<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon

How Olive AI Standardized Infrastructure Access in Order to Scale

During a featured session at this year’s DevOps Experience, Olive AI CloudOps Engineer Kellen Anker spoke with Justin McCarthy, StrongDM CTO & Co-founder, about his company’s journey towards achieving one-click onboarding access and the resulting radical improvements in workforce efficiencies.

A Textbook Case of Pain in the Access

Olive AI, a healthcare artificial intelligence company, has been on a steep trajectory of growth as it continues to expand inside and out, from its partner ecosystem to its customer base to its headcount. But not too long ago, the company’s exponential growth created exponential complexities that, in turn, led to exponential inefficiencies. Paradoxically, this predicament impeded the company’s ability to scale. 

The heart of the problem: infrastructure access. As the number of employees grew, it became harder and harder to keep up with who needed access to which systems and to what extent and for how long. The number of VPN accounts multiplied, as did the number of one-off DB access requests, all of it exposing a profound bottleneck in productivity. 

 

 The Imperative to Standardize Access

Clearly, Olive AI needed a solution to rein in the chaos and implement order. The technical team couldn’t afford to spend so much time managing and curating YAML files. What’s more, as a HIPAA-compliant company, Olive AI was facing compliance and security gaps due to the state of its access landscape.

Kellen Anker knew that he needed a way to standardize infrastructure access in order for the company to scale smoothly. He sagely established the key components he needed in an access management solution:

  • Security
  • HIPAA-compliance
  • Auditability
  • Full-stack compatibility 
  • Scalability
  • Frictionless UX
  • And no VPNs period

These requirements led him to StrongDM.

One-Click Onboarding Access Unleashes Productivity

Olive AI’s implementation of StrongDM led to a profound improvement in productivity and security. StrongDM gives Olive’s technical staff frictionless and auditable access to everything they need across their entire stack, in a single place. 

The hundreds of database accounts that once monopolized the technical team’s daily tasks were eliminated due to the simplicity that StrongDM provides. With StrongDM, the team can now provision, delete, and modify onboarding access with just one click. 

StrongDM also brought huge improvements to the end-user experience, enabling new and existing employees to access the necessary tools and systems with the right permissions all from day one. 

Importantly, StrongDM helps Olive uphold the compliance and security standards that are crucial to any business operating in the healthcare space.

 

Hungry for more details on Olive AI’s outstanding transformation? Watch the recorded session here.

StrongDM combines authentication, authorization, networking & observability into a single platform to enable fast, auditable access to everything technical staff need across your entire stack. See for yourself.


About the Author

, Marketing Operations Analyst, is a marketing specialist with eight-plus years of experience in a variety of industries from sports and entertainment to technology. In addition to choreographing the operations and organization of the marketing team, Meghan teaches dance classes outside the weekly 9 to 5. She holds a bachelor's degree in Communication Studies from Medaille College. To contact Meghan, visit her on LinkedIn.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

Top 9 Zero Trust Security Solutions
Top 9 Zero Trust Security Solutions in 2024
Zero trust is a security and authentication model that eliminates the assumption of trust and shifts the focus from a traditional security parameter, like a VPN or firewall, to the individual user. Nearly all (92 percent) cybersecurity professionals agree that it’s the best network security approach that exists. In this article, we’ll evaluate the top nine zero trust solutions and help you decide which is right for your organization.
StrongDM vs. AWS SSM Session Manager: Side-by-Side Comparison
StrongDM vs. AWS SSM Session Manager: Side-by-Side Comparison
Both AWS Systems Manager (SSM) Session Manager and StrongDM are solutions for gaining remote access to critical infrastructure. Yet, while they share some of the same capabilities required of an enterprise access management platform, the execution and the ultimate goals they accomplish for security and compliance teams are very different.
Unauthorized Access: 5 New Methods and 10 Ways to Block Them
Unauthorized Access: Types, Examples & Prevention
Unauthorized access—the unauthorized entry or use of an organization's systems, networks, or data by individuals without permission—is a common way for bad actors to exfiltrate data, inject malicious code, and take advantage of all types of breaches, and can have severe consequences for an enterprise and its customers.
Financial Services Cybersecurity Guide: Risks & Solutions
Financial Services Cybersecurity Guide: Risks & Solutions
Financial services companies handle a vast amount of sensitive data, including the personal and financial information of their customers. This makes them a prime target for hackers and cybercriminals who want to steal that data. Hackers are constantly finding new ways to break through the walls of enterprise environments. If successful, they can cause serious problems like identity theft or fake transactions, impacting individuals and companies financially.
13 Password Management Best Practices
13 Password Management Best Practices to Know in 2024
Weak passwords are the third most common attack vector for malicious actors — and often the most difficult for enterprises to control since individual employees typically choose their own passwords. Effectively managing passwords is critical in safeguarding your organization’s assets, maintaining regulatory compliance, and minimizing security risks. In this article, we’ll share 13 password management best practices that will help you keep your systems and data safe from password-related attacks.