<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon
strongDM logo

blog

Why Customer Happiness Matters

Why Customer Happiness Matters

Product decisions are about more than the capabilities of the software. Active Customer Support helps customers get the most value out of the product.
Three Pillars of Observability Explained: Metrics, Logs, Traces

Three Pillars of Observability Explained: Metrics, Logs, Traces

In this article, we’ll focus on the three pillars of observability. You’ll learn about the definitions, strengths, and limitations of each pillar. By
Understanding the Difference Between IAM Roles and Policies in AWS
Understanding the Difference Between IAM Roles and Policies in AWS
In this article, you’ll learn the difference between AWS roles vs. policies and see examples of each. By the end of this article, you’ll have a clear understanding of what distinguishes an AWS role from a policy, in addition to understanding the difference between IAM roles, users, and groups.
Observability vs. Monitoring: Understanding the Difference
Observability vs. Monitoring: Understanding the Difference
Observability and monitoring are often used interchangeably, but there are key differences you should know between these two IT terms and the tools that enable them. In this article, we’ll explore the relationship and differences between observability vs. monitoring. Plus, you’ll learn about what makes observability and monitoring different from telemetry and application performance monitoring (APM).
Kubernetes Access: Why It Is Complex and How to Simplify It
Kubernetes Access: Why It Is Complex and How to Simplify It
Provisioning and maintaining Kubernetes access doesn’t need to be a full-time job. Much of it can be automated with strongDM, resulting in more productive system administrators and users who can access the necessary clusters for their jobs much faster.
35 Alarming Small Business Cybersecurity Statistics for 2025
35 Alarming Small Business Cybersecurity Statistics for 2025
Cyberattacks against small businesses have been on the rise in recent years. Despite the attitude among many small business owners that hackers only go after behemoths, smaller companies make increasingly attractive prey. We’ve gathered the most recent cybersecurity statistics relevant to small businesses. Read on to find out exactly what they are up against and what steps they can take to defend themselves.
Meet strongDM | Cameron Delano
Meet strongDM | Cameron Delano
Meet Cameron, Solutions Architect at strongDM and a gaming-world defender who helped rescue Christmas from the Lizard Squad in 2014.
Alternatives to Cloudflare Access
Alternatives to Cloudflare Access
Cloudflare Access is a Zero Trust Network Access (ZTNA) SaaS application that works with identity providers and endpoint protection platforms to enforce access policies for corporate applications, private IP spaces, and hostnames. It aims to prevent lateral movement and reduce VPN reliance. However, if you're looking to enable fast, secure access to your stack - with complete audit trails - Cloudflare Access might not be the best solution for your requirements.
Understanding GCP IAM Roles
Understanding GCP IAM Roles
In this article, you’ll learn about how GCP IAM works and the different types of roles that can be delegated to users as well as when those roles are most appropriate in the GCP environment. By the end of this article, you’ll have a clear understanding of the pros and cons of each different role type as well as their limitations.
Identity and Access Management (IAM) Best Practices
Identity and Access Management (IAM) Best Practices
In this article, we'll list eleven Identity and Access Management (IAM) best practices and describe each one of them in detail. You'll also learn how to make these best practices standard in your organization.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀