Senior Data Engineer at a non-profit with 1,001-5,000 employees
Real User
Top 20
2024-10-29T13:05:27Z
Oct 29, 2024
I was part of the team managing the infrastructure for a small startup company. We used StrongDM to provide access to cloud private networks, control user access to databases, hosts through SSH, and Kubernetes resources.
Find out what your peers are saying about StrongDM, CyberArk, Keeper Security, Inc. and others in Privileged Access Management (PAM). Updated: January 2025.
Privileged Access Management (PAM) solutions provide organizations with the ability to secure, control, and monitor access to critical information and resources by privileged users.
PAM is crucial for businesses that need to safeguard sensitive data and maintain compliance with industry regulations. It restricts privileged access to only those users who need it and tracks their activities, helping prevent security breaches. Solutions in the PAM category offer comprehensive tools to manage...
I was part of the team managing the infrastructure for a small startup company. We used StrongDM to provide access to cloud private networks, control user access to databases, hosts through SSH, and Kubernetes resources.
We use it for zero-trust privileged access.