White papers on log and access management

IT Security Compliance for Cloud Service Providers

IT Security Compliance for Cloud Service Providers

From this White Paper you can learn:

  • What are the key compliance trends in the IT service provider industry.
  • What are the key goals and requirements of the ISO27001:2013, PCI-DSS v3.0, CSA-STAR and SSAE 16/ISAE 3402 standards.

Download white paper »


Top 10 Reasons to Monitor Privileged Users

Top 10 Reasons to Monitor Privileged Users

From the Infographics you can learn:

  • Which are the TOP 10 reasons to monitor privileged users' activities.
  • Which solutions companies use to protect themselves against human errors and attacks.

Download infographics »


Log Management Essentials

Log Management Essentials

From this White Paper you can learn:

  • What are the main challenges solved by log management in industries, such as finance or telecommunication
  • What attributes makes a log management infrastructure enterprise class
  • What are the best practices of log management and how you can make the most of your investment

Download white paper »


The Essential Guide to Privileged Activity Monitoring

The Essential Guide to Privileged Activity Monitoring

From this White Paper you can learn:

  • What are the key capabilities of Privileged Activity Monitoring (PAM) solutions and its benefits for you and your customers
  • What are the key privileged user-related challenges which various industries face
  • What are the best practices in order to mitigate the risks related to privileged users

Download white paper »


ISO 27001 Compliance and Log Management

From this White Paper you can learn:

  • Which ISO 27001 objectives and controls can be satisfied using log management.
  • How syslog-ng and the syslog-ng Store Box helps you to comply with ISO 27001:2013 objectives.

Download white paper »


PCI DSS Compliance and Privileged Activity Monitoring

From this White Paper you can learn:

  • What are the access control and user monitoring related requirements of PCI-DSS v3.0.
  • How to satisfy these requirements using the BalaBit Shell Control Box privileged activity monitoring solution.

Download white paper »


PCI DSS compliance and log management

From this White Paper you can learn:

  • What are the main challenges solved by log management in industries, such as finance or telecommunication
  • What are the log management related requirements of PCI-DSS, including archiving and log retention.
  • How to satisfy these requirements using the syslog-ng Store Box and syslog-ng Premium Edition.

Download white paper »


ISO 27001 compliance and Privileged Access Monitoring

From this White Paper you can learn:

  • What SCB is and what are its benefits in a compliance environment.
  • How SCB helps you to comply with ISO 27001:2013 objectives.

Download white paper »


Comply with ISO/IEC 27011

Comply with ISO/IEC 27011

From this White Paper you can learn:

  • What are the most critical security challenges that managers in telecommunication face day by day
  • What are the key goals and requirements of the ISO 27011 telecommunication-specific information security standard
  • How can BalaBit technologies help with ISO 27011 compliance

Download white paper »


Control Your IT Staff

Control Your IT Staff

From this White Paper you can learn:

  • How the BalaBit Shell Control Box activity monitoring solution can help you audit your IT admins
  • How can you reduce IT troubleshooting costs with this solution
  • How can you comply with internal and external regulations related to user monitoring

Download white paper »


When logs are insufficient

Benefits of activity monitoring over loggin

If you purchase a log management or SIEM tool, you might sit back with the conclusion that all your system audit and compliance problems are solved. Unfortunately, this rosy picture seems to ignore the ever-present problem of blind spots in audit reports: if your apps don't log it, your audit report won't show it...

There are several scenarios of where the blind spots occur. For example, basic system administrator activities, such as firewall or web-server configuration all include a potentially high security risk for companies. We might think that these activities should generate sufficient log entries, but in actuality they do not.

The documents show the difference between event logging and activity monitoring in Linux and Windows environments by comparing standard system logging with complete session recording.


ISO 27001 - Achieve the impossible

ISO 27001 - Achieve the impossible

From this White Paper you can learn:

  • The requirements recommended to fulfill for IT and business managers to obtain an ISO 27001 certificate,
  • The 7 worst and the 7 best practices regarding the implementation of a security management and control system, and
  • The business benefits of being ISO certified.

Download white paper »


Logging, the Pillar of Compliance

Logging, the Pillar of Compliance

From this White Paper you can learn:

  • How can you avoid a breach of compliance, and ensure your business continuity.
  • What are the key IT security requirements of the most frequently applied standards, such as the ISO 27001, PCI, SOX or COBIT.
  • How advanced logging technology can contribute to cost-effective compliance and successful accomplishment of audits.

Download white paper »


The Business Benefits of Logging

The Business Benefits of Logging

From this White Paper you can learn:

  • How logging-based benefits can make the work of managers more successful.
  • How logging contributes to lowering the operational costs of organizations while making them more efficient.
  • How syslog-ng logging technology can help to fulfill organizations' business requirements.

Download white paper »


BalaBit IT Security Insight for Telecom Providers in India

Insight for Telecom Providers in India

From this White Paper you can learn:

  • What these technical requirements are
  • How BalaBit technologies can help you to comply with these requirements

Download white paper »


Regulatory compliance and system logging

Regulatory compliance and system logging

From this white paper you will learn:

  • What system logging is and how it helps solve problems
  • What are the logging-related requirements of PCI-DSS, COBIT, and HIPAA
  • How to satisfy these requirements using the syslog-ng Store Box

Download white paper »


Cloud security risks and solutions

Cloud security risks and solutions

From this white paper you will learn:

  • What are the top security risks of the cloud and how to gain the trust of prospective cloud customers
  • How can you prevent the data damage and data abuse
  • What are the top cloud security benefits that help you to make security data accessible and auditable

Download white paper »


The six cornerstones of logging

The six cornerstones of logging

This document aims at briefly demonstrating the technological and business processes that led to the revaluation of log information to such an extent that its collection and procession has become one of the most essential tasks of contemporary corporate IT.

Furthermore, we attempt to identify those critical points of a central logging management project that determine its success the most. We hope that taking our six pieces of advice relating to these six points will substantially contribute to the successful professional activities of our readers.
Download white paper »


Log message classification with syslog-ng

Log message classification with syslog-ng

From this white paper you will learn:

  • What system logging is and how it helps ease the burden for system administrators
  • How artificial ignorance detects anomalies in a working system
  • What you need to do to exploit the advanced log message classification method of syslog-ng

Download white paper »


Auditing VMware View sessions with Shell Control Box

Auditing VMware View sessions with Shell Control Box

From this white paper you will learn:

  • Why auditing VMware View users is important
  • How to control the activities of your VMware View users in a compliant and transparent way
  • How VMware View and BalaBit Shell Control Box activity monitoring solution work together

Download white paper »