Additional Info

Websitehttp://www.balabit.com
Company size (employees)200+

Overview

Balabit is a leading provider of contextual security technologies with the mission of preventing data breaches without constraining business. Balabit operates globally through a network of local offices across the United States and Europe and has a strong global partner network. Founded in 2000, Balabit has a proven track record including 23 Fortune 100 customers among more than one million corporate users worldwide.

Balabit operates in niche but dynamically growing markets, where continuous innovation is key to stay competitive. Balabit offers unique, technology-leading solutions in our product categories:
• syslog-ng is a de-facto industry standard in log management
• a new product category was created by announcing Shell Control Box Privileged Activity Monitoring appliance in 2006, and
• Balabit has already developed its own User Behavior Analytics tool, Blindspotter, before its strong competitors .

Balabit has been recognized as a technology leader by leading analyst firms in Log Management, Privileged User Monitoring and User Behavior Analytics.

The company is one of the fastest growing IT security companies in Europe, has been selected to the Deloitte Technology Fast 50 CE list four times over the past five years, and Zoltán Györkő, CEO of Balabit, received the Emerging Entrepreneur special award from EY for leading one of the most successful and dynamically growing companies in the Eastern European region.

In 2014, Balabit received $8 million from London based C5 Capital, Europe’s first dedicated investor in the security and data sector to further boost its global expansion, with a special focus on North America and accelerate its product development.

Balabit is going through a transition to a strategic IT security partner – well beyond its standalone IT security solutions. Balabit’s commitment is to providing continuous and future-proof security solutions that enable companies to establish a sustainable, business-friendly IT security.

How we are different

• New approach that improves IT security by focusing on the context of user activities - Businesses are drowning in security as organizations adopt a defensive strategy that relies on a cycle of ever stronger pre-defined security controls. The result is that business is unduly constrained, productivity is reduced and security teams are overwhelmed. This approach actually weakens security as controls are bypassed and security events go undetected. Balabit offers a complementary approach. Its Contextual Security Intelligence™ (CSI) Suite brings together its innovative, technology-leading solutions: the system and application Log Management (syslog-ng), Privileged User Monitoring (Shell Control Box) and User Behavior Analytics (Blindspotter) tools into an integrated solution.


• Industry-leading technology elements of the CSI Suite - Created in 1998, syslog-ng extends the original syslog model with content-based filtering, rich filtering capabilities, flexible configuration options and adds important features to syslog, like using TCP for transport. Its open source version has over a million users wordwide. Shell Control Box: "BalaBit offers industrial strength session monitoring and recording." - Andras Cser in "The Forrester Wave™: Privileged Identity Management, Q1 2014" Forrester Research, Inc. Blindspotter: Balabit was recognized as Innovative Cyber Security Company at the IPACSO Awards 2015, (IPACSO consortium is supported by the European Commission under FP7, encourages privacy and cyber security innovations). Balabit was selected to be one of the most innovative and forward-thinking researchers and entrepreneurs, recognized as a company bolstering Europe’s cyber security landscape.


• Protecting organizations against the most sophisticated threats like APTs and future threats. IT security controls based on rules and pre-defined patterns alone cannot prevent today’s intelligent attackers. Instead, Balabit equips businesses with the ability to quickly discover, investigate and respond to these threats. Its integrated CSI Suite does this without imposing additional layers of security on individual users.