Listing Thumbnail

    Procyon: Cloud Privileged Access Manager

     Info
    Out-of-the-box Multi-Cloud Privilege Access Management (PAM) solution for your developers and security teams.

    Overview

    Managing access keys and other forms of static credentials, permissions/policies/roles for users, and meeting compliance requirements in a "dynamic" cloud infrastructure is far more complex than ever.

    Procyon simplifies the complexity of cloud IAM operations and provides frictionless, secure access to cloud infrastructure.

    Core platform pillars include:

    1. Self-Service Portal: Provide developers with a self-service portal to request access for just-in-time. They can select the resources and permission and request time-bound access. Procyon's deep integration with cloud-native APIs will simplify developer access with just enough privileges. Dynamically create & delete roles for least-privilege access.

    2. Approval System: Remove the bottlenecks of centralized IT using a decentralized approval system. Individual teams can manage their accounts and resources. Approval requests are automatically routed to the resource owners. Integrations with Slack and Jira make it easier to approve. Or use Procyon Authenticator apps on IOS or Android devices to approve the requests. Set up policies to auto-approve the requests or manually approve them.

    3. Passwordless Access: Scale faster and stop credential sprawl by eliminating shared accounts and static credentials that are challenging to track. Bad actors on the internet don't break in; they sign into your accounts. With Procyon, developers and security teams don't have to worry about credential theft, as no real credentials are stored on users' devices. SSH, DB access, Kubernetes, cloud-cli, and other DevOps tools work seamlessly.

    4. Procyon Authenticator Apps for Windows, Mac, IOS, and Android: Windows and Mac authenticator App use Trusted Platform Module on the devices to register & connect with Procyon cloud. TPM provides a strong user and device identity. Security teams can easily find at any given instance - which resource is being accessed by which user, what device, which location, and how long. They can terminate the live sessions. Security teams can revoke access confidently. Stop any user, anywhere, anytime. Terminate live sessions instantly.

    For custom pricing, EULA, or a private contract, please email contact@procyon.ai  for a private offer

    Highlights

    • Self-Service Portal: Minimize your organization's attack surface and secure your sensitive data by limiting who gets access and when using a self-service-portal. Developers getting a shopping-cart experience. SSH, DB access, Kubernetes, cloud-cli and other DevOps tools work seamlessly.
    • Go Passwordless: Scale faster and stop credential sprawl by eliminating shared accounts and static credentials that are challenging to track.
    • Multi-Cloud Identity Governance: Simplify cloud IAM Operations with the out-of-the box solution and reduce the operational costs of centralized IT system. Automate risk analysis for all permissions granted to all identities across multi-cloud. Revoke Access Confidently. Stop any user, anywhere, anytime. Terminate live sessions instantly. Get complete visibility into every deployed resource, every user access, and the policies that define and govern access.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Procyon: Cloud Privileged Access Manager

     Info
    Pricing is based on the duration and terms of your contract with the vendor, and additional usage. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for overages or additional usage not covered in the contract. These charges are applied on top of the contract price. If you choose not to renew or replace your contract before the contract end date, access to your entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Procyon User
    Procyon Cloud Privilege Access Management Platform - 50 users
    $30,000.00
    Free Trial
    Free Trial for 5 users, 1 week
    $0.00

    Additional usage costs (1)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Cost/unit
    Per additional Procyon User per year
    $600.00

    Vendor refund policy

    No Refunds except where required by law

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    100
    In Infrastructure as Code
    Top
    10
    In Centralized Identity Management
    Top
    100
    In Applications

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    8 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Access Management
    Provides self-service portal for just-in-time access with dynamic role creation and least-privilege access controls
    Authentication Mechanism
    Implements passwordless access without storing real credentials on user devices, supporting SSH, database, Kubernetes, and cloud CLI access
    Multi-Cloud Integration
    Supports identity governance and access management across multiple cloud infrastructure platforms with deep cloud-native API integration
    Device Authentication
    Utilizes Trusted Platform Module (TPM) for strong user and device identity registration and connection with cloud platform
    Security Monitoring
    Enables real-time tracking of resource access, including user identity, device, location, and session duration with instant session termination capabilities
    Permission Intelligence
    Advanced system that analyzes and understands user and machine permission usage across cloud environments
    Global Default Deny Policy
    Comprehensive access control mechanism that automatically restricts and removes unused permissions and services
    Multi-Cloud Identity Management
    Cross-platform capability to manage and secure cloud identities and permissions across different cloud providers
    Dynamic Permission Workflow
    Automated permissions request and approval system that enables on-demand access with minimal friction
    Attack Surface Reduction
    Systematic approach to quarantine zombie identities, restrict excessive permissions, and disable unused services and regions
    Single Sign-On (SSO)
    Supports automatic user synchronization across multiple directories with one-click access to corporate applications across on-premises and cloud environments
    Multi-Factor Authentication
    Provides diverse authentication methods including passwordless, passkeys, one-time passcodes, push notifications, biometric data, and security keys with real-time reporting capabilities
    Identity Lifecycle Management
    Enables role-based user provisioning with least-privileged access controls and automated user management workflows
    Cloud Directory Services
    Offers secure cloud-based directory management with web interface for managing users, authentication policies, and access controls
    Security Integration
    Supports pre-built authentication connectors with third-party web applications and integrations with cloud infrastructure platforms like AWS IAM, AWS SSO, Amazon Cognito, and Amazon EventBridge

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.