Listing Thumbnail

    StrongDM: The Dynamic Access Management Platform

     Info
    Deployed on AWS
    StrongDM is a protocol aware proxy that manages and audits access to databases, servers, clusters, and web apps. StrongDM customers enjoy easy and secure infrastructure access regardless of tech stack or environment.

    Overview

    StrongDM is a Dynamic Access Management platform that centralizes privileged access for all technical users to all critical infrastructure. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. End users enjoy fast, intuitive, and auditable access to the resources they need. It seamlessly and securely integrates with every environment and protocol your team needs.

    For custom orders please contact AWS-Marketplace@strongdm.com .

    Highlights

    • StrongDM centralizes access control with authentication, authorization, networking, and observability in a single platform.
    • Least privilege access by default ensures just-right permissions every time.
    • Seamlessly and securely integrate with every database, environment, protocol and tool your team needs.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    StrongDM: The Dynamic Access Management Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor, and additional usage. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for overages or additional usage not covered in the contract. These charges are applied on top of the contract price. If you choose not to renew or replace your contract before the contract end date, access to your entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    StrongDM Essentials
    Includes access to everything: DBs, servers, clusters, and web apps.
    $840.00
    StrongDM Enterprise
    Essentials plus enterprise features for mature tech stacks.
    $1,200.00

    Additional usage costs (2)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Cost/unit
    Additional StrongDM User
    $840.00
    Additional StrongDM Enterprise User
    $100.00

    Vendor refund policy

    For refund policy, visit www.strongdm.com/tos-client 

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    If you encounter any issues with StrongDM, you can refer to our documentation or contact the team. Email us at support@strongdm.com  or find documentation at

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Network Infrastructure
    Top
    25
    In Continuous Integration and Continuous Delivery

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    30 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Access Management
    Protocol-aware proxy for managing and auditing access to databases, servers, clusters, and web applications
    Authentication Control
    Centralized authentication and authorization mechanism with least privilege access by default
    Infrastructure Integration
    Seamless integration across multiple environments, protocols, and technical infrastructure
    Security Observability
    Comprehensive audit logging to track user activities, access patterns, and infrastructure interactions
    Network Proxy
    Dynamic access management platform that acts as a secure intermediary for infrastructure resource connections
    Credential Management
    Discover, secure, and protect various types of privileged credentials including passwords, SSH keys, API keys, and cloud console access credentials
    Session Control
    Isolate, monitor, and control privileged session activities across cloud and on-premises infrastructure with capabilities to suspend or terminate high-risk sessions
    Secret Rotation
    Eliminate hard-coded secrets through secure storage and automated credential rotation based on predefined policies without performance impact
    Access Policy Enforcement
    Consistently enforce privileged access security policies across cloud, on-premises, and hybrid computing environments
    Multi-Environment Security
    Provide comprehensive protection for both traditional and modern workloads across diverse infrastructure deployment models
    Zero Trust Network Access
    Provides comprehensive Zero Trust Network Access (ZTNA) solution with multi-tunnel secure access methodology
    Multi-Device Support
    Enables secure access from managed and unmanaged devices across different platforms and models
    Multi-Environment Connectivity
    Supports secure connectivity across multi-cloud, on-premises, and legacy application environments
    Adaptive Access Control
    Implements consistent secure access for users working from various locations and network contexts
    Unified Security Architecture
    Delivers comprehensive security framework with consistent access controls across different user and workload scenarios

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.5
    1 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    100%
    0%
    0%
    0%
    1 AWS reviews
    |
    92 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Information Technology and Services

    Seamless, Secure, and Scalable Access Management

    Reviewed on Jul 02, 2025
    Review provided by G2
    What do you like best about the product?
    StrongDM’s partner-first mindset makes collaboration easy and impactful. Their platform is intuitive and highly secure, which makes it easy for us to recommend to clients across industries. The integration capabilities are top-notch, allowing us to embed StrongDM into complex environments with minimal friction. Most notably, their customer support is exceptional—both our team and our clients consistently receive fast, knowledgeable, and solution-oriented assistance. This level of support strengthens trust and ensures smooth deployments and ongoing success.
    What do you dislike about the product?
    There are a few areas where enhancements could further strengthen the collaboration. A more comprehensive partner portal—with features like real-time deal registration, co-marketing resources, and technical enablement materials—would streamline our joint go-to-market efforts. Additionally, expanding regional partner support, particularly in emerging markets, would help us scale more effectively and respond to local customer needs with greater agility.
    What problems is the product solving and how is that benefiting you?
    StrongDM is solving one of the most pressing challenges in modern IT environments: secure, auditable, and scalable access to infrastructure. Many of our clients struggle with fragmented access controls, manual provisioning, and compliance risks across databases, servers, and Kubernetes clusters. StrongDM addresses these issues by centralizing access management into a single, policy-driven platform that’s both secure and user-friendly. As a partner, this benefits us tremendously—it allows us to deliver faster, more reliable implementations, reduce support overhead, and build long-term trust with clients who value security and operational efficiency. It also opens up new opportunities for us to offer value-added services around access governance and compliance.
    Kyle B.

    StrongDM Makes Access Control Easy

    Reviewed on Jun 25, 2025
    Review provided by G2
    What do you like best about the product?
    StrongDM is incredibly easy to use, with a clean interface that makes managing access straightforward even for non-technical users. What stands out most is their excellent after-sales support—responsive, knowledgeable, and always willing to go the extra mile to help. The auditing is great as you can see graphically what commands where run etc
    What do you dislike about the product?
    There’s not much to dislike. overall a great product but maybe more advanced filtering or search capabilities to better parse logs
    What problems is the product solving and how is that benefiting you?
    StrongDM solves the challenge of managing secure access to infrastructure across a growing number of systems—servers, databases, and Kubernetes clusters—without relying on clunky VPNs or shared credentials
    Gabriel A.

    It was pretty easy to navigate.

    Reviewed on May 23, 2025
    Review provided by G2
    What do you like best about the product?
    The user friendliness of the process, it was very comforting to understand right away.
    What do you dislike about the product?
    The interface, i think it could be designed better.
    What problems is the product solving and how is that benefiting you?
    It’s making my task of managing my direct reports way easier.
    Arnold K.

    App review

    Reviewed on May 20, 2025
    Review provided by G2
    What do you like best about the product?
    It’s a really good app once you start learning how to use it.
    What do you dislike about the product?
    A little difficult to get started. No very good intro to get started to use it.
    What problems is the product solving and how is that benefiting you?
    Securing the information between different enpoints
    Information Technology and Services

    StrongDM Review

    Reviewed on May 20, 2025
    Review provided by G2
    What do you like best about the product?
    Centralized Access Management
    StrongDM provides a unified gateway for managing access to infrastructure, simplifying the handling of permissions across multiple systems.

    Auditability & Session Logging
    Every session (SSH, RDP, Kubernetes, database, etc.) is logged and auditable, which helps with compliance (SOC 2, HIPAA, etc.) and troubleshooting.

    Granular Role-Based Access Control (RBAC)
    Fine-grained RBAC makes it easier to enforce least-privilege policies and control access based on user roles, time-based rules, or resource sensitivity.

    No Credential Sharing
    End users don’t need to know or store passwords, keys, or connection strings. StrongDM handles credentials securely, reducing the risk of leaks.

    Seamless Integration with Existing Identity Providers
    It integrates well with Okta, Azure AD, Google Workspace, and other IdPs, making onboarding and offboarding automated and secure.
    What do you dislike about the product?
    Vendor Lock-in Risk
    Once integrated deeply into your access workflows, migrating away from StrongDM can be complex and costly due to proprietary tooling and workflows.

    Limited Community and Open Source Tools
    Compared to alternatives like HashiCorp Boundary or Teleport, StrongDM lacks a strong open-source ecosystem and community involvement.

    Performance Overhead
    Because StrongDM acts as a proxy/gateway for all traffic, some users report slight latency or bottlenecks under high loads or specific network configurations.
    What problems is the product solving and how is that benefiting you?
    StrongDM helps us solve key challenges around secure infrastructure access, specifically:

    Auditing: Every session and command is logged across SSH, RDP, Kubernetes, and databases, giving us detailed audit trails for compliance (e.g. SOC 2, HIPAA) and security reviews.

    Just-In-Time Access: We can grant time-bound, least-privilege access to sensitive systems, reducing standing permissions and limiting insider risk.

    Access Monitoring: Real-time visibility into who accessed what, when, and how — this improves operational oversight and incident response.

    These features significantly reduce our operational burden and improve our security posture without slowing down engineering workflows.
    View all reviews