blog /
SAML vs. LDAP: Everything You Need to Know

SAML vs. LDAP: Everything You Need to Know

The difference between SAML and LDAP is that SAML is designed for cloud-based connections using only an IdP and SP to communicate user data. LDAP, however, is typically used for accessing on-premises resources by installing a client on the user's device to connect with a directory service.
SASE vs. CASB: Everything You Need to Know

SASE vs. CASB: Everything You Need to Know

In this article, we’ll take a big-picture look at how SASE and CASB solutions fit into the enterprise security landscape. We'll explore the key differences between SASE and CASB and explain how each tool helps ensure enterprise security. You will gain an understanding of how SASE and CASB solutions compare and which might be suitable for your organization.
What is CIEM? Definition, Benefits, Limitations & More

What is CIEM? Definition, Benefits, Limitations & More

As more enterprises migrate to the cloud, access management and security has grown more complex. Cloud infrastructure entitlement management (CIEM) solutions emerged to address these challenges. In this article, we’ll take a broad look at what CIEM is, how it works, why it’s important, and how it differs from and works with other cloud management solutions.
What is DevOps Security? Challenges and Best Practices

What is DevOps Security? Challenges and Best Practices

What are the biggest security challenges facing DevOps, and how can practitioners overcome them? In this article, Good e-Learning and strongDM examine how DevOps engineers can work to guarantee security across their cultures.
Cloud Infrastructure Security | 3 Costly but Avoidable Mistakes

Cloud Infrastructure Security | 3 Costly but Avoidable Mistakes

The cloud has changed the way we access and secure technical infrastructure, leaving teams lost in a tangle of resources. Thankfully, access doesn’t have to be this complicated. Join Hermann Hesse, VP of Solutions at strongDM, as he shares three costly but avoidable cloud infrastructure security challenges and what you can do to address them.
Kubernetes in the Enterprise Webinar Recap

Kubernetes in the Enterprise Webinar Recap

Join strongDM CTO Justin McCarthy and a panel of experts as they discuss the challenges, complexities, and best practices of enterprise k8s adoption.
Has Your Technical Debt Become Unsustainable?

Has Your Technical Debt Become Unsustainable?

A closer look at what technical debt is, how it relates to infrastructure access, and why unwinding short-term workarounds can actually improve productivity.
Just-In-Time Access (JIT): Meaning, Benefits, Types & More

Just-In-Time Access (JIT): Meaning, Benefits, Types & More

Today, we’ll take a look at what just-in-time access (JIT) means and what types there are. You’ll also learn about what a JIT access solution can do for your organization. By the end of this article, you’ll understand how just-in-time access works, the best practices to ensure secured implementation, and how strongDM comes to the rescue.
11 Common Authentication Vulnerabilities You Need to Know

11 Common Authentication Vulnerabilities You Need to Know

In this article, we’ll take a look at what authentication vulnerabilities are, how they emerge, and how these issues can affect your organization. Also, you’ll learn about the most common authentication-based vulnerabilities and their implications. By the end of this article, you’ll know the best practices to prevent these authentication issues and keep sensitive data safe.
How to Avert Authentication Bypass Vulnerabilities for Self-hosted Web Infrastructure

How to Avert Authentication Bypass Vulnerabilities for Self-hosted Web Infrastructure

When it comes to self-hosting critical web infrastructure, modern security requires more than simply siloing an appliance to a local network. In this article, we will discuss new methods for authentication bypass vulnerabilities, simplify end-user experiences, and satisfy compliance requirements—without the need for legacy VPN solutions. Here’s how.
Cloud-Native Data Protection Panel Recap

Cloud-Native Data Protection Panel Recap

Cloud environments present new challenges for data protection as technological innovation, flexibility, and abstraction change the way we copy, store, and handle data. That’s why Justin McCarthy, CTO and co-founder of strongDM, recently sat down with Mike Vizard and a panel of technology experts. ...
Managing Access to Ephemeral Infrastructure At Scale

Managing Access to Ephemeral Infrastructure At Scale

Managing a static fleet of strongDM servers is dead simple. You create the server in the strongDM console, place the public key file on the box, and it’s done! This scales really well for small deployments, but as your fleet grows, the burden of manual tasks grows with it.
Understanding Software-Defined Networking (SDN)

Understanding Software-Defined Networking (SDN)

In this article, we will take a comprehensive look at software-defined networking (SDN). You’ll learn what it is, how it works, and what its benefits and disadvantages are. You’ll also learn how SDN compares to and works with other types of networks and get answers to common questions.
A Beginner’s Guide to Microsegmentation

A Beginner’s Guide to Microsegmentation

In this article, we’ll review the basics of microsegmentation and discuss it in context with other network security models and practices, including Zero Trust, software-defined networking, and network segmentation. You’ll learn about the benefits of microsegmentation, how it works, challenges for implementation, and best practices.
Infrastructure access app UI
Connect your first server or database in 5 minutes. No kidding.