<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
StrongDM Team

StrongDM Team

Zero Trust Privileged Access Management (PAM), the StrongDM team is building and delivering a Zero Trust Privileged Access Management (PAM), which delivers unparalleled precision in dynamic privileged action control for any type of infrastructure. The frustration-free access stops unsanctioned actions while ensuring continuous compliance.

StrongDM has been featured in Forbes, The New Stack, VentureBeat, DevOps.com, TechCrunch, and Fortune.


Latest blog posts from StrongDM

Comparing SSH Keys: A Comprehensive Guide (RSA, DSA, ECDSA)
Comparing SSH Keys: A Comprehensive Guide (RSA, DSA, ECDSA)
This blog post dives into the world of SSH keys and highlights the different types available. By comparing these different SSH key types, we aim to provide insights that allow users to make informed decisions based on their specific security needs.
How to Configure SSH Certificate-Based Authentication (Tutorial)
How to Configure SSH Certificate-Based Authentication (Tutorial)
With an emphasis on the significance of certificate-based authentication, this article seeks to clarify SSH authentication. It gives you a thorough understanding to support the safety of your digital interactions by outlining the benefits of using this approach over traditional ones and covering the implementation steps.
PostgreSQL Drop/Delete Database: 15 Ways, Examples and More
PostgreSQL Drop/Delete Database: 15 Ways, Examples and More
The DROP DATABASE command in PostgreSQL is a powerful command that is used to delete a database along with all its associated objects, such as tables, views, indexes, and other database-specific elements. It is often a good practice to clean up your workspace by removing unused databases. However, keep in mind that deleting an existing PostgreSQL database deletes all objects and data within that database. This command should be used with caution as it irreversibly removes the specified database
StrongDM Moves to the Leader Quadrant for IAM and PAM
StrongDM Moves to the Leader Quadrant for IAM and PAM
If you were in a scouting group as a kid, nothing was more exciting than getting a new badge to sew on your uniform as a reward for your hard work. At StrongDM, we’re constantly working to improve our identity and access management and privileged access management solution, and the results are in from the peer reviews at G2.
Alternatives to Cloudflare Access
Alternatives to Cloudflare Access
Cloudflare Access is a Zero Trust Network Access (ZTNA) SaaS application that works with identity providers and endpoint protection platforms to enforce access policies for corporate applications, private IP spaces, and hostnames. It aims to prevent lateral movement and reduce VPN reliance. However, if you're looking to enable fast, secure access to your stack - with complete audit trails - Cloudflare Access might not be the best solution for your requirements.
Event: Devising Cloud Strategies and Solutions
Event: Devising Cloud Strategies and Solutions
Attend this MegaCast for a ton of new ideas on how to use the cloud to advance your long-range IT goals. What are the ways that software-as-a-service could replace some on-premises infrastructure? How could a switch to modern applications supercharge an area of your business? Where could an expansion of infrastructure-as-a-service usage reduce your overall costs or dramatically improve your capacity and capability?
StrongDM kicks it into overdrive
StrongDM kicks it into overdrive
With the release of tighter integrations with Okta and Azure AD (or any SCIM-based directory service for that matter), you now have the ability to manage just-in-time, least-privilege access to your critical infrastructure right from your preferred identity provider (IdP), dramatically reducing the time needed to approve requests and grant access.
Infrastructure Access | Glossary of Terms
Infrastructure Access | Glossary of Terms
The way companies look at infrastructure access is changing. With so many data sources and types of information, ever-changing regulatory requirements, and the need to scale up or down quickly, even the terms we use to describe infrastructure have changed.To help you keep up with it all, this glossary contains definitions for infrastructure access terms you’ll hear as you work to manage access for your organization.
Series B, baby! ❤️
Series B, baby! ❤️
strongDM, the infrastructure access platform, today announced it closed a $54 million Series B funding round led by Tiger Global, with participation from new investor GV, and existing investors Sequoia Capital, True Ventures, HearstLab, Bloomberg Beta, and Godfrey Sullivan.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀