Press releases

2014. Jun. 18, Wed
BalaBit (, a Europe-based IT security innovator, has raised a $8 million Series A round of funding to speed up the development and expansion of its pioneering IT security platforms. The new investment will be used to fuel BalaBit’s international expansion in North America and additional European markets including the UK and Scandinavia. The cash was raised from London based C5 Capital, Europe’s first dedicated investor in the security and data sector.
2014. May. 28, Wed
BalaBit IT Security ( announced today its official technology alliance with Thycotic Software, provider of smart and effective privileged account management solutions for global organizations through integration of its Shell Control BoxTM, an activity monitoring appliance designed to control privileged access to remote servers and networking devices with Thycotic’s flagship password management solution, Secret Server. The technology integration provides users of both products with improved, real-time threat protection and a deeper view into privileged users’ activity.
2014. May. 13, Tue
netAura to Increase Presence of BalaBit Privileged Activity Monitoring and Logging Technologies
2014. Mar. 18, Tue
BalaBit eCSI Report underlines that it is time to allocate IT security budgeting according to real, human threats. The survey was conducted among nearly 300 attendees at the recent RSA® Conference, San Francisco. The survey results show that 84 percent of IT security related losses can be attributed to human elements (such as human error, sophisticated internal or external attackers) with the remaining 16 percent related to infrastructure issues (system malfunction, automated attack). The survey noted that, when it comes to budgeting, the ratio is quite balanced: only 55 percent of budgets are spent for managing human risk and 45 percent for infrastructure risk.
2014. Feb. 25, Tue
At RSA Conference 2014 BalaBit IT Security released their recent survey results about the use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology. More than 400 IT professionals ranked the TOP 10 reasons for monitoring privileged users.
2014. Feb. 24, Mon

BalaBit Makes Industry Showcase Debut at RSA Conference 2014

NEW YORK, NY and SAN FRANCISCO, CA – Feb 24, 2014 – BalaBit IT Security ( today announced the company is continuing its North American expansion at the RSA Conference 2014, Feb. 24-28 in San Francisco. BalaBit will exhibit in Booth #709 as part of the OATH (Initiative for Open Authentication) Pavillion.

2013. Nov. 14, Thu
BalaBit IT Security – also known as the “logging company” – announced a new version of its syslog-ng log message collection and management application. Using syslog-ng Premium Edition, organizations can centralize and simplify their log management infrastructure to improve operations, gain visibility of security threats, and meet compliance requirements. The syslog-ng 5 LTS brings advanced functionality previously only available for Linux/UNIX servers to Windows environments.
2013. Oct. 03, Thu
BalaBit IT Security, a global leader in the development of privileged activity monitoring, trusted logging and proxy-based gateway technologies announced a new version of its Shell Control BoxTM (SCB) activity monitoring appliance. The latest version of Shell Control Box makes forensics investigations easier, faster and more cost effective by extending the list of auditable protocols – SSH, RDP, Citrix ICA, VNC, Telnet – with HTTP/HTTPS. HTTP, originally created for content transport, has been becoming increasingly popular as a GUI protocol for various tools such as management network devices, business applications and SaaS/virtual infrastructures. Today, BalaBit has made a pioneering step to audit all web application access.
2013. Mar. 23, Sat

BalaBit has received two awards from eight categories in the annual Innovation Grand Prize competition in Hungary, for “developing the next generation of activity monitoring tools”. The jury of the Hungarian Association for Innovation, consisting of professional and scientific experts, recognizes not only the novelty of the technology innovation, but also the business result reached in the previous year.

2013. Feb. 12, Tue

The new real-time alerting and blocking feature of Shell Control BoxTM 3 F4 activity monitoring appliance prevents malicious user activities, either external or internal, even those initiated by users with the highest privileges