• video_forest
    WALLIX ADMINBASTION img01 WAB

We are Wallix


img01

Privileged account traceability Insider threat management

Privileged account traceability Insider threat management

Wallix AdminBastion tracks all connections and actions by privileged users on administered devices: business applications, databases, hypervisors, Windows & Unix/Linux servers, network devices, etc. Via WAB’s audit console, you can view connection logs and monitor sessions in real time.

Session recording Simplified searches
Windows Terminal Server (RDP) or VNC graphic sessions on managed devices can be recorded in video format, and activities performed during command-line sessions (SSH, Telnet, etc.) can be recorded in text file format. Wallix AdminBastion’s Optical Character Recognition (OCR) engine analyses all Windows and VNC graphical sessions, providing a simple means of finding the source of incidents, failures and wrongdoing.

Activity & audit reports
Wallix AdminBastion provides standard reports on global WAB activity (connection logs, number of connections, user rankings, etc.). Wallix’s WAB Report Manager (WRM) add-on solution can be used to create custom statistical and alert reports according to your needs and your business or audit requirements.

Password management Turnover control
WAB includes a password management system that can be used to automatically or manually change the privileged account passwords of administered devices (Windows & Unix/Linux servers and Cisco hardware). It provides secure access to the modified passwords in the event of a major security incident.

Event analysis & OCR Improved visibility
Wallix AdminBastion examines all commands entered during SSH sessions in real time, creating an alert or even terminating the connection if it detects a prohibited string. Wallix AdminBastion’s OCR engine analyses all RDP and VNC sessions in real time so that an alert is sent when the WAB detects any inappropriate behaviour.

Access control
Simple yet powerful rules give you full control over access to devices and applications, using criteria such as the IP address, user name, time frames, protocol, etc.


VISIBILITY AND CONTROL ON PRIVILEGED ACCOUNTS AND USERS
IS KEY FOR YOUR IT SECURITY




NetGain Enterprise Manager (NetGain EM)

With the recent proliferation of targeted attacks, and the numerous risks associated with increased usage of external application hosting and cloud services, the demand for Privileged Access Management (PAM) has grown dramatically worldwide.
Specifically, organisations are increasingly seeking to simplify password management, consolidate their information security policies, secure access to sensitive data and systems, and manage in real-time the activity of their privileged users’, whether internal or external to the organisation.
Furthermore, businesses are looking for solutions that are easy to deploy, that fit their specific needs, and and which are backed by a range of professional support services.

MILLIONS OF SATISFIED CUSTOMERS

Would you like to sign up for our programme? Register your interest below