Posts by Category:
Automating Database Credentialing
Database sprawl is a lot like expanding into the suburbs: your house may be empty at first, but before you know it, you’re having to stuff things into your attic.
Identity Access Management (IAM) vs. Privileged Access Management (PAM) | Why IAM Alone Won’t Cut It
Access management matters. These days, large-scale data breaches make news headlines more often than celebrity breakups, and 61% of those breaches involve credential data. That’s clearly a problem, and the search for a solution is likely to leave you in a sea of acronyms. PIM, PAM, IAM… what’s the difference? And what matters for your organization?
Access Management 101: Understanding Roles & Access
Here’s the scenario: On one side, you’re inundated with requests to provide access to critical infrastructure in order to enable teams to do their jobs; on the other side, you’re tasked with auditing access and ensuring that security to those systems is solid.
Being Better: Solving Today’s Infrastructure Security Challenges with Better’s CISO
Modern infrastructure challenges range from new regulations to secrets management. See how Better’s CISO is tackling these challenges.
Getting Started: Role & Access Discovery
Discovering “who has access to what” is critical for zero trust and PAM. These six steps will get you started with Access Management.
Role & Access Discovery | Who Has Access to What Now?
Role & Access Discovery aims to answer “Does this person, in this role, need access to that system?” Learn why this is a critical part of access management.
Principle of Least Privilege (PoLP): What, Why, & How
Today we’re going to take a closer look at the principle of least privilege (PoLP)—what it is, why it matters, and how to implement it in your organization. Understanding the principle of least privilege is critical, as network administrators must strike a balance between ease and security—protecting network access without causing friction for users. If access is too restrictive, employees won’t be able to do their jobs. Too lax, and the door to attack is open.
Series B, baby! ❤️
strongDM, the infrastructure access platform, today announced it closed a $54 million Series B funding round led by Tiger Global, with participation from new investor GV, and existing investors Sequoia Capital, True Ventures, HearstLab, Bloomberg Beta, and Godfrey Sullivan.
#SDMLife: East Meets West in San Francisco
A big part of strongDM life is fun and food. At the recent San Francisco offsite, the team got together to craft some delicious thai food, and throw the frisbee
Smart Trade-offs for Better API Security
Surging API use presents new challenges for application security. Discover how experts from StackHawk, strongDM & Imvision are learning to adapt.
#SDMLife: Team Building in a Pandemic
How do you facilitate team building in a remote-first company? And especially in a pandemic? By finding ways to make it work. That’s the strongDM approach.
Connect your first server or database in 5 minutes. No kidding.
"When strongDM said deployment would take an hour, I assumed they were full of it and blocked out a full day. We finished in 45 minutes." - Peter Tormey, Manager DataOps, SoFi