blog /
Day Two Cloud 134: Simplifying Infrastructure Access With StrongDM

Day Two Cloud 134: Simplifying Infrastructure Access With StrongDM

StrongDM takes a proxy approach to the challenge of access and authentication. It uses a local client that can run on a Mac, Windows, or Linux device; a gateway to mediate access; and an administration layer for setting policies and permissions and auditing access.
When Old-School Isn't Cool: Sluggish and Untenable Access

When Old-School Isn't Cool: Sluggish and Untenable Access

Sluggish access is more than an inconvenience. The workarounds people take to ease friction can lead to security gaps and compliance problems, plus a lot of pain for users and admins alike.
Why Access Management Is Overdue for Innovation

Why Access Management Is Overdue for Innovation

Tech teams report: infrastructure has gotten complicated & access control has not kept up. Learn why access management is overdue for innovation.
Access Management 101: Tracking and Managing Infrastructure

Access Management 101: Tracking and Managing Infrastructure

When it comes to Access Management, taking inventory of your systems is just one of the tasks you need to tackle. Watch the course on Access Roles & Discovery to learn why taking inventory of your employees and their required access is just as important.
Pain in the Access: Database Management Challenges

Pain in the Access: Database Management Challenges

Apart from its business functions, a database’s core functions are integrating, separating, controlling, accessing, and protecting data. As such, organizations adopting databases must prioritize optimizing data access and protection.
Technical Staff Onboarding Checklist 2022

Technical Staff Onboarding Checklist 2022

Your guide to onboarding technical hires in 2022. Boost retention, engagement, and productivity with this new employee onboarding checklist.
Is the Infrastructure Access Security Gap Putting You at Risk?

Is the Infrastructure Access Security Gap Putting You at Risk?

The common element in all these data breaches is access control. As one security expert noted from the MyFitnessPal breach, “trust but verify” isn’t enough when data is stored in the cloud and accessed from locations outside a company’s secured internal network. The infrastructure access security gap has only expanded with the rise of remote work and increased numbers of connected systems.
strongDM kicks it into overdrive

strongDM kicks it into overdrive

With the release of tighter integrations with Okta and Azure AD (or any SCIM-based directory service for that matter), you now have the ability to manage just-in-time, least-privilege access to your critical infrastructure right from your preferred identity provider (IdP), dramatically reducing the time needed to approve requests and grant access.
Infrastructure Access | Glossary of Terms

Infrastructure Access | Glossary of Terms

The way companies look at infrastructure access is changing. With so many data sources and types of information, ever-changing regulatory requirements, and the need to scale up or down quickly, even the terms we use to describe infrastructure have changed.To help you keep up with it all, this glossary contains definitions for infrastructure access terms you’ll hear as you work to manage access for your organization.
Welcome to the Year of Access

Welcome to the Year of Access

strongDM asked 600 DevOps pros about the state of infrastructure access today. Their response? It’s out of control. Here’s an overview of our results.
Automating Database Credentialing

Automating Database Credentialing

Database sprawl is a lot like expanding into the suburbs: your house may be empty at first, but before you know it, you’re having to stuff things into your attic.
How Olive AI Standardized Infrastructure Access in Order to Scale

How Olive AI Standardized Infrastructure Access in Order to Scale

During a featured session at this year’s DevOps Experience, Olive AI CloudOps Engineer Kellen Anker spoke with Justin McCarthy, strongDM CTO & Co-founder, about his company’s journey towards achieving one-click onboarding access and the resulting radical improvements in workforce efficiencies.
RBAC vs. ABAC | Pros, Cons, and Major Distinctions

RBAC vs. ABAC | Pros, Cons, and Major Distinctions

This article presents an overview of RBAC vs. ABAC, plus several additional models of access control, including PBAC, ACL, and DAC. You will learn what these methods are, how they differ from each other, and the pros and cons of each.
Understanding Software-Defined Networking (SDN)

Understanding Software-Defined Networking (SDN)

In this article, we will take a comprehensive look at software-defined networking (SDN). You’ll learn what it is, how it works, and what its benefits and disadvantages are. You’ll also learn how SDN compares to and works with other types of networks and get answers to common questions.
Infrastructure access app UI
Connect your first server or database in 5 minutes. No kidding.