balasys-triangle-leftbalasys-triangle-left

Type your search criteria

see-behind
explore zorp
the number one multi-purpose proxy gateway
use case

active roles

Hybrid Active Directory management, simple and secure
Administrators struggle to keep up with requests to create, change or remove access in today’s hybrid AD environments and with the limited capabilities of Microsoft Active Directory (AD) and Azure Active Directory (AAD) native tools. Thankfully, help has arrived.

With One Identity Active Roles, you can streamline user and group administration, solve security issues – and meet those never-ending compliance requirements by managing and securing on-prem and cloud AD resources simply and efficiently with a single, intuitive solution.

Why do you need api securiy?

resources
Separation of critical systems
use case

features

contact sales
granular protocol control
Full interpretation and validaton of 20+ network protocols
Connection handling on application layer
Control of protocol channels ( e.g. file transfer, port forward)
comprehensive encryption support
control of SSL / TLS-encrypted protocols
TLS 1.3 cryptography support
SSL and IPSec VPN
use case

use cases

contact sales
API breach prevention

Unauthorized user or bot access, data leaks, (D)DOS attacks, misuses and human errors have become real threats for companies operating API infrastructures. Protecting your organization from API breaches is the ultimate goal of the Zorp API Gateway. You can authenticate API-requestors, control API calls and inspect the traffic in detail. By encrypting the traffic, you can increase the security of the API communication further. Enforce a custom API security policy without affecting the business operations.

traffic analysis

Zorp API Gateway supports detailed and flexible logging. You can extract customized data from the API-traffic, those you can analyze from different perspectives. You can forward security relevant logs to the SIEM or SOC to improve your API security monitoring posture. The Zorp API Gateway also supports big data tools and data lakes (for example, Kibana, Elasticsearch or Kafka) as potential log destinations. You can send pre-filtered, quality data to these destinations for in-depth business analysis.

Regulatory compliance

PSD2 requires banks to secure the financial data flow via their public-facing APIs. GDPR indirectly requires anonymization or pseudo anonymization of personal data in transit.  The PCI DSS requires financial providers to encrypt transmission of cardholder data via public networks… All these regulations have one key requirement in common: they require regulated companies to protect customers’ data at rest and in transit, as well. The Zorp API Gateway helps streamline your compliance efforts through its comprehensive access control, encryption and audit capabilities.

Protecting legacy systems

The Zorp API Gateway can ensure compatibility with your legacy systems by modifying certain elements of the API traffic. This enables the possibility of hiding information about security risks and treating the vulnerabilities of your legacy applications. For example, you can remove the error messages, banners, or other information specific to the applications to hide faulty configuration or sensitive information about your back-end infrastructure. It can even force upgrade of legacy encryption protocols to the recent TLS version.

Special network security projects

Thanks to its extremely flexible, scriptable configuration you can meet specific security requirements with Zorp Gateway. Just a few examples:

• Data manipulation - modifying sensitive or risky elements of the traffic. For example, masking credit card data or hiding vulnerable server configuration.
• Graceful degradation of services during peak times by preferring transaction-closing events
• Implement your own protocol by using the AnyPy proxy and the power of Python

use case

ICS Security

contact us
Introduction
Once a vague idea for philosophers to ponder, now a tangible reality: we live in a world of connected networks. Think water supply and electricity, transport systems, wearable technologies and smart cities – everything is connected. As thrilling as it may sound, the virtually limitless opportunities to make our lives better, richer and safer come with very real risks and responsibilities.

At Balasys, we work to address any potential security challenge, whatever form it takes. With new threats and vulnerabilities surfacing day in day out, it is an ongoing process: finding inspired and cutting-edge solutions is what keeps our R&D team motivated. 

Sounds promising? Contact us for information on our demo products. Even better, we encourage you to become our Product Definition Partner and test our brand new products while we are busy working out the fine details, enabling you to translate the latest technology into business benefits.
IACS security
Industrial Automation and Control Systems (IACS for short) form the base of critical infrastructures including, to name but a few, energy and water supply, transport and industrial production. These assets are essential for the functioning of both society and the economy.

It is easy to see why cyber-attacks against IACS have potentially devastating consequences. When it comes to intrusions in an industrial environment, the loss of control should be among the least of our concerns. Attacks – either by chance or with malicious intentions – may lead to malfunction, a complete halt to production, personal injury or environmental damage.

No system is immune to network attacks. The emergence of malware and ransomware targeting IACS/SCADA systems – in addition to the ever more sophisticated targeted APT attacks – and the increasing pace of industrial digitization lends extra urgency and makes it even more essential to enter the market with an effective product.

 Our goal is to boost IT safety for IACS with maximum efficiency. To that end, we are developing a gateway adapted to the characteristics of the specific environment, keeping in mind that security measures should not interfere with the industrial process. Designed to filter known attacks and anomalies and to monitor advanced threats, the gateway performs perimeter protection tasks and provides deep security.

 The project is complete with algorithms, software systems for implementation and a platform to run these systems. The solution provides efficient protection to IACS both independently or connected to the existing cyber security infrastructure, as well as the SOC, SIEM, CDMC solutions and monitoring systems that are becoming widespread.

Implementation is recommended for companies with multiple locations and extensive IACS infrastructure as well as production and industrial companies with more limited resources.
implementation
From simple start-up integrations to more complex projects, we offer a full range of services to ensure smooth deployment from initial project scoping to post-integration support.

Broad knowledge of not only the IT security landscape but all the connecting infrastructure components helps us find the optimal approach to every customer challenge.
Detailed Design
Delivery:
- Installation
- Configuration
- Customization
- Integration
Documentation
Testing
User and group management in hosted environment
Synchronize AD domain clients with a host AD domain in hosted environments. Utilize out-of-the-box connectors to synchronize your on-premises AD accounts to Microsoft Office 365, Lync Online and SharePoint Online.
Training
Balasys offers you traditional classroom schedule as well as cost-efficient online training packages. The goal of these trainings is to give your IT experts the knowledge and skills needed to configure, operate, maintain, and troubleshoot our products. Thanks to the successful cooperation, unequalled in the world, Balasys delivers training for all One Identity Safeguard and syslog-ng products lines, both for the employees of the vendor and its partners since it is the only company within the One Identity partner ecosystem with the necessary competence and licenses.
Classroom Trainings
Remote Trainings
Operations support
You can benefit from our expertise not only in the implementation but also after closing that phase of your project. Our remote support and remote management services can help you ease the burden on your operations staff and raise your operational efficiency.
one identity competence center
Balasys has become the key distribution and solution delivery partner of One Identity in the CEE region. By working actively with our channel partners and customers, from presales to support, we can add value to the delivered One Identity solutions
Expert team with broad knowledge of the IT security landscape
Several decades of experience
Deep knowledge of the regional market
Comprehensive consultancy, implementation, training and support services
Direct access to One Identity sales, presales and support resources
support
Balasys delivers deep technical support for you both for the Zorp and the One Identity product lines. This means that we can solve any problems for which other companies would need to help of the vendor. The Balasys support team provides you with a full range of customer support started from L1 to L3 level issues where our developers are involved to resolve your technical problem. In its distribution area, Balasys delivers its services according to strict standards: rendering 24/7 direct vendor support in English and Hungarian.

As a highly skilled implementation and support partner, we are committed to close collaboration with our channel partners and customers to help them achieve the best performance ratio for our products. We are committed to your long-term satisfaction. We are dedicated to ensuring you the highest availability and a reliable IT operation at a low maintenance cost.

Benefits

Benefits of the Balasys support services are:


- Custom support packages
- Flexible responses to your support needs and expectations
- 24/7 operations
- Professional and trustworthy relationship
- Experienced, senior support engineers
- Direct engineer access
- Online ticketing system
- Multi-language support engineers

contact us

Open a case: Create or manage technical and non-technical cases, access your licenses or download your software via Balasys Support site at https://support.balasys.hu

Call: Call Customer Support to receive assistance with your issues:

Phone: +36 1 646 4740, Direct number: +36 1 646 4747

Support levels

Title
Availability
Response time*
software-subscription
Contract
version
5x8 ( Mon-Fri, 9-17 CET )
The next business day
Yes
2
ExtendedSU
5x12 ( Mon-Fri, 8-20 CET )
4 hours
Yes
4
PrivilegeSU
7x24 ( Mon-Sun 0-24 )
2 hours
Yes
6
BaseSU
Availability: 5x8 ( Mon-Fri, 9-17 CET )
Response time* : The next business day
software-subscription: Yes
Contract: 2
ExtendedSU
Availability: 5x12 ( Mon-Fri, 8-20 CET )
Response time* : 4 hours
Software-Subscription: Yes
Contract: 4
PrivilegeSU
Availability: 7x24 ( Mon-Sun 0-24 )
Response time* :2 hours
Software-Subscription: Yes
Contract: 6
core features

responsive core

Granular configuration options enable
administrators to fully implement
corporate security policies.

open source

Granular configuration options enable
administrators to fully implement
corporate security policies.

high-end protection

Granular configuration options enable
administrators to fully implement
corporate security policies.
use case

iot security

IoT elements are exposed to be attacked permanently, so they need
solid security tools which can cut risks back to as little as possible.
In a world where everything joins networks, even networks too, you
need a tool to make these increased connections organized.
Button Text