AI Buyer Insights:

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Michelin, an e2open customer evaluated Oracle Transportation Management

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Michelin, an e2open customer evaluated Oracle Transportation Management

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

List of Britive Customers

Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Forbes Media Media 500 $100M United States Britive Britive Identity and Access Management (IAM) 2021 n/a
In 2021, Forbes Media deployed Britive to provide Just-in-Time privileged access across GCP, Google Workspace, BigQuery, Looker and Okta. The deployment used Britive as an Identity and Access Management (IAM) solution to accelerate developer and BI access while eliminating standing privileges in the United States. The implementation focused on Britive modules for JIT privileged access for cloud infrastructure and BI tools, explicitly provisioning ephemeral credentials for GCP resources and for BigQuery and Looker datasets. Configuration included time bound access policies, role elevation workflows and automated credential brokering to remove standing admin accounts. Functional capabilities documented in the case study addressed developer access, BI analyst access and automated offboarding controls. Integrations were executed with Google Cloud Platform, Google Workspace, BigQuery, Looker and Okta, with Britive tied into existing identity controls through Okta integration to centralize entitlement requests. The solution integrated with DevOps build pipelines to automate ephemeral access issuance as part of CI CD and build workflows, enabling programmatic, time limited credential issuance for development and analytics tasks. Architecture emphasized API based provisioning and audited access issuance for cloud and BI services. Rollout was completed in the United States in under four weeks and included governance changes to operationalize Just in Time access reviews and automated expiry. The deployment eliminated over 54,000 standing privileges and delivered faster on and off boarding for developer and BI users as described in the case study. Ongoing governance centered on policy driven access lifecycles, automated expiry and audited entitlement requests within the Identity and Access Management (IAM) framework provided by Britive.
Marqeta Banking and Financial Services 854 $507M United States Britive Britive Identity and Access Management (IAM) 2025 n/a
In 2025, Marqeta implemented Britive as its Identity and Access Management (IAM) platform to govern runtime authorization and secure identities across cloud and hybrid environments in the United States. Britive is cited by the vendor with a quote from Marqeta's Head of Identity Security describing platform use to secure human, machine and agentic AI identities while strengthening identity traceability and policy enforcement. Configuration and modules center on runtime authorization controls, identity traceability, and centralized policy enforcement, with vendor event materials indicating use of agentic AI identity security capabilities and just in time privileged access workflows for cloud workloads. The implementation of Britive included policy definition and enforcement layers consistent with Identity and Access Management (IAM) functional patterns, coupled with automated JIT elevation and short lived credential issuance for privileged cloud processes. Operational scope targeted security and cloud infrastructure domains, aligning Identity and Access Management (IAM) governance with application and DevOps workflows across Marqeta's United States cloud and hybrid footprint. Governance changes emphasized consolidated authorization policy administration, enhanced audit trails for human and machine identities, and operational controls to trace agentic AI identity activity, as referenced in Britive materials and event coverage. The stated outcome in vendor materials is strengthened identity traceability and more consistent policy enforcement across Marqeta's cloud and hybrid environments.
Nayya Professional Services 200 $30M United States Britive Britive Identity and Access Management (IAM) 2021 n/a
In 2021, Nayya deployed Britive to provide just-in-time privileged access and dynamic permissioning for its cloud infrastructure and DevSecOps workflows. The Britive implementation aligned to the Identity and Access Management (IAM) category and targeted cloud infrastructure and developer access in the United States, focusing on reducing standing privileges and improving developer velocity. The deployment used the Britive dynamic permission platform configured to enforce just-in-time privileged access, automated privilege reduction, role and attribute based access controls, policy driven entitlement management, and onboarding automation. Configuration emphasized ephemeral credential issuance and policy enforcement within developer workflows, reflecting Identity and Access Management (IAM) functional patterns for privileged access management and access lifecycle control. Operational coverage included engineering, DevOps, and security teams across Nayya's US footprint, with the implementation integrated into the cloud access control plane and the DevSecOps toolchain to orchestrate ephemeral permissions and approval workflows. Governance changes introduced centralized access request and approval workflows, automated provisioning and deprovisioning paths, and enhanced audit logging for visibility, delivering faster onboarding, better audit visibility, and automated reduction of standing privileges.
Professional Services 8000 $3.8B United States Britive Britive Identity and Access Management (IAM) 2022 n/a
Showing 1 to 4 of 4 entries

Buyer Intent: Companies Evaluating Britive

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating Britive. Gain ongoing access to real-time prospects and uncover hidden opportunities.

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD Britive Coverage

Britive is a Identity and Access Management (IAM) solution from Britive.

Companies worldwide use Britive, from small firms to large enterprises across 21+ industries.

Organizations such as Splunk, Marqeta, Forbes Media and Nayya are recorded users of Britive for Identity and Access Management (IAM).

Companies using Britive are most concentrated in Professional Services, Banking and Financial Services and Media, with adoption spanning over 21 industries.

Companies using Britive are most concentrated in United States, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of Britive across Americas, EMEA, and APAC.

Companies using Britive range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 75%, large organizations with 1,001-10,000 employees - 25%, and global enterprises with 10,000+ employees - 0%.

Customers of Britive include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified Britive customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Identity and Access Management (IAM).