<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
strongDM logo

blog

25 Surprising Employee Onboarding Statistics in 2023

25 Surprising Employee Onboarding Statistics in 2023

Today there are numerous technologies and solutions to help organizations create an active onboarding experience for employees. But what do the
What’s New at StrongDM | January 2023

What’s New at StrongDM | January 2023

Get more value from StrongDM. Learn about the new StrongDM desktop client, secret store integrations, and more.
People First Means Implementing Pay Transparency
People First Means Implementing Pay Transparency
There’s a reason car salespeople ask, “What do you want your monthly payment to be?” when prospective customers walk onto the lot–there is power in asking the question first. In a recruitment setting, the power dynamics are wildly in favor of the company side of the equation unless the company practices pay transparency.
Cost of a Data Breach: 19 Facts and Stats to Know in 2023
Cost of a Data Breach: 19 Facts and Stats to Know in 2023
Businesses need to be aware of the cost of a data breach as well as the latest trends in cybersecurity to develop appropriate prevention and response strategies. This article will review the latest statistics on data breach costs and several best practices for eliminating unauthorized data access.
11 Efficient Log Management Best Practices to Know in 2023
11 Efficient Log Management Best Practices to Know in 2023
In this article, we will spotlight 11 log management best practices you should know to build efficient logging and monitoring programs. You’ll learn how to establish policies and take a proactive approach to collecting, analyzing, and storing business-critical log data. By the end of this article, you’ll have a clearer understanding of how logs can help security teams detect suspicious activity, address system performance issues, identify trends and opportunities, improve regulatory compliance,
Have You Nailed Zero Trust?
Have You Nailed Zero Trust?
Reality doesn’t always match expectations. The Netflix baking show “Nailed It!” makes that clear: contestants will attempt to replicate a beautifully decorated unicorn cake, only to create a baking fail. And Zero Trust looks easy enough, but the reality for many companies is that it falls flat. It ...
PAM Pricing Simplified: Your Cost and ROI Explained
PAM Pricing Simplified: Your Cost and ROI Explained
The cost of a privileged access management (PAM) solution goes beyond the licensing fees. While it’s tempting to look only at the initial costs, evaluating privileged access management pricing includes examining other factors to determine whether the solution will provide a real Return on Investment (ROI) or cause more problems than it solves.
StrongDM Moves to the Leader Quadrant for IAM and PAM
StrongDM Moves to the Leader Quadrant for IAM and PAM
If you were in a scouting group as a kid, nothing was more exciting than getting a new badge to sew on your uniform as a reward for your hard work. At StrongDM, we’re constantly working to improve our identity and access management and privileged access management solution, and the results are in from the peer reviews at G2.
LDAP vs. Active Directory: Everything You Need to Know
LDAP vs. Active Directory: Everything You Need to Know
Struggling to understand the difference between Active Directory and LDAP? Don't worry, we’ll make it simple. These are just two among many methods that can provide secure user authentication and authorization. The information in this article will help you decide if LDAP or Active Directory is right for your organization. Robust security and a seamless user experience are attainable, and you can have both!
Privilege Elevation and Delegation Management (PEDM) Explained
Privilege Elevation and Delegation Management (PEDM) Explained
In this article, we’ll explore Privileged Elevation and Delegation Management (PEDM). You’ll learn how PEDM works and how it mitigates the risks associated with poorly managed privileged accounts. By the end of this article, you’ll understand why PEDM is an important security strategy and how businesses can use PEDM to manage privileged access and prevent cyberattacks.
What is an Attack Vector? 15 Common Attack Vectors to Know
What is an Attack Vector? 15 Common Attack Vectors to Know
In this article, we’ll take a deep dive into attack vectors. You’ll learn what they are, the most common types, how they’re used, and why hackers continually use them to exploit vulnerabilities. By the end of this article, you'll have a thorough understanding of the fifteen most common types of attack vectors and what you can do to prevent your organization from falling victim to them.
What Is SCIM Provisioning? How It Works, Benefits, and More
What Is SCIM Provisioning? How It Works, Benefits, and More
In this article, we will define SCIM and cover the basics of SCIM security. You’ll learn what SCIM stands for, how SCIM provisioning works, and why SCIM SSO is essential. By the end of this article, you will have a clear understanding of what SCIM means and how auto-provisioning via SCIM streamlines cloud identity management, increases employee productivity, and reduces IT costs.
What Are Zero Standing Privileges (ZSP)? (And How They Work)
What Are Zero Standing Privileges (ZSP)? (And How They Work)
Securing sensitive company data starts with limiting who can access that data, and adopting a zero standing privileges security approach is a great way to control access. In this article, we’ll discuss what zero standing privileges (ZSP) are, how standing privileges are created, and how just-in-time access makes a ZSP model feasible. We’ll explore the risks that accompany standing privileges, the benefits of a zero standing privilege philosophy, and best practices to follow when adopting a ZSP
StrongDM app UI showing available infrastructure resources
Connect your first server or database in 5 minutes. No kidding.