<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon

What’s New at StrongDM | February 2023

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

Increase admin productivity with shiny new metrics.

Welcome to our February product updates. Time has a way of moving quickly at StrongDM, especially when we are busy building products for the future. If only I could say the same for the minutes spent on a treadmill. For now, have a seat, grab a beverage, and check out what’s new at StrongDM.

Understand user behavior better with our added insights

You now have the power to visualize commonly asked questions around utilization to better manage and predict cost. This feature is just the beginning. We’re adding more robust reporting on our users throughout this quarter. Be on the lookout 👁).

Another Secret Store Integration is here!

We’ve made a new addition to our suite of native secret store integrations. Use StrongDM to manage privileged access to all your resources on-prem, in the cloud, or both!

You can use StrongDM to store your secrets or continue to get the investments from the vendors you already use.

StrongDM has added support for:




Want to learn more? Check out our full list of release notes.


About the Author

, Product Manager Expert, has worked in the technology industry for over 15 years, in roles ranging from software integration, customer support, project management and product management. His work experience spans start-up size companies all the way through large enterprises such as GE (GE Transportation) and Allstate (Allstate Identity Protection). Curiosity and a deep love of learning are the key ingredients in Erick's outlook on work and life in general.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

A New Era of Vault-Agnostic Secrets Management Is Here
A New Era of Vault-Agnostic Secrets Management Is Here
Discover why traditional secrets management isn't enough. StrongDM Managed Secrets offers vault-agnostic, Zero Trust security with secretless access, dynamic policy enforcement, automated rotation, and unified audits—perfect for complex enterprise environments.
Security vs. Compliance: How to Align The Differences
Security vs. Compliance: How to Align The Differences
Security breaches make headlines, while compliance audits keep teams on edge. The pressure to protect data and meet regulatory requirements is mounting—and often, the lines between security and compliance get blurred. Are they the same thing? Are they working in tandem—or pulling in different directions? This post breaks it down: what security and compliance are, how they intersect, where they differ, and most importantly, how your organization can align the two effectively.
User Access Reviews: Best Practices & Process Checklist
User Access Reviews: Best Practices & Process Checklist for 2025
As teams grow and roles shift, it’s easy for permissions to get out of sync. That’s where user access reviews come in—they ensure every employee, vendor, or service account has exactly the access they need, and nothing more.Regular reviews reduce risk, prevent privilege creep, and help meet compliance requirements like SOX, ISO 27001, and HIPAA. But manual reviews? They’re slow, messy, and often incomplete.This guide breaks down the essentials of access reviews—what they are, why they matter, and how to make them painless with real-time visibility, automated workflows, and just-in-time access controls.
What Is Secrets Management? Tools & Best Practices
What Is Secrets Management? Tools & Best Practices for 2025
Secrets management is the practice of securely storing, accessing, and controlling digital authentication credentials such as passwords, API keys, certificates, and tokens used by applications and systems. It ensures that sensitive information is protected from unauthorized access, while supporting automation, compliance, and security across modern infrastructure.
Financial Security in the Cloud: Why IAM & PAM Aren’t Enough
Financial Security in the Cloud: Why IAM & PAM Aren’t Enough
Legacy security models can’t protect modern financial systems. Continuous Authorization ensures real-time, risk-based access control for true Zero Trust. Learn how to secure your cloud and hybrid environments today.