BeyondTrust Endpoint Privilege Management vs WALLIX Bastion comparison

You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BeyondTrust Endpoint Privilege Management and WALLIX Bastion based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed BeyondTrust Endpoint Privilege Management vs. WALLIX Bastion Report (Updated: September 2023).
734,024 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
"One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD.""Scalability is good. I would rate the scalability a nine out of ten.""It's relatively straightforward to set up, especially if you are deploying to the cloud.""I find the solution’s features like section management, password management, and analytics valuable.""The solution's technical support is good.""The tool is easy to use and deploy. It has PAM capabilities like privilege access. The solution helps with the management of third parties and vendors. It is an effective solution compared to other alternatives.""The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us.""It is straightforward. It is a good technology, and it is made to do one single thing."

More BeyondTrust Endpoint Privilege Management Pros →

"WALLIX Bastion's most valuable feature is the Access Manager because you can use it and access the data center without any client VPN.""The solution's technical support team is helpful."

More WALLIX Bastion Pros →

"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management.""The product should improve its price.""It keeps on breaking every now and then. It is not yet mature. Every time something new comes up or we run into some new issues, the culprit is BeyondTrust because the agents and the adapter are not mature. The new development process goes on, and they're not able to handle things. It should be mature. It shouldn't break every now and then.""They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment.""They need to come up with better integrative options which should be customer-centric.""Its feature for establishing workflows needs improvement.""Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful.""There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."

More BeyondTrust Endpoint Privilege Management Cons →

"The performance of WALLIX Bastion's password manager is very low.""There could be more automation features for the solution."

More WALLIX Bastion Cons →

Pricing and Cost Advice
  • "Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
  • "Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
  • "The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
  • "It was very expensive."
  • "The solution's pricing is high."
  • More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →

  • "The solution's price is mid-ranged."
  • More WALLIX Bastion Pricing and Cost Advice →

    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    734,024 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpoint… more »
    Top Answer:Scalability is good. I would rate the scalability a nine out of ten.
    Top Answer:The solution's technical support team is helpful.
    Top Answer:There could be more automation features for the solution. Also, its user behavior analysis using machine learning needs improvement.
    Average Words per Review
    Average Words per Review
    Also Known As
    BeyondTrust PowerBroker, PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix
    Learn More

    BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

    Key Solutions Include:


    Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.


    Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.


    Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.


    Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

    Learn more at

    WALLIX offers cybersecurity and privileged access management solutions that secure and protect your most critical IT assets.

    Learn more about BeyondTrust Endpoint Privilege Management
    Learn more about WALLIX Bastion
    Sample Customers
    Aera Energy LLC, Care New England, James Madison University
    RTBF, Pharmagest, Michelin Group, Niort Hospital
    Top Industries
    Construction Company14%
    Comms Service Provider14%
    Manufacturing Company14%
    Security Firm14%
    Computer Software Company14%
    Financial Services Firm10%
    Manufacturing Company8%
    Computer Software Company18%
    Comms Service Provider13%
    Financial Services Firm12%
    Company Size
    Small Business46%
    Midsize Enterprise8%
    Large Enterprise46%
    Small Business23%
    Midsize Enterprise14%
    Large Enterprise63%
    Small Business57%
    Large Enterprise43%
    Small Business26%
    Midsize Enterprise15%
    Large Enterprise59%
    Buyer's Guide
    BeyondTrust Endpoint Privilege Management vs. WALLIX Bastion
    September 2023
    Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. WALLIX Bastion and other solutions. Updated: September 2023.
    734,024 professionals have used our research since 2012.

    BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 10 reviews while WALLIX Bastion is ranked 8th in Privileged Access Management (PAM) with 2 reviews. BeyondTrust Endpoint Privilege Management is rated 8.2, while WALLIX Bastion is rated 7.6. The top reviewer of BeyondTrust Endpoint Privilege Management writes "A simple and flexible solution for controlling the access and improving the security posture". On the other hand, the top reviewer of WALLIX Bastion writes "Provides good stability, but its machine-learning features need improvement". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, CyberArk Privileged Access Manager, Delinea Secret Server, Cisco ISE (Identity Services Engine) and Fortinet FortiAuthenticator, whereas WALLIX Bastion is most compared with CyberArk Privileged Access Manager, BeyondTrust Privileged Remote Access, One Identity Safeguard, Delinea Secret Server and Fudo PAM. See our BeyondTrust Endpoint Privilege Management vs. WALLIX Bastion report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.