<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon
strongDM logo

blog

Series B, baby! ❤️

Series B, baby! ❤️

strongDM, the infrastructure access platform, today announced it closed a $54 million Series B funding round led by Tiger Global, with participation
#SDMLife: East Meets West in San Francisco

#SDMLife: East Meets West in San Francisco

A big part of strongDM life is fun and food. At the recent San Francisco offsite, the team got together to craft some delicious thai food, and throw
#SDMLife: Team Building in a Pandemic
#SDMLife: Team Building in a Pandemic
How do you facilitate team building in a remote-first company? And especially in a pandemic? By finding ways to make it work. That’s the strongDM approach.
SRE vs. DevOps: Understanding the Difference
SRE vs. DevOps: Understanding the Difference
DevOps is a combination of “development” and “operations” and is a set of practices that combine these two disciplines. SRE stands for Site Reliability Engineering and is a principle that applies software engineering practices to infrastructure and operations to improve site reliability. This new IT discipline is evolving, so its differentiation from DevOps isn’t always clear. The information we share here will help you better grasp these two roles and where they intersect. After reading this
What Is Credential Management? 8 Best Practices to Know
What Is Credential Management? 8 Best Practices to Know
Concerned that bad actors could gain access to your digital resources using stolen credentials? Don't worry, there’s a way to safeguard your employees’ account details. Modern credential management tools and policies can give you precise control over who can view keys to access your systems and how much access they may have. The information in this article will help you conquer your biggest credential management challenges. With the right knowledge and tools, you can significantly mitigate the
Privileged Access Management Audit Checklist for 2025
Privileged Access Management Audit Checklist for 2025
It’s easy to assume that individuals with privileged access will inherently do the right thing, or simply know what they’re doing when accessing systems. That isn’t always the case. Similarly, how often do you check in on your systems with privileged access to understand what they're up to?
All Offboard! The 2025 Tech Staff Offboarding Checklist
All Offboard! The 2025 Tech Staff Offboarding Checklist
Offboarding technical employees can be a complex and arduous process with a lot of moving parts. The key to successful offboarding is to have a clear understanding of what needs to be done, who does it, and how to monitor for any shenanigans from former employees.
Embracing the New Mindset of Cloud-Native Security
Embracing the New Mindset of Cloud-Native Security
What is a “mindset of cloud-native security”? 🤔 That’s a great question. That’s why Justin McCarthy, CTO and co-founder of strongDM, recently sat down with Mike Vizard at Container Journal and a panel of technology experts to discuss just that—and how to implement it without creating friction.
StrongDM Works With Your Secrets Manager
StrongDM Works With Your Secrets Manager
We’re pleased to announce public beta support for the use of third-party secrets managers with StrongDM to store your credentials. And the best part? There are zero changes to your workflow.
3 Best Enterprise VPN Alternatives for Business in 2025
3 Best Enterprise VPN Alternatives for Business in 2025
This article will introduce several best business VPN alternatives to help you secure remote access using the infrastructure you already have. You’ll see how teams of all sizes—from three-person startups to large organizations like Peloton—have replaced outdated VPN architecture with secure, scalable, auditable solutions built for modern computing.
Scaling Your SSH Strategy
Scaling Your SSH Strategy
In our last post, we discussed some of the challenges that are inherent to management of SSH keys across your infrastructure as you scale the number of team members and servers. In this post, we will dig into some of your options and the trade-offs that they provide.
Alternatives to Google Cloud Identity-Aware Proxy (IAP)
Alternatives to Google Cloud Identity-Aware Proxy (IAP)
Identity-Aware Proxy (IAP) is a Google Cloud Platform service that centralizes user access to SaaS applications and other cloud resources accessed by HTTPS. IAP secures authentication for requests made to virtual machines running on GCP and other cloud-based and on-premises applications, only granting access to users you authorize. With IAP, users can connect from untrusted networks without using a VPN.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. đź‘€