WALLIX Bastion: Privileged Access Management (PAM)

Comprehensive privileged access management (PAM) system offering centralised control and monitoring of strategic data and critical assets. Ensure protection of your infrastructure against cyber risks through access management, password policies, real-time oversight, suspicious activity detection, and much more!

Centralised Control of Sensitive Assets

WALLIX Bastion is dedicated to protecting your infrastructure against cyber risks

WALLIX remote access offer banner

Gain real-time visibility and analysis of all privileged activities, including full session recording and metadata extraction. With WALLIX Bastion, you can limit visibility of resources from users between primary and target accounts. Ensure that only the authorised users can access the certain resources at specified times with advanced access workflows. Identify suspicious behaviour and trigger automatic session termination. All allowing you to protect credentials, even when leaked, with automatic rotation, periodically or based on check-in/check-out.

The WALLIX Bastion solution supports all technical environments with dedicated protection for on-premise, multisite deployments, and public/private clouds. It’s also compatible with all the leading cloud platforms and can be found on leading Cloud marketplaces.

Why Privileged Account Management? (PAM) Is it really needed?

Across all sectors, a top security priority is guaranteeing control and traceability over third-party service providers in addition to meeting the criteria of a range of mandatory compliance regulations (GDPR, NISD, LPM, PCI-DSS, etc.). PAM (Privileged Access Management) addresses these requirements while strengthening the security of remote connections and protecting the organisations’ strategic resources. Watch the video below to discover 5 real-life scenarios where you need Privileged Access Management:

5 Real-Life Privileged Account Management Scenarios

Wallix Bastion Account Manager Authorisation Management

Wallix Bastion Auth

Control Access to Resources

Real-time visibility of privileged activities including session recording and metadata extraction

  • Authorised users can access authorised resources
  • Credential protection with automatic rotation
  • Limited resource visibility and account segregation
  • Identify suspicious behaviours

Deploy your Defence

  • Centralise user management and target systems
  • Create and enforce password policies for internal and external users
  • Set up authorisation rules and conditions to automatically grant or deny system access

Simplified Build & Run

Solution requiring minimal time to administer, resulting in optimised Total Cost of Ownership

  • Deploy quickly without interruption to workflows
  • Easy to use and easy to integrate, Bastion minimises the ‘Build & Run’ intervention time for IT
  • Integrate seamlessly with existing security (e.g. AD)

Monitor and Review

  • Choose to receive automated alerts for when privileged sessions begin
  • Monitor sessions in real-time with WALLIX 4-Eyes
  • Audit sessions via full recording and metadata extraction

Ensure Regulatory Compliance

Benefit from an all-in-one solution to meet access and data regulations, and compliance requirements

Ensure internal security meets industry standards by protecting and tracing critical data access
Comply with specific regulation requirements with access control, monitoring, and audit capabilities

Terminate Malicious Attempts

  • Distinguish legitimate user sessions from suspicious activity such as unusual command lines or forbidden applications
  • Raise alarms or terminate sessions when malicious activity is detected

An introduction to WALLIX Bastion

Set up Privileged Access Management in less than 15 minutes!


Arrange a FREE online demo or trial with us see how it works live in your working environment.

For more information on WALLIX Bastion Privileged Account Management (PAM) please contact us.

Get in touch

Features

At a glance…

  • ACCESS MANAGER: Grant & control secure access for external connections
  • SESSION MANAGER: Ensure real-time oversight of critical resources
  • PASSWORD MANAGER: Maintain the highest standards of password protection
  • PEDM: Least Privilege protection to secure workstations and servers
  • DISCOVERY: Map and explore your network to unveil hidden privileged accounts
  • AAPM: Application-to-Application Password Management with the Bastion Vault
  • API: Standardised set of API to integrate the Bastion in your provisioning workflow

Detailed feature list

  • Integrate seamlessly with existing security infrastructure (e.g. AD)
  • Centralise management of users and target systems
  • Create and enforce password policies for internal and external users
  • Set up authorisation rules and conditions to automatically grant or deny access to critical systems
  • Receive automatic alerts when privileged sessions begin
  • Monitor sessions in real-time with Session Sharing Audit sessions via full recording and metadata extraction
  • Distinguish legitimate user sessions from suspicious activity
  • Detect unusual command lines or forbidden applications
  • Raise alarms or terminate sessions when malicious activity is detected
  • Ensure that only the authorised user can access the authorised resources at the right time with advanced access workflows
  • Protect credentials, even when leaked, with automatic rotation, periodically or based on check-in/check-out
  • Limit resources visibility from users with strict account segregation between primary and target accounts
  • Identify suspicious behaviour and trigger automatic session termination
  • Deploy quickly and with no interruption to daily workflows, allowing administrators to “set it and forget it”
  • Easy to use and easy to integrate, the Bastion minimises Build & Run intervention time for your IT team
  • Ensure internal security meets industry standards – and avoid penalties by protecting and tracing critical data access
  • Comply with specific regulation requirements with access control, monitoring, and audit capabilities (GDPR, NIS, ISO 27001, HIPAA, PCI DSS, etc.)

For more information on WALLIX Bastion Privileged Account Management (PAM) please contact us.

Get in touch

Latest articles from the Idency Blog

Idency Darts: Rob Adnams updates!

So, as you’ll recall we are sponsoring friend of Idency and darts prodigy Rob Adnams in his quest to join the big leagues. The aim is to go Pro and get on the PDC tour wit...
Read More

Board decision: Idency supports Rob’s Darts target

I’ve always loved the Darts. Well, I say always; apart from the time my dad bought a dartboard to ‘help with my maths’ when I was working towards my GCSEs. On the face of it, it...
Read More

Remote Control: Security challenges of working from home and how to tame them

Or, what the Coronavirus pandemic can teach us about other threats to our security – especially when working from home Ok, I think we can all agree: 2020, in summary, was ...
Read More