Overview

Product video
Cyolo enables privileged remote operations, connecting verified identities directly to applications with continuous authorization throughout the connection. Purpose-built for deployment in every type of environment, our hybrid secure access solution combines multiple security functions required to mitigate high risk access, including Zero Trust Access for users and devices, MFA including the last mile, IDP, Vault, secure file transfer, supervised access, session recording and much more into a single, cost-effective, easy to deploy, and user-friendly platform.Consolidate your security stack and experience the power of seamless and secure operations across any application in any environment, from critical infrastructure to cloud.
Highlights
- ztna vpn
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
n/a
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Whats New? New Features Recordings are stored only on selected IDACs, not on all of them Session recordings are no longer replicated across all IDACs in the cluster, but only on selected IDACs. External services required by IDAC are proxied through the Private Gateway All IDAC services are now proxied through the Private Gateway, removing the need to open firewall ports. System secrets retrieval Users who have access to system-vault secrets can retrieve the secrets value from the user portal. Latency Measurements Log A new log type captures ongoing latency measurements, available via API and IDAC stdout. Enhanced cluster health alerts Alerts are now raised when the cluster is misconfigured, allowing for proactive identification of health issues. Customizable Device Posture violation messages Admins can now customize messages displayed to users when their devices violate the organizations policy.
Additional details
Usage instructions
Linux Machine Setup Instructions
-
Log in to the Linux Machine
ssh cyolo@<Linux-Machine-IP> -
Put the License File in the Correct Location
scp license.cyolo cyolo@<Linux-Machine-IP>:/home/cyolo/tmp/cyolo-build/Or if already on the machine:
mv /path/to/license.cyolo /home/cyolo/tmp/cyolo-build/ -
Copy the Certificate Files
scp *.pem cyolo@<Linux-Machine-IP>:/home/cyolo/tmp/cyolo-build/Or if already on the machine:
mv /path/to/*.pem /home/cyolo/tmp/cyolo-build/ -
Modify /etc/cyolo/config/docker-compose.yml Update the file with the correct upstream setup:
IDAC: UPSTREAM: <Edge physical IP>:443 UPSTREAM_SNI: tcp.<tenant name>.cyolo.io SITE: <site name> DISABLE_AUTO_UPDATE: trueFor GAUCD and RDP_PROXY, refer to the article: Managed ContainersÂ
-
Start the Docker Containers
docker-compose -f /etc/cyolo/config/docker-compose.yml up -d -
Check Logs
docker logs -f config_idac_1 docker logs -f config_router_1 -
Reset the Admin Password
docker exec -it config_idac_1 ./idac tinker admin reset-password <password>
Resources
Vendor resources
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Customer reviews
Review on Cyolo
Best security tool
Amazing experience with Cyolo solution
Cyolo, my goto zero trust solution ! Will secure what was not secured before.
Lately, with the forced remote work, Cyolo brought tremendous advantage as it also allow to remote to legacy systems, enforcing MFA and attribute based authentication, and encryption for systems that natively did not support it. It's my go to zero trust tool box !
It also allows to audit in a single place, all the access to my infrastructure, which is great for visibility and compliance !