SOURCE: Balabit, Inc.

BalaBit, Inc.

October 08, 2014 11:58 ET

BalaBit Announces Blindspotter, a New Product That Discovers Malicious Activity in the Blind Spots of IT Systems

Blindspotter™ Is a Real-Time User Behavior Analytics Solution That Mitigates the Impact of Advanced Persistent Threats (APTs) and Potential Data Breaches

NEW YORK, NY--(Marketwired - Oct 8, 2014) - BalaBit (www.balabit.com), an IT security innovator specializing in log management and advanced monitoring technologies, today announced the availability of Blindspotter, a next-generation IT security tool that analyzes all user activity, including malicious events, occurring throughout IT systems. 

Blindspotter features monitoring capabilities that map and profile user behavior to reveal human risk. It helps companies focus their security resources and replace some controls, yielding greater business efficiency. It tracks and visualizes user activity in real-time for a better understanding what is really happening on the network. Blindspotter integrates a variety of contextual information in addition to standard log data, processes them using a unique set of algorithms, and offers a wide range of outputs from warnings to automatic interventions. Blindspotter is perfectly suited to stopping APT attacks or identifying internal info-criminals.

Blindspotter delivers a comprehensive activity dashboard and prioritizes security events using advanced data science algorithms. With Blindspotter, it is not only possible to discover the potential risk, but with real-time alerting and blocking functionality, stop threats dead in their tracks. With advanced monitoring across every aspect of an IT system, Blindspotter prevents sensitive and critical data from potential security breaches, from both internal and external attacks.

"Traditional perimeter defense tools and those solutions that restrict users and hinder business processes have reached their end. Today's biggest threats are too sophisticated, too stealthy, and well executed for these tools to stop or even to detect," said Zoltán Györkő, CEO of BalaBit. "Attackers are intelligent, well-funded and their attacks are increasingly complex and well targeted. The common theme of the recent, high-profile breaches is that they were carefully planned and went undetected for some time. Blindspotter is designed to detect these kinds of threats in real time and minimize any associated risk."

With Blindspotter, it's possible to increase the efficiency and effectiveness of IT security teams, because it enables them to concentrate their resources on security events that pose the biggest threat. Top use cases for Blindspotter include:

  • Detect Advanced Persistent Threats (APT): lowers the impact of potential breaches
  • Log message noise reduction: significantly decreases the processing and storage costs associated with handling the logs that are being produced by the IT infrastructure by the millions by prioritizing them according to their importance. This allows customers to optimize the use of their resources.
  • Decrease the complexity of security controls: increases the level of security without introducing additional control layers.
  • Optimize SIEM (Security Information and Event Management) alerts: increases the awareness of security teams, allowing them to see malicious activity happening "under the radar".

BalaBit's current product portfolio -- syslog-ng (log management) and Shell Control Box (privileged user monitoring) -- are perfectly complemented by the deep behavior and risk discovery provided by Blindspotter. BalaBit's product development has accelerated since the London based C5 Capital, Europe's first investor dedicated to the security and data sector, invested $8 million in the company in June 2014. The release of Blindspotter is the first result of the funding.

BalaBit has developed a new approach to IT security called electronic Contextual Security Intelligence™ (eCSI). The eCSI concept designed to change existing IT security methods that restrict users' access and activities by control-based security tools. Contextual Security Intelligence avoids introducing additional security control tools, extra authentication layers and policies. It is based on continuous monitoring and algorithms that focus on finding unusual activity in the behaviour of users (that is unique, just like a fingerprint) and can highlight anomalies that are worth investigating.

About BalaBit
BalaBit -- headquartered in Luxembourg -- is a European IT security innovator, specializing in log management and advanced monitoring technologies. It has sales offices in France, Germany, Hungary, Russia, the United Kingdom and the United States and partners in 40+ countries. Its main development centers are located in Hungary. BalaBit has customers all over the world including 23 Fortune 100 companies.

The company is widely-known for syslog-ng™, its open source log management solution, used by more than a million companies worldwide. This significant user base has provided a solid foundation for the company's expansion which has been fueled by Shell Control Box™, a pioneering development for the rapidly-growing privileged activity monitoring market.

For more information, visit www.balabit.com.

BalaBit™, Shell Control Box™, syslog-ng™ and Contextual Security Intelligence™ are trademarks of BalaBit. All other product names mentioned herein are the trademarks of their respective owners.

Contact Information