
WALLIX One helps mitigate risks associated with theft and identity compromise
WALLIX extends its suite of identity and digital access management software via its SaaS platform, WALLIX One. This platform includes essential services designated to …

WALLIX SaaS Remote Access allows organizations to regain control of external remote access
WALLIX has released SaaS Remote Access, the SaaS version of the remote access management technology integrated into WALLIX PAM4ALL, its unified privilege management solution. …

WALLIX PAM4ALL offers protection for user access and workstations
To meet the evolving cyber security challenges that face organisations in today’s digital world, WALLIX has launched its vision PAM for all. To make this a reality for …

WALLIX Bastion 9 protects and monitors privileged accounts
WALLIX launched WALLIX Bastion 9, the newest version of its flagship Privileged Access Management (PAM) solution designed to help customers solve emerging digital challenges …
WALLIX partners with CYBERNOVA adding behaviour analytics into its portfolio
WALLIX announced a new technology partnership with CYBERNOVA. The partnership involves the integration of CYBERNOVA’s Operation Center solution into WALLIX’s flagship …
WALLIX appoints Yoann Delomier as OT Business Developer
WALLIX announced the expansion of its channel team with the appointment of Yoann Delomier as Operational Technology (OT) Business Developer. In his new role, Delomier will be …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility