Cyber Security Summit NYC ,  21.09.2016

Preventing data breaches without constraining business

Behavior is the new authentication

How to distinguish friend from enemy?

Learn more

Check out our newest infographics

Why do companies need User Behavior Analytics?

Nowadays, attackers are intelligent, well-funded, and their attacks are increasingly complex and well targeted.


How Balabit helps to comply with ISO 27k?

Download our awe-inspiring poster-like infograph and stick it on the wall!




syslog-ng Hits Major Milestone with Version 3.8.1 Release

We are happy to announce that after almost a year of development, syslog-ng 3.8.1 has been released. This is the first stable release from the syslog-ng 3.8 branch. Version 3.8.1 adds some long-awaited features to syslog-ng and improves the performance of name-value-pair related operations.

Read more

Releasing the Balabit Mouse Dynamics Challenge Data Set

For a couple of months earlier this year, we have been busy integrating behavioral biometric capabilities into our User Behavior Analysis product. In order to detect unauthorized usage of user accounts we employ methods that analyze mouse and keystroke dynamics.

Read more

Passwords are Dead - Behavior is the New Authentication

Cyber-security is full of over-used terms. One of them is the idea of “keeping the bad guys out.” Traditionally, this notion has involved preventative technologies like firewalls or security gateways that filter incoming traffic and try to protect the workers on the inside.

Read more

Preventing Data Breaches without Constraining Business Behavior Analytics is The New Authentication Over the last ten years, organizations around the world have spent billions on security technology designed to protect users and data from cybercrime. Technologies like Anti-spam/anti-virus, firewalls and DLP systems have been deployed to create a perimeter to try to keep the criminals out. In fact, some of the world’s largest organizations have as many as 200 different security solutions in place, and yet … major breaches are on the increase.

PCI DSS Compliance with Shell Control Box This video explains how Balabit's Privileged User Monitoring solution can help organizations comply with PCI DSS 3.x (Payment Card Industry Data Security Standard) requirements. The video summarizes the key regulations of the PCI DSS and links the supportive functions of Shell Control Box.

Blindspotter The real-time user behavior analytics solution Blindspotter™ is a monitoring tool that maps and profiles user behavior to reveal human risk. Blindspotter™ integrates a variety of contextual information in addition to logs, processes them using a unique algorithm, and offers a wide range of outputs from warnings to automatic interventions.

Shell Control Box Real-time prevention of malicious activities Shell Control Box can monitor the traffic of network connections in real time, and execute various actions if a certain pattern appears in the command line or on the screen.

See how to optimize SIEM with syslog-ng From this short video you can learn how to improve the ROI of your SIEM with syslog-ng.

Joe's One Day Incident management SCB is an independent device that operates transparently, and extracts the audit information directly from the communication of the client and the server. This prevents anyone from modifying the audited information.

Joe's One Day 2 Real-time detection and prevention Joe at an outsourcing company

Analyst opinion about CSI / Martin Kuppinger

Charles J. Kolodgy - Research Vice President, Security Products, IDC


Cyber Security Summit NYC

 21.09.2016  - 21.09.2016
Grand Hyatt, New York, NY, USA

The Cyber Security Summit is an exclusive conference series connecting C-Level & Senior Executives responsible for protecting their companies’ critical infrastructures with cutting-edge technology providers and renowned information security experts.


Behavior is the new authentication

 29.09.2016  - 29.09.2016

Join us on Thursday, September 29, 2016 at 10:00 AM CEST (GMT+02:00) to hear about ways to prevent data breaches without contraining business. Learn more about Contextual Security Intelligence™ and evolve the way you think about IT security.

Sign Up

Les Assises

 05.10.2016  - 08.10.2016
Monte Carlo, Monaco

This event has become the reference for the security community, attracting hundreds of IS directors, CISOs, DP directors and BU decision makers, from major accounts in the industry.


IT-SA 2016

 18.10.2016  - 20.10.2016
Nuremberg, Germany

it-sa is the only IT security exhibition in the German-speaking region and one of the most important worldwide events.


IANS Boston Forum

 02.11.2016  - 03.11.2016
Boston Convention Center, MA, USA

IANS' Information Security Forums bring together experienced IT and information security practitioners for confidential information sharing on the industry's most important issues, technologies, and trends.

List all events