Britive Access Broker is powerful and extendable. In the Resource Type area there is an option […]
Azure PIM (Privilege Identity Management) is a valuable tool, but can it truly meet the comprehensive […]
At a high level, there are two way to Scan in Britive 1- On-Demand Scan2- Scheduled […]
To get Britive to deliver audit logs to DataDog via a webhook, we must use the […]
Introduction and Purpose of This Guide This guide is designed for users who are already familiar […]
How to assign a custom role to an application in Azure Follow this link https://docs.britive.com/v1/docs/assigning-azure-permissions-for-dynamic-permissioning for […]
For my Britive tenant I can see following application and have access to them Depending on […]
My Okta application is now onboarded in Britive. Following shows a screen shot of it Britive […]
At Britive, our mission is to provide seamless and secure access management for multi-cloud environments and […]
Salesforce has experienced several security incidents related to elevated or excessive permissions in the past. These […]
The Salt Typhoon hack refers to a significant cyberespionage campaign conducted by a Chinese hacking group […]
DORA The Digital Operational Resilience Act (DORA) focuses on strengthening the IT security and operational resilience of financial […]
https://catapult.dev2.aws.britive-app.com/my-access UI Overview for a Brand New Tenant Identity Provider Onboarding Britive supports many applications out […]
Snowflake is a powerful data warehousing platform that offers a variety of features to help organizations […]
I wanted to do a side by side comparison so let’s do it. Capability CyberArk Britive […]
Problem Statement Over permissions and standing permission in AWS could be a serious issue. Capitol One […]
Problem Statement A financial institute that provides loans to businesses faced a significant challenge: ensuring the […]
What is CIEM? Cloud infrastructure entitlement management (CIEM) tools manage identities and privileges in cloud environments. […]
Problem Statement Standing permissions and persistent credentials in Azure are among the leading causes of cybersecurity […]