"When strongDM said deployment would take an hour, I assumed they were full of it and blocked out an entire day. We finished in 45 minutes."

Peter Tormey, Head of Infrastructure, SoFi

sofi-strongdm-customer

PLATFORM ARCHITECTURE

strongDM is a control plane to secure & audit access to databases and servers
strongdm-platform-architecture

BUILT TO SPAN EVERY ENVIRONMENT

strongDM seamlessly connects to your infrastructure wherever it resides: in a corporate office, data center or any cloud. strongDM is software packaged for convenient deployment on a host, either in a Docker container or as a virtual machine. It communicates using the native network protocols of the target systems, regardless of how they’re deployed. strongDM is agentless and does not modify your databases or servers.

CLOUD

Deploy in any cloud provider or region.

ON-PREM

Works with traditional datacenters and networks.

built-for-security

BUILT TO SECURE MISSION-CRITICAL SYSTEMS

Because strongDM integrates with every SSO and credential store, clients authenticate without ever exposing underlying database credentials or ssh keys. Once a session starts, strongDM validates identity at every hop using a device signature and pervasive certificate management. strongDM also upgrades all database encryption transport to the most current version of TLS. strongDM fails closed to ensure a defensive posture at all times.

BUILT FOR RESILIENCE

Your staff expects reliable access to infrastructure. To ensure connectivity, strongDM fully automates relay failover and routes traffic intelligently to the lowest latency path. Even if a proxy goes down, your staff can continue to query or ssh without interruption.
built-for-resilience
built-for-scale

BUILT FOR SCALE

strongDM’s unique architecture scales horizontally with compute and integrates with your dynamic capacity schedulers so you can instantly spin up/down by adding CPU cores on a single system or across multiple systems.

BUILT FOR TRANSPARENCY

strongDM automatically records every user & administrator action in a tamper-proof log. Conveniently review an activity feed of permission changes, password resets, login attempts, queries, ssh commands and RDP sessions. You control the encryption so that the content of your logs is opaque to strongDM.
built-for-audit

GOT QUESTIONS?