balasys-triangle-leftbalasys-triangle-left

Type your search criteria

see-behind
explore zorp
the number one multi-purpose proxy gateway
use case

active roles

Hybrid Active Directory management, simple and secure
Administrators struggle to keep up with requests to create, change or remove access in today’s hybrid AD environments and with the limited capabilities of Microsoft Active Directory (AD) and Azure Active Directory (AAD) native tools. Thankfully, help has arrived.

With One Identity Active Roles, you can streamline user and group administration, solve security issues – and meet those never-ending compliance requirements by managing and securing on-prem and cloud AD resources simply and efficiently with a single, intuitive solution.

Why do you need api securiy?

resources
Separation of critical systems
use case

features

contact sales
granular protocol control
Full interpretation and validaton of 20+ network protocols
Connection handling on application layer
Control of protocol channels ( e.g. file transfer, port forward)
comprehensive encryption support
control of SSL / TLS-encrypted protocols
TLS 1.3 cryptography support
SSL and IPSec VPN
use case

use cases

contact sales
API breach prevention

Unauthorized user or bot access, data leaks, (D)DOS attacks, misuses and human errors have become real threats for companies operating API infrastructures. Protecting your organization from API breaches is the ultimate goal of the Zorp API Gateway. You can authenticate API-requestors, control API calls and inspect the traffic in detail. By encrypting the traffic, you can increase the security of the API communication further. Enforce a custom API security policy without affecting the business operations.

traffic analysis

Zorp API Gateway supports detailed and flexible logging. You can extract customized data from the API-traffic, those you can analyze from different perspectives. You can forward security relevant logs to the SIEM or SOC to improve your API security monitoring posture. The Zorp API Gateway also supports big data tools and data lakes (for example, Kibana, Elasticsearch or Kafka) as potential log destinations. You can send pre-filtered, quality data to these destinations for in-depth business analysis.

Regulatory compliance

PSD2 requires banks to secure the financial data flow via their public-facing APIs. GDPR indirectly requires anonymization or pseudo anonymization of personal data in transit.  The PCI DSS requires financial providers to encrypt transmission of cardholder data via public networks… All these regulations have one key requirement in common: they require regulated companies to protect customers’ data at rest and in transit, as well. The Zorp API Gateway helps streamline your compliance efforts through its comprehensive access control, encryption and audit capabilities.

Protecting legacy systems

The Zorp API Gateway can ensure compatibility with your legacy systems by modifying certain elements of the API traffic. This enables the possibility of hiding information about security risks and treating the vulnerabilities of your legacy applications. For example, you can remove the error messages, banners, or other information specific to the applications to hide faulty configuration or sensitive information about your back-end infrastructure. It can even force upgrade of legacy encryption protocols to the recent TLS version.

Special network security projects

Thanks to its extremely flexible, scriptable configuration you can meet specific security requirements with Zorp Gateway. Just a few examples:

• Data manipulation - modifying sensitive or risky elements of the traffic. For example, masking credit card data or hiding vulnerable server configuration.
• Graceful degradation of services during peak times by preferring transaction-closing events
• Implement your own protocol by using the AnyPy proxy and the power of Python

use case

iot Security

contact US
Introduction
In this fascinating connected world, it is truly challenging to keep up with the innovations that will impact our lives in major ways. Dozens of connected vehicle solutions are launched every day to reshape traffic and urban life.

The rapid expansion of the Internet of Things (IoT) is bringing us one step closer to developing truly smart homes. While all this brings virtually limitless potential in terms of, for example, enhancing road safety and enjoying an ever-greater level of convenience, security hazards and threats are also mushrooming. Intrusion prevention and detection, complete with protection against emerging attack patterns, is an absolute must for citizens and businesses alike.

Cybersecurity threats come in many forms. Some are quite easy to detect, others come in disguise. Besides providing scalable security solutions, we also make a point of enforcing data privacy protection measures.
onboard automotive firewall
One step ahead in vehicle security

The automotive industry is going through a rapid transformation shaped by four major trends: electrification, robotization, on-demand ownership and finally, connectivity.

Connected car technology has produced many great achievements, and on-board diagnostics (OBD) systems are clearly one of them. OBD systems today are widely available and, as a result, the amount of real-time information about the status of the vehicle is increasing, giving way to better vehicle management – and also extending a warm welcome to attackers.

An OBD port is an open standard, easy-to-access service port – one that usually comes without any physical or digital protection. In other words, uploading a malware (e.g. blackmail virus) into a vehicle through this port is shockingly easy.

The solution we developed for intrusion prevention through the OBD port prevents unauthorized connection and provides real-time intrusion detection on the entire CAN (Controller Area Network) bus.Balasys’ OBD firewall is a tiny appliance placed hidden behind the OBD junction.

All the data inwards and outwards the vehicle through the port is filtered. At the same time, the entire data traffic on the internal CAN bus is logged. Regular reports and alerts are sent to the central management server through a GSM connection.

The equipment complies with statutory and regulatory requirements for data security in the vehicle.Quick and easy installation is another attractive feature of the product: with no visible modification of the original socket system, the car warranty remains intact.
Privahome
Balasys PrivaHome project focuses on the smart home environment. Home automation includes a wide range of smart devices providing services and executing physical tasks.

The diversity of smart home products is already mind-blowing: from speakers to window blinds, cooking utensils and light bulbs, anything and everything can connect to the internet. IoT in private homes also means a vast amount of data transfer.

Smart devices collect and share data that are relevant to their functionality. Some of these data, however, may also serve third-party interests: with our connected devices, we practically invited marketers into our homes – and many others arrive uninvited and with less obvious intentions.

In short, smart homes are basically a sitting duck for cybercriminals. With that in mind, the Balasys PrivaHome project is primarily focused on the privacy and security issues faced by homeowners. It is our mission to empower citizens to make smart decisions regarding their smart home environments.

We do that by providing tools for a better understanding of potential risks, as well as a capable device control technology that helps enforce the decisions citizens make.

The first step to make that happen is providing smart home owners with knowledge about how IoT and smart devices work. It is also vital that they understand the nature of threats an unauthorized access may pose. Add to that the power imbalance between citizens and tech companies – in favor of the latter – and you will see why we consider it our mission to provide transparency and awareness.

For the sake of transparency, we encourage smart home owners to make sure network traffic in their smart home environment is inspected and analyzed, either locally or in a cloud infrastructure. Awareness comes from making informed decisions based on the analysis of traffic.

To that end, it must be provided in a comprehensible, user-friendly format.With all the exciting features smart homes have to offer, privacy issues and data protection policies are easy to neglect. Given the fact that privacy and security focused user-centric controls are in many cases explicitly missing from IoT devices, the prevailing ignorance is alarming in so many ways it is difficult to count. Therefore, it is our job to draw the attention of homeowners to these issues and then propose solutions, such as the external means (e.g. in a security-oriented router) to enforce technical control over data traffic. 
implementation
From simple start-up integrations to more complex projects, we offer a full range of services to ensure smooth deployment from initial project scoping to post-integration support.

Broad knowledge of not only the IT security landscape but all the connecting infrastructure components helps us find the optimal approach to every customer challenge.
Detailed Design
Delivery:
- Installation
- Configuration
- Customization
- Integration
Documentation
Testing
User and group management in hosted environment
Synchronize AD domain clients with a host AD domain in hosted environments. Utilize out-of-the-box connectors to synchronize your on-premises AD accounts to Microsoft Office 365, Lync Online and SharePoint Online.
Training
Balasys offers you traditional classroom schedule as well as cost-efficient online training packages. The goal of these trainings is to give your IT experts the knowledge and skills needed to configure, operate, maintain, and troubleshoot our products. Thanks to the successful cooperation, unequalled in the world, Balasys delivers training for all One Identity Safeguard and syslog-ng products lines, both for the employees of the vendor and its partners since it is the only company within the One Identity partner ecosystem with the necessary competence and licenses.
Classroom Trainings
Remote Trainings
Operations support
You can benefit from our expertise not only in the implementation but also after closing that phase of your project. Our remote support and remote management services can help you ease the burden on your operations staff and raise your operational efficiency.
one identity competence center
Balasys has become the key distribution and solution delivery partner of One Identity in the CEE region. By working actively with our channel partners and customers, from presales to support, we can add value to the delivered One Identity solutions
Expert team with broad knowledge of the IT security landscape
Several decades of experience
Deep knowledge of the regional market
Comprehensive consultancy, implementation, training and support services
Direct access to One Identity sales, presales and support resources
support
Balasys delivers deep technical support for you both for the Zorp and the One Identity product lines. This means that we can solve any problems for which other companies would need to help of the vendor. The Balasys support team provides you with a full range of customer support started from L1 to L3 level issues where our developers are involved to resolve your technical problem. In its distribution area, Balasys delivers its services according to strict standards: rendering 24/7 direct vendor support in English and Hungarian.

As a highly skilled implementation and support partner, we are committed to close collaboration with our channel partners and customers to help them achieve the best performance ratio for our products. We are committed to your long-term satisfaction. We are dedicated to ensuring you the highest availability and a reliable IT operation at a low maintenance cost.

Benefits

Benefits of the Balasys support services are:


- Custom support packages
- Flexible responses to your support needs and expectations
- 24/7 operations
- Professional and trustworthy relationship
- Experienced, senior support engineers
- Direct engineer access
- Online ticketing system
- Multi-language support engineers

contact us

Open a case: Create or manage technical and non-technical cases, access your licenses or download your software via Balasys Support site at https://support.balasys.hu

Call: Call Customer Support to receive assistance with your issues:

Phone: +36 1 646 4740, Direct number: +36 1 646 4747

Support levels

Title
Availability
Response time*
software-subscription
Contract
version
5x8 ( Mon-Fri, 9-17 CET )
The next business day
Yes
2
ExtendedSU
5x12 ( Mon-Fri, 8-20 CET )
4 hours
Yes
4
PrivilegeSU
7x24 ( Mon-Sun 0-24 )
2 hours
Yes
6
BaseSU
Availability: 5x8 ( Mon-Fri, 9-17 CET )
Response time* : The next business day
software-subscription: Yes
Contract: 2
ExtendedSU
Availability: 5x12 ( Mon-Fri, 8-20 CET )
Response time* : 4 hours
Software-Subscription: Yes
Contract: 4
PrivilegeSU
Availability: 7x24 ( Mon-Sun 0-24 )
Response time* :2 hours
Software-Subscription: Yes
Contract: 6
core features

responsive core

Granular configuration options enable
administrators to fully implement
corporate security policies.

open source

Granular configuration options enable
administrators to fully implement
corporate security policies.

high-end protection

Granular configuration options enable
administrators to fully implement
corporate security policies.
use case

iot security

IoT elements are exposed to be attacked permanently, so they need
solid security tools which can cut risks back to as little as possible.
In a world where everything joins networks, even networks too, you
need a tool to make these increased connections organized.
Button Text