![Justin McCarthy](https://discover.strongdm.com/hs-fs/hubfs/about-us/justin-mccarthy-cto.jpg?width=70&height=70&name=justin-mccarthy-cto.jpg)
- Role-based, attribute-based, & just-in-time access to infrastructure
- Connect any person or service to any infrastructure, anywhere
- Logging like you've never seen
![Day Two Cloud 134: Simplifying Infrastructure Access With StrongDM](https://discover.strongdm.com/hs-fs/hubfs/Imported_Blog_Media/6216ef44c8776d2eab8e9d1a_Packet-Pushers-Podcast-2.jpg?width=780&height=438&name=6216ef44c8776d2eab8e9d1a_Packet-Pushers-Podcast-2.jpg)
Today’s Day Two Cloud is a sponsored episode with StrongDM. StrongDM focuses on infrastructure access; that is, helping engineers and IT professionals get access to databases, servers, Kubernetes clusters, switches, Web apps, and more from a desktop or laptop.
StrongDM takes a proxy approach to the challenge of access and authentication. It uses a local client that can run on a Mac, Windows, or Linux device; a gateway to mediate access; and an administration layer for setting policies and permissions and auditing access.
Our guest is Justin McCarthy, StrongDM’s co-founder and CTO.
We discuss:
- The problems StrongDM aims to solve
- How it differs from other access and authentication systems
- Integrations with directories and identity stores
- The ability to audit and play back events
- Pros and cons of the proxy model
- Use cases
- More
About the Author
Justin McCarthy, Co-founder / CTO, originally developed empathy for Operations as a founding and pager-carrying member of many operations and data teams. As an Executive, he has led Engineering and Product in high-throughput and high-stakes e-Commerce, financial, and AI products. Justin is the original author of StrongDM's core protocol-aware proxy technology. To contact Justin, visit him on Twitter.
You May Also Like
![Senior Engineering Dir at Zymergen on Code Reviews](https://discover.strongdm.com/hs-fs/hubfs/Imported_Blog_Media/5f1d518016da7d305d51f6aa_00014-sdm-bg-2000x1000-3.jpg?width=300&height=168&name=5f1d518016da7d305d51f6aa_00014-sdm-bg-2000x1000-3.jpg)
![Daniel Leslie at Namely on the Human Side of Security](https://discover.strongdm.com/hs-fs/hubfs/Imported_Blog_Media/5f1d54200ba49a33eec699d7_00037-sdm-bg-2000x1000-2.jpg?width=300&height=168&name=5f1d54200ba49a33eec699d7_00037-sdm-bg-2000x1000-2.jpg)
![Alan Daines CISO at FactSet on Phishing](https://discover.strongdm.com/hs-fs/hubfs/Imported_Blog_Media/5f1d53edc892d85a0435aeab_00033-sdm-bg-2000x1000-3.jpg?width=300&height=168&name=5f1d53edc892d85a0435aeab_00033-sdm-bg-2000x1000-3.jpg)
![InVision Talks Secure Code](https://discover.strongdm.com/hs-fs/hubfs/Imported_Blog_Media/5f1d588c103473b642c26fc5_00119-sdm-bg-2000x1000-3.jpg?width=300&height=168&name=5f1d588c103473b642c26fc5_00119-sdm-bg-2000x1000-3.jpg)