StrongDM streamlines secure, password-less access, reducing attack surfaces with its zero trust approach. It integrates smoothly with existing systems supporting IP whitelisting and excels in managing runtime features while offering comprehensive audit logging and seamless resource access.

| Product | Mindshare (%) |
|---|---|
| StrongDM | 2.5% |
| CyberArk Privileged Access Manager | 10.4% |
| Delinea Secret Server | 4.5% |
| Other | 82.6% |
| Type | Title | Date | |
|---|---|---|---|
| Category | Privileged Access Management (PAM) | May 10, 2026 | Download |
| Product | Reviews, tips, and advice from real users | May 10, 2026 | Download |
| Comparison | StrongDM vs CyberArk Privileged Access Manager | May 10, 2026 | Download |
| Comparison | StrongDM vs One Identity Safeguard | May 10, 2026 | Download |
| Comparison | StrongDM vs Okta Platform | May 10, 2026 | Download |
| Title | Rating | Mindshare | Recommending | |
|---|---|---|---|---|
| Cloudflare One | 4.3 | N/A | 100% | 23 interviewsAdd to research |
| Okta Platform | 4.3 | 3.3% | 96% | 109 interviewsAdd to research |
StrongDM provides organizations with enhanced security through features like password rotation and efficient management of access to resources such as EC2 instances, Kubernetes clusters, and databases. Its integration capabilities are complemented by cost-effectiveness compared to competitors like CyberArk. Companies utilize StrongDM for controlling access in dynamic environments, benefiting from audit logging for detailed movement tracking. While users appreciate its efficiency, they also seek improvements in update control and better accompanying documentation. Some express the need for a cloud-native option to address diverse demands, as the current setup can be challenging without comprehensive materials. Flexibility and more traditional PAM features are in demand.
What are StrongDM's key features?In industries managing sensitive data or requiring regulated access, StrongDM is crucial for securing cloud private networks and managing user access to databases and hosts. DevOps teams benefit from its ability to protect connectivity to backend servers, ensuring identity and access management remains robust and adaptable for companies dealing with frequent changes or expansions.
| Author info | Rating | Review Summary |
|---|---|---|
| Iam Engineer at a manufacturing company with 10,001+ employees | 3.5 | I use StrongDM for PAM and value its password rotation and credential-less, single-platform server access, plus cost efficiency versus CyberArk. It’s usually reliable but sometimes crashes or can’t retrieve passwords; patches are frequent. Support is good. I’d recommend it. |
| Director at LivePerson | 4.0 | I value StrongDM as a modern, intuitive PAM solution that significantly reduced developer onboarding time and maintenance. Its features are flawless, setup was easy, and it's superior to CyberArk. Despite being expensive, I rate it 8/10. |
| Senior Network Security Engineer at EMAK For Computer Manufacturing (ECM) | 3.0 | I find StrongDM easy for securing hybrid cloud access and its audit logging powerful. However, installation, documentation, stability, and support are significant challenges, making maintenance difficult despite its hybrid capabilities. |
| Senior Data Engineer at a non-profit with 1,001-5,000 employees | 4.5 | I was part of a team at a startup where we used StrongDM to manage secure access to resources on AWS. It simplified access management over using multiple solutions, though documentation sometimes lagged, and updates could affect existing setups negatively. |
| Senior Devops Engineer at a transportation company with 51-200 employees | 4.5 | We use StrongDM for zero-trust privileged access, appreciating its seamless integration with existing data sources and additional access solutions for remote workers. However, we're limited by its inability to redirect traffic when used as a client-side VPN. |