration of Britive Access Broker for secure on-premise database access. The Britive Access Broker extends […]
Introduction (0:00 – 0:30) “Hello everyone, and welcome to this demonstration of Britive’s dynamic credential management in CI/CD pipelines. CI/CD pipelines are the non human identities present in your enterprise. Today, I’ll be showing you how Britive eliminates the need for static credentials in your deployment […]

A few things we’re great at

Helping YOU!

Learn

Complex topics in easy manner

educate

Keep up with the innovation in cloud networking

upskill

Gain more knowledge and prepare for new realities

sharing

We share what we know you should do the same

Design Principles

Designing Cloud Network requires following the Well-Architected framework design pillars. Remember CRAMPS.

cost

Cost optimization is key for cloud networks. Pay special attention to Egress Charges

recoverability

Recover from failure by building multi region applications. For DR scenarios, consider multiple clouds.

availability

Build Active Active links with automatic failure options in the network. Don’t forget the hybrid connections.

MANAGEABILITY

Manage network with IaC (Infrastructure as Code) options such as Terraform. Single pane for visibility is the key.

PERFORMANCE

Performance of the network must be planned. Do not rely only on the auto scale features to optimize for performance.

Security

Security must be part of the network. Follow Zero-Trust Network Architecture approach.

contact information

Social Media Contacts