RevBits adds CI/CD Access Management to its Privileged Access Management Solution

RevBits Adds CI/CD Access Management to its Privileged Access Management Solution

Seamlessly integrates with popular CI/CD pipeline toolsets

For immediate release

Mineola, NY September 07th, 2021 - RevBits, a software provider for a complete 360-degree cyber defense, today announced availability of its CI/CD Access Management module, further enhancing RevBits feature-rich Privileged Access Management solution.

Continuous integration and continuous delivery (CI/CD), enables software developers and DevOps teams to meet the high demands and dynamic requirements of users. These two combined methodologies create a CI/CD pipeline, enabling DevOps to deliver software updates more frequently and reliably. However, without enough oversight, or security as a key requirement, they come with potential security risks.

Building upon its technology leadership in the access management marketplace, RevBits has added, what Gartner considers, an advanced PAM feature to its solution. RevBits' PAM with CI/CD Access Management, expands the capabilities of system administrators to more fully manage and control secrets access.

"CI/CD Access Management was built to address the unique scalability and agility challenges associated with authenticating, authorizing, and auditing secrets within DevOps environments," said David Schiffer, CEO at RevBits. "As a module within our advanced PAM solution, CI/CD enables enterprises to reduce security and compliance risk associated with secrets sprawl, while improving productivity."

When DevOps create an app for a testing, staging, or production server, they often include secrets. These can be credentials or security keys, which authenticate data associated with an API, application, SSH, certificate, etc. RevBits secrets manager, can be audited and centrally managed to protect and control secrets.

"Using a secrets manager plugin within CI/CD environments is a more secure approach. Applying common DevOps tools, like Jenkins, Kubernetes, and others, developers can configure the variables, and associate them with the location and values they imputed for the secrets," said Mucteba Celik, CTO at RevBits. "By continuing to add to our PAM solution, with modules like CI/CD Access Management, RevBits continues to deliver the tools enterprises need to protect their valuable assets, networks, applications, and services."

RevBits CI/CD Access Management feature highlights

  • § RevBits secrets manager, can be audited and centrally managed to protect and control secrets.

  • § Keeps secrets encrypted and delivers them to CI/CD plugins when needed over SSL, with an additional layer of encryption that employs Diffie-Hellman to establish the secure key exchange.

  • § Supports Jenkins, Puppet, Terraform, OpenShift, Ansible, Docker, Cloud Foundry, and Kubernetes with future tools under development.

About RevBits

RevBits delivers new levels of security IQ through context-rich behavioral analysis, artificial intelligence and machine learning. RevBits Cyber Intelligence Platform (CIP) is a unified security platform that integrates a best-in-class suite of Detection and Response, Privileged Access Management, Email Security, Deception Technology, and Zero Trust Network solutions. RevBits empowers security operations with a complete cyber defense; encrypting, authenticating, authorizing, and intelligently analyzing layered context-rich security data across the security stack. RevBits dashboard unifies cross-functional security presenting an intuitive 360-degree view. Taking cybersecurity to the next level, RevBits is innovating new capabilities, with multiple patented technologies to ensure enterprises have a security advantage. For more information, visit www.revbits.com.

Related Insights

Email Phishing Training and Anti-Phishing Tools Matter Most Before the Holidays
May 25, 2022

It’s Time to Think Out-of-the-Box About Cybersecurity

“I could end the deficit in 5 minutes. You just pass a law that says anytime there is a deficit of more than 3% of GDP, all sitting members of Congress are ineligible for re-election.” - Warren Buffett

Email Phishing Training and Anti-Phishing Tools Matter Most Before the Holidays
May 13, 2022

Is Your Email Security Built to Withstand Determined Intruders?

We take great care to safeguard our homes and valuable assets with numerous methods of defense. We employ layers of protection, with double locks on external doors, alarm sensors on windows, strategically placed motion-activated cameras and signs in the yard to deter intruders.

Are You Still Falling for These Cybersecurity Misconceptions?
February 04, 2022

Are You Still Falling for These Cybersecurity Misconceptions?

We currently live in a cultural climate of escalating misinformation, spurious ideations, and fomenting conspiracy theories. Pick a topic - health, finance, politics… Brittany Spears - and you’ll unearth a plethora of factual distortion and false beliefs. The Covid-19 pandemic and subsequent vaccination program continues to be fraught with conflicting confabulations and political media manipulations. It’s hard to know what to trust, where to place your faith, or how to attain a sense of security. And security, on a personal and business level, is a core primary concern. Relying upon inaccurate information or outdated myths could lead to devastating consequences.

Contact Details

Contact RevBits

Message icon Request a Demo