WALLIX Bastion Valuable Features
Bastion provides a kind of isolation between the administration laptop and the server you want to administer. It offers session management, and you can make videos. Overall, Bastion has several useful features.
View full review »AA
Abdulaziz Alghamdi
System Engineer at Saudia technic
The most valuable feature of WALLIX Bastion is its password management capability, which is central to safeguarding sensitive information. The password rotation feature changes passwords after eight sessions, thus protecting both our sessions and assets. Additionally, the workflow feature is unique to WALLIX solutions, enhancing our access security. It is the only solution we found with this feature, making it a distinct choice for our needs.
View full review »
DN
Dimitri Nokovitch
CEO at EasyPatternZ Incorporated / ArmadAI
The Access Manager and Bastion in WALLIX Bastion are straightforward to use, and their administration of users, groups, and assets is simple to implement and manage. The session management capabilities, which allow for session recording, are valuable, though primarily used for exceptional purposes. The solution's simplicity and ease of setup are notable, requiring short training for local administrators.
View full review »
Buyer's Guide
WALLIX Bastion
June 2025

Learn what your peers think about WALLIX Bastion. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,825 professionals have used our research since 2012.
We use WALLIX Bastion to provide access and to monitor sessions.
View full review »MB
Movses Bagheryan
IT Security Consultant at Softprom GMBH
Bastionis controls all interactions passing through itself. When a connection is established through this system, it audits those connections very well.
View full review »PO
PHILIP OLANIYAN
Relationship Manager at Snapnet Ltd
WALLIX Bastion is one of the premium solutions that is very effective in PAM (Privileged Access Monitoring). One thing it does is secure identity with intelligent privilege control.
Another is essential management, and thirdly, it enables secure vendor and third-party access. Organizations with third-party vendors can use PAM to provide secure access. It ensures proper security and access control, allowing third parties-access to specific network segments. It also reduces risk by enhancing controlled visibility over privileged access for all users within the organization, both internal and privileged users.
For privileged users, it provides a unique password after verifying their details. This password allows access to servers or databases based on approval by the admin or the approving authority. It ensures continuous compliance, simplified with data reporting and deployment security. These features make it highly effective for cybersecurity.
View full review »The solution has the best automation features.
View full review »CK
Christian Katengwa
RSSI at a comms service provider with 10,001+ employees
The security, its video recording capabilities have definitely been key for us. The reason why we deployed this solution in the first place was for the video recording features.
View full review »RM
Reno Mathew
IT engineer at a non-tech company with 11-50 employees
I like the access methods even though browser, console, are normal access.
We can use native tool like direct rdp and ssh or third party remote tool which is controlled, audited and Single signon to devices with privileged account thats management in the solution.
No limitations in access and convenience to use
No agents, activeX or Java to communicate the critical targets from wallix pam solution
Video Recording on top level. Meta data and ocr facilities
you don't need to have separate implementations, extra database licenses, or enterprise licenses. Total one complete solution package.
I think because it's Linux-based solution, it's more lightweight seamless and secure than Windows.
I also like the access manager, which I think is a super tool. Everything is browser-based, and you don't need a VPN, need to dmz the accessmanager. No ports are public. So, that's a great thing.
wallix gives what you exactly want. Everything you need is compliant to this product
View full review »This solution allows me to have an agent event though it's agentless. I use the proxy approach. Some solutions are divided into proxy or agent-based. This solution is agentless, it's by proxy. I'm able to use something like an agent that is encapsulated into this version. It's similar to allowing for hybrid technology. There's no agent, but something like an agent can be launched from the surface.
The newest model can do great things. It can hide passwords, for example. The Password Manager also allows for password retrieval for encrypted passwords. Even if the Password Manager goes down, with a Jiffy Key, a person can retrieve all of their passwords and have them sent to their email.
There is also an Access Manager, which no other solution offers. Each web console can gain access through several PAMs. They need to just open the web browser and everything they need is the browser. They do their work right in the browser window.
The interface is very simple. It doesn't need any plug-ins, just browsers that are installed at the beginning.
View full review »MS
Mohamed SY
IT Security Engineer at a cloud solution provider with self employed
WALLIX Bastion's most valuable feature is the Access Manager because you can use it and access the data center without any client VPN.
View full review »Buyer's Guide
WALLIX Bastion
June 2025

Learn what your peers think about WALLIX Bastion. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,825 professionals have used our research since 2012.