2019-09-03T08:57:00Z

What is your primary use case for WALLIX Bastion?

Miriam Tover - PeerSpot reviewer
  • 0
  • 24
PeerSpot user
5

5 Answers

PO
Real User
Top 5Leaderboard
2024-01-08T11:08:23Z
Jan 8, 2024

The primary use cases involve privilege access management (PAM). One key use case is vendor desktop privilege monitoring. Additionally, it's effective for managing privileged users.

Search for a product comparison
JudithSOLAHOUE - PeerSpot reviewer
Reseller
Top 5
2023-11-07T13:55:00Z
Nov 7, 2023

The main use case is to protect the access of diffrent companies applications.

RM
Real User
2021-06-29T14:25:51Z
Jun 29, 2021

Managing external vendors or zerotrust users with secure remote connections and audit the critical targets usage with zero management of the organization privileged accounts by these external vendors or providers themselves. Role and time-based access to be more protected and controlled. With solution hardened at top notch to defend all cyber attacks

CK
Real User
2021-03-02T19:25:16Z
Mar 2, 2021

Within our company, there are roughly 200 employees that use this solution, including partners and outsourced employees. There are two of us that handle all maintenance-related issues.

Andrei Bigdan - PeerSpot reviewer
Real User
Top 5Leaderboard
2019-09-03T08:57:00Z
Sep 3, 2019

The system helps ITs and techs by storing all the things that users do to be able to look at their actions and make a decision as to if it's okay to do or not. It helps ensure that users don't break the system.

Learn what your peers think about WALLIX Bastion. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
WALLIX offers cybersecurity and privileged access management solutions that secure and protect your most critical IT assets.
Download WALLIX Bastion ReportRead more