<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
strongDM logo

blog

What Is Data Loss Prevention? Best Practices

What Is Data Loss Prevention? Best Practices

Data loss prevention (DLP) can save organizations millions of dollars on data breaches every year. In this article, we will take a big-picture look
What is SD-WAN? Everything You Need to Know

What is SD-WAN? Everything You Need to Know

In this article, we’ll review what SD-WAN is, its history and development, as well as the key benefits and limitations of SD-WAN deployment. You’ll
Understanding Cloud Access Security Brokers (CASBs)
Understanding Cloud Access Security Brokers (CASBs)
In this article, we’ll take a high-level look at what a CASB is, what it does, and how it works. You’ll learn the key pillars of CASBs and how they address the growing threat of Shadow IT in cloud-based organizations. By the end of this article, you’ll understand the differences between CASB, SASE, and IAM, as well as the main challenges to implementing a CASB solution.
Tech Marketer By Day, Song Bird By Night
Tech Marketer By Day, Song Bird By Night
Marketing Coordinator Meghan Stephan is a classically-trained singer whose performance venues have ranged from intimate church weddings to professional football games. In today’s interview, she shares her early forays into music, her experience auditioning for The Voice, and an unexpected link between singing and her marketing career.
Meet strongDM | Sienna Gordon
Meet strongDM | Sienna Gordon
Sienna Gordon spent a year solo traveling the world. With a tight budget and a big sense of adventure, she slept in monasteries, zipped through tea fields, and even helped MedEvac someone to safety! Her big takeaway from the experience? There are a lot of nice people in the world. I think it’s fair to say that Sienna is one of them.
Crossing the Chasm from the Couch to strongDM
Crossing the Chasm from the Couch to strongDM
I thought I had solved the biggest problems in the cloud, so I shifted into the background to watch the next evolutions of technology pass me by. I had the comfortable couch, the latest game console, and plenty of time to regret the true state of my adult gaming reflexes. I thought I was done. I was wrong.
Meet strongDM | Phil Hassey, Technical Lead
Meet strongDM | Phil Hassey, Technical Lead
Phil is the technical lead at strongDM. Prior to this, he was an indie game developer working on the multi-player game Galcon. This gave him a lot of experience in low-level network protocols and cross-network synchronization, as well as security. But as we’ll see, Phil’s interests extend well beyond the tech world.
Alternatives to Pomerium
Alternatives to Pomerium
Pomerium is an "identity-aware proxy" which aims to disrupt the VPN industry. Pomerium works on just about any device, providing remote access management solutions for individuals to enterprise level companies. Pomerium works as a SASE solution which allows users to manage authentication and authorization of any internal or third party application. Essentially, Pomerium adds SSO capabilities to just about any application. However, if you're looking for a more robust way to manage access to
Alternatives to Perimeter 81
Alternatives to Perimeter 81
Perimeter 81 is a cloud-based Secure Access Service Edge (SASE) platform that provides centralized access to local networks, applications, and cloud resources. The company takes a security-first approach and aims to disrupt the VPN industry by offering a simple and scalable network access alternative for organizations of all sizes. However, if you're looking for a more reliable and enterprise-ready solution to manage access to infrastructure, Perimeter 81 might not be the best solution for your
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀