Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

An open-source interface that ensures secure authentication, management, and auditing of non-human access across various tools, applications, containers, and cloud environments is essential for robust secrets management. These secrets are vital for accessing applications, critical infrastructure, and other sensitive information. Conjur enhances this security by implementing precise Role-Based Access Control (RBAC) to manage secrets tightly. When an application seeks access to a resource, Conjur first authenticates the application, then conducts an authorization assessment based on the established security policy, and subsequently delivers the necessary secret securely. The framework of Conjur is built on the principle of security policy as code, where security directives are documented in .yml files, integrated into source control, and uploaded to the Conjur server. This approach treats security policy with the same importance as other source control elements, fostering increased transparency and collaboration regarding the organization's security standards. Additionally, the ability to version control security policies allows for easier updates and reviews, ultimately enhancing the security posture of the entire organization.

Description

WALLIX Bastion's PAM solution is easy to use and deploy. It provides robust security and oversight of privileged access to critical IT infrastructure. With simplified Privileged Access Management, you can reduce the attack surface, protect remote access, and comply with regulatory compliance requirements. WALLIX Bastion provides top session management, secrets management and access management features to secure IT environments and enable Zero Trust policies. It also protects internal and external access of sensitive data, servers and networks in industries that range from healthcare to finance to industry, manufacturing, and even finance. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion can be used both on-premise or in the cloud for maximum flexibility, scalability and the lowest total cost of ownership. WALLIX Bastion PAM natively integrates to a full suite security solutions

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Brainwave GRC
Cyberwatch
DNSWatch
Qualys WAS
ThreatSync
Check Point IPS
Cloud Foundry
DatAnswers
Datacard Secura
Entrust Identity Essentials
InsightCloudSec
PangaeAPI
Pivotal Tracker
Red Hat OpenShift
Securonix Unified Defense SIEM
TCPWave
Terraform
WALLIX MFA Authenticator
XYGATE Identity Connector

Integrations

Brainwave GRC
Cyberwatch
DNSWatch
Qualys WAS
ThreatSync
Check Point IPS
Cloud Foundry
DatAnswers
Datacard Secura
Entrust Identity Essentials
InsightCloudSec
PangaeAPI
Pivotal Tracker
Red Hat OpenShift
Securonix Unified Defense SIEM
TCPWave
Terraform
WALLIX MFA Authenticator
XYGATE Identity Connector

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

CyberArk

Founded

2013

Country

United States

Website

conjur.org

Vendor Details

Company Name

WALLIX

Country

France

Website

www.wallix.com

Product Features

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Product Features

Password Management

Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Alternatives

HashiCorp Vault Reviews

HashiCorp Vault

HashiCorp
Bravura Safe Reviews

Bravura Safe

Bravura Security
RadiantOne Reviews

RadiantOne

Radiant Logic