Use Case Guide

The Sym platform supports a variety of use cases, including a host of access-related workflows wrapping sensitive resources. If you're looking to put unobtrusive just-in-time access workflows with sophisticated routing rules around any of the following resources, please reach out.

Sensitive Resource Examples

  • SSH access to instances
  • Buckets with user data
  • Postgres or Elasticsearch databases
  • Anything you can run a SQL query against
  • Anything you can put behind an IAM role

Use Case Guide

Please see the below use case guide for other common uses of Sym.

What’s Next

Are you working on protecting resources like this? Reach out!

Did this page help you?