Posts by Category:
Understanding Role-Based Access Control (RBAC)
Role-based access control (RBAC) boosts security, compliance & employee cheer. Learn about role & access discovery, plus a 6 step approach to implementation.
Zero Trust Explained: The Ultimate Guide to Zero Trust Security
What is Zero Trust? In this comprehensive guide, you’ll learn the history, principles, and models for implementing Zero Trust security in a modern network.
Tech Marketer By Day, Song Bird By Night
Marketing Coordinator Meghan Stephan is a classically-trained singer whose performance venues have ranged from intimate church weddings to professional football games. In today’s interview, she shares her early forays into music, her experience auditioning for The Voice, and an unexpected link between singing and her marketing career.
How Olive AI Standardized Infrastructure Access in Order to Scale
During a featured session at this year’s DevOps Experience, Olive AI CloudOps Engineer Kellen Anker spoke with Justin McCarthy, strongDM CTO & Co-founder, about his company’s journey towards achieving one-click onboarding access and the resulting radical improvements in workforce efficiencies.
Meet strongDM | Sienna Gordon
Sienna Gordon spent a year solo traveling the world. With a tight budget and a big sense of adventure, she slept in monasteries, zipped through tea fields, and even helped MedEvac someone to safety! Her big takeaway from the experience? There are a lot of nice people in the world. I think it’s fair to say that Sienna is one of them.
7 Network Segmentation Best Practices to Level-up Your Security
Network segmentation is key to a modern security posture. Boost your network security and improve performance with these network segmentation tips.
Crossing the Chasm from the Couch to strongDM
I thought I had solved the biggest problems in the cloud, so I shifted into the background to watch the next evolutions of technology pass me by. I had the comfortable couch, the latest game console, and plenty of time to regret the true state of my adult gaming reflexes. I thought I was done. I was wrong.
How we work: Backend Engineering
strongDM is built around the people, and engineering is no exception. See how pair programming, small releases & enormous respect make SDM a great place to work.
Meet strongDM | Phil Hassey, Technical Lead
Phil is the technical lead at strongDM. Prior to this, he was an indie game developer working on the multi-player game Galcon. This gave him a lot of experience in low-level network protocols and cross-network synchronization, as well as security. But as we’ll see, Phil’s interests extend well beyond the tech world.
The Definitive Guide to Secure Access Service Edge (SASE)
What is Secure Access Service Edge? Read this guide to learn how SASE fits into the broader context of cloud security, and take steps to adopt it today.
Automating Database Credentialing
Database sprawl is a lot like expanding into the suburbs: your house may be empty at first, but before you know it, you’re having to stuff things into your attic.
Identity Access Management (IAM) vs. Privileged Access Management (PAM) | Why IAM Alone Won’t Cut It
Access management matters. These days, large-scale data breaches make news headlines more often than celebrity breakups, and 61% of those breaches involve credential data. That’s clearly a problem, and the search for a solution is likely to leave you in a sea of acronyms. PIM, PAM, IAM… what’s the difference? And what matters for your organization?
Connect your first server or database in 5 minutes. No kidding.
"When strongDM said deployment would take an hour, I assumed they were full of it and blocked out a full day. We finished in 45 minutes." - Peter Tormey, Manager DataOps, SoFi