The way companies look at infrastructure access is changing. With so many data sources and types of information, ever-changing regulatory requirements, and the need to scale up or down quickly, even the terms we use to describe infrastructure have changed.To help you keep up with it all, this glossary contains definitions for infrastructure access terms you’ll hear as you work to manage access for your organization.
Posts by Category:
- Security
- Access
- Auditing
- Policy
- Privileged Access Management
- SOC 2
- Zero Trust
- DevOps
- Compliance
- Authentication
- Identity and Access Management
- Compare
- Team
- Databases
- Integrations
- Product
- AWS
- Podcasts
- Productivity
- Kubernetes
- SSH
- ISO 27001
- Dynamic Access Management
- HIPAA
- Observability
- Role-Based Access Control
- Secure Access Service Edge
- Webinars
- Engineering
- Events
- NIST
- Onboarding
- Passwordless
- Offsites
- Platform
- PCI
strongDM asked 600 DevOps pros about the state of infrastructure access today. Their response? It’s out of control. Here’s an overview of our results.
Database sprawl is a lot like expanding into the suburbs: your house may be empty at first, but before you know it, you’re having to stuff things into your attic.
During a featured session at this year’s DevOps Experience, Olive AI CloudOps Engineer Kellen Anker spoke with Justin McCarthy, strongDM CTO & Co-founder, about his company’s journey towards achieving one-click onboarding access and the resulting radical improvements in workforce efficiencies.
This article presents an overview of RBAC vs. ABAC, plus several additional models of access control, including PBAC, ACL, and DAC. You will learn what these methods are, how they differ from each other, and the pros and cons of each.
In this article, we will take a comprehensive look at software-defined networking (SDN). You’ll learn what it is, how it works, and what its benefits and disadvantages are. You’ll also learn how SDN compares to and works with other types of networks and get answers to common questions.
In this article, we’ll review the basics of microsegmentation and discuss it in context with other network security models and practices, including Zero Trust, software-defined networking, and network segmentation. You’ll learn about the benefits of microsegmentation, how it works, challenges for implementation, and best practices.
Data loss prevention (DLP) can save organizations millions of dollars on data breaches every year. In this article, we will take a big-picture look at data loss prevention and discover how DLP tools and processes strengthen an enterprise’s security posture.
In this article, we’ll take a high-level look at what a CASB is, what it does, and how it works. You’ll learn the key pillars of CASBs and how they address the growing threat of Shadow IT in cloud-based organizations. By the end of this article, you’ll understand the differences between CASB, SASE, and IAM, as well as the main challenges to implementing a CASB solution.
Proofpoint is a SaaS based cybersecurity and compliance company which purchased Meta Networks in 2019. Proofpoint ZTNA (Meta Networks) is a Zero Trust Network Access provider that specializes in granting secure remote access from a user-level. They focus heavily on providing users with the ability to securely access company resources from any location, while ditching the need for a VPN. However, if you're looking for a simple and secure way, without expensive starting costs and required
BeyondTrust FKA Bomgar is an access management and endpoint security solution which provides end user access and monitoring for a variety of platforms and devices including: Linux, Windows, Mac, Unix, and other mobile and cloud platforms. BeyondTrust has a host of solutions in privileged identity & access management, privileged remote access and vulnerability management. However, if you're looking for a simple and secure way to manage access to databases, Kubernetes clusters, or other internal
Access management matters. These days, large-scale data breaches make news headlines more often than celebrity breakups, and 61% of those breaches involve credential data. That’s clearly a problem, and the search for a solution is likely to leave you in a sea of acronyms. PIM, PAM, IAM… what’s the difference? And what matters for your organization?