Type your search criteria

explore zorp
the number one multi-purpose proxy gateway
use case

active roles

Hybrid Active Directory management, simple and secure
Administrators struggle to keep up with requests to create, change or remove access in today’s hybrid AD environments and with the limited capabilities of Microsoft Active Directory (AD) and Azure Active Directory (AAD) native tools. Thankfully, help has arrived.

With One Identity Active Roles, you can streamline user and group administration, solve security issues – and meet those never-ending compliance requirements by managing and securing on-prem and cloud AD resources simply and efficiently with a single, intuitive solution.

Why do you need api securiy?

Separation of critical systems
use case


contact sales
granular protocol control
Full interpretation and validaton of 20+ network protocols
Connection handling on application layer
Control of protocol channels ( e.g. file transfer, port forward)
comprehensive encryption support
control of SSL / TLS-encrypted protocols
TLS 1.3 cryptography support
use case

use cases

contact sales
API breach prevention

Unauthorized user or bot access, data leaks, (D)DOS attacks, misuses and human errors have become real threats for companies operating API infrastructures. Protecting your organization from API breaches is the ultimate goal of the Zorp API Gateway. You can authenticate API-requestors, control API calls and inspect the traffic in detail. By encrypting the traffic, you can increase the security of the API communication further. Enforce a custom API security policy without affecting the business operations.

traffic analysis

Zorp API Gateway supports detailed and flexible logging. You can extract customized data from the API-traffic, those you can analyze from different perspectives. You can forward security relevant logs to the SIEM or SOC to improve your API security monitoring posture. The Zorp API Gateway also supports big data tools and data lakes (for example, Kibana, Elasticsearch or Kafka) as potential log destinations. You can send pre-filtered, quality data to these destinations for in-depth business analysis.

Regulatory compliance

PSD2 requires banks to secure the financial data flow via their public-facing APIs. GDPR indirectly requires anonymization or pseudo anonymization of personal data in transit.  The PCI DSS requires financial providers to encrypt transmission of cardholder data via public networks… All these regulations have one key requirement in common: they require regulated companies to protect customers’ data at rest and in transit, as well. The Zorp API Gateway helps streamline your compliance efforts through its comprehensive access control, encryption and audit capabilities.

Protecting legacy systems

The Zorp API Gateway can ensure compatibility with your legacy systems by modifying certain elements of the API traffic. This enables the possibility of hiding information about security risks and treating the vulnerabilities of your legacy applications. For example, you can remove the error messages, banners, or other information specific to the applications to hide faulty configuration or sensitive information about your back-end infrastructure. It can even force upgrade of legacy encryption protocols to the recent TLS version.

Special network security projects

Thanks to its extremely flexible, scriptable configuration you can meet specific security requirements with Zorp Gateway. Just a few examples:

• Data manipulation - modifying sensitive or risky elements of the traffic. For example, masking credit card data or hiding vulnerable server configuration.
• Graceful degradation of services during peak times by preferring transaction-closing events
• Implement your own protocol by using the AnyPy proxy and the power of Python

use case


OEM Partnerships
Become an OEM (Original Equipment Manufacturer) partner for a pioneer vendor in proxy-based network security technology.

Whether you are a hardware, software or solution provider, our partnership offer can be tailored to your needs and provide you with a range of OEM options.Our OEM Partners are a select group of companies that work alongside us to extend the reach and value of our joint solutions.

Why consider becoming our OEM partner?An OEM partnership enables your business to leverage the synergy of your product and our robust Zorp technology.

This means you can distinguish your product with added features and provide customers with a more comprehensive solution – and also enter the market faster.

An OEM partnership can also save you money, time and effort in terms of development and maintenance. There is no need to invent a new security module. Instead, use the best-in-class in the industry and focus on your core competencies so you can build your products faster.
Our Technology
Balasys products are based on the capabilities of the Zorp network security framework. Zorp is an application-level, transparent proxy technology. It is the world's first modular proxy technology, with 20 years of development history on the European market.

The highly flexible and customizable architecture makes Zorp suitable for the industry-specific needs of fintech, IoT and Industrial Control System (ICS) environments.Zorp was developed from pure technology and a revolutionary engineering spirit, with the express intention of seamless interconnecting computer systems.

Developed for extensive, distributed networks and high security requirements, Zorp offers uncompromising solutions for the challenges of the digital world. Zorp tackles both internal and external threats with maximum compliance with security regulations. Its flexibility and resilience make it an ideal choice for the most demanding and complex environments of today and tomorrow.
From simple start-up integrations to more complex projects, we offer a full range of services to ensure smooth deployment from initial project scoping to post-integration support.

Broad knowledge of not only the IT security landscape but all the connecting infrastructure components helps us find the optimal approach to every customer challenge.
Detailed Design
- Installation
- Configuration
- Customization
- Integration
User and group management in hosted environment
Synchronize AD domain clients with a host AD domain in hosted environments. Utilize out-of-the-box connectors to synchronize your on-premises AD accounts to Microsoft Office 365, Lync Online and SharePoint Online.
Balasys offers you traditional classroom schedule as well as cost-efficient online training packages. The goal of these trainings is to give your IT experts the knowledge and skills needed to configure, operate, maintain, and troubleshoot our products. Thanks to the successful cooperation, unequalled in the world, Balasys delivers training for all One Identity Safeguard and syslog-ng products lines, both for the employees of the vendor and its partners since it is the only company within the One Identity partner ecosystem with the necessary competence and licenses.
Classroom Trainings
Remote Trainings
Operations support
You can benefit from our expertise not only in the implementation but also after closing that phase of your project. Our remote support and remote management services can help you ease the burden on your operations staff and raise your operational efficiency.
one identity competence center
Balasys has become the key distribution and solution delivery partner of One Identity in the CEE region. By working actively with our channel partners and customers, from presales to support, we can add value to the delivered One Identity solutions
Expert team with broad knowledge of the IT security landscape
Several decades of experience
Deep knowledge of the regional market
Comprehensive consultancy, implementation, training and support services
Direct access to One Identity sales, presales and support resources
Balasys delivers deep technical support for you both for the Zorp and the One Identity product lines. This means that we can solve any problems for which other companies would need to help of the vendor. The Balasys support team provides you with a full range of customer support started from L1 to L3 level issues where our developers are involved to resolve your technical problem. In its distribution area, Balasys delivers its services according to strict standards: rendering 24/7 direct vendor support in English and Hungarian.

As a highly skilled implementation and support partner, we are committed to close collaboration with our channel partners and customers to help them achieve the best performance ratio for our products. We are committed to your long-term satisfaction. We are dedicated to ensuring you the highest availability and a reliable IT operation at a low maintenance cost.


Benefits of the Balasys support services are:

- Custom support packages
- Flexible responses to your support needs and expectations
- 24/7 operations
- Professional and trustworthy relationship
- Experienced, senior support engineers
- Direct engineer access
- Online ticketing system
- Multi-language support engineers

contact us

Open a case: Create or manage technical and non-technical cases, access your licenses or download your software via Balasys Support site at

Call: Call Customer Support to receive assistance with your issues:

Phone: +36 1 646 4740, Direct number: +36 1 646 4747

Support levels

Response time*
5x8 ( Mon-Fri, 9-17 CET )
The next business day
5x12 ( Mon-Fri, 8-20 CET )
4 hours
7x24 ( Mon-Sun 0-24 )
2 hours
Availability: 5x8 ( Mon-Fri, 9-17 CET )
Response time* : The next business day
software-subscription: Yes
Contract: 2
Availability: 5x12 ( Mon-Fri, 8-20 CET )
Response time* : 4 hours
Software-Subscription: Yes
Contract: 4
Availability: 7x24 ( Mon-Sun 0-24 )
Response time* :2 hours
Software-Subscription: Yes
Contract: 6
core features

responsive core

Granular configuration options enable
administrators to fully implement
corporate security policies.

open source

Granular configuration options enable
administrators to fully implement
corporate security policies.

high-end protection

Granular configuration options enable
administrators to fully implement
corporate security policies.
use case

iot security

IoT elements are exposed to be attacked permanently, so they need
solid security tools which can cut risks back to as little as possible.
In a world where everything joins networks, even networks too, you
need a tool to make these increased connections organized.
Button Text