23 NYCRR 500 Balabit helps to comply

From this White Paper you can learn:

  • How to manage and control privileged user access to information systems
  • How to apply strong authentication and multi-factor authentication on privileged users
  • How to monitor and supervise privileged user activities with nonpublic information
  • How to achieve risk-based authentication with User Behavior Analytics
Download white paper »
General data protection regulation

From this White Paper you can learn:

  • What are the most important requirements of the GDPR
  • What are the implications for your business
Download white paper »
White paper on ISO 27001

From this White Paper you can learn:

  • Recommendations for IT and business managers who help companies obtain an ISO 27001 certificate,
  • The 10 worst and the 10 best practices regarding the implementation of a security management system,
  • The Balabit solutions helping companies to fulfill ISO 27001 requirements related to access control, operations security and supplier relationships,
  • The business benefits of being ISO certified.
Download white paper »
KPMG White Paper on Cloud Security

From this White Paper you can learn

  • What are the key compliance trends in the IT service provider industry.
  • What are the key goals and requirements of the ISO27001:2013, PCI-DSS v3.0, CSA-STAR and SSAE 16/ISAE 3402 standards.
Download white paper »
White paper on log management

From this White Paper you can learn:

  • What are the main challenges solved by log management in industries, such as finance or telecommunication
  • What attributes makes a log management infrastructure enterprise class
  • What are the best practices of log management and how you can make the most of your investment
Download white paper »
The Essential Guide to Privileged Activity Monitoring

From this White Paper you can learn:

  • What are the key capabilities of Privileged User Monitoring (PUM) solutions and its benefits for you and your customers
  • What are the key privileged user-related challenges which various industries face
  • What are the best practices in order to mitigate the risks related to privileged users
Download white paper »
Cloud Logging and Privileged Access Management for CSPs

From this White Paper you can learn:

  • How to meet privacy and data protection regulations
  • How to prove what the cloud administrator accessed or modified - or, occationally, what did not do – in the cloud
  • How to provide bulletproof evidence that helps you and your clients to be compliant
Download white paper »
ISO 27001 Compliant Log Management

From this White Paper you can learn:

  • Which ISO 27001 objectives and controls can be satisfied using log management.
  • How syslog-ng and the syslog-ng Store Box helps you to comply with ISO 27001:2013 objectives.
Download white paper »
PCI DSS Compliant Access Management

From this White Paper you can learn:

  • What are the access control and user monitoring related requirements of PCI-DSS v3.2.
  • How to satisfy these requirements using the Balabit Shell Control Box privileged activity monitoring solution.
Download white paper »
PCI DSS Compliant Log Management

From this White Paper you can learn:

  • What are the main challenges solved by log management in industries, such as finance or telecommunication
  • What are the log management related requirements of PCI-DSS, including archiving and log retention.
  • How to satisfy these requirements using the syslog-ng Store Box and syslog-ng Premium Edition.
Download white paper »
PCI DSS Compliant Log Management

From this White Paper you can learn:

  • What SCB is and what are its benefits in a compliance environment.
  • How SCB helps you to comply with ISO 27001:2013 objectives.
Download white paper »
White Paper on 27011

From this White Paper you can learn:

  • What are the most critical security challenges that managers in telecommunication face day by day
  • What are the key goals and requirements of the ISO 27011 telecommunication-specific information security standard
  • How can Balabit technologies help with ISO 27011 compliance
Download white paper »
Control Your IT Staff

From this White Paper you can learn:

  • The security and compliance challenges organizations face today with regards to administrative activities
  • A best-of-breed concept called Privileged Access Management (PAM) to mitigate the risks related to sysadmins and meet increasingly strict regulations
  • Best practices that help you implement a secure yet cost effective framework to control and monitor privileged account usage.
Download white paper »
Regulatory compliance and system logging

From this White Paper you can learn:

  • What system logging is and how it helps solve problems
  • What are the logging-related requirements of PCI-DSS, COBIT, and HIPAA
  • How to satisfy these requirements using the syslog-ng Store Box
Download white paper »
Cloud security risks and solutions

From this White Paper you can learn:

  • What are the top security risks of the cloud and how to gain the trust of prospective cloud customers
  • How can you prevent the data damage and data abuse
  • What are the top cloud security benefits that help you to make security data accessible and auditable
Download white paper »
Log message classification with syslog-ng

From this White Paper you can learn:

  • What system logging is and how it helps ease the burden for system administrators
  • How artificial ignorance detects anomalies in a working system
  • What you need to do to exploit the advanced log message classification method of syslog-ng
Download white paper »
Auditing VMware View sessions

From this White Paper you can learn:

  • Why auditing VMware View users is important
  • How to control the activities of your VMware View users in a compliant and transparent way
  • How VMware View and Balabit Shell Control Box activity monitoring solution work together
Download white paper »