We're seeking an EMEA Partner Director to oversee our partner strategy. 🤝 Are you passionate about driving strategic, partner-led opportunities? Do you enjoy traveling and collaborating with local teams? You need to check this out! 💰 £235,000 - 275,000 GBP OTE (50/50 split) + equity salary packages Expand your horizons! 🌅 Apply now: https://bit.ly/3UuOcs8 #EMEA #partnerdirector #hiring #hiringnow
StrongDM
Software Development
Burlingame, California 7,809 followers
We put people first by giving technical staff a direct route to the critical infrastructure they need.
About us
StrongDM is a Dynamic Access Management platform that puts people first by giving technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.
- Website
-
https://www.strongdm.com
External link for StrongDM
- Industry
- Software Development
- Company size
- 51-200 employees
- Headquarters
- Burlingame, California
- Type
- Privately Held
- Founded
- 2015
Products
StrongDM
Privileged Access Management (PAM) Software
StrongDM is a proxy that combines authentication, authorization, networking, and observability into a single product. The product is designed to unify and simplify infrastructure access workflows by providing low-friction connectivity to virtually every piece of infrastructure in your stack.
Locations
-
Primary
20 Park Rd
Burlingame, California 94010, US
Employees at StrongDM
Updates
-
We're #hiring a new Senior Pre-Sales Solution Engineer- APJ in Australia. Apply today or share this post with your network.
-
We're #hiring a new Senior Software Engineer - Networking in United States. Apply today or share this post with your network.
-
The MITRE ATT&CK for Containers offers adversary tactics and techniques based on real-world observations. 🌍 John Martinez wrote this solution guide to walk you through the specific requirements and help you mitigate the techniques in the following areas: • Initial Access • Persistence • Privilege Escalation • Defense Evasion • Credential Access • Discovery • Lateral Movement Read and download the ungated report.👇🏻 #MITRE #MITREframework #containers #kubernetes
-
Last week, we had the pleasure of meeting up with other authorization aficionados at the annual Internet Identity Workshop Un-conference. 💻 After IIW, John Martinez, Tarun Dwivedi, and members of the AuthZ Clipping Service gathered for a meetup and happy hour. There are even greater things to come! 🤩 Link in comments. #authorization #identity #conference
-
StrongDM is thrilled to welcome Jen Luker, a distinguished software engineer and an ardent advocate for web accessibility and diversity + inclusion in the tech industry. 👩🏻💻 With her deep expertise in web development, particularly in JavaScript and related technologies, Jen uses her platform to promote accessibility and inclusivity. Her background includes speaking at numerous conferences and events, sharing her engineering expertise, and advocating for underrepresented groups in technology. #engineeringleaders #engineering #inclusivity #womenintech #a11y
-
StrongDM reposted this
Transformative leader, strategist, cybersecurity expert, digital transformation sherpa, disrupter of the status quo, and tech evangelist.
Identity and access. It's almost always about identity and access. Beginning three months ago, a threat actor performed reconnaissance of MITRE’s networks and exploited one of the organization’s Ivanti VPN via the Ivanti Connect Secure zero-day vulnerabilities made public then. Apparently, "...the threat actor then moved past MITRE’s multi-factor authentication using session hijacking. From there, it moved laterally and dug into MITRE’s VMware infrastructure using a compromised administrator account. They then employed a combination of sophisticated backdoors and webshells to maintain persistence and harvest credentials." This time it was an administrative account's credentials. It is all but flabbergasting to me that this type of attack has occurred over and over for decades and that it took the appliance vendor so long to distribute a patch. I think we need to question things more deeply. Are we really doing all we can to defend against these incidents? Would this have been possible with stricter adherence to the Mitre ATT&CK Matrix? (Yes, I am aware of the irony here!) Would this have still happened if Mitre had used a real dynamic access methodology or a continuous authentication and authorization capability? What is it they say, trust nothing and question everything...
-
Enyichi Chikwendu has joined our Customer Success team! 🙌🏾 With over 8 years of experience in SaaS companies, including Veracode, Lacework, and Crownpeak, Enyichi is a cybersecurity veteran known for his ability to create impactful business processes. We are so excited to have his energy on our team! #hiring #customersuccess #newhire #welcome
-
Welcome, Mari Pope! 👋 With 15 years of experience in software sales and specialized expertise in Identity Management and Privileged Account Management at Quest Software and One Identity, Mari deeply understands the cybersecurity industry and its challenges. We are thrilled to have her on our team! #newhires #hiring #techsales
-
We're #hiring a new Senior Software Engineer - Kubernetes in United States. Apply today or share this post with your network.