<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Eric Gaudin

Overseeing privileged access to your vital infrastructure, Product Marketing, WALLIX

Recent Posts

Enable secure application-to-application communication

[fa icon="calendar'] Jul 13, 2017 4:43:06 PM / by Eric Gaudin posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

I am not just a standalone application, I also need to communicate with my peers!


Read More [fa icon="long-arrow-right"]

Why do you need to build (AD) bridges when there is already a Highway?

[fa icon="calendar'] May 31, 2017 5:48:38 PM / by Eric Gaudin posted in Wallix Products

[fa icon="comment"] 0 Comments

Integration between several worlds (Windows; Unix/Linux etc.) often requires several adapted tools. This relates to AD Bridging integration.



Read More [fa icon="long-arrow-right"]

The Bastion secures your applications with AAPM

[fa icon="calendar'] May 11, 2017 12:30:17 PM / by Eric Gaudin posted in Wallix Products

[fa icon="comment"] 0 Comments

The WALLIX Bastion offers AAPM (application-to-application password management) with a fingerprinting proprietary technology to authenticate third party applications.


Read More [fa icon="long-arrow-right"]

to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security