Partner Details
Stefan-George-Ring 29 • 81929 München • Germany
Phone: +49 (0)89 9308 6477
Fax: +49 (0)89 9308 6467
Internet: http://www.balabit.com/
Balabit’s Contextual Security Intelligence Suite protects organizations in real-time from threats posed by the misuse of high risk and privileged accounts. Solutions include reliable system and application Log Management with context enriched data ingestion, Privileged User Monitoring and User Behavior Analytics. Together they can identify unusual user activities and provide deep visibility into potential threats. Working in conjunction with existing control-based strategies Balabit enables a flexible and people-centric approach to improve security without adding additional barriers to business practices. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide.
Sponsored Events
Date | Title |
---|---|
Feb 21, 2017 |
Webinar
Privileged User Monitoring as Key Element of Counter-MeasuresThe IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. This extends the risk surface. It is no longer about protecting some centralized servers in a well-secured data center, but about a sprawl of systems and services. |
Jan 24, 2017 |
Webinar
Improving Your SOC Efficiency with Advanced Security AnalyticsToday, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. |
Dec 06, 2016 |
Webinar
Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three StepsThe history of IT Security is only a generation old, yet the direction of the arms race has already changed completely several times. Initially, perimeter-based security – firewalls and anti-virus software – played the most important role at organizations. By the beginning of the new millennium the focus of security turned to identity-based solutions but IAM has also been shown not to be a silver bullet to protect against breaches. |
May 10 ‑ May 13, 2016 |
Congress
European Identity & Cloud Conference 2016European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
May 05 ‑ May 08, 2015 |
Congress
European Identity & Cloud Conference 2015European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
Apr 14, 2015 |
Webinar
Monitor your cloud administrators and managed service operators – avoid privilege abuse and fraudBoth the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged operator and administrator access, to these services. Who can manage your cloud services, particularly the ones that offer just one shared administrative account? And who controls the access of external operators to your services? |
Reports
Date | Title | Price |
---|---|---|
Aug 03, 2017 |
Leadership Compass: Privilege Management - 72330Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische… |
€1295.00 |
Jun 12, 2017 |
Leadership Compass: Privilege Management - 72330Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and… |
€1295.00 |
Feb 02, 2017 |
Whitepaper: Balabit - Privilege Management - 72705Privileged Accounts are the high-risk accounts – and they are the target of attackers, both internals and externals. SOCs must implement modern Privilege Management as part of their… |
€295.00 |
Jun 08, 2016 |
Executive View: Balabit Contextual Security Intelligence Platform - 71306Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and replaced with… |
€190.00 |
Apr 28, 2016 |
Executive View: Balabit Shell Control Box - 71570Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a transparent… |
€190.00 |
Apr 21, 2016 |
Executive View: Balabit syslog-ng - 71571The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard… |
€190.00 |
Apr 21, 2016 |
Executive View: Balabit Blindspotter - 71572Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior. |
€190.00 |
Sep 18, 2015 |
Executive View: BalaBit Blindspotter - 71202Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior. |
€190.00 |
Aug 26, 2015 |
Executive View: BalaBit syslog-ng - 71201The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard… |
€190.00 |
Jul 24, 2014 |
Executive View: BalaBit Shell Control Box - 71123BalaBit IT Security was founded in 2000 in Hungary, and their first product was an application layer firewall suite called Zorp. Since that time, BalaBit has grown into an international… |
€190.00 |
Videos
Date | Language | Title |
---|---|---|
Feb 22, 2017 |
![]() |
Privileged User Monitoring as Key Element of Counter-MeasuresThe IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. This extends... |
Jan 25, 2017 |
![]() |
Improving Your SOC Efficiency with Advanced Security AnalyticsToday, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts coming from... |
Dec 07, 2016 |
![]() |
Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three StepsThe history of IT Security is only a generation old, yet the direction of the arms race has already changed completely several times. Initially, perimeter-based security – firewalls and anti-virus software – played the most important role at organizations. By the beginning of the new millennium t... |
Apr 15, 2015 |
![]() |
Monitor Your Cloud Administrators and Managed Service Operators – Avoid Privilege Abuse and FraudBoth the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged opera... |
KuppingerCole PLUS
Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Blog
Informatica is Moving Data Management to the Cloud


Introducing Intelligent Data Management Cloud (IDMC) as a Comprehensive, Cloud-Native, and Cloud-First Approach to Data Management Data is the new gold, the new oil, or whatever. In the cloud, you only own the data, but not the applications, systems, or networks anymore. Data is essential for Digital Transformation. There is so much data that is sprawling that it is hard to keep control of it. And, within the SaaS and PaaS tenants, data is what belongs to the tenant. Many organizations fail in [...]
Latest Insights