The Sym platform supports a variety of use cases, including a host of access-related workflows wrapping sensitive resources. If you're looking to put unobtrusive just-in-time access workflows with sophisticated routing rules around any of the following resources, please reach out.
- SSH access to instances
- Buckets with user data
- Postgres or Elasticsearch databases
- Anything you can run a SQL query against
- Anything you can put behind an IAM Role
Please see the below use case guide for other common uses of Sym.
Updated 3 months ago
Are you working on protecting resources like this? Reach out!