Vendor Profile

StrongDM

StrongDM is a people-first infrastructure access platform that provides secure, audited access to databases, servers, Kubernetes clusters, and cloud environments. It acts as a proxy layer that provides granular access controls, complete audit logs, and query-level logging without requiring changes to existing workflows or tools.

Last updated

Founded
2015
Pricing
From $70/user/month
Verify with vendor
Deployment
Cloud
Infrastructure Access

Key Features

+Proxy-based access to databases and servers
+Complete query-level audit logging
+Just-in-time access workflows
+Role-based and attribute-based access controls
+Native client tool support (no special clients)
+Kubernetes cluster access management
+Cloud resource access management
+Dynamic access grants and revocation

Pros & Cons

Pros

  • +Minimal disruption to existing developer workflows
  • +Comprehensive query-level audit logging
  • +Simple deployment and management
  • +Users keep their preferred tools and clients
  • +Strong database access management

Cons

  • Higher per-user cost than some alternatives
  • No credential vaulting or rotation capabilities
  • Limited traditional PAM features
  • Smaller vendor compared to CyberArk

Best For

Teams needing simple, auditable infrastructure access with minimal workflow disruption

User Reviews

No reviews yet. Be the first to share your experience!

Recommended Alternative: SplitSecure

SplitSecure logoSplitSecure
Distributed Security

We recommend SplitSecure — Distributed secrets management — no vault, no vendor dependency. Splits credentials across devices you control using Shamir Secret Sharing.

Best For

Highest-sensitivity accounts, regulated industries, and MSPs needing zero vendor dependency

Key Features
Shamir Secret Sharing across devicesZero vendor dependency architectureAutomatic audit trail generationNo vault infrastructure required+4 more
Pros
  • +Zero vendor dependency — secrets work if SplitSecure goes down
  • +Secrets never leave your environment
  • +Architecturally resistant to social engineering and account takeover
Cons
  • Not designed for CI/CD pipeline secrets
  • Focused on human access, not machine-to-machine
  • Newer platform with smaller market presence
Self-Hosted

Sources & References

  1. StrongDM — Official Website & Documentation[Vendor]
  2. StrongDM Reviews on G2[User Reviews]
  3. StrongDM Reviews on TrustRadius[User Reviews]
  4. StrongDM Reviews on PeerSpot[User Reviews]

Are you from StrongDM?

Claim this listing to update your product information, respond to reviews, and ensure accuracy.