Listing Thumbnail

    StrongDM: The Dynamic Access Management Platform

     Info
    Deployed on AWS
    StrongDM is a protocol aware proxy that manages and audits access to databases, servers, clusters, and web apps. StrongDM customers enjoy easy and secure infrastructure access regardless of tech stack or environment.
    4.6

    Overview

    StrongDM is a Dynamic Access Management platform that centralizes privileged access for all technical users to all critical infrastructure. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. End users enjoy fast, intuitive, and auditable access to the resources they need. It seamlessly and securely integrates with every environment and protocol your team needs.

    For custom orders please contact AWS-Marketplace@strongdm.com .

    Highlights

    • StrongDM centralizes access control with authentication, authorization, networking, and observability in a single platform.
    • Least privilege access by default ensures just-right permissions every time.
    • Seamlessly and securely integrate with every database, environment, protocol and tool your team needs.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    StrongDM: The Dynamic Access Management Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor, and additional usage. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for overages or additional usage not covered in the contract. These charges are applied on top of the contract price. If you choose not to renew or replace your contract before the contract end date, access to your entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    StrongDM Essentials
    Includes access to everything: DBs, servers, clusters, and web apps.
    $840.00
    StrongDM Enterprise
    Essentials plus enterprise features for mature tech stacks.
    $1,200.00

    Additional usage costs (2)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Cost/unit
    Additional StrongDM User
    $840.00
    Additional StrongDM Enterprise User
    $100.00

    Vendor refund policy

    For refund policy, visit <www.strongdm.com/tos-client >

    How can we make this page better?

    Tell us how we can improve this page, or report an issue with this product.
    Tell us how we can improve this page, or report an issue with this product.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    If you encounter any issues with StrongDM, you can refer to our documentation or contact the team. Email us at support@strongdm.com  or find documentation at

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Network Infrastructure
    Top
    25
    In Continuous Integration and Continuous Delivery

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    36 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Protocol-Aware Proxy Architecture
    Protocol aware proxy that manages and audits access to databases, servers, clusters, and web apps across multiple environments.
    Centralized Access Control
    Centralizes privileged access management with integrated authentication, authorization, networking, and observability capabilities in a single platform.
    Least Privilege Access Enforcement
    Implements least privilege access by default to ensure just-right permissions and eliminate unauthorized and excessive access permissions.
    Comprehensive Audit Logging
    Provides comprehensive audit logs enabling tracking of user actions, resource access, and activities across infrastructure with detailed who, what, where, and when information.
    Multi-Protocol and Multi-Environment Integration
    Seamlessly integrates with multiple databases, environments, protocols, and tools regardless of technology stack or infrastructure type.
    Credential Management
    Discover, secure, and protect account passwords, SSH Keys, API keys, cloud console access, and other privileged credentials
    Session Monitoring and Control
    Isolate, monitor and control all privileged session activity across cloud and on-premises infrastructure with capability to suspend or terminate high-risk sessions
    Secrets Rotation
    Securely store and rotate application credentials based on policy without impacting application performance
    Multi-Environment Support
    Enforce privileged access security policies consistently across cloud, on-premises, and hybrid environments
    Cloud Deployment Automation
    Cloud automation tools simplify and accelerate deployment in cloud environments
    Zero Trust Network Access Architecture
    Cloud-native, unified, API-enabled solution implementing zero trust network access principles with one-to-one encrypted network segments for each user to explicitly granted resource locations
    Multi-Tunnel Encrypted Connectivity
    Delivers consistent secure multi-tunnel access across multi-cloud, on-premises, and legacy applications from any location or device
    Device-Agnostic Access Control
    Supports reliable secure access from managed and unmanaged devices across all makes and models without device-specific restrictions
    Automated Access Management
    Enables concurrent and automated access to multiple disparate environments with explicit resource grant mechanisms, eliminating manual access approval workflows
    Cross-Environment Resource Access
    Provides unified secure access to resources regardless of physical location or virtual segmentation across diverse infrastructure environments

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    107 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    78%
    21%
    2%
    0%
    0%
    2 AWS reviews
    |
    105 external reviews
    External reviews are from G2  and PeerSpot .
    Vlad Gust

    Access management has become intuitive and just-in-time onboarding now saves months of effort

    Reviewed on May 04, 2026
    Review provided by PeerSpot

    What is our primary use case?

    At this point, we are using StrongDM  solely as a PAM solution. We are looking into ways to expand that and to use other features of the product to meet other demands we have in security, but that is a work in progress.

    What is most valuable?

    I absolutely would say that the best features of StrongDM  and what I appreciate about the solution is that time to onboard is absolutely minimal. The timeframe it takes from no StrongDM to having StrongDM in the organization was swift. The product is very intuitive and easy to use for developers, which was one of the criteria that we felt was really important. The security features, as in the expected features of StrongDM, work flawlessly. Just-in-Time Access is the primary feature that works well and makes life easier for us here at LivePerson .

    The impression of the credential-less access control is positive. It is painless, positive, and fast, but mainly it has reduced our time to onboard developers and to maintain any credentials to a minimum. Previously we had to issue a bunch of tickets and grant access, which was IT work and could take days. Now it is instantaneous.

    What needs improvement?

    With StrongDM, I think there are areas that may have room for improvement. That is a tough position because I have never had a vendor that I had so little feedback on. They are truly good. The only thing is with recent happenings, they have been acquired by a company, but nothing changed for the worse. I cannot provide any feedback to improve on anything.

    For how long have I used the solution?

    I have been using StrongDM for two years.

    What do I think about the stability of the solution?

    Regarding stability, I would rate it a nine.

    What do I think about the scalability of the solution?

    StrongDM is a scalable solution, and it depends on the deployment. For scalability from zero to ten, I would rate it a seven.

    How are customer service and support?

    From one to ten, I rate their technical support as an eight.

    Which solution did I use previously and why did I switch?

    In comparing StrongDM with other solutions, the only other points of reference I have are CyberArk and SailPoint. SailPoint is not a PAM solution, so we will not include that. Compared to CyberArk, StrongDM is far more modern. It is far less clunky. It requires less maintenance of infrastructure. I would say it is plain better. I am also very biased against CyberArk because I absolutely dislike that product.

    How was the initial setup?

    The initial setup was on Google Cloud  Platform. The deployment was straightforward and easy. As with any deployment, you do have some minor quirks here and there, but compared to whatever we had before, that was an absolute breeze. Mean time to deployment is negligible.

    What about the implementation team?

    We are a customer.

    What was our ROI?

    When it comes to return on investment, questions of that nature are really difficult to quantify. I have not done a dollar to time saved assessment. I can definitely say that it saved us time, and a lot of it. Probably months worth of time in engineering and IT support. Return of investment in two years, we perhaps broke even.

    What's my experience with pricing, setup cost, and licensing?

    My thoughts on the pricing of StrongDM is that it is expensive. Coming from knowing the landscape of the market, it is not that they are not competitive. They are still very expensive. That does not mean they are not expensive. Their pricing model is per seat, so that is per user, and it is pretty steep. I do not think that it is any different from any other PAM provider of this caliber.

    What other advice do I have?

    My advice for others looking into StrongDM is to do incredibly thorough due diligence on use cases and scenarios for your own internal use before you begin a proof of concept. You need to be crystal clear about what you want to achieve, how you want to achieve it, and when. Additionally, communication with your own engineers is critical, because that is a major overhaul to how engineers access their infrastructure. I cannot overstate this enough: you need to communicate with your own engineers to understand their needs before you do a proof of concept with StrongDM or any other PAM solution. I would rate this product an eight overall.
    Shri Padmanaban R.

    Efficient Privileged Account Management

    Reviewed on Apr 30, 2026
    Review provided by G2
    What do you like best about the product?
    I really like using StrongDM for server and database logins. It's quite easy to set up, and we've successfully onboarded 2000 users to it.
    What do you dislike about the product?
    Customized reporting should be improved.
    What problems is the product solving and how is that benefiting you?
    I use StrongDM for managing and creating privilege accounts, streamlining server, and DB logins.
    Ibrahim Hassan Barakat

    Secure access to hybrid servers has improved oversight but now needs simpler setup and better guides

    Reviewed on Apr 16, 2026
    Review from a verified AWS customer

    What is our primary use case?

    My use case involves a company I'm working in that wants to secure the connectivity between the DevOps team and the backend server in the company.

    What is most valuable?

    The best features in StrongDM  are that it is the easiest product in the market for this situation with easy access. The DevOps team only needs to log in through StrongDM  with credentials, and then I can control everything after this, including what they are doing inside our servers, their movements, their actions, and everything I can see. One of the most powerful tools in StrongDM is audit logging. I can handle everything and see all that happened inside their movement on the backend server in our company.

    What needs improvement?

    In StrongDM, I think the installation was hard, and they want to be more flexible in the initial setup. I think they want to add more features like traditional PAM. It is difficult to find documentation or materials to review how it works, and there is less product material available in the market.

    For how long have I used the solution?

    I have been using the solution for seven months.

    What do I think about the stability of the solution?

    I rate the stability of the product five out of ten because crashes sometimes happen when we are working on it.

    What do I think about the scalability of the solution?

    I rate scalability five as well.

    How are customer service and support?

    I rate technical support seven out of ten because their response takes much more time than usual. However, at the end, they can help. I think they want to reduce their support staff.

    How was the initial setup?

    The deployment is neither easy nor complex; I think it is in the middle.

    What about the implementation team?

    I am not deploying it, as someone deployed it for me, but I think they put it in the default credential access.

    Which other solutions did I evaluate?

    I compare StrongDM with other vendors like CyberArk or Okta, and I think CyberArk is a heavy PAM. If all my product is on-premises and not cloud and premises, CyberArk will be good for that. However, with StrongDM, I think it is better to work on cloud and on-premises at the same time. I recommend CyberArk if your environment is all on-premises.

    What other advice do I have?

    I am not using the continuous runtime authorization feature, as I think it is not enabled.

    I have my servers on-premises and on AWS .

    For now, I think it is about 53 or 54 users who use the solution.

    StrongDM requires maintenance. In terms of maintenance, it is easy. I think it is easy to maintain, but it is hard to know how to do it because the materials are less than anything in the market. Other vendors' materials are available in the market, but StrongDM materials are not as readily available.

    I rate StrongDM overall six out of ten because I think it is the only product that can mix or be hybrid between on-premises and cloud on the market. I think it is a stable product on the market.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Renard P.

    Secure and User-Friendly Access Solution

    Reviewed on Mar 16, 2026
    Review provided by G2
    What do you like best about the product?
    I find StrongDM very easy to use and user-friendly. It allows our team members to log in to servers without having to leverage their personal accounts, providing a secure way to access our servers. I like how it helps us access servers without revealing personal information, which could be exploited by hackers. This provides us peace of mind in accessing our servers securely.
    What do you dislike about the product?
    N/A
    What problems is the product solving and how is that benefiting you?
    I use StrongDM to securely access servers without revealing personal information, reducing the risk of hacking.
    Sam J.

    Effortless Deployment with Strong Security Controls

    Reviewed on Mar 05, 2026
    Review provided by G2
    What do you like best about the product?
    I like how StrongDM helps us securely manage and control access to critical infrastructures like databases and servers. It enforces least-privilege access, eliminates shared credentials, and provides centralized auditing and visibility. I appreciate that the deployment cycle is short and pretty straightforward. The architecture is non-complicated, and it reduces dependency on servers. The initial setup was very easy.
    What do you dislike about the product?
    Operationalizing StrongDM can be improved. We need to have accelerators to streamline the operational processes.
    What problems is the product solving and how is that benefiting you?
    We use StrongDM to securely manage and control access to critical infrastructures, enforce least-privilege access, and eliminate shared credentials while providing centralized auditing and visibility. It addresses standing privileges, high license costs from competitors, and offers easy deployment.
    View all reviews