Type your search criteria


Identity governance


Traditional identity and access management (IAM) frameworks are expensive to build and time-consuming to implement and maintain. They are burdens on most IT departments, as IT typically handles all user identity lifecycle management. To meet the varied IAM needs of different business units, IT often works with a siloed set of narrowly focused tools and security policies and relies on manual processes for enforcement.

This leaves the environment vulnerable, increases risk and makes it difficult to meet SLAs. You can increase productivity by giving users access to the data and applications they need to do their jobs – and nothing more. In this way, you can mitigate risk, secure data, meet uptime requirements and satisfy compliance by giving users access to data and applications they need. Now, identity and access management (IAM) can be driven by business needs, not by IT capabilities.

  1. Hackers shift their interest to APIs.

    The amount of sensitive data exposed via APIs is increasing significantly, making APIs a primary target for attackers. They’ve started to look for vulnerable, broken APIs to find ways to the back-end systems that store sensitive data. And they are becoming increasingly successful. Many recent huge data breaches have leveraged APIs – just think of the Salesforce.com, US Post, T-Mobile and Strava incidents.
  2. Traditional security solutions are insufficient

    Today’s API attacks are increasingly complex, targeted and easily bypass traditional security solutions. These attacks CANNOT be detected by signature-based web application firewalls (WAFs), authentication or other baseline security tools. Advanced API attacks can only be prevented by targeted solutions. Without this knowledge in mind, businesses may expose their core systems data with a false sense of security.
  3. API developers work without focusing on security

    Security is not a priority for many application development projects: they focus on the functional specification, user experience and deadlines. Often, security requirements are not specified in detail in these projects. Developers don’t think like attackers. As there are no API-standards, they only deal with security on a best-effort basis. This practice leads to unique vulnerabilities in public-facing APIs, which in turn creates risk for the business and opportunities for the bad guys.
  4. Regulations require secure API communication

    PSD2 requires banks to open their APIs directly to retailers and third-party payment providers (TPP or fintech). GDPR indirectly requires the anonymization or pseudo-anonymization of personal data in transit. The PCI DSS requires financial providers to encrypt transmission of cardholder data via public networks, etc.  All these regulations have one key requirement in common: companies must protect customers’ data at rest and also in transit. To meet these criteria, regulated industries like finance or public services must start thinking about how to secure the sensitive data flow via their public-facing APIs.

With our identity governance and administration solution, you can unify security policies and satisfy governance needs – today and long into the future. You can do this while improving business agility today and in the future with a modular and scalable IAM solution.

You can govern all your identities, data and privileged access with visibility, reduced risk and increased control on-premises, hybrid or cloud. Gain simplicity and affordability with a unified IAM foundation that addresses the identity management, auditing and compliance needs that are prerequisites to strong governance. Balasys’s consultancy services will help you identify your IAM challenges and assemble the right solution set.

We can customize our implementation services to meet your exact requirements. After implementation, our training services will boost the efficiency of your operations staff. Should you need further assistance, we can help you with operations support.

Learn more about our IAM productLearn more about our IAM services

Development concept

Our Development concept

We continuously develop our API security concept to create a highly competitive and future-proof solution. On the top of our existing product functionality, we’re planning to add traffic transformation, authentication and malware detection capabilities. Our development plans include, but are not limited to:

- Data enrichment
- Anonymization & data masking
- Format and protocol conversion (e.g. json2xml)
- Graceful degradation of services in peak times
- Support of multiple authentication methods (AD/LDAP, X.509, Kerberos, OAuth, OpenID, SAML, etc.)
- Multi-layer content filtering


See the benefits of Balasys' identity governance solution:

Govern access to on-premises, cloud and hybrid resources from request through fulfillment for users and data

Reduce risk by ensuring users have only the access they need

Satisfy audit and compliance initiatives with attestation/ recertification policies

Put access decisions where it belongs — in the hands of the business

Build on existing investments and infrastructure and grow from there

World class consultancy services to identify your IAM challenges and develop the right solution

Customized implementation services to meet your individual requirements, regardless of your company size and complexity

Education services to boost the efficiency of your operations staff

contact us

Create or manage technical and non-technical cases, access your licenses or download your software via Balasys Support site at https://support.balasys.hu

Call Customer Support to receive assistance with your issues: +36 1 646 4740, +36 1 646 4747

Support levels

Response time*
5x8 ( Mon-Fri, 9-17 CET )
The next business day
5x12 ( Mon-Fri, 8-20 CET )
4 hours
7x24 ( Mon-Sun 0-24 )
2 hours
Availability: 5x8 ( Mon-Fri, 9-17 CET )
Response time* : The next business day
software-subscription: Yes
Contract: 2
Availability: 5x12 ( Mon-Fri, 8-20 CET )
Response time* : 4 hours
Software-Subscription: Yes
Contract: 4
Availability: 7x24 ( Mon-Sun 0-24 )
Response time* :2 hours
Software-Subscription: Yes
Contract: 6