The Balabit™ name and other proprietary names and marks (Zorp™, syslog-ng™, SCB™, Pattern DB™, logstore™, zero message lost™, contextual security intelligence™) are covered under by Hungarian and international copyright and trademark laws and are the property of Balabit SA This content may not be used for any commercial use without express written permission of Balabit SA. You are not permitted to use or abuse the above trademarks and logos, or to use or register any similar or confounding trademark, commercial name, or logo. All other trademarks and copyrights are the property of their respective owners.

Mitigate against privileged account risks
Get in touch

Recent Resources

The top IT Security trends to watch out for in 2018

With 2017 now done and dusted, it’s time to think ...

The key takeaways from 2017’s biggest breaches

Like many years before it, 2017 has seen a large ...

Why is IT Security winning battles, but losing the war…?

This is a guest post by Adrian Asher, CISO at London ...

“The [Balabit] solution’s strongest points are the privileged session management, recording and search, and applying policy filters to apps and commands typed by administrators on monitored sessions.”

– The Forrester Wave, Privileged Identity Management, Q3 2016, by Andras Cser