Compare System Frontier и WALLIX Bastion

Take a look at comparison of based on the customers reviews. The rating is calculated in real time from reviews of customers.

Starting price from 1 usd. from 1 usd.
Who this service is for

System Frontier enables organizations to easily delegate granular permissions to Tier 1 support staff, junior administrators, contractors and vendo... Read more

Modular privileged account security solution that automates privileged sessions monitoring, SSH keys and password management.

Rating
4.7 / 5
4 / 5
Cybersecurity software features
Endpoint Management
Endpoint Management
Privileged Access Management software features
Application Access Control
Least Privilege
Remote Access Management
Application Access Control
Least Privilege
Remote Access Management
SIEM software features
User Activity Monitoring
User Activity Monitoring
Access Governance software features
Policy Management
Password Management
Multi-Factor Authentication
Policy Management
Password Management
Multi-Factor Authentication
Password Management software features
Credential Management
Credential Management
Accreditation Management software features
Access Controls/Permissions
Access Controls/Permissions
Interface screenshot
Desktop & Mobile Platforms

Cloud-hosted / box software

Cloud-hosted / box software

Support Working hours, Online Working hours, Online
Training
Documentation
Webinars
Personal
Online
Documentation
Webinars
Personal
Online
Reviews
4 / 5

System Frontier - Excellent product and Support

Benefits:

-Installation is very easy and straight forward. -The Very flexible product, allow for delegation of almost anything. -Support of Powershell, inc... Read more

-Installation is very easy and straight forward. -The Very flexible product, allow for delegation of almost anything. -Support of Powershell, including Powershell library modules (a must in my environment). -Support for Powershell CmdLets and web forms for the arguments (no Web scripting necessary). -Technical support is amazing. One of the best I have experienced so far. Fast and very knowledgeable.

Drawbacks:

The web interface is OK, but need a little work. In our case, only the technical supports use it and not the end user, so it's perfectly fine. In... Read more

Summary:

In Windows environment systems, I managed to delegate most of the tasks through scripting, manipulating ACLs or registry keys, but sometimes it's n... Read more

Adam D.
5 / 5

Fantastic Product

Benefits:

Drawbacks:

Summary:

We use System Frontier to give users in our Finance department the ability to manually execute scheduled tasks that reside on the SQL server; manua... Read more

Quentin B.
5 / 5

excellent product!

Benefits:

Drawbacks:

Summary:

We have been using System frontier for a few months now, it has greatly increased the productivity of the development teams as they can now manage ... Read more

Stevan A.
4 / 5

Wallis Bastion PAM

Benefits:

The most important aspect of any PAM solution is the ease of implementing the solution. Since I have experience using other PAM solution . This sol... Read more

The most important aspect of any PAM solution is the ease of implementing the solution. Since I have experience using other PAM solution . This solution has the min implementation time compared all the solution available in the market.

Drawbacks:

Wallis needs to add more features like out of the box integration softand hard tokens like RSA and PKI cards.

Summary:

Overall experience is good . The solution is very user friendly and has all the necessary features required by a PAM solution.

Rejoy R.

Alternative software

Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. PAM secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups. Learn more about Hitachi ID Bravura Privilege

BeyondTrust Active Directory Bridge centralizes authentication for UNIX, Linux and Mac environments by extending Microsoft Active Directory's Kerberos authentication and single sign-on capabilities to these platforms. By extending Group Policy to these non-Windows platforms BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Learn more about Privilege Management for Unix, Linux, and Networked Devices

Devolutions Server is a full-featured shared account and password management solution, with built-in privileged access components created to meet the ever-expanding security requirements of SMBs. It is fast to deploy and easy to implement and has all the basic features required for a PAM solution while remaining very affordable. When used in combination with Remote Desktop Manager, Devolutions Server forms a robust, privileged account and session management tool integrating over 150+ tools. Learn more about Devolutions Server

rating

4.5 ( 4 reviews )

Identity based granular access control solution for users to access an enterprise's applications on a need-to-know basis. Learn more about Instasafe

XTAM is a privileged account management software which includes Web based password vault with password rotation, discovery, workflow controlled access, high trust login, session and keystroke recording with instant playback, full audit trail, elevated script automation, alerting and extensive analytics. XTAM integrates with AD/LDAP, SIEM, multi factor authentication providers and ticketing systems. XTAM is an agentless, scalable solution for on premises, hybrid and cloud deployments. Learn more about Xton Access Manager

PrivX stands apart from traditional privileged access management (PAM) tools by delivering a lean, cost effective solution. Compared to legacy PAMs, PrivX helps you to: Cut the costs of password lifecycle management and vaulting by granting short-lived authentication to users only when they need it. Economize on deployment and maintenance efforts by avoiding the use of agents on your client workstations and hosts. Learn more about PrivX

Manage, monitor, and control access to your systems, equipment, facilities, and all other critical data. Users can submit an access request that triggers built-in approval workflow. Excellent tool for employee Onboarding. Learn more about Security Access Request Manager

The Ignimission Protec solution helps accelerate the deployment and enhance the value of PAM projects with CyberArk. We manage the entire CyberArk application lifecycle, from project initiation to operations and migration. Learn more about Ignimission Protec

BigID.me brings data trust and transparency to your customers with easy, intuitive, and proactive privacy management. Learn more about BigID.me

Software suite that provides full compliance to organizations. Learn more about ProfileTailor