<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
strongDM logo

blog

What’s New at StrongDM | July 2023

What’s New at StrongDM | July 2023

Spring has sprung and the audits will come. How efficient are you at audit preparation? At StrongDM we reduce the administrative load and help
Break Glass Explained: Why You Need It for Privileged Accounts

Break Glass Explained: Why You Need It for Privileged Accounts

Identity and access management (IAM) and privileged access management (PAM) are critical security tools for modern organizations. However, they can
What’s New at StrongDM | June 2023
What’s New at StrongDM | June 2023
Spring has sprung and the audits will come. How efficient are you at audit preparation? At StrongDM we reduce the administrative load and help customers get answers to the questions they need to reach regulatory compliance for internal and external audits.
How to Simplify Auditing Access in AWS
How to Simplify Auditing Access in AWS
Want a secure and compliant AWS environment? Then you need to audit access. Keeping tabs on who has accessed what—as well as the whens, wheres, and whys—helps you spot suspicious activities and address them promptly. Without this kind of access control, your sensitive data could be exposed to malicious actors, putting you at risk of data breaches and subsequent regulatory nightmares or service interruptions.
12 AWS IAM Best Practices for Enhanced Security
12 AWS IAM Best Practices for Enhanced Security
When it comes to cloud security, AWS follows the Shared Responsibility Model. They secure the underlying infrastructure while you protect your data, applications, and systems—including the identities that access them. Integrating AWS with a dynamic access management tool like StrongDM is key to securing identities in the cloud. StrongDM centralizes access control, while AWS offers robust security measures, contributing to a solid defense against unauthorized access.
StrongDM: Breaking Glass Scenarios
StrongDM: Breaking Glass Scenarios
Let’s face it. If you work with any type of technology, you know that all software, hardware, and networking gear can fail in weird and unexpected ways. That’s why it’s critical that your technology stack has no single point of failure in your environment. At StrongDM, that means having options in a “break glass” scenario. We firmly believe that this is a requirement for the responsible operation of modern technology. So here’s how we tackle it.
Ensure Secure Access and Mitigate Threats to FFIEC Controls
Ensure Secure Access and Mitigate Threats to FFIEC Controls
The Federal Financial Institutions Examination Council (FFIEC) places significant emphasis on user security controls and the mitigation of potential risks posed by privileged users. To comply with FFIEC guidelines and safeguard critical systems, strong access management measures are crucial.
Simplify Kubernetes Management on AWS
Simplify Kubernetes Management on AWS
Secure access controls must be applied universally and consistently across all your infrastructure—from the Linux boxes in your datacenter to your Kubernetes clusters in AWS. StrongDM Dynamic Access Management is uniquely positioned to provide seamless, secure access across your entire stack, simplifying access management and compliance for your legacy systems and modern cloud stack.
SSH Tunnel and SSH Tunneling (Port Forwarding) Explained
SSH Tunnel and SSH Tunneling (Port Forwarding) Explained
SSH tunneling, also known as SSH port forwarding, provides a secure method for client applications to communicate with remote servers. By encrypting traffic, SSH tunnels ensure data protection during transmission. This article explores the significance of SSH tunneling, its advantages, how it works, and its various use cases.
AWS Authentication Best Practices (That Go Beyond MFA)
AWS Authentication Best Practices (That Go Beyond MFA)
AWS authentication confirms the identity of users trying to access your resources, safeguarding against potential intrusions and data breaches. But weak authentication practices—like easy-to-guess passwords and single-factor authentication (SFA)—are far too common and they leave the door wide open for threat actors. Weak authentication often leads to data theft, resource misuse, financial and reputational nightmares…the list goes on. On the contrary, strong authentication measures like
Infertility, Miscarriage, and the Workplace: Why Sick Time Isn’t Enough and How Companies Can Fix It
Infertility, Miscarriage, and the Workplace: Why Sick Time Isn’t Enough and How Companies Can Fix It
World Infertility Awareness Month happens every June to increase awareness regarding numerous infertility issues faced by couples across the globe. An estimated 1 in 6 people globally are affected by infertility, according to a new report from the World Health Organization. Yet, despite the prevalence of these issues, many workplaces still do not have adequate policies in place to support their employees during these difficult times.
What’s New at StrongDM | May 2023
What’s New at StrongDM | May 2023
Spring has sprung and the audits will come. How efficient are you at audit preparation? At StrongDM we reduce the administrative load and help customers get answers to the questions they need to reach regulatory compliance for internal and external audits.
The Annual Access Audit Survival Guide
The Annual Access Audit Survival Guide
So, you’ve decided to conduct an annual access audit. Now comes the obvious question: where do I start? Just like you wouldn’t embark on a mountain climbing excursion without a clear understanding of the terrain and gear you need, the starting point for an annual access audit requires an understanding of the process, people, and tools you’ll need to get started. Let’s go!
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. đź‘€