<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

The Bastion secures your applications with AAPM

[fa icon="calendar'] May 11, 2017 12:30:17 PM / by Eric Gaudin posted in Wallix Products

[fa icon="comment"] 0 Comments

The WALLIX Bastion offers AAPM (application-to-application password management) with a fingerprinting proprietary technology to authenticate third party applications.

 

Read More [fa icon="long-arrow-right"]

Using RSA Authentication Manager for PAM

[fa icon="calendar'] Mar 1, 2017 3:43:51 PM / by WALLIX posted in Wallix Products

[fa icon="comment"] 0 Comments

WALLIX’s Privileged Access Management (PAM) solution integrates with the RSA Authentication Manager and has just received the label RSA Ready

 

Read More [fa icon="long-arrow-right"]

Cloud Bastion: WALLIX now on AWS and Azure

[fa icon="calendar'] Dec 30, 2016 4:38:48 PM / by WALLIX posted in Wallix Products

[fa icon="comment"] 0 Comments

In cloud computing, you need a bastion (aka a jumpbox) to provide secure access to your users and outside applications. The bastion is a specialized server that has been hardened against outside attacks and that serves as a gateway for your users.

 

 

Read More [fa icon="long-arrow-right"]

Calling IT Security Channel Partners!

[fa icon="calendar'] Dec 23, 2016 10:22:17 AM / by WALLIX posted in Wallix Products

[fa icon="comment"] 0 Comments

WALLIX has recently seen a big increase in interest in our channel and reseller programs. This dramatic increase is being driven by several trends:

 

 

Read More [fa icon="long-arrow-right"]

We Are PAM, We Are WALLIX

[fa icon="calendar'] Sep 30, 2016 2:46:29 PM / by WALLIX posted in Wallix Products

[fa icon="comment"] 0 Comments

Privileged Access Management (PAM) refers to a set of technologies designed to mitigate the inherent risks associated with the privileged user accounts of administrators and super-users. By providing full control and visibility of the sensitive, daily tasks of such personnel, an effective PAM solution can greatly reduce the risk of attack, while helping to ensure compliance with the relevant regulatory standards.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security