Congrats on the launch Sym! I love the idea of bringing access requests into tools where teams live (slack etc) and temporary access needs (I always forget about them... 🙃)
What I like most about the concept behind Sym is that "security" no longer has to be a bottleneck. I've seen several implementations of this and the fact that it can provide complete transparency and traceability is extremely valuable. I can see this tool being a must-have for any company with auditors complaining about "developers having access to production"
How does this work with identity platforms like Okta? Will the enterprises be able to continue using that for core access management and sym to provision JIT/temporary access? VERY COOL
Sym makes it easy to build in approval workflows into existing systems. If you are a 'slack-native' organization, especially, take a look! The python SDK makes is possible to support all sorts of complicated workflows if you need to, but simple things are easy too. The team is super responsive to feedback, and is great to work with!
Deployed and running in a production capacity. It's keeping our infra and customer's data secure (think recent Okta/Zendesk/Reddit priv-user breaches), while satisfying pretty strict compliance requirements!
Sym (the product and the team) have been great partners! We've been using their product to gate and log all of our production access - including supporting customers within our own app and are super happy! They're super fast when we have questions and are always interested and engaging on how we can better leverage their product and get a better experience on our end. And it was super easy to get in to production.
The sym product has been extremely helpful with solving our access needs. After implementing one flow, we quickly started finding other use cases and different ideas to simplify our security model. Not only has the product been great, the team has been fantastic to work with!
I've been waiting a long time for something like Sym to come along. This greatly simplifies controlling developer access and addresses a major security weak point.