DATIVE strengthens its offering with a partnership with WALLIX and their Bastion solution

DATIVE strengthens its offering with a partnership with WALLIX and their Bastion solution

13 feb. 2024Cyber2 minutes
Linkedin

Bastion, an innovative solution for managing privileged accesses

As part of our ongoing commitment to strengthening our customers' industrial cybersecurity, DATIVE is delighted to announce a new strategic partnership with WALLIX, France's leading identity and access management (IAM) solution. This collaboration marks another step forward in our mission to provide cutting-edge solutions in the face of growing threats.

Tangible benefits for our customers

We're delighted to add WALLIX's BASTION solution to our industrial cyber security offering. This solution will enhance your industry's ability to protect itself against cyber threats by minimising the risks associated with unauthorised access.

WALLIX Cybersécurity Simplified


This partnership underlines our commitment to offering solutions that meet the specific challenges of industrial cyber security. By integrating the BASTION solution, we can offer our customers a proactive approach to minimising the risks associated with privileged access.


BASTION's fine-grained authorisation management enables granular privilege allocation, ensuring that only authorised people have access to your business-critical information. This strategy strengthens the resilience of your industrial infrastructure in the face of persistent threats, while meeting the most stringent compliance standards.

An ANSSI-certified, NISv2-compliant solution

WALLIX's BASTION solution is CSPN (First-level security certification) certified by ANSSI (French Cybersecurity Agency), attesting to its effectiveness and compliance with the most rigorous security standards.


This certification, issued by a recognised authority, reinforces BASTION's credibility as a trusted choice for enhancing industrial cyber security.

ANSSI security approval


Moreover, the solution is compatible with the new NISv2 directive, which we mentioned in a previous article (https://www.dative-gpi.com/en/news/nis2).


BASTION offers a solution that meets regulatory expectations, providing robust and scalable protection against emerging cyber threats.

News

News

DATIVE Cybersecurity | Forum In Cyber
Cybersecurity
DATIVE Cybersecurity at Forum In Cyber 2025: Securing Industry Against Cyber Threats

Industry 4.0 is transforming production environments through the connectivity of OT (Operational Technology) systems, SCADA, Industrial IoT, and automated networks. However, this digital transformation also exposes critical infrastructures to increasingly sophisticated cyberattacks.

Know more
Industrial cybersecurity: understanding the risks and protecting yourself
Cybersecurity
Industrial cybersecurity: understanding the risks and protecting yourself

Cybersecurity in industrial environments is a critical issue today. OT (Operational Technology) systems, essential to industry, are prime targets for cybercriminals. Industrial cybersecurity begins by understanding the risks surrounding an industrial infrastructure. This article explores the main OT cybersecurity threats and presents solutions to protect your infrastructure.

Know more
Best practices in industrial cybersecurity: tips and importance!
Cybersecurity
Best practices in industrial cybersecurity: tips and importance!

In a world where Industry 4.0 is revolutionizing production chains, industrial cybersecurity has become essential. The integration of connected technologies exposes industrial systems, historically isolated, to increasingly sophisticated cyber threats. These attacks can disrupt operations, cause significant financial losses, and jeopardize the sustainability of businesses. This article guides you through best practices and highlights the critical importance of industrial cybersecurity. You will discover why securing your infrastructure is crucial in the face of major risks related to cyber threats. We will provide concrete recommendations to protect your facilities and reduce vulnerabilities in your critical systems. Finally, key solutions will be discussed to secure your sensitive data and ensure operational resilience.

Know more
A detailed overview of the EBIOS RM method for analyzing and managing cyber risks within organizations.
Cybersecurity
EBIOS RM: The european reference for cyber risk analysis

In a context where digital threats continue to grow, organizations must adopt solid approaches to identify, assess, and mitigate cybersecurity risks. The EBIOS Risk Manager (EBIOS RM) method, revised in 2024, stands out as an essential solution. Adopted at the european level, this structured method provides a rigorous framework for integrating digital risk management into an organization's overall strategy. This article explores this standard in detail, including its objectives, principles, and practical application.

Know more
A detailed overview of CWE for identifying and addressing security weaknesses in IT systems.
Cybersecurity
Common Weakness Enumeration (CWE): A key framework for securing IT systems

Cybersecurity is an ever-evolving field, with increasingly complex and sophisticated threats. To better identify, understand, and mitigate system vulnerabilities, the security community relies on standards, frameworks, and tools. One of the most important tools in this context is the Common Weakness Enumeration (CWE). Developed by the MITRE Corporation, CWE is a classification system that groups common software and IT system weaknesses. This article will explore what CWE is, its role in cybersecurity, and its application across various sectors, particularly in industrial cybersecurity, where securing critical infrastructures is essential.

Know more