Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs WALLIX Bastion comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (5th)
WALLIX Bastion
Ranking in Privileged Access Management (PAM)
6th
Average Rating
7.4
Reviews Sentiment
6.7
Number of Reviews
13
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 2.5%, down from 3.6% compared to the previous year. The mindshare of WALLIX Bastion is 4.5%, down from 8.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Endpoint Privilege Manager2.5%
WALLIX Bastion4.5%
Other93.0%
Privileged Access Management (PAM)
 

Featured Reviews

PH
Manager at a computer software company with 1,001-5,000 employees
MFA boosts protection and has blocking capabilities but dependency on other solutions complicates deployment
The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks. The agent may have problems syncing, which complicates deployment, especially when users leave the organization, however, agents remain licensed since the server still maintains licenses. Additionally, compared to other endpoint managers like Thycotic, CyberArk Endpoint Privilege Manager lacks recording capabilities, which limits its functionality for critical applications. A feature that records activity, even when bypassing CyberArk Endpoint Privilege Manager, would be beneficial.
AA
System Engineer at Saudia technic
Password management secures sessions but auditing features need enhancement
The most valuable feature of WALLIX Bastion is its password management capability, which is central to safeguarding sensitive information. The password rotation feature changes passwords after eight sessions, thus protecting both our sessions and assets. Additionally, the workflow feature is unique to WALLIX solutions, enhancing our access security. It is the only solution we found with this feature, making it a distinct choice for our needs.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It offers great performance."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"The product is stable."
"Our setup process is moving to the cloud, which is very good. It reduces complexity."
"We have not had issues with CyberArk. It works very smoothly. We can do many things with CyberArk. It helps us to see exactly what is happening."
"What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
"The department management aspect of the solution is the most valuable aspect."
"CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks."
"Bastion provides a kind of isolation between the administration laptop and the server you want to administer."
"The solution's technical support team is helpful."
"We use WALLIX Bastion to provide access and to monitor sessions."
"WALLIX Bastion is a security tool that protects us, and I think we are protected with this tool."
"Bastion provides a kind of isolation between the administration laptop and the server you want to administer."
"Its video recording capabilities have definitely been key for us."
"The interface is very simple. It doesn't need any plug-ins, just browsers that are installed at the beginning."
"I like that it's Linux-based, and you don't need to have separate implementations, extra database licenses, or enterprise licenses. I think because it's Linux-based, it's more seamless than Windows. I also like the access manager, which I think is a super tool. Everything is browser-based, and you don't need a VPN. So, that's a great thing."
 

Cons

"CyberArk Endpoint Privilege Manager can improve its Identity Governance, which is already working effectively yet could continue to enhance its capabilities."
"The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM."
"Can be improved by allowing computers to be excluded from policies."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"CyberArk should consider whitelisting important applications like PowerShell and DLL that are currently not allowed due to some malicious content."
"The tool should be more user-friendly."
"The product is expensive."
"Technical support is slow to respond when we run into issues."
"I do not find WALLIX Bastion easy to use and ergonomic."
"The password management needs improvement. Management of Access Manager should be improved as well."
"The product doesn't have behavior analytics. They promised to develop this, but only for the cloud, not for on-premise versions."
"For me, the main issue has to do with the system performance itself."
"Based on my experience as a sales tech person, one area of improvement could be a more unified licensing model."
"WALLIX Bastion is GUI-driven, but it sometimes needs some management."
"The performance of WALLIX Bastion's password manager is very low."
"There should be more effort to increase the level of security."
 

Pricing and Cost Advice

"CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
"The tool is priced high. I would rate its pricing an eight out of ten."
"The solution's pricing is reasonable compared to other vendors' products."
"It is an expensive solution."
"It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point."
"Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
"The tool's pricing is reasonable for customers."
"The solution's price is mid-ranged."
"The solution's pricing is comparable to that of other products."
"Some extra price needs to be paid for license."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
883,011 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
9%
Government
8%
Computer Software Company
14%
Financial Services Firm
11%
Government
10%
Comms Service Provider
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise1
Large Enterprise5
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
What is your experience regarding pricing and costs for WALLIX Bastion?
The price of WALLIX Bastion is rated five out of ten, positioning it in the middle. The cost is justified by the features and capabilities we receive.
What needs improvement with WALLIX Bastion?
I do not find WALLIX Bastion easy to use and ergonomic, but I have no clue about how much it costs. When I say it is not easy to use, I mean the interface is complex, but it might not be directly l...
What is your primary use case for WALLIX Bastion?
The major use cases for WALLIX Bastion are general privileged access management, such as connecting to a server or securing SSH.
 

Also Known As

Viewfinity
Bastion
 

Overview

 

Sample Customers

Information Not Available
RTBF, Pharmagest, Michelin Group, Niort Hospital
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. WALLIX Bastion and other solutions. Updated: February 2026.
883,011 professionals have used our research since 2012.