<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon

What’s New at StrongDM | February 2023

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

Increase admin productivity with shiny new metrics.

Welcome to our February product updates. Time has a way of moving quickly at StrongDM, especially when we are busy building products for the future. If only I could say the same for the minutes spent on a treadmill. For now, have a seat, grab a beverage, and check out what’s new at StrongDM.

Understand user behavior better with our added insights

You now have the power to visualize commonly asked questions around utilization to better manage and predict cost. This feature is just the beginning. We’re adding more robust reporting on our users throughout this quarter. Be on the lookout 👁).

Another Secret Store Integration is here!

We’ve made a new addition to our suite of native secret store integrations. Use StrongDM to manage privileged access to all your resources on-prem, in the cloud, or both!

You can use StrongDM to store your secrets or continue to get the investments from the vendors you already use.

StrongDM has added support for:




Want to learn more? Check out our full list of release notes.


About the Author

, Product Manager Expert, has worked in the technology industry for over 15 years, in roles ranging from software integration, customer support, project management and product management. His work experience spans start-up size companies all the way through large enterprises such as GE (GE Transportation) and Allstate (Allstate Identity Protection). Curiosity and a deep love of learning are the key ingredients in Erick's outlook on work and life in general.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

IGA vs. PAM: What’s the Difference?
IGA vs. PAM: What’s the Difference?
IGA (Identity Governance and Administration) manages user identities and access across the organization, ensuring proper access and compliance. PAM (Privileged Access Management) secures privileged accounts with elevated permissions by using measures like credential vaulting and session monitoring to prevent misuse. While IGA handles overall user access, PAM adds security for the most sensitive accounts.
How To Monitor and Securely Access IoT Devices Remotely
How To Monitor and Securely Access IoT Devices Remotely
Internet of Things (IoT) devices form the backbone of many modern businesses, facilitating operations, collecting valuable data, and enhancing efficiency. However, the widespread deployment of these devices creates numerous entry points for potential attackers. Without robust security measures, you risk exposing critical systems and sensitive information to malicious actors.
What Is Defense In Depth (DiD)? Strategy and Implementation
What Is Defense In Depth (DiD)? Strategy & Implementation
Traditional security measures like simple virus protection, firewalls, and web and email filtering are no longer sufficient to safeguard against the sophisticated tactics used by modern cybercriminals. This heightened complexity means you must implement advanced defense mechanisms that go beyond basic protections, ensuring a resilient and adaptive cybersecurity posture.
MFA Fatigue Attack: Meaning, Types, Examples, and More
MFA Fatigue Attack: Meaning, Types, Examples, and More
This article investigates MFA fatigue attacks. We'll explain how they work, why they're effective, and who they typically target. We'll also provide real-life examples to help your team detect and prevent these threats. You'll leave with a clear understanding of MFA fatigue attacks and tips on how to shore up your cloud security to defend against them.
What Is User Provisioning? How It Works, Best Practices & More
What Is User Provisioning? How It Works, Best Practices & More
User provisioning is the process of managing user access within an enterprise. It involves creating, managing, and deprovisioning user accounts and access rights across various systems and applications. This includes setting up accounts, assigning roles and permissions, and managing identities.