DATIVE strengthens its offering with a partnership with WALLIX and their Bastion solution

DATIVE strengthens its offering with a partnership with WALLIX and their Bastion solution

13 feb. 2024Cyber2 minutes
Linkedin

Bastion, an innovative solution for managing privileged accesses

As part of our ongoing commitment to strengthening our customers' industrial cybersecurity, DATIVE is delighted to announce a new strategic partnership with WALLIX, France's leading identity and access management (IAM) solution. This collaboration marks another step forward in our mission to provide cutting-edge solutions in the face of growing threats.

Tangible benefits for our customers

We're delighted to add WALLIX's BASTION solution to our industrial cyber security offering. This solution will enhance your industry's ability to protect itself against cyber threats by minimising the risks associated with unauthorised access.

WALLIX Cybersécurity Simplified


This partnership underlines our commitment to offering solutions that meet the specific challenges of industrial cyber security. By integrating the BASTION solution, we can offer our customers a proactive approach to minimising the risks associated with privileged access.


BASTION's fine-grained authorisation management enables granular privilege allocation, ensuring that only authorised people have access to your business-critical information. This strategy strengthens the resilience of your industrial infrastructure in the face of persistent threats, while meeting the most stringent compliance standards.

An ANSSI-certified, NISv2-compliant solution

WALLIX's BASTION solution is CSPN (First-level security certification) certified by ANSSI (French Cybersecurity Agency), attesting to its effectiveness and compliance with the most rigorous security standards.


This certification, issued by a recognised authority, reinforces BASTION's credibility as a trusted choice for enhancing industrial cyber security.

ANSSI security approval


Moreover, the solution is compatible with the new NISv2 directive, which we mentioned in a previous article (https://www.dative-gpi.com/en/news/nis2).


BASTION offers a solution that meets regulatory expectations, providing robust and scalable protection against emerging cyber threats.

News

News

Cybersecurity in Pharma: network audit for a global injectable drug manufacturer
Cybersecurity
Cybersecurity in Pharma: network audit for a global injectable drug manufacturer

When an industrial network becomes unstable, pharmaceutical production feels the impact immediately. We were engaged to understand, diagnose, and stabilize an environment where each interruption could jeopardize the production of a vital drug. Here is how our team conducted the network audit for a global pharmaceutical leader to restore performance, stability, and cybersecurity.

Know more
Cybersecurity in Water Treatment: Cyber Assessment of WWTPs and Strengthening Their OT Resilience
Cybersecurity
Cybersecurity in Water Treatment: Cyber Assessment of WWTPs and Strengthening Their OT Resilience

A local authority in Savoie operating around twenty wastewater treatment plants (WWTPs) tasked our DATIVE experts with an industrial cybersecurity assessment. Objective: identify OT vulnerabilities, secure the infrastructure, and build a robust action plan to reinforce resilience against cyber threats.

Know more
These workstations will never be patched… but they can become unalterable
Cybersecurity
These workstations will never be patched… but they can become unalterable

This article presents a comprehensive hardening strategy for obsolete workstations to strengthen your industrial cybersecurity. In industrial environments, we regularly encounter outdated systems (Windows 2000 SP4, XP, 7 or old Windows 10). These systems, although critical in industry, can no longer receive patches: license issues, PLC incompatibilities, or risk of production shutdown.

Know more
How to design an ideal architecture for your industries?
Cybersecurity
How to design an ideal architecture for your industries?

Industrial cybersecurity is no longer optional. With the rise of cyber threats, every industry must build an architecture adapted to its OT systems. An effective strategy relies on a detailed analysis of flows, assets, and risks. This article guides you in designing a robust, scalable, and standards-compliant industrial cybersecurity architecture for 2025.

Know more
Vulnerability Management in Industrial Systems (OT): From Theory to Real-World Practice
Cybersecurity
Vulnerability Management in Industrial Systems (OT): From Theory to Real-World Practice

Managing security vulnerabilities in industrial systems has become a key challenge — but one that’s rarely straightforward. With legacy equipment, unpatchable systems, and often incomplete inventories, field teams must navigate significant technical and operational constraints. While standards and frameworks provide valuable guidance, applying them in real industrial environments remains complex. This article explores the real-world obstacles and presents a pragmatic approach to effectively securing existing systems without disrupting operations.

Know more