Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

Privileged Access - Britive unlocks dynamic permissioning at scale across multi-cloud enterprises, elevating efficiency and protection from security breaches.

Visibility - Sitting across multiple public clouds and apps, Britive unveils who’s doing what across the cloud universe, revealing typical blind spots like over-privileged users and machine IDs.

Enforcement - Britive empowers users and apps to grant themselves pre-authorized access privileges just-in-time (JIT). These expire at the end of the session to minimize threat exposure.

Analytics - Centralized logging makes it easier to integrate data with security operations center (SOC) technologies, speeding up threat detection and prevention.

Integration - Designed to work across public clouds, the Britive platform is API first for easy integration into a vast and growing number of cloud environments.

Contact Information

Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SearchMobileComputing.com

SearchMobileComputing.com

SearchMobileComputing.com is a leading source of news, analysis and how-to information about enterprise mobility.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

Baltimore Cyber Range (BCR)

Baltimore Cyber Range (BCR)

Baltimore Cyber Range provides IT and cybersecurity training, simulation and placement services across the full spectrum of experience and skill levels.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.