Skip to main content
TrustRadius
WALLIX Bastion

WALLIX Bastion

Overview

What is WALLIX Bastion?

WALLIX Bastion is a Privileged Access Management (PAM) solution offered by WALLIX. According to the vendor, the product is designed to defend critical assets from cyber-attacks and meet cybersecurity compliance requirements. It is intended for SMEs to large accounts and is used by various professions...

Read more
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is WALLIX Bastion?

The WALLIX Bastion PAM solution delivers security and oversight over privileged access to critical IT infrastructure. It aims to reduce the attack surface and meet regulatory compliance requirements with simplified Privileged Access Management.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

42 people also want pricing

Alternatives Pricing

What is ManageEngine ADManager Plus?

ManageEngine ADManager Plus simplifies enterprise-wide Windows Active Directory management and reporting.

N/A
Unavailable
What is Delinea Server PAM?

Delinea Server PAM solution (Cloud Suite and Server Suite) secures privileged access for servers on both on-premise and cloud/multi-cloud environments. It allows humans and machines to seamlessly authenticate, enforcing least privilege with just-in-time privilege elevation, increasing…

Return to navigation

Product Demos

How to provide secured remote access with WALLIX Bastion?

YouTube

Upravljanje privilegiranih dostopov: demo prikaz rešitve PAM - Wallix Bastion

YouTube

[Demo prikaz] PAM Wallix Bastion

YouTube
Return to navigation

Product Details

What is WALLIX Bastion?

WALLIX Bastion is a Privileged Access Management (PAM) solution offered by WALLIX. According to the vendor, the product is designed to defend critical assets from cyber-attacks and meet cybersecurity compliance requirements. It is intended for SMEs to large accounts and is used by various professions and industries, including IT Network Infrastructure and Security Managers, IT Managers, Cybersecurity Architects, Risk Managers, IT Administrators, Government and Defense, Healthcare, Financial Services, Manufacturing, and Telecommunications.

Key Features

Session Management: According to the vendor, this feature helps defend critical assets from cyber-attacks, achieve cybersecurity compliance requirements, monitor privileged session activity, and increase IT admins' productivity.

Password Management: The vendor claims that this feature allows users to control privileged access with secure password management, manage password complexity, security, and rotation, and simplify IT super administrators' access and control over credentials.

Access Manager: The vendor states that this feature provides secure remote access to critical assets, empowers IT administrators and external providers to connect securely, enables the IT team to ensure the right person has access to the right resource, and eliminates untraceable VPNs, fat clients, or plugins.

PEDM: According to the vendor, this feature allows users to grant the right privileges to IT administrators, control the applications they access on critical assets, eliminate overprivileged users and reduce risk, and establish security policies for applications and processes.

AAPM: The vendor claims that this feature enables users to securely manage and rotate application passwords, simplify password management for IT teams, and improve security posture and reduce risk exposure.

Universal Tunneling: According to the vendor, this feature provides secure external access to critical IT assets, streamlines control over privileges and oversight of privileged activity, has a limited attack surface with a single secured HTTPS entry point, and reduces the total cost of ownership with no VPN clients.

Privilege Elevation and Delegation Management (PEDM, BestSafe): The vendor states that this feature helps eliminate local administrators and limit user rights, establish a Zero Trust policy with comprehensive session monitoring, protect assets with combined user access workflows, credential rotation, and local rights limitation, and fine-tune application rights to prevent known and unknown attacks.

Authenticator (MFA): According to the vendor, this feature increases security with user identity solutions, integrates with other security solutions for SSO and identity federation, supports standard protocols to connect to third-party MFA solutions, and tracks and logs privileged user access for audit purposes.

HA 3+ Clustering: The vendor claims that this feature ensures high availability with 3+ clustering, provides redundancy and failover protection for critical infrastructure, and increases system reliability and uptime.

WALLIX Bastion Video

How to provide secured remote access with WALLIX Bastion?

WALLIX Bastion Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation