Procyon Revenue and Competitors
Employee Data
- Procyon has 17 Employees.
- Procyon grew their employee count by 0% last year.
Procyon's People
Name | Title | Email/Phone |
---|---|---|
1 | Co-Founder, CTO/VPEng | Reveal Email/Phone |
2 | Co-Founder, Chief Product Officer | Reveal Email/Phone |
3 | CTO and Co-Founder | Reveal Email/Phone |
4 | Chief Business Officer | Reveal Email/Phone |
5 | Go to Market Sales Leader | Reveal Email/Phone |
6 | Principal MTS (Founding Engineer) | Reveal Email/Phone |
7 | Senior Staff Engineer | Reveal Email/Phone |
8 | Senior Staff Engineer | Reveal Email/Phone |
9 | Principal Engineer | Reveal Email/Phone |
10 | Principal Engineer | Reveal Email/Phone |
Procyon Competitors & AlternativesAdd Company
Competitor Name | Revenue | Number of Employees | Employee Growth | Total Funding | Valuation |
---|---|---|---|---|---|
#1 | N/A | 266 | 21% | N/A | N/A |
#2 | N/A | 279 | 22% | N/A | N/A |
#3 | N/A | 57 | 43% | N/A | N/A |
#4 | $15M | 227 | -14% | N/A | N/A |
#5 | N/A | 31 | 19% | $7.7M | N/A |
#6 | N/A | 67 | 43% | N/A | N/A |
#7 | N/A | 25 | 0% | N/A | N/A |
#8 | N/A | 7 | -88% | N/A | N/A |
#9 | $3.5M | 26 | 73% | N/A | N/A |
#10 | N/A | 21 | 0% | N/A | N/A |
What Is Procyon?
What if developers don't need any static credentials to access cloud infrastructure? Today's modern enterprises face credential sprawl problems - where the number of credentials to manage is growing exponentially. Developers and admins are often targets of social engineering attacks. Procyon's Cloud Privilege Access Management solution enables enterprises: 1. Implement a self-service portal for developers. Users can request roles, servers, and databases for just-in-time access. When the allocated time expires, the access is revoked automatically. With fine-grained control, users can request the permissions they need or create new roles in AWS or GCP on a need basis. 2. Implement Passwordless Access cloud console and resources. Procyon solution leverages deep integration into cloud-native APIs to provide a passwordless experience. The developers can use native tools such as ssh, aws-cli, gcloud cli, kubectl, etc. The deveopers don't need to go through a jump box to access the resources. 3. Speed up Access Reviews and compliance. The TPM-based solution provides a strong device and user identity. Security teams have detailed visibility into who accessed what, when, how long, and from what device, etc. They even have a kill switch to terminate malicious sessions.
keywords:N/AN/A
Total Funding
17
Number of Employees
N/A
Revenue (est)
0%
Employee Growth %
N/A
Valuation
N/A
Accelerator
Company Name | Revenue | Number of Employees | Employee Growth | Total Funding |
---|---|---|---|---|
#1 | $1.5M | 17 | 6% | N/A |
#2 | $3.1M | 17 | N/A | N/A |
#3 | $1.5M | 17 | -6% | N/A |
#4 | $0.6M | 17 | -15% | $74M |
#5 | $1.3M | 17 | -15% | $20M |