Session Manager

Secure, Control & Audit Privileged Session Activity

Monitoring and recording the activity of privileged users in your IT infrastructure is critical to protecting sensitive assets and complying with strict cybersecurity regulations.

With the WALLIX Bastion Session Manager, gain a real-time view of privileged user activity to monitor actions, record user sessions, and automatically terminate suspicious activity for enhanced threat detection and response.

Ensure privileged session security with an easy-to-use and cost-effective Privileged Session Management solution increasing IT administrators’ productivity and enabling fast and easy control.

Here's How Session Manager Can Help

Regulatory Compliance

Meet regulatory requirements with detailed audit and traceability for robust proof of compliance.

Know precisely who did what on critical IT assets

Comply with GDPR, HIPAA, NIST, ISO 27001 and many more cybersecurity regulations requiring and unalterable trail of session logs

Real-Time Monitoring

Live session sharing enables IT admins to collabourate remotely, participate in training, to monitor system maintenance.

Alerts and automated termination of suspicious activity or unauthorised attempts

OCR Recording and replay of all activity including clicks, keystrokes, and command line while connected to a privileged session

Insider Threat & Zero Trust

Implement a Zero Trust policy with comprehensive session monitoring and management.

Accelerate incident response and analysis with detailed logs and visibility.

Integrate with security platforms, such as SIEM, IDS, and SOAR for deeper analysis

WALLIX Bastion Session Management

Manage access and activity of privileged users through comprehensive session monitoring and recording, including real-time alerting and session sharing for complete privileged session oversight.

  • Meet compliance requirements (HIPAA, GDPR, PCI-DSS, NIST, etc.) with audit and tracing capabilities
  • Deploy rapidly into existing environments to optimise Total Cost of Ownership (TCO)
  • Leverage a modern user interface with advanced components and design to improve workflows administration
  • Enable auditors to view privileged users’ activity in real time, interact, and to immediately kill malicious sessions in case of emergency with Session Sharing
  • Protect against suspicious files thanks to integration with ICAP-based antivirus solutions, both in RDP and SSH
  • Prevent a user from reconnecting after their session was terminated
  • Implement feature-rich approval workflows for strong control over activity with enforcement of privileged session duration, session uniqueness, and timeout management
  • Easily separate duties to enable dedicated supervisors to handle users while others manage access
  • Leverage OCR recording of all session activity (typed, clicked, and command line), “4-Eyes” supervision, and more high-level features
  • Connect with external password vaults
  • Protect against malicious activity with privilege elevation and delegation management.
[PRODUCT_DOCUMENTS]

Other Wallix Bastion Features

Session Manager

Defend your critical assets from cyber-attack with powerful and easy-to-use Privileged Session Management capabilities.  Achieve cybersecurity compliance requirements and monitor privileged session activity, all while increasing IT admins’ productivity and enabling and easy control over privileged access.

The WALLIX Session Manager offers IT leaders a powerful solution to manage, control and audit access to network assets with strong security posture ensuring that only the right person has access to the right IT resources.

More Info

Password Manager

Securely store credentials in a controlled vault and protect passwords against theft and sharing thanks to high-end encryption.  Eliminate the use of passwords written on sticky notes or stored in unsecured Excel files, or worse, saved in clear text scripts for all to discover.  Leverage high-level password security controls as well as Application-to-Application Password management for tight control over privileged credentials.

The WALLIX Password Manager enables IT leaders to easily control and manage their passwords, secrets and credentials.  It operates with the WALLIX vault or integrates with third-party vaults to protect and enhance existing investments.

More Info

Access Manager

Enable secure remote access for IT administrators and external providers to connect safely from anywhere with secure-by-design capabilities; empower your IT team to ensure that only the right person can access the right resource for the right purpose.

Eliminate the need to open an RDP, SSH, or Telnet connection thanks to the Access Manager’s HTML5 browser-based connectivity with session management.  No additional plugins or fat clients needed on endpoints, and no untraceable VPN infrastructure to secure access to critical resources.

The WALLIX Access Manager offers advanced multi-Bastion Global Search capabilities for privileged session forensic analysis and can distinguish tenants spanning across several Bastion instances, for a global multi-tenant Privileged Access Management architecture.

More Info

PEDM

Admin rights can introduce critical vulnerabilities to your vital assets.  Ensure that the right privilege is granted to the right user at the right time, without compromising productivity.

Privilege Elevation and Delegation Management offers Least Privilege control over access rights to your most sensitive IT resources.  Eliminate overprivileged users and minimize security risks without impeding your teams’ productivity.

More Info

AAPM

Enable DevOps and Robotic Processes to automatically access critical IT resources in real time without vulnerable, hard-coded credentials left in scripts.  The AAPM module is an easy-to-install software that works with Ansible, Terraform, and other similar tools to allow sealed access to target passwords stored in the WALLIX Bastion Vault.

The WALLIX Application-to-Application Password Manager enables DevOps to access critical resources without ever knowing the credentials.  All secrets are safely stored and AAPM enables completely secure access for DevOps tools or robots for unrivaled security and control and unimpacted productivity.

More Info