Monitoring third party access in large enterprises ,  14.09.2016

Preventing data breaches without constraining business

Behavior is the new authentication

How to distinguish friend from enemy?

Learn more

Check out our newest infographics

Why do companies need User Behavior Analytics?

Nowadays, attackers are intelligent, well-funded, and their attacks are increasingly complex and well targeted.

Download

How Balabit helps to comply with ISO 27k?

Download our awe-inspiring poster-like infograph and stick it on the wall!

Download

BALABIT BLOG ABOUT CSI

03052016

eXPRTLK - Georgia Weidman

Georgia Weidman talks about the latest feud between Apple and FBI, smartphone security, and how being a woman feels in an industry dominated by men.

Read more
22042016

We Hacked IT - The credit card issue

Credit and debit cards are handed out to millions every month, although it is astonishing and frightening at the same time how careless people can behave with them.

Read more
19042016

Paying the price of a payment system robbery

The most direct access for a criminal today is not through the bank vault but rather through the electronic payment system...

Read more

Blindspotter The real-time user behavior analytics solution Blindspotter™ is a monitoring tool that maps and profiles user behavior to reveal human risk. Blindspotter™ integrates a variety of contextual information in addition to logs, processes them using a unique algorithm, and offers a wide range of outputs from warnings to automatic interventions.

Shell Control Box Real-time prevention of malicious activities Shell Control Box can monitor the traffic of network connections in real time, and execute various actions if a certain pattern appears in the command line or on the screen.

See how to optimize SIEM with syslog-ng From this short video you can learn how to improve the ROI of your SIEM with syslog-ng.

Joe's One Day Incident management SCB is an independent device that operates transparently, and extracts the audit information directly from the communication of the client and the server. This prevents anyone from modifying the audited information.

Joe's One Day 2 Real-time detection and prevention Joe at an outsourcing company

Analyst opinion about CSI / Martin Kuppinger

Charles J. Kolodgy - Research Vice President, Security Products, IDC

Events

Monitoring third party access in large enterprises

 14.09.2016  - 14.09.2016
Webinar

Join us on Wednesday, September 14, 2016 at 2:00 PM EST to hear about third party access in large enterprises. Giving access to third party providers can expose enterprises to unknown threats and potential breaches. Learn how Balabit customers rely on our award winning solutions to protect the enterprise while not impacting productivity.

Sign Up

Cyber Security Summit NYC

 21.09.2016  - 21.09.2016
Grand Hyatt, New York, NY, USA

The Cyber Security Summit is an exclusive conference series connecting C-Level & Senior Executives responsible for protecting their companies’ critical infrastructures with cutting-edge technology providers and renowned information security experts.

website

Les Assises

 05.10.2016  - 08.10.2016
Monte Carlo, Monaco

This event has become the reference for the security community, attracting hundreds of IS directors, CISOs, DP directors and BU decision makers, from major accounts in the industry.

website

IT-SA 2016

 18.10.2016  - 20.10.2016
Nuremberg, Germany

it-sa is the only IT security exhibition in the German-speaking region and one of the most important worldwide events.

website

Cyber Trends 2016

 20.10.2016  - 21.10.2016
Prague, Czech Republic

Cyber Trends is a two-day international professional conference divided into four sections accompanied by live demonstration and simulation test area, professional workshops and Table-top exhibition of partners’ solutions and products.

website
List all events