Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Securden Unified PAM Reviews & Ratings
    12 Ratings
  • Keeper Security Reviews & Ratings
    1,764 Ratings
    Company Website
  • Passwork Reviews & Ratings
    97 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,707 Ratings
    Company Website
  • Securden Password Vault for Enterprises Reviews & Ratings
    55 Ratings
  • Uniqkey Reviews & Ratings
    182 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    684 Ratings
    Company Website
  • Proton Pass Reviews & Ratings
    31,996 Ratings
    Company Website
  • Google Chrome Enterprise Reviews & Ratings
    2,062 Ratings
    Company Website
  • Securden Endpoint Privilege Manager Reviews & Ratings
    7 Ratings
    Company Website

What is WALLIX Bastion?

WALLIX Bastion's Privileged Access Management (PAM) solution is user-friendly and straightforward to implement, delivering strong security and oversight for privileged access to essential IT infrastructure. By streamlining Privileged Access Management, it effectively minimizes the attack surface, secures remote access, and ensures adherence to regulatory compliance standards. Additionally, WALLIX Bastion excels in session management, secrets management, and access management, which are vital for safeguarding IT environments and facilitating Zero Trust policies. It also safeguards both internal and external access to sensitive data, servers, and networks across various sectors, including healthcare, finance, manufacturing, and more. Embracing digital transformation is made easier with secure DevOps capabilities through Application-to-Application Password Management (AAPM). Furthermore, WALLIX Bastion offers the flexibility of deployment either on-premise or in the cloud, ensuring scalability and a low total cost of ownership. Lastly, it seamlessly integrates with a comprehensive suite of security solutions, enhancing the overall security posture.

What is Admin By Request Endpoint Privilege Management?

Quickly enabling Just-In-Time privilege elevation for all employees is essential for modern security. Both workstations and servers can be efficiently managed and onboarded through a user-friendly portal. Utilizing threat and behavior analysis, organizations can detect and thwart malware attacks and data breaches by pinpointing risky users and assets. Instead of elevating user permissions, applications are elevated, which streamlines the process and cuts costs by assigning privileges based on specific users or groups. Whether it's a seasoned developer in IT or a less experienced staff member in HR, there is an appropriate elevation strategy available for every type of user to effectively manage your endpoints. Admin By Request includes a comprehensive set of features that can be tailored to suit the unique requirements of different users or groups, ensuring a customizable approach to security. This flexibility allows organizations to maintain robust security while accommodating diverse workflows.

Media

Media

Integrations Supported

Active Directory
BackBox
Brainwave GRC
ChatGPT
Cyberwatch
DNSWatch
Jira
MetaDefender Vault
Microsoft Entra ID
Microsoft Power BI
Microsoft Teams
OPSWAT MetaDefender
OctoXLabs
Okta
ServiceNow
Slack
Splunk Cloud Platform
ThreatAware
ThreatSync
VirusTotal

Integrations Supported

Active Directory
BackBox
Brainwave GRC
ChatGPT
Cyberwatch
DNSWatch
Jira
MetaDefender Vault
Microsoft Entra ID
Microsoft Power BI
Microsoft Teams
OPSWAT MetaDefender
OctoXLabs
Okta
ServiceNow
Slack
Splunk Cloud Platform
ThreatAware
ThreatSync
VirusTotal

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

WALLIX

Company Location

France

Company Website

www.wallix.com

Company Facts

Organization Name

Admin By Request

Company Location

United States

Company Website

www.adminbyrequest.com/en/endpoint-privilege-management

Categories and Features

Password Management

Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Categories and Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Remote Support

Diagnostic Tools
File Transfer
Live Chat
Real-time Chat
Remote Control
Screen Sharing
Session Recording
Session Transfer
Surveys & Feedback

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

Popular Alternatives

Popular Alternatives