RevBits adds CI/CD Access Management to its Privileged Access Management Solution
Seamlessly integrates with popular CI/CD pipeline toolsets
For immediate release
Mineola, NY September 07th, 2020 - RevBits, a software provider for a complete 360-degree cyber defense, today announced availability of its CI/CD Access Management module, further enhancing RevBits feature-rich Privileged Access Management solution.
Continuous integration and continuous delivery (CI/CD), enables software developers and DevOps teams to meet the high demands and dynamic requirements of users. These two combined methodologies create a CI/CD pipeline, enabling DevOps to deliver software updates more frequently and reliably. However, without enough oversight, or security as a key requirement, they come with potential security risks.
Building upon its technology leadership in the access management marketplace, RevBits has added, what Gartner considers, an advanced PAM feature to its solution. RevBits' PAM with CI/CD Access Management, expands the capabilities of system administrators to more fully manage and control secrets access.
"CI/CD Access Management was built to address the unique scalability and agility challenges associated with authenticating, authorizing, and auditing secrets within DevOps environments," said David Schiffer, CEO at RevBits. "As a module within our advanced PAM solution, CI/CD enables enterprises to reduce security and compliance risk associated with secrets sprawl, while improving productivity."
When DevOps create an app for a testing, staging, or production server, they often include secrets. These can be credentials or security keys, which authenticate data associated with an API, application, SSH, certificate, etc. RevBits secrets manager, can be audited and centrally managed to protect and control secrets.
"Using a secrets manager plugin within CI/CD environments is a more secure approach. Applying common DevOps tools, like Jenkins, Kubernetes, and others, developers can configure the variables, and associate them with the location and values they imputed for the secrets," said Mucteba Celik, CTO at RevBits. "By continuing to add to our PAM solution, with modules like CI/CD Access Management, RevBits continues to deliver the tools enterprises need to protect their valuable assets, networks, applications, and services."
RevBits CI/CD Access Management feature highlights
§ RevBits secrets manager, can be audited and centrally managed to protect and control secrets.
§ Keeps secrets encrypted and delivers them to CI/CD plugins when needed over SSL, with an additional layer of encryption that employs Diffie-Hellman to establish the secure key exchange.
§ Supports Jenkins, Puppet, Terraform, OpenShift, Ansible, Docker, Cloud Foundry, and Kubernetes with future tools under development.
RevBits delivers new levels of security IQ through context-rich behavioral analysis, artificial intelligence and machine learning. RevBits Cyber Intelligence Platform (CIP) is a unified security platform that integrates a best-in-class suite of Detection and Response, Privileged Access Management, Email Security, Deception Technology, and Zero Trust Network solutions. RevBits empowers security operations with a complete cyber defense; encrypting, authenticating, authorizing, and intelligently analyzing layered context-rich security data across the security stack. RevBits dashboard unifies cross-functional security presenting an intuitive 360-degree view. Taking cybersecurity to the next level, RevBits is innovating new capabilities, with multiple patented technologies to ensure enterprises have a security advantage. For more information, visit www.revbits.com.
How big is Email? So far, in 2021, over 319 billion emails have been sent and received worldwide.
Ultimately, all organizations stay connected through email, which carries information from one employee to another. Basically, email communication is the channel used by every company for internal and external communication. However, the primary question is, "How secure is the email system?"
It’s a common misconception that the only threats to an enterprise’s security come from external actors. Whether intentional or not, 47% of organizational data breaches are the result of internal human error, such as a misplaced device or document. Moreover, some employees present an even larger risk than others. According to recent reports, younger employees are more likely to bypass security protocols that are viewed as an impediment to their productivity. When it comes to onboarding new employees, young or old, enterprises must have proper security awareness & anti-phishing training, in addition to a strong privileged access management solution, to guard against the different types of human error that could create security vulnerabilities.