Listing Thumbnail

    IDAC

     Info
    Deployed on AWS
    Gain visibility and control of remote connectivity and mitigate security and safety risks without replacing existing systems, disrupting operations, or changing current work routines.

    Overview

    Play video

    Cyolo enables privileged remote operations, connecting verified identities directly to applications with continuous authorization throughout the connection. Purpose-built for deployment in every type of environment, our hybrid secure access solution combines multiple security functions required to mitigate high risk access, including Zero Trust Access for users and devices, MFA including the last mile, IDP, Vault, secure file transfer, supervised access, session recording and much more into a single, cost-effective, easy to deploy, and user-friendly platform.Consolidate your security stack and experience the power of seamless and secure operations across any application in any environment, from critical infrastructure to cloud.

    Highlights

    • ztna vpn

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Ubuntu 24.04

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing and entitlements for this product are managed through an external billing relationship between you and the vendor. You activate the product by supplying a license purchased outside of AWS Marketplace, while AWS provides the infrastructure required to launch the product. AWS Subscriptions have no end date and may be canceled any time. However, the cancellation won't affect the status of the external license.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Vendor refund policy

    n/a

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    Whats New? New Features Recordings are stored only on selected IDACs, not on all of them Session recordings are no longer replicated across all IDACs in the cluster, but only on selected IDACs. External services required by IDAC are proxied through the Private Gateway All IDAC services are now proxied through the Private Gateway, removing the need to open firewall ports. System secrets retrieval Users who have access to system-vault secrets can retrieve the secrets value from the user portal. Latency Measurements Log A new log type captures ongoing latency measurements, available via API and IDAC stdout. Enhanced cluster health alerts Alerts are now raised when the cluster is misconfigured, allowing for proactive identification of health issues. Customizable Device Posture violation messages Admins can now customize messages displayed to users when their devices violate the organizations policy.

    Additional details

    Usage instructions

    Linux Machine Setup Instructions

    1. Log in to the Linux Machine

      ssh cyolo@<Linux-Machine-IP>
    2. Put the License File in the Correct Location

      scp license.cyolo cyolo@<Linux-Machine-IP>:/home/cyolo/tmp/cyolo-build/

      Or if already on the machine:

      mv /path/to/license.cyolo /home/cyolo/tmp/cyolo-build/
    3. Copy the Certificate Files

      scp *.pem cyolo@<Linux-Machine-IP>:/home/cyolo/tmp/cyolo-build/

      Or if already on the machine:

      mv /path/to/*.pem /home/cyolo/tmp/cyolo-build/
    4. Modify /etc/cyolo/config/docker-compose.yml Update the file with the correct upstream setup:

      IDAC: UPSTREAM: <Edge physical IP>:443 UPSTREAM_SNI: tcp.<tenant name>.cyolo.io SITE: <site name> DISABLE_AUTO_UPDATE: true

      For GAUCD and RDP_PROXY, refer to the article: Managed Containers 

    5. Start the Docker Containers

      docker-compose -f /etc/cyolo/config/docker-compose.yml up -d
    6. Check Logs

      docker logs -f config_idac_1 docker logs -f config_router_1
    7. Reset the Admin Password

      docker exec -it config_idac_1 ./idac tinker admin reset-password <password>

    Resources

    Vendor resources

    Support

    Vendor support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    4 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Satish J.

    Review on Cyolo

    Reviewed on Oct 30, 2023
    Review provided by G2
    What do you like best about the product?
    Cyolo helps in ensuring access to trusted applications only
    What do you dislike about the product?
    I don't see any major dislikes or disadvantages of Cyolo. Only thing I noticed that finding right resources for Cyolo.
    What problems is the product solving and how is that benefiting you?
    It helped us to provide secured solutions for the client with zero risk.
    sudipto s.

    Best security tool

    Reviewed on Jul 25, 2023
    Review provided by G2
    What do you like best about the product?
    I must say when we start using this software we are very happy with the support and services.
    What do you dislike about the product?
    Not any bad experience till now we are very happy with the support team
    What problems is the product solving and how is that benefiting you?
    Trusted access to any system on any platform no need to worry about anything, support team is always happy to help and provide always correct solutions.
    Renewables & Environment

    Amazing experience with Cyolo solution

    Reviewed on Mar 08, 2022
    Review provided by G2
    What do you like best about the product?
    Speedy and easy installation, intuitive and fast new access policies.
    What do you dislike about the product?
    Not much actually, I just wish more features (which is on their roadmap BTW)
    What problems is the product solving and how is that benefiting you?
    Remote secure access to 3rd parties and partners. Internal secure access for our employees to sensitive systems
    Recommendations to others considering the product:
    Highly recommended solution for zero trust access
    Alexandre B.

    Cyolo, my goto zero trust solution ! Will secure what was not secured before.

    Reviewed on Jan 26, 2021
    Review provided by G2
    What do you like best about the product?
    Cyolo brings an amazing flexible approach, allowing to get rid of traditional firewall and VPN approach, ensuring we can close the perimeter and implement continuous authentication and authorization mechanism.
    Lately, with the forced remote work, Cyolo brought tremendous advantage as it also allow to remote to legacy systems, enforcing MFA and attribute based authentication, and encryption for systems that natively did not support it. It's my go to zero trust tool box !
    What do you dislike about the product?
    No free trial online immediately available, I like when organization provide live hands on demo immediately
    What problems is the product solving and how is that benefiting you?
    Fixed the remote connectivity issue, with unified controls for all my resources. It covers on prem, cloud challenges too, and allow to bring security on legacy assets.
    It also allows to audit in a single place, all the access to my infrastructure, which is great for visibility and compliance !
    View all reviews