Procyon Revenue and Competitors

Location

N/A

Total Funding

Employee Data

  • Procyon has 17 Employees.(i)
  • Procyon grew their employee count by 0% last year.

Procyon's People

NameTitleEmail/Phone
1
Co-Founder, CTO/VPEngReveal Email/Phone
2
Co-Founder, Chief Product OfficerReveal Email/Phone
3
CTO and Co-FounderReveal Email/Phone
4
Chief Business OfficerReveal Email/Phone
5
Go to Market Sales LeaderReveal Email/Phone
6
Principal MTS (Founding Engineer)Reveal Email/Phone
7
Senior Staff EngineerReveal Email/Phone
8
Senior Staff EngineerReveal Email/Phone
9
Principal EngineerReveal Email/Phone
10
Principal EngineerReveal Email/Phone
Competitor NameRevenueNumber of EmployeesEmployee GrowthTotal FundingValuation
#1
N/A26621%N/AN/A
#2
N/A27922%N/AN/A
#3
N/A5743%N/AN/A
#4
$15M227-14%N/AN/A
#5
N/A3119%$7.7MN/A
#6
N/A6743%N/AN/A
#7
N/A250%N/AN/A
#8
N/A7-88%N/AN/A
#9
$3.5M2673%N/AN/A
#10
N/A210%N/AN/A
Add Company

What Is Procyon?

What if developers don't need any static credentials to access cloud infrastructure? Today's modern enterprises face credential sprawl problems - where the number of credentials to manage is growing exponentially. Developers and admins are often targets of social engineering attacks. Procyon's Cloud Privilege Access Management solution enables enterprises: 1. Implement a self-service portal for developers. Users can request roles, servers, and databases for just-in-time access. When the allocated time expires, the access is revoked automatically. With fine-grained control, users can request the permissions they need or create new roles in AWS or GCP on a need basis. 2. Implement Passwordless Access cloud console and resources. Procyon solution leverages deep integration into cloud-native APIs to provide a passwordless experience. The developers can use native tools such as ssh, aws-cli, gcloud cli, kubectl, etc. The deveopers don't need to go through a jump box to access the resources. 3. Speed up Access Reviews and compliance. The TPM-based solution provides a strong device and user identity. Security teams have detailed visibility into who accessed what, when, how long, and from what device, etc. They even have a kill switch to terminate malicious sessions.

keywords:N/A

N/A

Total Funding

17

Number of Employees

N/A

Revenue (est)

0%

Employee Growth %

N/A

Valuation

N/A

Accelerator

Company NameRevenueNumber of EmployeesEmployee GrowthTotal Funding
#1
$1.5M176%N/A
#2
$3.1M17N/AN/A
#3
$1.5M17-6%N/A
#4
$0.6M17-15%$74M
#5
$1.3M17-15%$20M