Partner Details

Gold Sponsor    Booth: Booth G1

Balabit’s Contextual Security Intelligence Suite protects organizations in real-time from threats posed by the misuse of high risk and privileged accounts. Solutions include reliable system and application Log Management with context enriched data ingestion, Privileged User Monitoring and User Behavior Analytics. Together they can identify unusual user activities and provide deep visibility into potential threats. Working in conjunction with existing control-based strategies Balabit enables a flexible and people-centric approach to improve security without adding additional barriers to business practices. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide. 


 Sponsored Events

Date Title
Feb 21, 2017 Webinar

Privileged User Monitoring as Key Element of Counter-Measures

The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. This extends the risk surface. It is no longer about protecting some centralized servers in a well-secured data center, but about a sprawl of systems and services.

Jan 24, 2017 Webinar

Improving Your SOC Efficiency with Advanced Security Analytics

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security.

Dec 06, 2016 Webinar

Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps

The history of IT Security is only a generation old, yet the direction of the arms race has already changed completely several times. Initially, perimeter-based security – firewalls and anti-virus software – played the most important role at organizations. By the beginning of the new millennium the focus of security turned to identity-based solutions but IAM has also been shown not to be a silver bullet to protect against breaches.

May 10  ‑  May 13, 2016 Congress

European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

May 05  ‑  May 08, 2015 Congress

European Identity & Cloud Conference 2015

European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Apr 14, 2015 Webinar

Monitor your cloud administrators and managed service operators – avoid privilege abuse and fraud

Both the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged operator and administrator access, to these services. Who can manage your cloud services, particularly the ones that offer just one shared administrative account? And who controls the access of external operators to your services?

 Reports

Date Title Price
Aug 03, 2017

Leadership Compass: Privilege Management - 72330

Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische…

€1295.00
Jun 12, 2017

Leadership Compass: Privilege Management - 72330

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and…

€1295.00
Feb 02, 2017

Whitepaper: Balabit - Privilege Management - 72705

Privileged Accounts are the high-risk accounts – and they are the target of attackers, both internals and externals. SOCs must implement modern Privilege Management as part of their…

€295.00
Jun 08, 2016

Executive View: Balabit Contextual Security Intelligence Platform - 71306

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and replaced with…

€190.00
Apr 28, 2016

Executive View: Balabit Shell Control Box - 71570

Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a transparent…

€190.00
Apr 21, 2016

Executive View: Balabit syslog-ng - 71571

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard…

€190.00
Apr 21, 2016

Executive View: Balabit Blindspotter - 71572

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

€190.00
Sep 18, 2015

Executive View: BalaBit Blindspotter - 71202

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

€190.00
Aug 26, 2015

Executive View: BalaBit syslog-ng - 71201

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard…

€190.00
Jul 24, 2014

Executive View: BalaBit Shell Control Box - 71123

BalaBit IT Security was founded in 2000 in Hungary, and their first product was an application layer firewall suite called Zorp. Since that time, BalaBit has grown into an international…

€190.00

 Webcasts

Date Language Title
Feb 22, 2017

Privileged User Monitoring as Key Element of Counter-Measures

The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. This extends...

Jan 25, 2017

Improving Your SOC Efficiency with Advanced Security Analytics

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts coming from...

Dec 07, 2016

Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps

The history of IT Security is only a generation old, yet the direction of the arms race has already changed completely several times. Initially, perimeter-based security – firewalls and anti-virus software – played the most important role at organizations. By the beginning of the new millennium t...

Apr 15, 2015

Monitor Your Cloud Administrators and Managed Service Operators – Avoid Privilege Abuse and Fraud

Both the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged opera...

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00

Information

Congress

European Identity & Cloud Conference 2015

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 05 - 08, 2015 Munich, Germany

Key Topics

  • Assessing and Measuring the Impact of Digital Risk on your Business

  • Identity & Access Management as a Digital Business Enabler

  • Cloud Security, Privacy & Compliance

  • Managing Cyber Risk: Why Defence is not Enough

  • The Impact of the Internet of Things on your Business and Infrastructure

  • IT & OT: Catalyzing the Fusion of two Contrasting Cultures

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00