BalaBit (www.balabit.com), a Europe-based IT security innovator, has raised a $8 million Series A round of funding to speed up the development and expansion of its pioneering IT security platforms. The new investment will be used to fuel BalaBit’s international expansion in North America and additional European markets including the UK and Scandinavia. The cash was raised from London based C5 Capital, Europe’s first dedicated investor in the security and data sector.
BalaBit IT Security (www.balabit.com) announced today its official technology alliance with Thycotic Software, provider of smart and effective privileged account management solutions for global organizations through integration of its Shell Control BoxTM, an activity monitoring appliance designed to control privileged access to remote servers and networking devices with Thycotic’s flagship password management solution, Secret Server. The technology integration provides users of both products with improved, real-time threat protection and a deeper view into privileged users’ activity.
netAura to Increase Presence of BalaBit Privileged Activity Monitoring and Logging Technologies
BalaBit eCSI Report underlines that it is time to allocate IT security budgeting according to real, human threats. The survey was conducted among nearly 300 attendees at the recent RSA® Conference, San Francisco. The survey results show that 84 percent of IT security related losses can be attributed to human elements (such as human error, sophisticated internal or external attackers) with the remaining 16 percent related to infrastructure issues (system malfunction, automated attack). The survey noted that, when it comes to budgeting, the ratio is quite balanced: only 55 percent of budgets are spent for managing human risk and 45 percent for infrastructure risk.
At RSA Conference 2014 BalaBit IT Security released their recent survey results about the use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology. More than 400 IT professionals ranked the TOP 10 reasons for monitoring privileged users.
BalaBit Makes Industry Showcase Debut at RSA Conference 2014
NEW YORK, NY and SAN FRANCISCO, CA – Feb 24, 2014 – BalaBit IT Security (www.balabit.com) today announced the company is continuing its North American expansion at the RSA Conference 2014, Feb. 24-28 in San Francisco. BalaBit will exhibit in Booth #709 as part of the OATH (Initiative for Open Authentication) Pavillion.
BalaBit IT Security – also known as the “logging company” – announced a new version of its syslog-ng log message collection and management application. Using syslog-ng Premium Edition, organizations can centralize and simplify their log management infrastructure to improve operations, gain visibility of security threats, and meet compliance requirements. The syslog-ng 5 LTS brings advanced functionality previously only available for Linux/UNIX servers to Windows environments.
BalaBit IT Security, a global leader in the development of privileged activity monitoring, trusted logging and proxy-based gateway technologies announced a new version of its Shell Control BoxTM (SCB) activity monitoring appliance. The latest version of Shell Control Box makes forensics investigations easier, faster and more cost effective by extending the list of auditable protocols – SSH, RDP, Citrix ICA, VNC, Telnet – with HTTP/HTTPS. HTTP, originally created for content transport, has been becoming increasingly popular as a GUI protocol for various tools such as management network devices, business applications and SaaS/virtual infrastructures. Today, BalaBit has made a pioneering step to audit all web application access.
BalaBit has received two awards from eight categories in the annual Innovation Grand Prize competition in Hungary, for “developing the next generation of activity monitoring tools”. The jury of the Hungarian Association for Innovation, consisting of professional and scientific experts, recognizes not only the novelty of the technology innovation, but also the business result reached in the previous year.
The new real-time alerting and blocking feature of Shell Control BoxTM 3 F4 activity monitoring appliance prevents malicious user activities, either external or internal, even those initiated by users with the highest privileges