Channel Avatar

StrongDM @UCYMSnwT5uCwczfT0hrWelkQ@youtube.com

665 subscribers - no pronouns :c

StrongDM is the leader in Zero Trust PAM. We are a policy-ba


03:46
MFA for Database Actions (With Zero Trust Action Policies)
01:05
Why Legacy PAM Solutions Cannot Deliver for Today’s Enterprise
02:29
MFA for Windows Remote Desktop
02:58
MFA for Network Devices
01:18
How StrongDM is Different
01:31
Security or Productivity? Zero Trust PAM Delivers Both
01:32
What is Zero Trust PAM?
01:17
An Introduction to Privileged Access Management (PAM)
01:04
Compliance Never Stops Neither Should Your PAM
01:43
Never, Ever Trust, Always, Always Verify A New Era for PAM
01:36
With Fine Grained Policies & Continuous Authorization, StrongDM is Delivering on the Promise of PAM
03:43
MFA for SSH
03:21
MFA for Oracle DB
07:35
The Zero Trust Roller Coaster | John Has Trust Issues
12:41
AT&T Snowflake Incident Explained: How to Mitigate Risks with MFA
18:27
Security Expert: Continuous Validation of Zero Trust, Importance of MFA, CISO Productivity Tips
10:19
NSA Zero Trust Maturity Guidance: Explained
05:23
Enabling MFA Across Various Resources (Postgres and SSH)
03:20
StrongDM Zero Trust Policies: Granular Authorization to Privileged Resources (Access and Actions)
09:30
Microsoft Security Lapse: Employees Exposed Internal Passwords | John Has Trust Issues
06:01
AT&T Data Leak Hit 73 Million Current and Former Users: What To Do Next? | John Has Trust Issues
09:56
XZ Utils Backdoor Explained: How to Mitigate Risks | John Has Trust Issues
05:35
AT&T Data Breach Explained: How to Mitigate the Risk (Personal & Business) | John Has Trust Issues
04:12
Cozy Bear (APT29) Update & How to Prevent Similar Attacks | John Has Trust Issues
03:09
Strong Policy Engine: The Feature That Makes Zero Trust Implementation a Reality
01:55
Malicious Code Impacts 100K Repositories on GitHub
01:51
Ken Thompson's "Reflections on Trusting Trust" | John Has Trust Issues
02:53
CISA’s ED 24-01 & Ivanti Connect Secure | John Has Trust Issues
02:48
How to Thwart Espionage Attacks | John Has Trust Issues
01:29
Provisioning Access with StrongDM & Your Identity Provider (IdP)
01:06
Deprovisioning Access with StrongDM & Your Identity Provider (IdP)
01:46
Accessing Kubernetes Clusters with Slack Messages
03:51
How to Configure AWS CLI in the SDM Cloud
02:55
How to Configure Azure CLI in the SDM Cloud
00:36
StrongDM Walk Through - DevOps
00:41
StrongDM Walk Through - Security
00:39
The StrongDM End User Experience
02:35
How to configure Google CLI in the SDM Cloud
08:57
How to review your SSH Session Log
02:54
How to add MySQL as a datasource
08:58
How to set up certificate based SSH with Terraform
13:05
Start Now: Discovering the Critical Tools and Services That Will Define IT Through 2030
06:35
How to set up certificate based SSH
03:46
How to add PostgreSQL as a Datasource
09:22
Product Demo - Three ways to use strongDM tags
10:07
Cloud Infrastructure: 3 Costly but Avoidable Mistakes
05:36
Product Demo - Code Garden Log Export Container
26:06
Identity Governance, Protection & Administration EcoCast : Rise of the Tech Employee
05:16
Product Demo Series - Code Garden AccessBot
04:50
How to add MongoDB as a datasource
11:07
5 most common workflows to automate with StrongDM SDKs
04:13
How to Link OKTA Groups to StrongDM Roles Using SCIM Provisioning
08:36
Part 3: 5 most common questions to answer using strongDM SSH Query Logs
09:52
Part 2: 5 most common questions to answer using StrongDM Queries and Error Logs
06:17
How to provision StrongDM users, groups, and roles through Azure AD
03:49
Part 1: 5 most common questions to answer using strongDM logs - Log Activities
07:04
How to configure the GCP Secret Manager integration with StrongDM
05:52
How to configure the AWS Secrets Manager integration with StrongDM
04:59
Using HashiCorp Vault Secrets with StrongDM
06:28
How to configure the Azure Key Vault integration with StrongDM