What Integrates with StrongDM?
Find out what StrongDM integrations exist in 2024. Learn what software and services currently integrate with StrongDM, and sort them by reviews, cost, features, and more. Below is a list of products that StrongDM currently integrates with:
-
1
Intelligent Discovery
Ldaptive
$199 per monthIntelligent Discovery makes it easy to manage your AWS security. Our industry-leading AWS vulnerability scanning tool and remediation tool allow you to quickly identify potential threats without slowing down your infrastructure. You can prevent attackers from exploiting weaknesses by proactively identifying, resolving and mitigating security threats using a user-friendly interface. Automate Security Auditing, Security Log Management and Customize Controls, plus many other features! -
2
Puppet Enterprise
Puppet
$120 per monthPuppet is changing the way continuous operations can be done. Automate your environment with products that are responsive, predictive and predictive. 90% of the US's largest companies use Puppet's infrastructure to simplify complex IT infrastructure. Puppet is redefining continuous operations. Our platform empowers IT operations teams to automate their infrastructure. This allows them to deliver at cloud speed, cloud scale. Our flexible approach to infrastructure automation allows teams to innovate quickly, while ensuring security and compliance. We are leading the charge in predicting at scale and moving beyond find-and-fix. No more surprises. We work at the speed of business and deliver infrastructure automation software that promises your business and gives your employees back their time. Peace of mind. -
3
Jira Align
Atlassian
$75 per user per monthJira Align (formerly AgileCraft), connects your business strategy and technical execution. To make all work visible across your enterprise, aggregate team-level data. To determine scope, roadmaps, and dependencies across portfolios and teams, get everyone on the same page. To drive faster and more reliable outcomes, connect strategic investments with customer value to accelerate the delivery of results. Investors, analysts, employees should be made aware of the benefits of funding strategic initiatives. To drive enterprise value, connect strategy and execution to support your high-level vision and mission. Sprint work should be done in line with your company's high level strategy. Ensure that programs run smoothly and that resources are properly allocated to ensure on-time delivery. You can manage idea intake, prioritize feature backlogs, and track progress using real-time roadmaps. A framework that scales agile in your company will enable digital transformation. -
4
Active Directory
Microsoft
$1 per user per monthActive Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration. -
5
Terraform
HashiCorp
Terraform is an open source infrastructure as code software tool. It provides a consistent CLI workflow for managing hundreds of cloud services. Terraform codifies cloud APIs into declarative configuration files. Write infrastructure as code using declarative configuration files. The HashiCorp Configuration Language allows for concise descriptions using blocks, arguments and expressions of resources. Run terraform plan before you provision or change infrastructure. To achieve the desired configuration state, apply changes to hundreds cloud providers using terraform. To manage the entire lifecycle of infrastructure, define it as code. Create new resources, manage existing ones, destroy those that are no longer needed. -
6
MongoDB Atlas
MongoDB
$57 per monthThe most innovative cloud database service available, with unmatched data mobility across AWS, Azure and Google Cloud, as well as built-in automation for resource optimization and workload optimization. MongoDB Atlas is a global cloud database service that supports modern applications. Fully managed MongoDB can be deployed across AWS, Google Cloud and Azure. This is possible with best-in class automation and proven practices that ensure availability, scalability and compliance with the highest data security and privacy standards. This is the best way to deploy, scale, and run MongoDB in cloud. MongoDB Atlas provides security controls for all data. Allow enterprise-grade features to be integrated with your existing security protocols or compliance standards. MongoDB Atlas protects your data with preconfigured security features that allow for authentication, authorization and encryption. -
7
AWS Secrets Manager
Amazon
$0.40 per monthAWS Secrets Manager protects secrets that allow you to access your services, applications, and IT resources. This service allows you to easily manage, retrieve, and rotate database credentials, API keys, as well as other secrets, throughout their lifecycle. Secrets Manager APIs can be called by users and applications to retrieve secrets. This eliminates the need to hardcode sensitive data in plain text. Secrets Manager provides secret rotation with integrated integration for Amazon RDS and Amazon Redshift. The service can also be extended to other types secrets, such as API keys and OAuth tokens. Secrets Manager allows you to manage access to secrets with fine-grained permissions. You can also audit secret rotation centrally for resources in AWS Cloud, third party services, and on-premises. AWS Secrets Manager allows you to safely rotate secrets without the need for code deployments. -
8
Indent
Indent
$8 per monthFaster access unlocks more revenue. Give your team on-demand access to apps that is faster and easier without frustrating them. Slack allows users to request access to apps. Managers can approve or deny the request from Slack. All of this is auditable. Stop manually catherding approvals. Every time an access is granted, there's a security risk. Indent helps teams to scale security and least-privilege by shifting users from permanent access without slowing things down. Automate spreadsheet-based processes for SOC 2, SOX ISO and HITRUST. Controls and policies are baked directly into the access request workflows. Reduce your license footprint by only providing access when needed, instead of granting permanent access. Indent reduces costs without adding friction to the end user experience. If you want to lead a rapidly growing company to success, you need to take on big risks. -
9
Syslog-ng
Balabit
Syslog-ng provides a reliable, scalable and secure central log management solution. IT teams can use syslog to collect and centralize log data regarding user activity, network traffic, and other metrics. This eliminates data silos and gives teams full-stack access to their log data. Syslog-ng features include secure data storage, scalable architecture, flexible routing, real-time transformation, and more. Syslog-ng is available in both open source and enterprise editions. -
10
Teradata Vantage
Teradata
Businesses struggle to find answers as data volumes increase faster than ever. Teradata Vantage™, solves this problem. Vantage uses 100 per cent of the data available to uncover real-time intelligence at scale. This is the new era in Pervasive Data Intelligence. All data across the organization is available in one place. You can access it whenever you need it using preferred languages and tools. Start small and scale up compute or storage to areas that have an impact on modern architecture. Vantage unifies analytics and data lakes in the cloud to enable business intelligence. Data is growing. Business intelligence is becoming more important. Four key issues that can lead to frustration when using existing data analysis platforms include: Lack of the right tools and supportive environment required to achieve quality results. Organizations don't allow or give proper access to the tools they need. It is difficult to prepare data. -
11
Logentries
Logentries
The fastest way to analyze log data. No complicated setup. There is no waiting. No waiting. Just answers. Logentries can quickly search for your data, no matter what format it is. Our search is now 300x more efficient than the previous generation. You can search keywords, key values pairs, or regex patterns faster than ever before. Logs from servers, applications and routers can be centralized in one place. You can create custom tags to help you spot important events. Logs can be viewed in Table View or in raw format for easy interpretation. Logs from servers, networks, platforms, containers, and other devices can be easily analyzed. Live streaming of application logs and performance metrics allows for real-time analysis, debugging, and debugging. Compliance requirements can be met by storing logs, centralizing them, and reporting. -
12
Amazon EKS
Amazon
Amazon Elastic Kubernetes Service is a fully managed Kubernetes services. EKS is trusted by customers such as Intel, Snap and Intuit. It also supports GoDaddy and Autodesk's mission-critical applications. EKS is reliable, secure, and scaleable. EKS is the best place for Kubernetes because of several reasons. AWS Fargate is serverless compute for containers that you can use to run your EKS clusters. Fargate eliminates the need for provisioning and managing servers. It allows you to specify and pay per application for resources and improves security by application isolation by design. EKS is also integrated with AWS Identity and Access Management, AWS CloudWatch, Auto Scaling Groups and AWS Identity and Access Management, IAM, and Amazon Virtual Private Cloud (VPC), allowing you to seamlessly monitor, scale, and load balance your applications. -
13
Amazon ElastiCache
Amazon
Amazon ElastiCache makes it easy to create, manage, and scale popular open source compatible in-memory cloud data stores. You can build data-intensive apps and improve the performance of existing databases by retrieving data in high-throughput and low latency, in-memory storages. Amazon ElastiCache is popular for real-time applications such as Caching, Session Stores and Gaming, Geospatial Service, Real-Time Analytics and Queuing. Amazon ElastiCache provides fully managed Redis, Memcached and other services for demanding applications that need sub-millisecond response time. Amazon ElastiCache is an in-memory cache and data store that can support the most demanding applications that require sub-millisecond response time. Amazon ElastiCache delivers secure, lightning fast performance by using an optimized stack that runs on customer-dedicated nodes. -
14
Logstash
Elasticsearch
Centralize, transform & stash your data. Logstash is an open, free server-side data processing platform that ingests data and transforms it before sending it to your favorite "stash". Logstash dynamically ingests and transforms your data, regardless of its format or complexity. With grok, you can create structure from unstructured data, decipher geo coordinates using IP addresses, anonymize sensitive fields or exclude them, and simplify overall processing. Data can be scattered or siloed across many different systems in many formats. Logstash can handle a variety inputs that pull events from many common sources at once. You can stream continuously and easily ingest logs, metrics web applications, data stores, as well as other AWS services in a continuous stream. Download: https://sourceforge.net/projects/logstash.mirror/ -
15
HashiCorp Vault
HashiCorp
Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API. -
16
Greenplum
Greenplum Database
Greenplum Database®, an open-source data warehouse, is a fully featured, advanced, and fully functional data warehouse. It offers powerful and fast analytics on petabyte-scale data volumes. Greenplum Database is uniquely designed for big data analytics. It is powered by the most advanced cost-based query optimizer in the world, delivering high analytical query performance with large data volumes. The Apache 2 license is used to release Greenplum Database®. We would like to thank all of our community contributors. We are also open to new contributions. We encourage all contributions to the Greenplum Database community, no matter how small. Open-source, massively parallel data platform for machine learning, analytics, and AI. Rapidly create and deploy models to support complex applications in cybersecurity, predictive management, risk management, fraud detection, among other areas. The fully integrated, open-source analytics platform is now available. -
17
Apache Druid
Druid
Apache Druid, an open-source distributed data store, is Apache Druid. Druid's core design blends ideas from data warehouses and timeseries databases to create a high-performance real-time analytics database that can be used for a wide range of purposes. Druid combines key characteristics from each of these systems into its ingestion, storage format, querying, and core architecture. Druid compresses and stores each column separately, so it only needs to read the ones that are needed for a specific query. This allows for fast scans, ranking, groupBys, and groupBys. Druid creates indexes that are inverted for string values to allow for fast search and filter. Connectors out-of-the box for Apache Kafka and HDFS, AWS S3, stream processors, and many more. Druid intelligently divides data based upon time. Time-based queries are much faster than traditional databases. Druid automatically balances servers as you add or remove servers. Fault-tolerant architecture allows for server failures to be avoided. -
18
Trustle
Trustle
$10 per user per monthTraditional cloud data security apps don't scale. Trustle allows you to grant and revoke access to multiple data sources on an individual basis. It also provides a comprehensive overview of all connected systems, all from a single SaaS product. Trustle gives every employee access to the data they need, when and for how long it is needed. Positive team dynamics are an essential component of any employer's value proposition. Your employer brand will be strengthened while strengthening team cohesion across the business. This will bring about a significant improvement in the lives of developers, citizens developers, teams, and organizations. Trustle is a unique SaaS offering that allows you to manage access-at-risk in minutes and provides new structure to your business’s holistic data strategy in days. -
19
Unified.to
Unified.to
$250 per monthShip the integrations that your customers and prospects require now, and watch your revenue soar without compromising your core products. Deliver secure, deep, and powerful integrations with advanced observability features and security for all types of use cases. We never store any of your customer's data. You can also securely store their OAUTH2 access tokens in your AWS Secrets Manager accounts. OAUTH2 authentication keeps your customers' credentials safe while giving them the ability to revoke their access tokens at any time. Use your OAUTH2 client secrets and IDS to take control of branding and security. Your application will have full autonomy over authorization and access tokens. Avoid the headaches of juggling multiple APIs and complex data transforms. Simplify integration with a single API and data model. -
20
MariaDB
MariaDB
MariaDB Platform is an enterprise-level open-source database solution. It supports transactional, analytical, and hybrid workloads, as well as relational and JSON data models. It can scale from standalone databases to data warehouses to fully distributed SQL, which can execute millions of transactions per second and perform interactive, ad-hoc analytics on billions upon billions of rows. MariaDB can be deployed on prem-on commodity hardware. It is also available on all major public cloud providers and MariaDB SkySQL, a fully managed cloud database. MariaDB.com provides more information. -
21
Workspace ONE
Omnissa
Workspace ONE is an intelligent digital workspace platform that allows you to securely deliver and manage apps on any device. Workspace ONE combines access control, multi-platform endpoint and application management into a single platform. It is available either as a cloud-based service or for on-premises deployment. Enterprises can maximize employee engagement and productivity with a personalized user experience and access to any app, on any device. Adopt a cloud-native, single solution for endpoint management - any device or use case. Eliminate silos, manage all device types and apps faster with fewer solutions and greater capabilities. Secure devices, users and data using conditional access, automated patches and configuration policies. -
22
Metabase
Metabase
This is the place where everyone can ask questions and get data-based advice. Get your data connected and in front of your employees. Dashboards, such as this one, are easy to create, share, and examine. Any member of your team can access answers to data questions with just a few clicks. This includes the CEO and Customer Support. SQL and our notebook editor can be used to simplify complex questions. Visual joins, multiple aggregates and filtering steps allow you to dig deeper into your data. To create interactive visualizations that users can modify and explore, you can add variables to your queries. To get the right data to the right people at the right moment, set up alerts or scheduled reports. You can either use the hosted version or Docker to get started on your own. Connect to your existing data and invite your team. You have a BI solution that will take less than a sales call. -
23
PostgreSQL
PostgreSQL Global Development Group
PostgreSQL, a powerful open-source object-relational database system, has over 30 years of experience in active development. It has earned a strong reputation for reliability and feature robustness. -
24
Presto
Presto
#1 Contactless Dining Solution. $0 Monthly Fee. We are the largest provider worldwide of contactless dining technology, with more than 100 million active users per month and 300,000+ shipped devices. Find out more about our top-selling product. Our Contactless Dining Solution allows your restaurant to offer a complete contactless dining experience to all of its guests. Guests can view the entire menu, place orders, pay at their table, and much, much more without the need to make contact with anyone. Register today to be completely contactless within 3 days. There are no recurring fees, but regular payment processing charges apply. You don't even need to change your existing POS software. Although the solution is available worldwide, supplies are limited and demand high so make sure to reserve your spot today. Presto is the largest provider of contactless technology in America and Europe, with over 100 million users using it each month and 300,000+ systems being shipped. -
25
Cisco HyperFlex
Cisco
It's now easier than ever to adopt hyperconverged infrastructure. More mission-critical apps can be powered by hyperconverged infrastructure. Multicloud services with flexible options Cisco Intersight makes it easy to deploy HyperFlex wherever you are. Cisco HyperFlex provides flexible configurations for hyperconverged infrastructure built on the Cisco UCS platform. Find the latest M5 and Edge nodes to meet your business needs. Optimize operations and increase performance of mission-critical applications like SAP apps and Microsoft SQL. Cisco offers many hybrid cloud and container management options to give you options. Flexible configuration options and multisite management allow you to power applications at the edge. Hyperconverged infrastructure (HCI), combines compute, storage, virtualization, networking, and networking within a single cluster. Users can scale up to meet their storage and computing resource requirements by starting with just three nodes. Hyperconvergence offers cloud-like simplicity on-premises. -
26
openSUSE Leap
openSUSE
OpenSUSE is now possible in a completely new way. Leap uses source code from SUSE Linux Enterprise, which gives Leap an unmatched level of stability and combines it with community developments to give users and developers the best stable Linux experience. OpenSUSE users can upgrade by either booting from the DVD/USB or performing an 'Online Update'. Leap is a stable distribution method that releases one version each year, in between security updates and bugfixes. This makes Leap attractive as a server operating system as well as for Desktops as it requires minimal maintenance. OpenSUSE Leap can be used with SUSE Linux Enterprise, which gives Leap an unmatched level of stability and allows users to migrate to an enterprise offering. -
27
CentOS
CentOS
CentOS Linux is a community-supported distribution that was derived from freely available sources on Red Hat or CentOS Git for Red Hat Enterprise Linux. CentOS Linux is functionally compatible with RHEL. The CentOS Project changes packages primarily to remove artwork and branding from upstream vendors. CentOS Linux is free and available at no cost. Each CentOS version will be maintained until the RHEL version that is equivalent goes out of support. Once a new RHEL version has been rebuilt, a new CentOS version will be made available. This happens approximately every 6-12months for minor version bumps and several years for major versions. The rebuild can take anywhere from weeks for point releases to several months for major version bumps. This creates a stable, reliable, predictable, reproducible Linux environment that is easy to maintain. -
28
Rackspace
Rackspace
Customers can now benefit from enhanced full-lifecycle cloud native programming capabilities that will allow them to build modern applications for tomorrow. With applications designed for tomorrow, unlock the full potential of cloud computing today. Traditional cloud adoption strategies focused on application migration and infrastructure, but did not pay enough attention to the code underneath. While the cloud has always offered the benefits of scale and elasticity, it cannot unleash its full potential unless the code in your applications is updated. Modern applications built with cloud native technology and modern architectures allow you to tap the full potential of cloud computing. This will increase agility and help you accelerate innovation. You can create self-healing, autoscaling applications that are free from the limitations of servers. Serverless architectures provide the best efficiency and cost savings of the cloud, while allowing almost all infrastructure and software management to be done on the platform. -
29
Blink
Blink Ops
Blink is a powerful ROI multiplier for business leaders and security teams who want to quickly and easily secure many different use cases. Get complete visibility and coverage across your organization's security stack. Automated flows can reduce false positives and noise in alerts. Scan for threats and vulnerabilities and identify them proactively. Automated workflows can be created to add context, streamline communication, and reduce the MTTR. Automate your workflows with no-code and generative AI to take action on alerts, and improve the security posture of your cloud. Keep your applications secure by allowing developers to access their applications, streamlining approvals processes, and shifting left the requests for access. Monitor your application continuously for SOC2, ISO or GDPR compliance checks, and enforce controls. -
30
OpenVZ
Virtuozzo
Open source container-based virtualization of Linux. Multiple isolated, secure Linux containers (also known as VEs and VPSs) can be installed on a single server to improve server utilization and ensure that applications do not clash. Each container works and executes exactly as a standalone server. A container can be rebooted separately and has root access, users and IP addresses. It can also have root access, root, users, memory, processes and files. -
31
Keycloak
Red Hat
Keycloak is an open-source identity and access management system. Easily add authentication to secure services and applications. There is no need to store users or authenticate users. All of this is available right out of the box. Advanced features like User Federation, Identity Brokering, and Social Login are available. You can find more information at about and documentation. Don't forget Keycloak! It's simple by design.