Listing Thumbnail

    StrongDM: The Dynamic Access Management Platform

     Info
    Deployed on AWS
    StrongDM is a protocol aware proxy that manages and audits access to databases, servers, clusters, and web apps. StrongDM customers enjoy easy and secure infrastructure access regardless of tech stack or environment.
    4.6

    Overview

    StrongDM is a Dynamic Access Management platform that centralizes privileged access for all technical users to all critical infrastructure. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. End users enjoy fast, intuitive, and auditable access to the resources they need. It seamlessly and securely integrates with every environment and protocol your team needs.

    For custom orders please contact AWS-Marketplace@strongdm.com .

    Highlights

    • StrongDM centralizes access control with authentication, authorization, networking, and observability in a single platform.
    • Least privilege access by default ensures just-right permissions every time.
    • Seamlessly and securely integrate with every database, environment, protocol and tool your team needs.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    StrongDM: The Dynamic Access Management Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor, and additional usage. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for overages or additional usage not covered in the contract. These charges are applied on top of the contract price. If you choose not to renew or replace your contract before the contract end date, access to your entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    StrongDM Essentials
    Includes access to everything: DBs, servers, clusters, and web apps.
    $840.00
    StrongDM Enterprise
    Essentials plus enterprise features for mature tech stacks.
    $1,200.00

    Additional usage costs (2)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Cost/unit
    Additional StrongDM User
    $840.00
    Additional StrongDM Enterprise User
    $100.00

    Vendor refund policy

    For refund policy, visit <www.strongdm.com/tos-client >

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    If you encounter any issues with StrongDM, you can refer to our documentation or contact the team. Email us at support@strongdm.com  or find documentation at

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Network Infrastructure
    Top
    25
    In Continuous Integration and Continuous Delivery

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    32 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Protocol-Aware Proxy Architecture
    Protocol aware proxy that manages and audits access to databases, servers, clusters, and web apps across multiple environments.
    Centralized Access Control
    Centralizes privileged access management with integrated authentication, authorization, networking, and observability capabilities in a single platform.
    Least Privilege Access Enforcement
    Implements least privilege access by default to ensure just-right permissions and eliminate unauthorized and excessive access permissions.
    Comprehensive Audit Logging
    Provides comprehensive audit logs enabling tracking of user actions, resource access, and activities across infrastructure with detailed who, what, where, and when information.
    Multi-Protocol and Multi-Environment Integration
    Seamlessly integrates with multiple databases, environments, protocols, and tools regardless of technology stack or infrastructure type.
    Credential Management
    Discover, secure, and protect account passwords, SSH Keys, API keys, cloud console access, and other privileged credentials
    Session Monitoring and Control
    Isolate, monitor and control all privileged session activity across cloud and on-premises infrastructure with capability to suspend or terminate high-risk sessions
    Secrets Rotation
    Securely store and rotate application credentials based on policy without impacting application performance
    Multi-Environment Support
    Enforce privileged access security policies consistently across cloud, on-premises, and hybrid environments
    Cloud Deployment Automation
    Cloud automation tools simplify and accelerate deployment in cloud environments
    Zero Trust Network Access
    Implements Zero Trust Network Access (ZTNA) architecture for secure access control
    Multi-Tunnel Access
    Provides consistent secure multi-tunnel access across multiple cloud environments, on-premises infrastructure, and legacy applications
    Cross-Device Support
    Supports secure access from managed and unmanaged devices across all makes and models
    Standalone Appliance Deployment
    Deployable as a single standalone SDP appliance with 25-user license capacity
    Multi-Cloud and Legacy Application Integration
    Enables unified secure access for multi-cloud workloads, on-premises systems, and legacy applications

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    103 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    79%
    20%
    1%
    0%
    0%
    1 AWS reviews
    |
    102 external reviews
    External reviews are from G2  and PeerSpot .
    Sam J.

    Effortless Deployment with Strong Security Controls

    Reviewed on Mar 05, 2026
    Review provided by G2
    What do you like best about the product?
    I like how StrongDM helps us securely manage and control access to critical infrastructures like databases and servers. It enforces least-privilege access, eliminates shared credentials, and provides centralized auditing and visibility. I appreciate that the deployment cycle is short and pretty straightforward. The architecture is non-complicated, and it reduces dependency on servers. The initial setup was very easy.
    What do you dislike about the product?
    Operationalizing StrongDM can be improved. We need to have accelerators to streamline the operational processes.
    What problems is the product solving and how is that benefiting you?
    We use StrongDM to securely manage and control access to critical infrastructures, enforce least-privilege access, and eliminate shared credentials while providing centralized auditing and visibility. It addresses standing privileges, high license costs from competitors, and offers easy deployment.
    reviewer2804475

    Access management has improved privileged logins while still needing fewer crashes and less upkeep

    Reviewed on Feb 23, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My use case for StrongDM  is Privileged Access Management . I have privileged accounts because I am working for the Identity and Access Management  team at my company. As an engineer, I have really privileged or elevated accounts for which I need my account onboarded to StrongDM , so I have to regularly use it.

    What is most valuable?

    The best features in StrongDM are the password rotation capabilities, which I think are pretty cool, and also how you can literally log in to any of the privileged servers through a single platform. You just copy-paste the IP and the port number and log in over there through RDP, so I think that's pretty cool. I have used CyberArk before, but I think StrongDM as a product has pretty good potential.

    My impression of the credential-less access control is that it's pretty good because it reduces the attack surface. Basically, if you cannot see the password and everything, even the privileged users cannot see the password. It's a password-less system where you just log in to the servers without knowing your password, and even if you know your password, it's probably going to be rotated after a while. So, I think that's a pretty good use case for reducing the attack surface and maintaining zero trust throughout an identity perimeter.

    StrongDM helps with runtime features in a twenty-four-seven dynamic environment. Whenever I try to access at maybe two a.m. or three a.m. at night and I have a production issue on a server located in a different continent, I can access it right at that moment. I think the application works pretty much like a charm. It's readily available, and I think the runtime feature is pretty cool, although the application sometimes crashes when it's downloaded locally on your machine.

    Regarding pricing, I find StrongDM to be definitely cost-efficient. We used to use CyberArk before, but StrongDM is more cost-effective, which is why we are using it. Our director is a board member at StrongDM, allowing us to utilize the product and the flexibility it provides, which tailor-suits our needs based on the organization and is something we do not get from other PAM products.

    What needs improvement?

    StrongDM regularly requires patches and maintenance, but I think that's a good question for the PAM architects in our organization.

    If you guys could offer only a cloud-native solution, you would likely cater to different organizations. That could grow the product more.

    For how long have I used the solution?

    I have been using StrongDM for the last one or one and a half years.

    What do I think about the stability of the solution?

    I think the stability of StrongDM is about four to five due to the occasional crashes that I mentioned. The gateway sometimes crashes, and you are unable to retrieve passwords, which I hope they address in the future as the product evolves.

    What do I think about the scalability of the solution?

    Regarding scalability, it's difficult for me to assess because we are a mid-sized organization. Although we have many users, we only have a limited number of privileged accounts that StrongDM caters to. If a larger organization such as Microsoft or Dell adopted it, there would be more privileged accounts, showing the product's potential to grow if issues in maintenance and crashing are resolved.

    How are customer service and support?

    I would rate the technical support seven to eight, for sure.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We have used CyberArk before. While CyberArk has a lot of fine-grain solutions, the problem is it lacks flexibility. CyberArk is fantastic and has been around for a long time, but it doesn't offer the tailored solution that different organizations need because every organization behaves in different ways. StrongDM provides that flexibility, as it is still growing and works on feedback to help integrate with your environment.

    What other advice do I have?

    I would assess StrongDM's ability to unify access across different systems in my organization as pretty good, despite sometimes facing issues using the platform, probably because of maintenance. Sometimes you are not able to retrieve the password, so it has happened. I'm not going to say that it's a perfect product, but I think they're slowly getting better, and as I said, in the future, this product has potential for hybrid solutions in my company, especially after they got acquired by Delinea.

    Regarding the continuous runtime authorization feature, I haven't utilized that feature in the product myself, but someone else in the organization has. I mostly work with StrongDM as an end user who has privileged accounts onboarded.

    I believe the importance of continuous authorization versus periodic checks is significant. Automatic credential rotation means we do not have to worry about manual checks repeatedly. It is a good solution for continuous authorization, although the challenge remains about how it will support larger organizations with many enterprise privileged accounts.

    I would definitely recommend StrongDM, especially for mid-sized to small organizations. If it's a large organization, I would suggest having them view a demo to see if they are ready to adopt it as a product. My overall review rating for StrongDM is seven out of ten.

    Amine M.

    Essential Access Control with Stellar Support

    Reviewed on Jan 27, 2026
    Review provided by G2
    What do you like best about the product?
    I like the great documentation and responsive support from StrongDM. The tool itself solves a big problem for us by providing control over data store access. I appreciate having a tool that values support and long-term relationships, which is important as we intend to spread the use of the technology widely. The initial setup was also easy.
    What do you dislike about the product?
    I find the UI could be more intuitive and visually appealing. A better user experience for the desktop app would be great. Adding features like a list and grid view, a dark mode view, and icons related to the type of resource to access would make it nicer.
    What problems is the product solving and how is that benefiting you?
    I use StrongDM to provision access control for AWS data stores, providing a unified access point for engineers. It gives us control over data stores access, backed by great documentation and responsive support.
    Marketing and Advertising

    Simple, Stable Access Management That Just Works

    Reviewed on Jan 23, 2026
    Review provided by G2
    What do you like best about the product?
    I'm a user of StrongDM which my company set up for us. Simplicity of mapping remote ports/servers to local port, easy to ssh and connect to databases. It's been stable and I almost don't notice it's there. Customer support responds quickly and patiently helped me solve my problem.
    What do you dislike about the product?
    Nothing for now, it's been working great.
    What problems is the product solving and how is that benefiting you?
    I no longer need to keep track of the url and port of a hundred remote servers, databases and machines.
    Financial Services

    Simplified Secure Access with Audit-Ready Reporting

    Reviewed on Jan 22, 2026
    Review provided by G2
    What do you like best about the product?
    StrongDM makes access management simple and secure across databases, servers, and cloud tools. The setup process was straightforward, and onboarding has been smooth for both admins and developers. I also appreciate the centralized audit logs and fine-grained access controls, which save a lot of time and make it easier to manage permissions consistently. Overall, it feels like a reliable, scalable tool for modern teams.
    What do you dislike about the product?
    SDM is not supported Azure Databricks onboarding with Entra Redirect and Login which is pure need for fintech services. Also the Azure storage account we are not also able to on board onto SDM.

    If this is implemented then for fintech is a game changer.
    What problems is the product solving and how is that benefiting you?
    StrongDM effectively solves access management challenges for our critical fintech production data. The lightweight, user-friendly local client makes development seamless—installation is simple, and connecting to resources via host and dynamic port is effortless. Audit-ready reporting provides clear visibility into who accessed what and when, along with structured access revocation workflows. Overall, it’s a secure, reliable, and developer-friendly solution.
    View all reviews