<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon
blog /
Automating Database Credentialing Guide for 2024

Automating Database Credentialing Guide for 2024

Database sprawl is a lot like expanding into the suburbs: your house may be empty at first, but before you know it, you’re having to stuff things into your attic.
How Olive AI Standardized Infrastructure Access in Order to Scale

How Olive AI Standardized Infrastructure Access in Order to Scale

During a featured session at this year’s DevOps Experience, Olive AI CloudOps Engineer Kellen Anker spoke with Justin McCarthy, strongDM CTO & Co-founder, about his company’s journey towards achieving one-click onboarding access and the resulting radical improvements in workforce efficiencies.
Difference between RBAC vs. ABAC vs. ACL vs. PBAC vs. DAC

Difference between RBAC vs. ABAC vs. ACL vs. PBAC vs. DAC

This article presents an overview of RBAC vs. ABAC, plus several additional models of access control, including PBAC, ACL, and DAC. You will learn what these methods are, how they differ from each other, and the pros and cons of each.
Understanding Software-Defined Networking (SDN)

Understanding Software-Defined Networking (SDN)

In this article, we will take a comprehensive look at software-defined networking (SDN). You’ll learn what it is, how it works, and what its benefits and disadvantages are. You’ll also learn how SDN compares to and works with other types of networks and get answers to common questions.
A Beginner’s Guide to Microsegmentation

A Beginner’s Guide to Microsegmentation

In this article, we’ll review the basics of microsegmentation and discuss it in context with other network security models and practices, including Zero Trust, software-defined networking, and network segmentation. You’ll learn about the benefits of microsegmentation, how it works, challenges for implementation, and best practices.
Data Loss Prevention Best Practices

Data Loss Prevention Best Practices

Data loss prevention (DLP) can save organizations millions of dollars on data breaches every year. In this article, we will take a big-picture look at data loss prevention and discover how DLP tools and processes strengthen an enterprise’s security posture.
Understanding Cloud Access Security Brokers (CASBs)

Understanding Cloud Access Security Brokers (CASBs)

In this article, we’ll take a high-level look at what a CASB is, what it does, and how it works. You’ll learn the key pillars of CASBs and how they address the growing threat of Shadow IT in cloud-based organizations. By the end of this article, you’ll understand the differences between CASB, SASE, and IAM, as well as the main challenges to implementing a CASB solution.
You Can't Have Zero Trust Without Identity and Access Management

You Can't Have Zero Trust Without Identity and Access Management

In a recent podcast, Gartner described the starting point for Zero Trust: Identity and Access.
Alternatives to Proofpoint

Alternatives to Proofpoint

Proofpoint is a SaaS based cybersecurity and compliance company which purchased Meta Networks in 2019. Proofpoint ZTNA (Meta Networks) is a Zero Trust Network Access provider that specializes in granting secure remote access from a user-level. They focus heavily on providing users with the ability to securely access company resources from any location, while ditching the need for a VPN. However, if you're looking for a simple and secure way, without expensive starting costs and required
Alternatives to BeyondTrust

Alternatives to BeyondTrust

BeyondTrust FKA Bomgar is an access management and endpoint security solution which provides end user access and monitoring for a variety of platforms and devices including: Linux, Windows, Mac, Unix, and other mobile and cloud platforms. BeyondTrust has a host of solutions in privileged identity & access management, privileged remote access and vulnerability management. However, if you're looking for a simple and secure way to manage access to databases, Kubernetes clusters, or other internal
Identity Access Management (IAM) vs. Privileged Access Management (PAM): Why IAM Alone Won’t Cut It

Identity Access Management (IAM) vs. Privileged Access Management (PAM): Why IAM Alone Won’t Cut It

Access management matters. These days, large-scale data breaches make news headlines more often than celebrity breakups, and 61% of those breaches involve credential data. That’s clearly a problem, and the search for a solution is likely to leave you in a sea of acronyms. PIM, PAM, IAM… what’s the difference? And what matters for your organization?
Access Management 101: Understanding Roles & Access

Access Management 101: Understanding Roles & Access

Here’s the scenario: On one side, you’re inundated with requests to provide access to critical infrastructure in order to enable teams to do their jobs; on the other side, you’re tasked with auditing access and ensuring that security to those systems is solid.
Getting Started: Role & Access Discovery

Getting Started: Role & Access Discovery

Discovering “who has access to what” is critical for zero trust and PAM. These six steps will get you started with Access Management.
Role & Access Discovery | Who Has Access to What Now?

Role & Access Discovery | Who Has Access to What Now?

Role & Access Discovery aims to answer “Does this person, in this role, need access to that system?” Learn why this is a critical part of access management.
StrongDM app UI showing available infrastructure resources
Connect your first server or database, without any agents, in 5 minutes.