Company Website

Ratings and Reviews 96 Ratings

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

What is StrongDM?

The landscape of access and access management has evolved into a more intricate and often frustrating challenge. strongDM reimagines access by focusing on the individuals who require it, resulting in a solution that is not only user-friendly but also maintains rigorous security and compliance standards. This innovative approach is referred to as People-First Access. Users benefit from quick, straightforward, and traceable access to essential resources, while administrators enjoy enhanced control that reduces the risk of unauthorized and excessive permissions. Additionally, teams in IT, Security, DevOps, and Compliance can effortlessly track activities with detailed audit logs answering critical questions about actions taken, locations, and timings. The system integrates seamlessly and securely across various environments and protocols, complemented by reliable 24/7 customer support to ensure optimal functionality. This comprehensive approach guarantees both efficiency and security in managing access.

What is Twingate?

The landscape of work has undergone a significant transformation, enabling individuals to operate from virtually anywhere rather than being confined to their offices. Cloud-based applications have replaced on-premise solutions, leading to a distributed company network perimeter that spans the internet. Traditional VPNs, which focus on network-centric remote access, have become not only cumbersome and outdated but also pose considerable security vulnerabilities for businesses. The costs and resources associated with acquiring, deploying, and maintaining VPN infrastructure can be staggering. When access isn't secured at the application level, hackers may be able to compromise entire networks. Twingate offers a solution for organizations by facilitating the swift implementation of a zero trust network that outperforms VPNs in security. As a cloud-based service, Twingate enables IT teams to establish a software-defined perimeter rapidly without necessitating any changes to existing infrastructure. Moreover, it provides centralized management of user access to internal applications, regardless of whether these applications are hosted in the cloud or on-premise. This modern approach not only enhances security but also simplifies access management across diverse environments.

Media

Media

Integrations Supported

Indent
Amazon CloudWatch
Apache Cassandra
Apache Druid
CockroachDB
Datadog
Docker
Entitle
Fedora
HashiCorp Vault
Intelligent Discovery
Logstash
MySQL
Redis
Scalyr
Syslog-ng
Tableau
Teradata VantageCloud
daydream

Integrations Supported

Indent
Amazon CloudWatch
Apache Cassandra
Apache Druid
CockroachDB
Datadog
Docker
Entitle
Fedora
HashiCorp Vault
Intelligent Discovery
Logstash
MySQL
Redis
Scalyr
Syslog-ng
Tableau
Teradata VantageCloud
daydream

API Availability

Has API

API Availability

Has API

Pricing Information

$70/user/month
Free Trial Offered?
Free Version

Pricing Information

$10 per user per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

StrongDM

Date Founded

2015

Company Location

United States

Company Website

www.strongdm.com/

Company Facts

Organization Name

Twingate

Company Location

United States

Company Website

www.twingate.com

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Customer Identity and Access Management (CIAM)

Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning

Database

Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Categories and Features

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

VPN

Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label

Popular Alternatives

Popular Alternatives

UTunnel VPN and ZTNA Reviews & Ratings

UTunnel VPN and ZTNA

Secubytes LLC
Perimeter 81 Reviews & Ratings

Perimeter 81

Check Point Software Technologies