<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

PAM Was Dead. StrongDM Just Brought it Back to Life. ✨  An important message from StrongDM's CEO!

Search
Close icon
Search bar icon
strongDM logo

blog

Automating Database Credentialing Guide for 2024

Automating Database Credentialing Guide for 2024

Database sprawl is a lot like expanding into the suburbs: your house may be empty at first, but before you know it, you’re having to stuff things
Managing Access to Ephemeral Infrastructure At Scale

Managing Access to Ephemeral Infrastructure At Scale

Managing a static fleet of strongDM servers is dead simple. You create the server in the strongDM console, place the public key file on the box, and
How Olive AI Standardized Infrastructure Access in Order to Scale
How Olive AI Standardized Infrastructure Access in Order to Scale
During a featured session at this year’s DevOps Experience, Olive AI CloudOps Engineer Kellen Anker spoke with Justin McCarthy, strongDM CTO & Co-founder, about his company’s journey towards achieving one-click onboarding access and the resulting radical improvements in workforce efficiencies.
Difference between RBAC vs. ABAC vs. ACL vs. PBAC vs. DAC
Difference between RBAC vs. ABAC vs. ACL vs. PBAC vs. DAC
This article presents an overview of RBAC vs. ABAC, plus several additional models of access control, including PBAC, ACL, and DAC. You will learn what these methods are, how they differ from each other, and the pros and cons of each.
Understanding Software-Defined Networking (SDN)
Understanding Software-Defined Networking (SDN)
In this article, we will take a comprehensive look at software-defined networking (SDN). You’ll learn what it is, how it works, and what its benefits and disadvantages are. You’ll also learn how SDN compares to and works with other types of networks and get answers to common questions.
A Beginner’s Guide to Microsegmentation
A Beginner’s Guide to Microsegmentation
In this article, we’ll review the basics of microsegmentation and discuss it in context with other network security models and practices, including Zero Trust, software-defined networking, and network segmentation. You’ll learn about the benefits of microsegmentation, how it works, challenges for implementation, and best practices.
What is an Attack Surface? (And the Best Way to Reduce It)
What is an Attack Surface? (And the Best Way to Reduce It)
Data breaches are a perpetual risk for modern organizations — and the wider your attack surface, the higher your organization’s risk of a breach. In this article, we will take a high-level look at what your attack surface is, what vectors and endpoints may be at risk, and how to analyze your attack surface.
Data Loss Prevention Best Practices
Data Loss Prevention Best Practices
Data loss prevention (DLP) can save organizations millions of dollars on data breaches every year. In this article, we will take a big-picture look at data loss prevention and discover how DLP tools and processes strengthen an enterprise’s security posture.
What is SD-WAN? Everything You Need to Know
What is SD-WAN? Everything You Need to Know
In this article, we’ll review what SD-WAN is, its history and development, as well as the key benefits and limitations of SD-WAN deployment. You’ll learn the difference between SD-WAN and WAN, VPNs, MPLS, and SDN and how the different services and solutions compare.
Understanding Cloud Access Security Brokers (CASBs)
Understanding Cloud Access Security Brokers (CASBs)
In this article, we’ll take a high-level look at what a CASB is, what it does, and how it works. You’ll learn the key pillars of CASBs and how they address the growing threat of Shadow IT in cloud-based organizations. By the end of this article, you’ll understand the differences between CASB, SASE, and IAM, as well as the main challenges to implementing a CASB solution.
StrongDM app UI showing available infrastructure resources
Connect your first server or database, without any agents, in 5 minutes.