THE BEST WAY TO SECURE ACCESS TO DATABASES

Convenient permissions, monitoring and compliance reporting

UNIFY PERMISSIONS

UNIFY PERMISSIONS

Grant or revoke access to every database through your existing SSO or AD. When an employee leaves, disable access to 90% of everything in one click.

MONITOR EVERYTHING

MONITOR EVERYTHING

Continuously monitor every database user, session, query and permission change in easy to access, human readable logs. No need to play detective by cross referencing session time stamps and query logs to deduce who wrote that query. The answer is one click away.

AUTOMATE COMPLIANCE

AUTOMATE COMPLIANCE

When auditors ask how do you manage database access, instantly export your SOC 2 or HIPAA compliance report in one click. With strongDM you're always audit ready.

Activate Your SSO

Any SSO including AD, Okta & OneLogin

Watch Compliance Demo

Robust reporting for SOC2, IS27001, HIPPA & NIST

Download Compliance Checklist

Everything you need to know before hiring an auditor

SOME OF OUR HAPPY CLIENTS

shipwire
makespace
hearst
yext
grommet
YOU COMBINED CONVENIENCE AND SECURITY,
WHICH HAVE ALWAYS BEEN TWO COMPLETELY
OPPOSING FORCES. IT'S REALLY A MIRACLE. CONGRATULATIONS, YOU CREATED A UNICORN.
Dave Anderson
Director IT & Security, Greenhouse Software
WE SUPPORT YOUR STACK

redis
sql server
redshift
postgresql
dynamodb
mysql
memsql
mongodb
mariadb
green-plum
MADE FOR YOU

CONVENIENT CONTROLS FOR DEVOPS

Introducing a one stop shop to conveniently manage database access. One click to:

  • onboard a new hire
  • approve temporary access
  • revoke access
  • tail queries in real-time
  • export compliance reports
DevOps User Database Provisioning
DevOps User Database Provisioning
SOC 2 | HIPAA | GDPR

AUTOMATE COMPLIANCE REPORTING

Fulfill SOC 2 and HIPAA requirements without stitching together a dozen different plugins and scripts. strongDM continuously monitors every database and provides easily accessible, human-readable logs. In one click export logs summarizing:

  • active users' permissions
  • suspended users
  • recent permission changes
  • queries by user or database

HOW IT WORKS

Conveniently deploy the strongDM proxy on prem or in the cloud via Docker, RPM or raw binary.

strongDM deployment architecture