We performed a comparison between BeyondTrust Privileged Remote Access and WALLIX Bastion based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The project goal was to allow staff to run applications with admin privileges without being admins, which was the product's most important feature."
"The security provided by PRA when it comes to access for remote and privileged users has been outstanding. It has met all of our objectives, everything from password rotation to securing and allowing us to clamp down access to the auditing and monitoring features."
"The most valuable feature is that this solution can be implemented regardless of the operating system."
"I like the enterprise credential manager. It's a connector that sits in PRA and tests the credentials for the end user with a process that will clean the password. This is one of PRA's primary features and simplifies user onboarding. There aren't many restrictions or complications. We can add the user while only opening one port, which is more than enough to access the PRA server. Every organization requires only four critical servers out of a hundred and some 50 production servers."
"The visibility of the solution's Vault works as it is supposed to: out-of-the-box for domain accounts, endpoints, and local accounts associated with discovery jobs."
"One of the features that I really like about it is the ability to set a start date, time, and end date for the access. For example, you can set the access for a person from tomorrow, Monday, or Tuesday and ending on a specific period of the day or a specific date. That's really quite helpful."
"We like the integration with Active Directory. It allows us to discover the endpoints and user accounts that need protection. It's a good way of securing our privileged access."
"Its initial setup process is straightforward."
"WALLIX Bastion's most valuable feature is the Access Manager because you can use it and access the data center without any client VPN."
"Its video recording capabilities have definitely been key for us."
"I like that it's Linux-based, and you don't need to have separate implementations, extra database licenses, or enterprise licenses. I think because it's Linux-based, it's more seamless than Windows. I also like the access manager, which I think is a super tool. Everything is browser-based, and you don't need a VPN. So, that's a great thing."
"The support is great. They offer 24/7 support, but the specific level of support depends on your subscription. There's a weekday-only option, and a 24/7 option that covers all days of the week. They also have offices in different regions, including West Africa, so people there can easily get support. There's no need to worry about getting assistance."
"The interface is very simple. It doesn't need any plug-ins, just browsers that are installed at the beginning."
"The solution's technical support team is helpful."
"They could probably integrate a wizard or something like that to add a new use case. It could be something that makes it easier to add a new use case."
"There is no connectivity to the appliance side. There is no API, and it is just difficult for me to capture what version the device is on without going in and doing screenshots. It is a little too secure in that regard, where they don't even trust their product owner. Since a lot of hacks come from the inside, they are probably doing what they need to do out of necessity. It is just that I have to work pretty hard to produce compliance data on the box."
"The solution's Vault is a nice feature. It helps to securely share a security password in teams, but it is not at the level of a password management solution. So, it is just really a vault. We were expecting to have more features to better manage passwords, but that is something that you can work around if you also have a password safe solution. I would like them to have features like password rotation or password auditing, e.g., old passwords."
"The price is pretty expensive."
"One of our gaps or pain points is having multi-factor authentication at the endpoint and using the PRA password injection from BeyondTrust, which does not work in our environment. We can only have MFA at the login of BeyondTrust to check out the password. Therefore, we can't meet our security requirements of having it on the endpoint."
"Its management is through two different portals, and you can't get from one portal to the other. I have to literally open up another website and go into it a different way. There are no inner links between the two. They should interlink the actual virtual server and the appliance. In general, there should be one interface for management for admins."
"Multiple areas can be improved. We've seen lots of updates in the past year. They have a portal where we can submit our ideas. BeyondTrust is immediately implementing user suggestions. The UI could be more informative. Initially, there were two or three connectors, and now we have five or six. It would be nice if they added a few more connectors for third-party integration. There are multiple tools, but the clients may require more for their convenience."
"The solution is very flexible, which is a plus, but I would say the implementation requires someone with knowledge and experience, as it can be easy to get lost in all the details. The implementation process could be streamlined and simplified. Though the complexity of the solution provides greater flexibility, it requires a lot of time to understand it fully."
"There could be more automation features for the solution."
"The product doesn't have behavior analytics. They promised to develop this, but only for the cloud, not for on-premise versions."
"The performance of WALLIX Bastion's password manager is very low."
"Based on my experience as a sales tech person, one area of improvement could be a more unified licensing model."
"It would be better if I could manage multiple accounts in one place, like CyberArk. With WALLIX, you can only manage one account, and you are given a separate category. You have to click on each connection to do anything. For example, CyberArk might give three options for one connection if you want to have an interactive user-level experience. But with WALLIX, you have to click three times to get that access. Also, the biggest disadvantage of WALLIX is the reporting. I feel like it's very weak in reporting when compared to the other solutions. As a solution, they're good and stable. But they need to make their reports neater and better. Right now, we're going to the console and then pressing buttons every single time."
"The password management needs improvement. Management of Access Manager should be improved as well."
"For me, the main issue has to do with the system performance itself."
More BeyondTrust Privileged Remote Access Pricing and Cost Advice →
BeyondTrust Privileged Remote Access is ranked 3rd in Privileged Access Management (PAM) with 21 reviews while WALLIX Bastion is ranked 9th in Privileged Access Management (PAM) with 7 reviews. BeyondTrust Privileged Remote Access is rated 8.6, while WALLIX Bastion is rated 7.8. The top reviewer of BeyondTrust Privileged Remote Access writes "Our support team can do so much more without having to actively engage our customers, which saves us time and money". On the other hand, the top reviewer of WALLIX Bastion writes "Offers secure identity management, privilege control, access monitoring, and risk reduction through controlled access". BeyondTrust Privileged Remote Access is most compared with CyberArk Privileged Access Manager, BeyondTrust Remote Support, BeyondTrust Password Safe, Citrix DaaS (formerly Citrix Virtual Apps and Desktops service) and Apache Guacamole, whereas WALLIX Bastion is most compared with CyberArk Privileged Access Manager, Fudo PAM, One Identity Safeguard, Delinea Secret Server and Teleport. See our BeyondTrust Privileged Remote Access vs. WALLIX Bastion report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.