<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon

How Olive AI Standardized Infrastructure Access in Order to Scale

During a featured session at this year’s DevOps Experience, Olive AI CloudOps Engineer Kellen Anker spoke with Justin McCarthy, StrongDM CTO & Co-founder, about his company’s journey towards achieving one-click onboarding access and the resulting radical improvements in workforce efficiencies.

A Textbook Case of Pain in the Access

Olive AI, a healthcare artificial intelligence company, has been on a steep trajectory of growth as it continues to expand inside and out, from its partner ecosystem to its customer base to its headcount. But not too long ago, the company’s exponential growth created exponential complexities that, in turn, led to exponential inefficiencies. Paradoxically, this predicament impeded the company’s ability to scale. 

The heart of the problem: infrastructure access. As the number of employees grew, it became harder and harder to keep up with who needed access to which systems and to what extent and for how long. The number of VPN accounts multiplied, as did the number of one-off DB access requests, all of it exposing a profound bottleneck in productivity. 

 

The Imperative to Standardize Access

Clearly, Olive AI needed a solution to rein in the chaos and implement order. The technical team couldn’t afford to spend so much time managing and curating YAML files. What’s more, as a HIPAA-compliant company, Olive AI was facing compliance and security gaps due to the state of its access landscape.

Kellen Anker knew that he needed a way to standardize infrastructure access in order for the company to scale smoothly. He sagely established the key components he needed in an access management solution:

  • Security
  • HIPAA-compliance
  • Auditability
  • Full-stack compatibility 
  • Scalability
  • Frustration-free UX
  • And no VPNs period

These requirements led him to StrongDM.

One-Click Onboarding Access Unleashes Productivity

Olive AI’s implementation of StrongDM led to a profound improvement in productivity and security. StrongDM gives Olive’s technical staff frustration-free and auditable access to everything they need across their entire stack, in a single place. 

The hundreds of database accounts that once monopolized the technical team’s daily tasks were eliminated due to the simplicity that StrongDM provides. With StrongDM, the team can now provision, delete, and modify onboarding access with just one click. 

StrongDM also brought huge improvements to the end-user experience, enabling new and existing employees to access the necessary tools and systems with the right permissions all from day one. 

Importantly, StrongDM helps Olive uphold the compliance and security standards that are crucial to any business operating in the healthcare space.

 

Hungry for more details on Olive AI’s outstanding transformation? Watch the recorded session here.

StrongDM combines authentication, authorization, networking & observability into a single platform to enable fast, auditable access to everything technical staff need across your entire stack. See for yourself.


About the Author

, Marketing Operations Analyst, is a marketing specialist with eight-plus years of experience in a variety of industries from sports and entertainment to technology. In addition to choreographing the operations and organization of the marketing team, Meghan teaches dance classes outside the weekly 9 to 5. She holds a bachelor's degree in Communication Studies from Medaille College. To contact Meghan, visit her on LinkedIn.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

Securing Network Devices with StrongDM's Zero Trust PAM Platform
Securing Network Devices with StrongDM's Zero Trust PAM Platform
Let’s talk about the unsung heroes of your on-premises infrastructure: network devices. These are the routers, switches, and firewalls that everyone forgets about…and takes for granted—until something breaks. And when one of those somethings breaks, it leads to some pretty bad stuff. If your network goes down, that’s bad, bad, bad for business. But if those devices lack the necessary security, well, that can leave you exposed in an incredibly dangerous way.
What Is Zero Trust for the Cloud? (And Why It's Important)
What Is Zero Trust for the Cloud? (And Why It's Important)
Zero Trust cloud security is a cybersecurity model that operates on the principle that no user, device, system, or action should be trusted by default — even if it's inside your organization’s own network. This approach minimizes the risk of breaches and other cyber threats by limiting access to sensitive information and resources based on user roles, device security posture, and contextual factors.
How to Prevent Password Sharing in Healthcare
How to Prevent Password Sharing in Healthcare (8 Ways)
Protecting sensitive patient data in healthcare isn't just a priority—it's a legal and ethical obligation. However, one of the most overlooked security gaps that healthcare organizations face is the practice of password sharing among employees. This seemingly harmless habit can quickly lead to unauthorized access and serious data breaches, putting both the organization and patients at risk. While often seen as a convenient shortcut, password sharing undermines the security of protected health information (PHI), potentially leading to HIPAA violations and data breaches. In this post, we'll explore eight effective ways to prevent password sharing in healthcare.
What Is Privileged Identity Management (PIM)? 7 Best Practices
What Is Privileged Identity Management (PIM)? 7 Best Practices
Privileged Identity Management (PIM) is a complex cybersecurity approach. But it’s the only proven method you can use to lock down access and protect your precious resources. It can help you keep cybercriminals out and ensure that even your trusted users can’t accidentally—or intentionally—jeopardize your system’s security.
What Is Zero Trust Data Protection?
What Is Zero Trust Data Protection?
Zero Trust Data Protection isn't just the best way to safeguard your data — given today's advanced threat landscape, it's the only way. Assuming inherent trust just because an access request is inside your network is just asking for a breach. By implementing the latest tactics in authentication, network segmentation, encryption, access controls, and continuous monitoring, ZT data security takes the opposite approach.