

CyberArk Endpoint Privilege Manager and WALLIX Bastion are competitors in the endpoint and access management category. Based on user reviews, WALLIX Bastion has the upper hand in terms of features, while CyberArk excels in customer support and pricing, making it ideal for cost-conscious buyers.
Features: CyberArk offers granular policy management, ease of integration with existing systems, and a straightforward setup process. WALLIX Bastion is recognized for comprehensive session management, scalability, and its capability for large-scale deployments.
Room for Improvement: CyberArk users desire an improved reporting mechanism, better analytics, and enhanced documentation. WALLIX users seek more robust operational documentation, better onboarding processes, and improved user guides.
Ease of Deployment and Customer Service: CyberArk is noted for its seamless deployment and responsive support. WALLIX requires more time to deploy, but its advanced features justify this complexity. Both products offer distinct strengths in setup ease and support quality.
Pricing and ROI: CyberArk provides competitive pricing with a quicker ROI, appealing to budget-sensitive users. WALLIX involves a higher initial investment but offers valuable returns over time due to its robust features.
| Product | Mindshare (%) |
|---|---|
| CyberArk Endpoint Privilege Manager | 2.4% |
| WALLIX Bastion | 4.0% |
| Other | 93.6% |

| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 9 |
| Large Enterprise | 18 |
| Company Size | Count |
|---|---|
| Small Business | 10 |
| Midsize Enterprise | 1 |
| Large Enterprise | 5 |
CyberArk Endpoint Privilege Manager enhances security by controlling access, removing admin rights, and managing privileges. It supports diverse environments with simple integration, focusing on credential detection, threat protection, and compliance.
CyberArk Endpoint Privilege Manager secures enterprise passwords, monitors session connections, and enhances cybersecurity by controlling privileged access. It blocks unauthorized applications, monitors user activities, and secures credentials across platforms. Key areas include Just-In-Time Access, privilege separation, and local administrator password rotation. While robust, challenges exist with performance, complexity, and setup. Integration with Linux and Unix needs improvement, requiring advanced reporting tools and easier policy management. Pricing concerns and maintenance issues with Windows servers persist, as well as database issues in the on-prem version.
What are the key features of CyberArk Endpoint Privilege Manager?Organizations deploying CyberArk Endpoint Privilege Manager in industries such as finance, healthcare, and technology benefit from secure credential management across Unix, AWS, and GCP. By implementing privilege separation and monitoring user activities, they achieve effective risk mitigation and compliance across multiple platforms.
WALLIX Bastion is a Linux-based solution designed for password management, access control, and session monitoring. Its browser-based access minimizes VPN needs while supporting third-party access, focusing on compliance and security.
WALLIX Bastion offers comprehensive security features like password rotation and session recording. It ensures secure connections and limits public port exposure, integrating seamlessly with other systems. Although the interface requires simplification, it provides intelligent privilege control and supports secure external vendor connections.
What are the most noteworthy features of WALLIX Bastion?In medical industries, WALLIX Bastion aids in maintaining HIPAA compliance by monitoring sessions, offering secure remote access management crucial for international companies auditing CLI commands. It supports Active Directory security training, benefiting enterprises managing sensitive data and application access.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.