<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

StrongDM Secures Series C Funding to Establish Zero Trust PAM for Enterprise Security 🔒 Learn more!

Search
Close icon
Search bar icon
strongDM logo

blog

7 Network Segmentation Best Practices to Level-up Your Security

7 Network Segmentation Best Practices to Level-up Your Security

Network segmentation is key to a modern security posture. Boost your network security and improve performance with these network segmentation tips.
Crossing the Chasm from the Couch to strongDM

Crossing the Chasm from the Couch to strongDM

I thought I had solved the biggest problems in the cloud, so I shifted into the background to watch the next evolutions of technology pass me by. I
Meet strongDM | Phil Hassey, Technical Lead
Meet strongDM | Phil Hassey, Technical Lead
Phil is the technical lead at strongDM. Prior to this, he was an indie game developer working on the multi-player game Galcon. This gave him a lot of experience in low-level network protocols and cross-network synchronization, as well as security. But as we’ll see, Phil’s interests extend well beyond the tech world.
Alternatives to Pomerium
Alternatives to Pomerium
Pomerium is an "identity-aware proxy" which aims to disrupt the VPN industry. Pomerium works on just about any device, providing remote access management solutions for individuals to enterprise level companies. Pomerium works as a SASE solution which allows users to manage authentication and authorization of any internal or third party application. Essentially, Pomerium adds SSO capabilities to just about any application. However, if you're looking for a more robust way to manage access to
Alternatives to Proofpoint
Alternatives to Proofpoint
Proofpoint is a SaaS based cybersecurity and compliance company which purchased Meta Networks in 2019. Proofpoint ZTNA (Meta Networks) is a Zero Trust Network Access provider that specializes in granting secure remote access from a user-level. They focus heavily on providing users with the ability to securely access company resources from any location, while ditching the need for a VPN. However, if you're looking for a simple and secure way, without expensive starting costs and required
Alternatives to BeyondTrust
Alternatives to BeyondTrust
BeyondTrust FKA Bomgar is an access management and endpoint security solution which provides end user access and monitoring for a variety of platforms and devices including: Linux, Windows, Mac, Unix, and other mobile and cloud platforms. BeyondTrust has a host of solutions in privileged identity & access management, privileged remote access and vulnerability management. However, if you're looking for a simple and secure way to manage access to databases, Kubernetes clusters, or other internal
Alternatives to Perimeter 81
Alternatives to Perimeter 81
Perimeter 81 is a cloud-based Secure Access Service Edge (SASE) platform that provides centralized access to local networks, applications, and cloud resources. The company takes a security-first approach and aims to disrupt the VPN industry by offering a simple and scalable network access alternative for organizations of all sizes. However, if you're looking for a more reliable and enterprise-ready solution to manage access to infrastructure, Perimeter 81 might not be the best solution for your
Access Management 101: Understanding Roles & Access
Access Management 101: Understanding Roles & Access
Here’s the scenario: On one side, you’re inundated with requests to provide access to critical infrastructure in order to enable teams to do their jobs; on the other side, you’re tasked with auditing access and ensuring that security to those systems is solid.
Principle of Least Privilege Explained (How to Implement It)
Principle of Least Privilege Explained (How to Implement It)
Today we’re going to take a closer look at the principle of least privilege (PoLP)—what it is, why it matters, and how to implement it in your organization. Understanding the principle of least privilege is critical, as network administrators must strike a balance between ease and security—protecting network access without causing friction for users. If access is too restrictive, employees won’t be able to do their jobs. Too lax, and the door to attack is open.
Series B, baby! ❤️
Series B, baby! ❤️
strongDM, the infrastructure access platform, today announced it closed a $54 million Series B funding round led by Tiger Global, with participation from new investor GV, and existing investors Sequoia Capital, True Ventures, HearstLab, Bloomberg Beta, and Godfrey Sullivan.
StrongDM app UI showing available infrastructure resources
Connect your first server or database, without any agents, in 5 minutes.