Bitium is a Santa Monica, California-based developer of the cloud service Bitium, which provides single sign-on and identity management for Software as a Service (SaaS) cloud-based applications. Bitium allows end users to access all of their cloud software accounts using a single set of login credentials. The product can integrate with cloud apps using SAML for enhanced security.

Wikipedia
Bitium
Bitium
Page Metadata Update

New page description detected.

  • New: Bitium's Blog
  • Old: Manage all of your apps in one place with Bitium
Bitium
Bitium
Page Design Update
Bitium
Bitium
Blog Post

New blog articles detected.

  • Bitium Announces RADIUS with Multi-Factor Authentication
    Today Bitium is excited to announce RADIUS support. This often-requested feature allows our customers to authenticate users against Bitium to gain access to their VPN, which will then let them login to on-premise applications in addition to all of the cloud apps they currently access via Bitium.
Bitium
Bitium
Blog Post

New blog articles detected.

  • Passwords. The Pros, The Cons, The Alternatives.
    Enter your username and password. The format has been around for ages, and is so commonplace now that password fatigue is a real thing. The end result is that the same username and password combination -- maybe variations on the same theme because that seemed enough at the time -- are repeated and propagated across different sites and applications for years. The risk associated with sticking to th...
  • 16 of the World's Biggest Data Breaches & Hacks of 2016
     While looking forward to 2017, it is also time to take stock of last year. What follows is a list of the 15 biggest data breaches by record count for 2016. We compile this list every year, and just by sheer record count, 2016 blew previous years away (thank you Yahoo!), and is an eye watering compilation of sensitive information and credential theft.
  • 3 things to expect in 2017
     “Change is the only constant in life.” The words Greek philosopher Heraclitus once said could not be any truer than in today’s world. As we get close to the end of the year, it is a good time to reflect on what has been accomplished over the last 12 months and what we face in the year to come. Below are 3 things to expect in 2017:    
  • 2016 #CustomerLove Roundup
    Since we consider ourselves partners in identity and access management to our customers, we’re always thrilled to see their successes and announcements in the news. We have a lot of respect for the ways they’re making strides in their industries and pushing the envelope to create elegant solutions to the most complex problems. Here are some of our favorite highlights from 2016:      
  • Celebrating Computer Security Day
    Today is Computer Security Day. From smartphones to the ever expanding world of IoT, so much of daily life now depends upon or is directly impacted by a multitude of computer. As a result, there’s it’s in everyone’s best interest protect all of our connected devices, not just laptop or desktop computers. In the spirit of World Computer Security Day, , we’ve pulled together a few pieces of informat...
  • Giving Back for #GivingTuesday
    As a company, we practice gratitude every Friday. Our sales team takes that concept up a notch and is grateful every morning in their daily standup. We work a block away from the beach in sunny Southern California and are lucky to work in a team-working environment. We’re grateful for so many things, that we’re driven to give back.
  • Secure Authentication and Authorization: A Gateway to Selling to the Enterprise
    In today’s world of fast-paced app development, growing business-to-business (B2B) application services are looking to quickly add midmarket and enterprise clients to their customer base. While these potential enterprise customers seek to adopt SaaS tools to increase productivity, trust in app security is a prerequisite. Success in the crowded B2B app marketplace has been shown to rely heavily on ...
  • The 3-Step Antidote to Security Fatigue
    Last month NIST released a study warning of widespread security fatigue as end users report feeling defenseless against malicious attacks. Survey respondents displayed a general frustration and weariness around online account security. As a result, many have taken the stance of merely hoping that they’re not a high-value target instead of taking steps to fortify their defenses.
  • Focusing on the Journey, Not the Destination: Maximizing Existing Security Investments
    A well functioning and capable security program requires a blend of tools and solutions. Organizations typically make purchases based upon their immediate needs (or maybe those they had 12 months ago when the thought first crossed someone’s mind), and then hopefully implement said purchases. Buying and implementing though is just a portion of the lifecycle of those tools. What’s often forgotten al...
  • The Cow and The Ditch: What To Do After A Data Breach
    While the proper thing is to focus on avoiding data breaches and security incidents before they even happen, unfortunately they still do. According to the Identity Theft Resource Center, there have been nearly 800 data breaches over the course of the year so far with nearly 30 million records exposed. Many of these were the result of basic employee error, but some have been much more sophisticated...
Bitium
Bitium
YouTube Video

New YouTube videos detected.

  • Bitium + Slack: Accessing Applications as Fast as you Slack
    Bitium's new integration with Slack allows you to access apps from within Slack without needing the username or password. Learn more here: http://bit.tm/1u0sDdl
  • Bitium First-Time User Tutorial
    This video provides a quick-start guide for new users of Bitium. Watch this video for a basic introduction to the most commonly used features. For more detailed instructions for any feature, see http://support.bitium.com For more information about Bitium, visit http://bitium.com
  • How to Install & Use the Bitium Browser Plugin
    A short tutorial showing how to install and use the Bitium browser extension. The plugin enables users to sign in to apps around the web without having to repeatedly enter their credentials. It also allows for streamlined access to frequently-access pages, and simplified sharing of content with collaborators.
  • How to use the Message Center in Bitium
    In this tutorial, see how to use the Message Center in Bitium, where you can see and filter messages from various apps in one place.
  • How To Request a New App Be Added to Bitium
    Can't find an app you need in the Bitium App Marketplace? This tutorial shows how to request that we add a new app to our catalog.
  • How to Create and Manage Groups in Bitium
    In this tutorial, see how to create and manage groups in Bitium, to organize users and the apps that they need. Using Groups makes managing app access across entire departments a snap.
  • How to Add an App to Your Bitium Dashboard
    A short demonstration of how to add an App to your Bitium dashboard, allowing you one-click authenticated access to the App. ---- For more information, visit http://www.bitium.com
  • How to Share App Access Across Organizations (without sharing passwords)
    A demonstration of Bitium's cross-organization app sharing feature, which allows members of one organization to access an app on behalf of a person from another organization, without ever knowing the account password or credentials. ---- For more information, visit http://www.bitium.com
  • How to Setup a New User in Bitium (onboarding a new hire)
    A tutorial of how to create a new user account in Bitium, quickly granting them access to various apps with different authentication schemes, and adding the user to groups. ---- For more information, visit http://www.bitium.com
Bitium
Bitium
Blog Post

New blog articles detected.

  • Increasing Productivity for the Modern Workforce
    Gone are the days when IT was responsible for only a small set of apps which employees had to use. Today’s modern workforce expects to have access to any cloud app that increases their productivity while having the flexibility to use it from any device or location. The longer IT teams take to come up with a solution to this changing workforce expectation, the greater the rise of Shadow IT, which p...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.