Balabit Company Overview

4
Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com A Global Leader in Privileged Activity Monitoring and Log Management technologies

Transcript of Balabit Company Overview

Page 1: Balabit Company Overview

Copyright 2000-2014 BalaBit IT Security ■ All rights reserved. ■ www.balabit.com

A Global Leaderin Privileged Activity Monitoring and Log Management technologies

Page 2: Balabit Company Overview

www.balabit.com

But how can you secure your system against its users?By thinking outside the box. Access control defeats its own purpose way too often. Because of its inflexibility it is not able to prevent breaches, though it can seem a very appropriate response. Just like on the street where security is not granted by concrete walls and bulletproof vests but by the police action, security intelligence is the adequate tool against your internal info-criminals. A higher rate of detection - even during preparation - is more deterrent than passive control.

You have a new missionAs an eCSI officer, set up your security intelligence service for intelligence, forensics and countermeasures. You need high-quality, easy-to-use evidence for this job. And we can deliver.

BalaBit certificationsISO 9001During its operation BalaBit meets the requirements of MSZ EN ISO 9001:2009 certification

West Coast LabsOne of the world’s leading independent test facilities Shell Control Box - Performance Validated 2011syslog-ng Store Box - Performance Validated 2011

VMwareVMware Technology Alliance Partnership

Citrix Ready Shell Control Box is a Citrix verified auditing solution

Become an OfficerIf you are aiming to spend your IT security budget responsibly it’s high time to do away with a commonly held fallacy. Today, the greatest risk is not posed by unknown hackers, industrial espionage or malicious code spread by zombie networks. The real damage is done by your own users. They are the ones who use the very corporate password to sign up for phising sites, sell you out to competitors and delete your data to take revenge. Your company becomes a crime scene on a daily basis.

YoY growth rateaverage 30%

Number of employees >150

Number of global customers:commercial customers: 800

23 companies from the Fortune 100 Listopen source installations: over 1 million

Global partner network in 30 countries

Awarded to Deloitte Technology Fast 500 EMEA (2009) and Deloitte Fast 50 CE (2009, 2010, 2012,

2013) Lists

Facts and figures

About BalaBit IT SecurityBalaBit is also known as “the logging company”, based on the company’s flagship product, the open source log server application, which is used in 1 million installations worldwide and became the globally acknowledged de-facto industry standard.

BalaBit IT Security is an innovative information security company, a global leader in the development of Privileged Activity Monitoring, trusted logging and proxy-based gateway technologies to help protect customers against internal and external threats and meet security and compliance regulations. As an active member of the open source community, we provide solutions to a uniquely wide range of both open source and proprietary platforms, even for the most complex and heterogeneous IT systems across physical, virtual and cloud environments.

BalaBit, the fastest-growing IT Security company in the Central European region according to the latest Deloitte Technology Fast 50 list, has local offices in France, Germany, Russia, and in the USA, and cooperates with partners worldwide. Our R&D and global support centers are located in Hungary, Europe.

Page 3: Balabit Company Overview

www.balabit.com

Privileged Activity Monitoring At your company, users at different organizational levels have the possibility to directly access and manipulate sensitive information, such as CRM data, personnel records or credit card numbers. Beyond these privileged users, there are several superusers, as well, such as administrators, IT contractors or executives, who practically have unrestricted access to your information assets. System logging has limitations in tracing what exactly happened in your applications, moreover a skilled administrator (or attacker) can even manipulate logs to cover his tracks. As a result, it is very difficult to answer the question of “who did what?” and even more difficult to provide proof of any misuse.

The Shell Control Box (SCB) solves exactly these problems by introducing an independent auditor layer to oversee the working sessions of your privileged users. Your existing IT environment requires no change and your staff can do their day-to-day jobs without changing their working habits.

ProductsBalaBit IT Security provides unique solutions to IT security and operations challenges for companies in finance, telco, goverment, sector and enterprises under strict IT security policies.

Log ManagementThe syslog-ng Open Source Edition™ is the industry standard Log Management tool used on more than 1 million installations. The syslog-ng project is a continuous community effort to create the best Log Management tool. The project is an advocate and early adopter of open standards, including the syslog RFCs developed by the IETF.

The syslog-ng Premium Edition™ enables enterprises to collect, filter, normalize, forward, and store log messages from across their IT environment. Using syslog-ng Premium Edition, organizations can centralize and simplify their Log Management infrastructure to improve operations, gain visibility of security threats, and meet compliance requirements. It supports over 50 platforms.

The syslog-ng Store Box™ (SSB) is a high-reliability Log Management appliance that builds on the strengths of syslog-ng Premium Edition.

Public References

Page 4: Balabit Company Overview

Copyright 2000-2014 BalaBit IT Security ■ All rights reserved. ■ www.balabit.com