<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon

How Olive AI Standardized Infrastructure Access in Order to Scale

See StrongDM in action →
Olive AI Infrastructure Access Must Haves

Contents

Secure Access Made Simple

Built for Security. Loved by Devs.

  • Free Trial — No Credit Card Needed
  • Full Access to All Features
  • Trusted by the Fortune 100, early startups, and everyone in between

During a featured session at this year’s DevOps Experience, Olive AI CloudOps Engineer Kellen Anker spoke with Justin McCarthy, StrongDM CTO & Co-founder, about his company’s journey towards achieving one-click onboarding access and the resulting radical improvements in workforce efficiencies.

A Textbook Case of Pain in the Access

Olive AI, a healthcare artificial intelligence company, has been on a steep trajectory of growth as it continues to expand inside and out, from its partner ecosystem to its customer base to its headcount. But not too long ago, the company’s exponential growth created exponential complexities that, in turn, led to exponential inefficiencies. Paradoxically, this predicament impeded the company’s ability to scale. 

The heart of the problem: infrastructure access. As the number of employees grew, it became harder and harder to keep up with who needed access to which systems and to what extent and for how long. The number of VPN accounts multiplied, as did the number of one-off DB access requests, all of it exposing a profound bottleneck in productivity. 

 

The Imperative to Standardize Access

Clearly, Olive AI needed a solution to rein in the chaos and implement order. The technical team couldn’t afford to spend so much time managing and curating YAML files. What’s more, as a HIPAA-compliant company, Olive AI was facing compliance and security gaps due to the state of its access landscape.

Kellen Anker knew that he needed a way to standardize infrastructure access in order for the company to scale smoothly. He sagely established the key components he needed in an access management solution:

  • Security
  • HIPAA-compliance
  • Auditability
  • Full-stack compatibility 
  • Scalability
  • Frustration-free UX
  • And no VPNs period

These requirements led him to StrongDM.

One-Click Onboarding Access Unleashes Productivity

Olive AI’s implementation of StrongDM led to a profound improvement in productivity and security. StrongDM gives Olive’s technical staff frustration-free and auditable access to everything they need across their entire stack, in a single place. 

The hundreds of database accounts that once monopolized the technical team’s daily tasks were eliminated due to the simplicity that StrongDM provides. With StrongDM, the team can now provision, delete, and modify onboarding access with just one click. 

StrongDM also brought huge improvements to the end-user experience, enabling new and existing employees to access the necessary tools and systems with the right permissions all from day one. 

Importantly, StrongDM helps Olive uphold the compliance and security standards that are crucial to any business operating in the healthcare space.

 

Hungry for more details on Olive AI’s outstanding transformation? Watch the recorded session here.

StrongDM combines authentication, authorization, networking & observability into a single platform to enable fast, auditable access to everything technical staff need across your entire stack. See for yourself.

Meghan Stephan

About the Author

, Marketing Operations Analyst, is a marketing specialist with eight-plus years of experience in a variety of industries from sports and entertainment to technology. In addition to choreographing the operations and organization of the marketing team, Meghan teaches dance classes outside the weekly 9 to 5. She holds a bachelor's degree in Communication Studies from Medaille College. To contact Meghan, visit her on LinkedIn.

💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

What Is Access Certification? Process, Benefits & Best Practices
What Is Access Certification? Process, Benefits & Best Practices
Access certification is more than a checkbox; it’s how you prove and enforce least privilege at scale. It ensures every user, system, and role has only the access they need, nothing more. In this guide, you’ll learn how to run access certifications that satisfy auditors, reduce insider threats, and clean up outdated privileges. You’ll explore common types (manual vs. automated, user-based vs. resource-based), challenges, and how modern teams streamline the process with real-time visibility and automation.
What Is Authorization? Types, Examples, and How It Works
What Is Authorization? Types, Examples, and How It Works
Authorization isn’t just about who gets in, it’s about what they can do once they’re inside. And that’s where most breaches happen. Whether you're enforcing RBAC, ABAC, or context-based policies, effective authorization ensures users only access what they need, no more, no less. This post unpacks how authorization works, compares key models, and explores best practices for enforcing least privilege at scale.
From Legacy PAM to Identity Firewall: The Shift is Here
From Legacy PAM to Identity Firewall: The Shift is Here
More than just an incremental improvement, the Identity Firewall is an architectural transformation that enables both security and velocity in modern environments. Organizations ready to lead this transformation will build competitive advantages that extend far beyond security compliance.
Hackers Don’t Hack In. They Log In.
Hackers Don’t Hack In. They Log In.
Most breaches don’t begin with hacking—they start with logging in. Discover how compromised credentials fuel modern cyberattacks and why Zero Trust Privileged Access is essential for securing today’s identity-driven environments.
A New Era of Vault-Agnostic Secrets Management Is Here
A New Era of Vault-Agnostic Secrets Management Is Here
Discover why traditional secrets management isn't enough. StrongDM Managed Secrets offers vault-agnostic, Zero Trust security with secretless access, dynamic policy enforcement, automated rotation, and unified audits—perfect for complex enterprise environments.