This blog post dives into the world of SSH keys and highlights the different types available. By comparing these different SSH key types, we aim to provide insights that allow users to make informed decisions based on their specific security needs.
Latest blog posts from StrongDM
With an emphasis on the significance of certificate-based authentication, this article seeks to clarify SSH authentication. It gives you a thorough understanding to support the safety of your digital interactions by outlining the benefits of using this approach over traditional ones and covering the implementation steps.
The DROP DATABASE command in PostgreSQL is a powerful command that is used to delete a database along with all its associated objects, such as tables, views, indexes, and other database-specific elements. It is often a good practice to clean up your workspace by removing unused databases. However, keep in mind that deleting an existing PostgreSQL database deletes all objects and data within that database. This command should be used with caution as it irreversibly removes the specified database
If you were in a scouting group as a kid, nothing was more exciting than getting a new badge to sew on your uniform as a reward for your hard work. At StrongDM, we’re constantly working to improve our identity and access management and privileged access management solution, and the results are in from the peer reviews at G2.
Learn how Remote Identities helps you leverage SSH and k8s capabilities to capitalize on infrastructure workflow investments you’ve already made.
Cloudflare Access is a Zero Trust Network Access (ZTNA) SaaS application that works with identity providers and endpoint protection platforms to enforce access policies for corporate applications, private IP spaces, and hostnames. It aims to prevent lateral movement and reduce VPN reliance. However, if you're looking to enable fast, secure access to your stack - with complete audit trails - Cloudflare Access might not be the best solution for your requirements.
Attend this MegaCast for a ton of new ideas on how to use the cloud to advance your long-range IT goals. What are the ways that software-as-a-service could replace some on-premises infrastructure? How could a switch to modern applications supercharge an area of your business? Where could an expansion of infrastructure-as-a-service usage reduce your overall costs or dramatically improve your capacity and capability?
With the release of tighter integrations with Okta and Azure AD (or any SCIM-based directory service for that matter), you now have the ability to manage just-in-time, least-privilege access to your critical infrastructure right from your preferred identity provider (IdP), dramatically reducing the time needed to approve requests and grant access.
The way companies look at infrastructure access is changing. With so many data sources and types of information, ever-changing regulatory requirements, and the need to scale up or down quickly, even the terms we use to describe infrastructure have changed.To help you keep up with it all, this glossary contains definitions for infrastructure access terms you’ll hear as you work to manage access for your organization.
strongDM, the infrastructure access platform, today announced it closed a $54 million Series B funding round led by Tiger Global, with participation from new investor GV, and existing investors Sequoia Capital, True Ventures, HearstLab, Bloomberg Beta, and Godfrey Sullivan.
A big part of strongDM life is fun and food. At the recent San Francisco offsite, the team got together to craft some delicious thai food, and throw the frisbee