<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
strongDM logo

blog

Answering Auditors’ Questions in a SOC 2 Review

Answering Auditors’ Questions in a SOC 2 Review

We recently completed our own SOC 2 audit, so we thought we’d review how we dogfooded our own product. We’ll share tips and tricks to make the audit
Cloud-Native Data Protection Panel Recap

Cloud-Native Data Protection Panel Recap

Cloud environments present new challenges for data protection as technological innovation, flexibility, and abstraction change the way we copy, ...
Is the Infrastructure Access Security Gap Putting You at Risk?
Is the Infrastructure Access Security Gap Putting You at Risk?
The common element in all these data breaches is access control. As one security expert noted from the MyFitnessPal breach, “trust but verify” isn’t enough when data is stored in the cloud and accessed from locations outside a company’s secured internal network. The infrastructure access security gap has only expanded with the rise of remote work and increased numbers of connected systems.
StrongDM kicks it into overdrive
StrongDM kicks it into overdrive
With the release of tighter integrations with Okta and Azure AD (or any SCIM-based directory service for that matter), you now have the ability to manage just-in-time, least-privilege access to your critical infrastructure right from your preferred identity provider (IdP), dramatically reducing the time needed to approve requests and grant access.
Meet strongDM | Abdul Siddiqui
Meet strongDM | Abdul Siddiqui
Abdul Siddiqui, Customer Success Manager at strongDM, tells us about a trip to Pakistan and the door-opening power of judicious quiet.
Infrastructure Access | Glossary of Terms
Infrastructure Access | Glossary of Terms
The way companies look at infrastructure access is changing. With so many data sources and types of information, ever-changing regulatory requirements, and the need to scale up or down quickly, even the terms we use to describe infrastructure have changed.To help you keep up with it all, this glossary contains definitions for infrastructure access terms you’ll hear as you work to manage access for your organization.
Welcome to the Year of Access
Welcome to the Year of Access
strongDM asked 600 DevOps pros about the state of infrastructure access today. Their response? It’s out of control. Here’s an overview of our results.
Managing Access to Ephemeral Infrastructure At Scale
Managing Access to Ephemeral Infrastructure At Scale
Managing a static fleet of strongDM servers is dead simple. You create the server in the strongDM console, place the public key file on the box, and it’s done! This scales really well for small deployments, but as your fleet grows, the burden of manual tasks grows with it.
How Olive AI Standardized Infrastructure Access in Order to Scale
How Olive AI Standardized Infrastructure Access in Order to Scale
During a featured session at this year’s DevOps Experience, Olive AI CloudOps Engineer Kellen Anker spoke with Justin McCarthy, strongDM CTO & Co-founder, about his company’s journey towards achieving one-click onboarding access and the resulting radical improvements in workforce efficiencies.
Difference between RBAC vs. ABAC vs. ACL vs. PBAC vs. DAC
Difference between RBAC vs. ABAC vs. ACL vs. PBAC vs. DAC
This article presents an overview of RBAC vs. ABAC, plus several additional models of access control, including PBAC, ACL, and DAC. You will learn what these methods are, how they differ from each other, and the pros and cons of each.
Understanding Software-Defined Networking (SDN)
Understanding Software-Defined Networking (SDN)
In this article, we will take a comprehensive look at software-defined networking (SDN). You’ll learn what it is, how it works, and what its benefits and disadvantages are. You’ll also learn how SDN compares to and works with other types of networks and get answers to common questions.
A Beginner’s Guide to Microsegmentation
A Beginner’s Guide to Microsegmentation
In this article, we’ll review the basics of microsegmentation and discuss it in context with other network security models and practices, including Zero Trust, software-defined networking, and network segmentation. You’ll learn about the benefits of microsegmentation, how it works, challenges for implementation, and best practices.
What is an Attack Surface? (And the Best Way to Reduce It)
What is an Attack Surface? (And the Best Way to Reduce It)
Data breaches are a perpetual risk for modern organizations — and the wider your attack surface, the higher your organization’s risk of a breach. In this article, we will take a high-level look at what your attack surface is, what vectors and endpoints may be at risk, and how to analyze your attack surface.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀