We performed a comparison between CyberArk Privileged Access Manager and WALLIX Bastion based on real PeerSpot user reviews.Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
"The most valuable feature of CyberArk Privileged Access Manager is the vault. I am satisfied with the interface and the documentation."
"We like it for the ability to automatically change passwords. At least for my group, that's the best thing."
"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
"It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
"The solution helps our developers access internal systems. It also helps us in Privilege Access Management."
"The solution is stable."
"CyberArk Privileged Access Manager is stable."
"With CyberArk, you can be fully confident that your existing accounts are secure. You will be 100 percent"
"WALLIX Bastion's most valuable feature is the Access Manager because you can use it and access the data center without any client VPN."
"I like that it's Linux-based, and you don't need to have separate implementations, extra database licenses, or enterprise licenses. I think because it's Linux-based, it's more seamless than Windows. I also like the access manager, which I think is a super tool. Everything is browser-based, and you don't need a VPN. So, that's a great thing."
"If there is an area that has room for improvement, it's probably working with their support and getting people on the phone. That is hard to do with most products in general, but that seems to be the difficult area. The product is fantastic, but sometimes we want somebody on the phone."
"There is a lot of room for improvement in the report section. I also work on other tools, such as Thycotic, which allows you to create customized reports for your organization's needs. In CyberArk, there are limited reports, whereas in Thycotic or some of the other PAM tools, because the database is different, you can customize the report based on your needs through SQL queries."
"The initial setup of CyberArk Privileged Access Manager difficulty depends on the environment that you are implementing it into. However, it typically is simple."
"It should be easier to install. It is a comprehensive product, which makes it difficult to install. You need to have their consulting services in order to get it all installed and set up correctly because there is so much going on. It would be nice if there were an easier way to do the installation without professional services. I suspect they get a fair amount of their money from professional services. So, there is not a huge incentive."
"Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use."
"PAM could be more user-friendly and CyberArk could update the documentation to include more real-world examples. You have to learn it yourself through trial and error. In particular, the online documentation should have more information about troubleshooting."
"Sometimes the infrastructure team is hesitant to provide more resources."
"We would, of course, always prefer it if the pricing was cheaper."
"The performance of WALLIX Bastion's password manager is very low."
"It would be better if I could manage multiple accounts in one place, like CyberArk. With WALLIX, you can only manage one account, and you are given a separate category. You have to click on each connection to do anything. For example, CyberArk might give three options for one connection if you want to have an interactive user-level experience. But with WALLIX, you have to click three times to get that access. Also, the biggest disadvantage of WALLIX is the reporting. I feel like it's very weak in reporting when compared to the other solutions. As a solution, they're good and stable. But they need to make their reports neater and better. Right now, we're going to the console and then pressing buttons every single time."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.
Benefits of CyberArk Privileged Access Manager
Some of CyberArk Privileged Access Manager’s benefits include:
Reviews from Real Users
CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.
PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”
WALLIX offers cybersecurity and privileged access management solutions that secure and protect your most critical IT assets.
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 37 reviews while WALLIX Bastion is ranked 9th in Privileged Access Management (PAM) with 2 reviews. CyberArk Privileged Access Manager is rated 8.4, while WALLIX Bastion is rated 8.6. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of WALLIX Bastion writes "A stable privileged access managed service with an useful secure and seamless access management feature". CyberArk Privileged Access Manager is most compared with Azure Active Directory (Azure AD), Cisco ISE (Identity Services Engine), Delinea Secret Server, SailPoint IdentityIQ and One Identity Safeguard, whereas WALLIX Bastion is most compared with BeyondTrust Privileged Remote Access, One Identity Safeguard, Delinea Secret Server, ManageEngine Password Manager Pro and BeyondTrust Endpoint Privilege Management. See our CyberArk Privileged Access Manager vs. WALLIX Bastion report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.