WALLIX

WALLIX

Stand:
  • E120
  • Product Information
  • Images
  • Document
  • Social Media
  • Video

WALLIX is a software company offering Privileged Access Management (PAM), compliance, and traceability solutions. WALLIX has succeeded in combining the three core requirements of managing privileged users, password management, access control and traceability, into a single easy to deploy solution - The WALLIX Bastion.

Products

  • WALLIX Bastion

    With an unobtrusive architecture, full multi-tenancy, and virtual appliance packaging, Bastion is the easiest solution in its category to implement, u...

  • DISCOVERY

    This free module assists administrators in finding all the privileged and service accounts that have authorized access to your network. WALLIX Discove...

Please wait loading...

Please wait loading...

Videos

Documents

  • WALLIX brochure 2.43 MB

    presentation of WALLIX mission and solutions

    17 Apr 2019

Contacts

  • Contact Information

    WALLIX

    www.wallix.com/
    London London United Kingdom
    Tel:  +44 770 337 7994

Product Categories

  1. Product Categories
    Business Continuity / Incident Response
    • Data Breach Incident Management
    Compliance
    • Audit
    • Governance
    • PCI-DSS
    • Security Policy
    Cyber Physical
    • SCADA Security
    Data Protection
    • Data Breaches
    Human Factors
    • Insider Threat
    Network Security
    • Access Rights Management
    Risk Management
    • Risk & Vulnerability Assessment

Case Studies

  • Case Study Swissquote

    Swissquote selects the WALLIX Bastion to control access to its trading servers

  • Case Study PSA

    PSA opts for the WALLIX Bastion to monitor its privileged accounts in a complex environment

  • Case Study Gulf Air

    Gulf Air chooses the WALLIX Bastion to manage and control access to privileged accounts

White Papers

  • What to expect from PAM

    Traditionally privileged access to systems has been a right of those who need to maintain or support IT infrastructure. In some companies, the princip...

  • The CISO's guide to regulatory...

    How to quickly meet regulatory compliance and improve security with PAM

  • PAM in the Cloud: The Importance of...

    The cloud is an attractive target to hackers, and is highly vulnerable to insider threat by negligence or malicious intent. Organizations need to impl...

See all White Papers

Press Releases

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.