Listing Thumbnail

    StrongDM: The Dynamic Access Management Platform

     Info
    Deployed on AWS
    StrongDM is a protocol aware proxy that manages and audits access to databases, servers, clusters, and web apps. StrongDM customers enjoy easy and secure infrastructure access regardless of tech stack or environment.
    4.6

    Overview

    StrongDM is a Dynamic Access Management platform that centralizes privileged access for all technical users to all critical infrastructure. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. End users enjoy fast, intuitive, and auditable access to the resources they need. It seamlessly and securely integrates with every environment and protocol your team needs.

    For custom orders please contact AWS-Marketplace@strongdm.com .

    Highlights

    • StrongDM centralizes access control with authentication, authorization, networking, and observability in a single platform.
    • Least privilege access by default ensures just-right permissions every time.
    • Seamlessly and securely integrate with every database, environment, protocol and tool your team needs.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    StrongDM: The Dynamic Access Management Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor, and additional usage. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for overages or additional usage not covered in the contract. These charges are applied on top of the contract price. If you choose not to renew or replace your contract before the contract end date, access to your entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    StrongDM Essentials
    Includes access to everything: DBs, servers, clusters, and web apps.
    $840.00
    StrongDM Enterprise
    Essentials plus enterprise features for mature tech stacks.
    $1,200.00

    Additional usage costs (2)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Cost/unit
    Additional StrongDM User
    $840.00
    Additional StrongDM Enterprise User
    $100.00

    Vendor refund policy

    For refund policy, visit <www.strongdm.com/tos-client >

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    If you encounter any issues with StrongDM, you can refer to our documentation or contact the team. Email us at support@strongdm.com  or find documentation at

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Network Infrastructure
    Top
    25
    In Continuous Integration and Continuous Delivery

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    35 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Protocol-Aware Proxy Architecture
    Protocol aware proxy that manages and audits access to databases, servers, clusters, and web apps across multiple environments.
    Centralized Access Control
    Centralizes privileged access management with integrated authentication, authorization, networking, and observability capabilities in a single platform.
    Least Privilege Access Enforcement
    Implements least privilege access by default to ensure just-right permissions and eliminate unauthorized and excessive access permissions.
    Comprehensive Audit Logging
    Provides comprehensive audit logs enabling tracking of user actions, resource access, and activities across infrastructure with detailed who, what, where, and when information.
    Multi-Protocol and Multi-Environment Integration
    Seamlessly integrates with multiple databases, environments, protocols, and tools regardless of technology stack or infrastructure type.
    Credential Management
    Discover, secure, and protect account passwords, SSH Keys, API keys, cloud console access, and other privileged credentials
    Session Monitoring and Control
    Isolate, monitor and control all privileged session activity across cloud and on-premises infrastructure with capability to suspend or terminate high-risk sessions
    Secrets Rotation
    Securely store and rotate application credentials based on policy without impacting application performance
    Multi-Environment Support
    Enforce privileged access security policies consistently across cloud, on-premises, and hybrid environments
    Cloud Deployment Automation
    Cloud automation tools simplify and accelerate deployment in cloud environments
    Zero Trust Network Access Architecture
    Cloud-native, unified, API-enabled solution implementing zero trust network access principles with one-to-one encrypted network segments for each user to explicitly granted resource locations
    Multi-Tunnel Encrypted Connectivity
    Delivers consistent secure multi-tunnel access across multi-cloud, on-premises, and legacy applications from any location or device
    Device-Agnostic Access Control
    Supports reliable secure access from managed and unmanaged devices across all makes and models without device-specific restrictions
    Automated Access Management
    Enables concurrent and automated access to multiple disparate environments with explicit resource grant mechanisms, eliminating manual access approval workflows
    Cross-Environment Resource Access
    Provides unified secure access to resources regardless of physical location or virtual segmentation across diverse infrastructure environments

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    105 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    78%
    20%
    2%
    0%
    0%
    2 AWS reviews
    |
    103 external reviews
    External reviews are from G2  and PeerSpot .
    Ibrahim Hassan Barakat

    Secure access to hybrid servers has improved oversight but now needs simpler setup and better guides

    Reviewed on Apr 16, 2026
    Review from a verified AWS customer

    What is our primary use case?

    My use case involves a company I'm working in that wants to secure the connectivity between the DevOps team and the backend server in the company.

    What is most valuable?

    The best features in StrongDM  are that it is the easiest product in the market for this situation with easy access. The DevOps team only needs to log in through StrongDM  with credentials, and then I can control everything after this, including what they are doing inside our servers, their movements, their actions, and everything I can see. One of the most powerful tools in StrongDM is audit logging. I can handle everything and see all that happened inside their movement on the backend server in our company.

    What needs improvement?

    In StrongDM, I think the installation was hard, and they want to be more flexible in the initial setup. I think they want to add more features like traditional PAM. It is difficult to find documentation or materials to review how it works, and there is less product material available in the market.

    For how long have I used the solution?

    I have been using the solution for seven months.

    What do I think about the stability of the solution?

    I rate the stability of the product five out of ten because crashes sometimes happen when we are working on it.

    What do I think about the scalability of the solution?

    I rate scalability five as well.

    How are customer service and support?

    I rate technical support seven out of ten because their response takes much more time than usual. However, at the end, they can help. I think they want to reduce their support staff.

    How was the initial setup?

    The deployment is neither easy nor complex; I think it is in the middle.

    What about the implementation team?

    I am not deploying it, as someone deployed it for me, but I think they put it in the default credential access.

    Which other solutions did I evaluate?

    I compare StrongDM with other vendors like CyberArk or Okta, and I think CyberArk is a heavy PAM. If all my product is on-premises and not cloud and premises, CyberArk will be good for that. However, with StrongDM, I think it is better to work on cloud and on-premises at the same time. I recommend CyberArk if your environment is all on-premises.

    What other advice do I have?

    I am not using the continuous runtime authorization feature, as I think it is not enabled.

    I have my servers on-premises and on AWS .

    For now, I think it is about 53 or 54 users who use the solution.

    StrongDM requires maintenance. In terms of maintenance, it is easy. I think it is easy to maintain, but it is hard to know how to do it because the materials are less than anything in the market. Other vendors' materials are available in the market, but StrongDM materials are not as readily available.

    I rate StrongDM overall six out of ten because I think it is the only product that can mix or be hybrid between on-premises and cloud on the market. I think it is a stable product on the market.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Renard P.

    Secure and User-Friendly Access Solution

    Reviewed on Mar 16, 2026
    Review provided by G2
    What do you like best about the product?
    I find StrongDM very easy to use and user-friendly. It allows our team members to log in to servers without having to leverage their personal accounts, providing a secure way to access our servers. I like how it helps us access servers without revealing personal information, which could be exploited by hackers. This provides us peace of mind in accessing our servers securely.
    What do you dislike about the product?
    N/A
    What problems is the product solving and how is that benefiting you?
    I use StrongDM to securely access servers without revealing personal information, reducing the risk of hacking.
    Sam J.

    Effortless Deployment with Strong Security Controls

    Reviewed on Mar 05, 2026
    Review provided by G2
    What do you like best about the product?
    I like how StrongDM helps us securely manage and control access to critical infrastructures like databases and servers. It enforces least-privilege access, eliminates shared credentials, and provides centralized auditing and visibility. I appreciate that the deployment cycle is short and pretty straightforward. The architecture is non-complicated, and it reduces dependency on servers. The initial setup was very easy.
    What do you dislike about the product?
    Operationalizing StrongDM can be improved. We need to have accelerators to streamline the operational processes.
    What problems is the product solving and how is that benefiting you?
    We use StrongDM to securely manage and control access to critical infrastructures, enforce least-privilege access, and eliminate shared credentials while providing centralized auditing and visibility. It addresses standing privileges, high license costs from competitors, and offers easy deployment.
    reviewer2804475

    Access management has improved privileged logins while still needing fewer crashes and less upkeep

    Reviewed on Feb 23, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My use case for StrongDM  is Privileged Access Management . I have privileged accounts because I am working for the Identity and Access Management  team at my company. As an engineer, I have really privileged or elevated accounts for which I need my account onboarded to StrongDM , so I have to regularly use it.

    What is most valuable?

    The best features in StrongDM are the password rotation capabilities, which I think are pretty cool, and also how you can literally log in to any of the privileged servers through a single platform. You just copy-paste the IP and the port number and log in over there through RDP, so I think that's pretty cool. I have used CyberArk before, but I think StrongDM as a product has pretty good potential.

    My impression of the credential-less access control is that it's pretty good because it reduces the attack surface. Basically, if you cannot see the password and everything, even the privileged users cannot see the password. It's a password-less system where you just log in to the servers without knowing your password, and even if you know your password, it's probably going to be rotated after a while. So, I think that's a pretty good use case for reducing the attack surface and maintaining zero trust throughout an identity perimeter.

    StrongDM helps with runtime features in a twenty-four-seven dynamic environment. Whenever I try to access at maybe two a.m. or three a.m. at night and I have a production issue on a server located in a different continent, I can access it right at that moment. I think the application works pretty much like a charm. It's readily available, and I think the runtime feature is pretty cool, although the application sometimes crashes when it's downloaded locally on your machine.

    Regarding pricing, I find StrongDM to be definitely cost-efficient. We used to use CyberArk before, but StrongDM is more cost-effective, which is why we are using it. Our director is a board member at StrongDM, allowing us to utilize the product and the flexibility it provides, which tailor-suits our needs based on the organization and is something we do not get from other PAM products.

    What needs improvement?

    StrongDM regularly requires patches and maintenance, but I think that's a good question for the PAM architects in our organization.

    If you guys could offer only a cloud-native solution, you would likely cater to different organizations. That could grow the product more.

    For how long have I used the solution?

    I have been using StrongDM for the last one or one and a half years.

    What do I think about the stability of the solution?

    I think the stability of StrongDM is about four to five due to the occasional crashes that I mentioned. The gateway sometimes crashes, and you are unable to retrieve passwords, which I hope they address in the future as the product evolves.

    What do I think about the scalability of the solution?

    Regarding scalability, it's difficult for me to assess because we are a mid-sized organization. Although we have many users, we only have a limited number of privileged accounts that StrongDM caters to. If a larger organization such as Microsoft or Dell adopted it, there would be more privileged accounts, showing the product's potential to grow if issues in maintenance and crashing are resolved.

    How are customer service and support?

    I would rate the technical support seven to eight, for sure.

    Which solution did I use previously and why did I switch?

    We have used CyberArk before. While CyberArk has a lot of fine-grain solutions, the problem is it lacks flexibility. CyberArk is fantastic and has been around for a long time, but it doesn't offer the tailored solution that different organizations need because every organization behaves in different ways. StrongDM provides that flexibility, as it is still growing and works on feedback to help integrate with your environment.

    What other advice do I have?

    I would assess StrongDM's ability to unify access across different systems in my organization as pretty good, despite sometimes facing issues using the platform, probably because of maintenance. Sometimes you are not able to retrieve the password, so it has happened. I'm not going to say that it's a perfect product, but I think they're slowly getting better, and as I said, in the future, this product has potential for hybrid solutions in my company, especially after they got acquired by Delinea.

    Regarding the continuous runtime authorization feature, I haven't utilized that feature in the product myself, but someone else in the organization has. I mostly work with StrongDM as an end user who has privileged accounts onboarded.

    I believe the importance of continuous authorization versus periodic checks is significant. Automatic credential rotation means we do not have to worry about manual checks repeatedly. It is a good solution for continuous authorization, although the challenge remains about how it will support larger organizations with many enterprise privileged accounts.

    I would definitely recommend StrongDM, especially for mid-sized to small organizations. If it's a large organization, I would suggest having them view a demo to see if they are ready to adopt it as a product. My overall review rating for StrongDM is seven out of ten.

    Amine M.

    Essential Access Control with Stellar Support

    Reviewed on Jan 27, 2026
    Review provided by G2
    What do you like best about the product?
    I like the great documentation and responsive support from StrongDM. The tool itself solves a big problem for us by providing control over data store access. I appreciate having a tool that values support and long-term relationships, which is important as we intend to spread the use of the technology widely. The initial setup was also easy.
    What do you dislike about the product?
    I find the UI could be more intuitive and visually appealing. A better user experience for the desktop app would be great. Adding features like a list and grid view, a dark mode view, and icons related to the type of resource to access would make it nicer.
    What problems is the product solving and how is that benefiting you?
    I use StrongDM to provision access control for AWS data stores, providing a unified access point for engineers. It gives us control over data stores access, backed by great documentation and responsive support.
    View all reviews