Executive View: BalaBit Shell Control Box - 71123

Report Details

BalaBit IT Security wurde im Jahr 2000 in Ungarn gegründet. Ihr erstes Produkt war eine Application Layer Firewall Suite mit der Bezeichnung Zorp. Seitdem hat BalaBit sich zu einer internationalen Holding mit Sitz in Luxemburg entwickelt und verfügt über Vertriebsstellen in mehreren Ländern Europas, den Vereinigten Staaten und Russland sowie über ein großes Partner-Netzwerk. Das Unternehmen genießt breite Anerkennung in der Open-Source-Community, da sie ihre Hauptprodukte als Open-Source-Editionen unter der GPL-Lizenz zur Verfügung stellen. BalaBits Flaggschiff ist syslog-ng, ein Syslog-Server für verschiedene Unix-basierte Plattformen, der in über einer Million Installationen weltweit eingesetzt wird und de facto als Standard gilt. Dank dieser eindrucksvollen Nutzerbasis konnte das Unternehmen mit Produkten wie z.B. der Shell Control Box, einer Anwendung zur Aktivitätsüberwachung zwecks Kontrolle des privilegierten Fernzugriffs auf IT-Systeme, die privilegierte Aktivitäten in der Form von sogenannten Audit Trails aufzeichnet und böswillige Handlungen unterbindet, in andere Bereiche der Security Intelligence vorstoßen.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jan 19, 2015

Executive View: BalaBit Shell Control Box - 71123

BalaBit IT Security wurde im Jahr 2000 in Ungarn gegründet. Ihr erstes Produkt war eine Application Layer Firewall Suite mit der Bezeichnung Zorp. Seitdem hat BalaBit sich zu einer internationalen Holding mit Sitz in Luxemburg entwickelt und verfügt über Vertriebsstellen in…

€190.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Executive View

ARCON PAM SaaS

Privileged Access Management (PAM) must evolve if it is to meet the demands of different types of organizations and IT architecture. A one size fits all approach does not work in a world where access to privileged accounts is changing. Organizations need PAM solutions that fulfill security…

Whitepaper

Privileged Access Management solutions for Agile, multi-cloud and DevOps environments

Privileged Access Management (PAM) is an important area of risk management and security for any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But changing business practices and upgrades to IT including cloud and…

Executive View

IdentityIQ – SailPoint

IdentityIQ continues to provide organizations with a comprehensive solution to their identity management requirements. With the recent advances in predictive identity management, the tool reduces manual intervention and improves accuracy of user entitlements. The latest release adds cloud…

Executive View

CyberArk

Privileged Access Management (PAM) has evolved into a set of technologies that address some of today's most critical areas of cybersecurity in the context of digital transformation and industrial change. The CyberArk Core Privileged Access Security solution is designed to secure and protect…

Executive View

Executive View: ManageEngine PAM360 - 80140

In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological change. Digital transformation, Cloud, and Hybrid IT environments are putting new demands on PAM and vendors are…

Executive View

Executive View: Hitachi ID Privileged Access Manager - 80142

Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identity Manager and Password Manager products. In the last few years PAM has evolved into a set of targeted…

Executive View

Executive View: Ilantus Compact Identity - 80177

IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Management. Deployment is shifting towards flexible models supporting a range of deployment options, including IDaaS…

Executive View

Executive View: Thycotic Access Controller - 80406

Thycotic is one of the world’s leading providers of Privileged Access Management (PAM) solutions. In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological change.…

Executive View

Executive View: Symantec Privileged Access Manager - 80331

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. This report describes how Symantec Privileged Access Management meets these challenges.

Leadership Compass

Leadership Compass: Privileged Access Management - 80088

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, hybrid IT, cloud and…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Why Digital Trust Is at the Top Of CXOs’ Agenda… Even if They Don’t Realise It

Why Digital Trust Is at the Top Of CXOs’ Agenda… Even if They Don’t Realise It
Ben King

When thinking about the C-suite’s priorities, people tend to focus on growth, security, digital transformation or, more recently, keeping a remote workforce running. All of these aspects are important to keep the business profitable, remain at the forefront of innovation, maintain shareholder satisfaction and ensure that employees are safe, equipped and content. Yet, there is something that underpins every one of these priorities: digital trust. And without it, every area of the business [...]

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00