CHANNELS

Subscribe to the InfoTech eNewsletter

infoTECH News

TMCNet:  BalaBit IT Security Expands Privileged Activity Monitoring and Trusted Logging Technology to North American Security Market

[February 24, 2014]

BalaBit IT Security Expands Privileged Activity Monitoring and Trusted Logging Technology to North American Security Market

(Marketwire Via Acquire Media NewsEdge) NEW YORK, NY and SAN FRANCISCO, CA -- (Marketwired) -- 02/24/14 -- BalaBit IT Security (www.balabit.com) today announced the company is continuing its North American expansion at the RSA Conference 2014, Feb. 24-28 in San Francisco. BalaBit will exhibit in Booth #709 as part of the OATH (Initiative for Open Authentication) Pavillion.

BalaBit is a global leader in the development of privileged activity monitoring, trusted logging and proxy-based gateway technologies. BalaBit is a fastest growing IT security software developer company based on Deloitte Technology Fast 50 CE Lists, where BalaBit has been included four times in recent years. The company has offices in France, Germany, Russia, and in the USA, as well as partners globally. The company's headquarters, research and development, and global support centers are located in Hungary.

The company is now expanding its global presence to extend the reach of its technology, work with key technology innovators and North American partners and clients.

"As a freshman at RSA, we are really looking forward this conference where our flagship product is going to debut in the U.S. After achieving popularity in the states with our log management solution called syslog-ng, we would like to equal and even exceed this success in the rapidly growing market of Privileged Activity Monitoring. Our Shell Control Box is the leading PAM product in Europe and I believe that our product portfolio forms a really attractive solution for many American enterprises," said Zoltán Györko, CEO of BalaBit IT Security.

"Today, the greatest risk is not posed by ad-hoc hackers, industrial espionages or malicious codes spread by zombie networks. No, the real damage is done by internal and external users. They are the ones who use the very corporate password to sign up for phishing sites, sell confidential information out to competitors and crack your website exploiting a vulnerability. Companies become a crime scene on a daily basis. We help our customers to face this problem and to solve it business-friendly without bad compromises," he explained.

At the RSA Conference, the company will showcase its Shell Control Box� privileged activity monitoring appliance that controls access to remote servers and networking devices and records activities in screenshot-based audit trails that can be searched and replayed, like a movie. The privileged activity monitoring appliance takes real-time prevention to the next level and protects existing security investments by integrating with all popular password management solutions. It monitors the blind spots in an IT system, and by watching the audit trails, enables security managers to do a more efficient job of preventing, blocking and analyzing security incidents.

BalaBit will educate attendees about today's most pressing security topics such as: How to prevent the most costly security incidents, caused by malicious privileged accounts? Who are the privileged users at a company and what are the key security threats that are associated with them? What are the 10 Best Practices to eliminate the risks of privileged users?Receive Free Expo Pass and CapVisit the RSA Conference 2014 expo with a free Expo Pass courtesy of BalaBit by using code EC4OATH during registration process. The company is also offering a free baseball cap at https://www.balabit.com/lp/free-expo-pass-for-rsa-conference-2014.

About BalaBitBalaBit IT Security is an innovative information security company, a global leader in the development of privileged activity monitoring, trusted logging and proxy-based gateway technologies to help protect customers against internal and external threats and meet security and compliance regulations. As an active member of the open source community, we provide solutions to a uniquely wide range of both open source and proprietary platforms, even for the most complex and heterogeneous IT systems across physical, virtual and cloud environments.

BalaBit is also known as "the syslog-ng company", based on the company's flagship product, the open source log server application, which is used by more than 1 million companies worldwide and became the globally acknowledged de-facto industry standard.

For more information, visit www.balabit.com.

The syslog-ng�, the syslog-ng Store Box�, the Shell Control Box� and the Zorp� as well as the BalaBit� names are registered trademarks of BalaBit IT Security. All other product names mentioned herein are the trademarks of their respective owners.

Dan Chmielewski Madison Alexander PR Office +1 714-832-8716 Mobile: +1 949-231-2965 Email Contact Source: BalaBit IT Security

[ InfoTech Spotlight's Homepage ]


blog comments powered by Disqus

FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter