Britive, Snowflake Partners To Help Enterprises Analyse Identity And Access Data At Scale

Britive-Announces-Partnership-With-Snowflake-To-Help-Enterprises-Analyze-Identity-And-Access-Data-At-Scale

Britive, the cloud-native, multi-cloud privileged access management platform, announced a partnership with Snowflake, the data cloud company, to launch a “Bring Your Own Snowflake” program. Joint customers can now normalise and analyse their IAM data for the purposes of obtaining insights into identity borne risks, recommendations for eliminating overly permissive access, and gaining visibility into access spread to allow automatic remediation of issues. 

In addition, this model allows for the ingestion of historical identity and access data for analysis, as well as the enablement of users to proactively monitor their data for changes going forward. 

Also Read: Company Closeup: Snowflake

“A 360-degree approach is a key to effectively managing access permissions across cloud infrastructure,” said Omer Singer, Head of Cyber Security Strategy, Snowflake. “With Britive, Snowflake customers can now quickly gain insights into user permissions, actions and recommendations within the security data lake that they control.”

The Britive platform takes the complexity and time out of securing identities and permissions across multi-cloud environments, including IaaS, PaaS, SaaS, and DaaS services. The platform provides enterprise organisations with the ability to automatically grant Just-In-Time permissions, auto-expire permissions, enforce least-privilege access, right-size broad permissions and more.

“As security teams increasingly rely on security data lakes to store and analyse their data, there’s now an opportunity to leverage that visibility to effectively analyse cross-cloud identity and activity,” said Art Poghosyan, CEO, Britive. “Britive is thrilled to partner with Snowflake to help our joint customers feel confident that their cloud user privileges are right-sized through continuous analysis, and access policies are automatically enforced as part of a modern security data lake architecture.”