balasys-triangle-leftbalasys-triangle-left

Type your search criteria

see-behind
explore zorp
the number one multi-purpose proxy gateway
use case

active roles

Hybrid Active Directory management, simple and secure
Administrators struggle to keep up with requests to create, change or remove access in today’s hybrid AD environments and with the limited capabilities of Microsoft Active Directory (AD) and Azure Active Directory (AAD) native tools. Thankfully, help has arrived.

With One Identity Active Roles, you can streamline user and group administration, solve security issues – and meet those never-ending compliance requirements by managing and securing on-prem and cloud AD resources simply and efficiently with a single, intuitive solution.

Why do you need api securiy?

resources
Separation of critical systems
use case

features

contact sales
granular protocol control
Full interpretation and validaton of 20+ network protocols
Connection handling on application layer
Control of protocol channels ( e.g. file transfer, port forward)
comprehensive encryption support
control of SSL / TLS-encrypted protocols
TLS 1.3 cryptography support
SSL and IPSec VPN
use case

use cases

contact sales
API breach prevention

Unauthorized user or bot access, data leaks, (D)DOS attacks, misuses and human errors have become real threats for companies operating API infrastructures. Protecting your organization from API breaches is the ultimate goal of the Zorp API Gateway. You can authenticate API-requestors, control API calls and inspect the traffic in detail. By encrypting the traffic, you can increase the security of the API communication further. Enforce a custom API security policy without affecting the business operations.

traffic analysis

Zorp API Gateway supports detailed and flexible logging. You can extract customized data from the API-traffic, those you can analyze from different perspectives. You can forward security relevant logs to the SIEM or SOC to improve your API security monitoring posture. The Zorp API Gateway also supports big data tools and data lakes (for example, Kibana, Elasticsearch or Kafka) as potential log destinations. You can send pre-filtered, quality data to these destinations for in-depth business analysis.

Regulatory compliance

PSD2 requires banks to secure the financial data flow via their public-facing APIs. GDPR indirectly requires anonymization or pseudo anonymization of personal data in transit.  The PCI DSS requires financial providers to encrypt transmission of cardholder data via public networks… All these regulations have one key requirement in common: they require regulated companies to protect customers’ data at rest and in transit, as well. The Zorp API Gateway helps streamline your compliance efforts through its comprehensive access control, encryption and audit capabilities.

Protecting legacy systems

The Zorp API Gateway can ensure compatibility with your legacy systems by modifying certain elements of the API traffic. This enables the possibility of hiding information about security risks and treating the vulnerabilities of your legacy applications. For example, you can remove the error messages, banners, or other information specific to the applications to hide faulty configuration or sensitive information about your back-end infrastructure. It can even force upgrade of legacy encryption protocols to the recent TLS version.

Special network security projects

Thanks to its extremely flexible, scriptable configuration you can meet specific security requirements with Zorp Gateway. Just a few examples:

• Data manipulation - modifying sensitive or risky elements of the traffic. For example, masking credit card data or hiding vulnerable server configuration.
• Graceful degradation of services during peak times by preferring transaction-closing events
• Implement your own protocol by using the AnyPy proxy and the power of Python

use case

Join our partner program

We help our partners to expand their reach and maximize profits with a broad set of tools and methods. Join our Partner Program and enjoy all the benefits of a flexible professional network.
Develop more sales opportunities
Our business model is based on close collaboration with our partners to facilitate their business growth. You will benefit from new and expanded sales opportunities and engage prospects in the sales cycle, resulting in increased license and services revenue.
Acquire deep competency
To ensure the success of our partners and customers, we provide a variety of training options focused on both sales and technical skills. These include self-paced online courses, virtual classrooms and face-to-face classroom trainings.

Our dedicated training paths and certifications for sales representatives and engineers align with the requirements of both the Balasys Partner Network and the sales cycle, from pre-sales positioning to post-sales delivery. 
Engage more effectively
With our turnkey marketing campaign support, you will be on the fast track to reach prospective customers and start successful conversations. 
Support for your success
The Balasys team is committed to your success. We provide all the resources for you to identify and act effectively on sales opportunities.

This includes a highly-skilled services organization that offers a combination of cybersecurity technologies and expertise to support your implementations.
Balasys partner levels
Learn more about our partner program levels and explore the benefits.
implementation
From simple start-up integrations to more complex projects, we offer a full range of services to ensure smooth deployment from initial project scoping to post-integration support.

Broad knowledge of not only the IT security landscape but all the connecting infrastructure components helps us find the optimal approach to every customer challenge.
Detailed Design
Delivery:
- Installation
- Configuration
- Customization
- Integration
Documentation
Testing
User and group management in hosted environment
Synchronize AD domain clients with a host AD domain in hosted environments. Utilize out-of-the-box connectors to synchronize your on-premises AD accounts to Microsoft Office 365, Lync Online and SharePoint Online.
Training
Balasys offers you traditional classroom schedule as well as cost-efficient online training packages. The goal of these trainings is to give your IT experts the knowledge and skills needed to configure, operate, maintain, and troubleshoot our products. Thanks to the successful cooperation, unequalled in the world, Balasys delivers training for all One Identity Safeguard and syslog-ng products lines, both for the employees of the vendor and its partners since it is the only company within the One Identity partner ecosystem with the necessary competence and licenses.
Classroom Trainings
Remote Trainings
Operations support
You can benefit from our expertise not only in the implementation but also after closing that phase of your project. Our remote support and remote management services can help you ease the burden on your operations staff and raise your operational efficiency.
one identity competence center
Balasys has become the key distribution and solution delivery partner of One Identity in the CEE region. By working actively with our channel partners and customers, from presales to support, we can add value to the delivered One Identity solutions
Expert team with broad knowledge of the IT security landscape
Several decades of experience
Deep knowledge of the regional market
Comprehensive consultancy, implementation, training and support services
Direct access to One Identity sales, presales and support resources
support
Balasys delivers deep technical support for you both for the Zorp and the One Identity product lines. This means that we can solve any problems for which other companies would need to help of the vendor. The Balasys support team provides you with a full range of customer support started from L1 to L3 level issues where our developers are involved to resolve your technical problem. In its distribution area, Balasys delivers its services according to strict standards: rendering 24/7 direct vendor support in English and Hungarian.

As a highly skilled implementation and support partner, we are committed to close collaboration with our channel partners and customers to help them achieve the best performance ratio for our products. We are committed to your long-term satisfaction. We are dedicated to ensuring you the highest availability and a reliable IT operation at a low maintenance cost.

Benefits

Benefits of the Balasys support services are:


- Custom support packages
- Flexible responses to your support needs and expectations
- 24/7 operations
- Professional and trustworthy relationship
- Experienced, senior support engineers
- Direct engineer access
- Online ticketing system
- Multi-language support engineers

contact us

Open a case: Create or manage technical and non-technical cases, access your licenses or download your software via Balasys Support site at https://support.balasys.hu

Call: Call Customer Support to receive assistance with your issues:

Phone: +36 1 646 4740, Direct number: +36 1 646 4747

Support levels

Title
Availability
Response time*
software-subscription
Contract
version
5x8 ( Mon-Fri, 9-17 CET )
The next business day
Yes
2
ExtendedSU
5x12 ( Mon-Fri, 8-20 CET )
4 hours
Yes
4
PrivilegeSU
7x24 ( Mon-Sun 0-24 )
2 hours
Yes
6
BaseSU
Availability: 5x8 ( Mon-Fri, 9-17 CET )
Response time* : The next business day
software-subscription: Yes
Contract: 2
ExtendedSU
Availability: 5x12 ( Mon-Fri, 8-20 CET )
Response time* : 4 hours
Software-Subscription: Yes
Contract: 4
PrivilegeSU
Availability: 7x24 ( Mon-Sun 0-24 )
Response time* :2 hours
Software-Subscription: Yes
Contract: 6
core features

responsive core

Granular configuration options enable
administrators to fully implement
corporate security policies.

open source

Granular configuration options enable
administrators to fully implement
corporate security policies.

high-end protection

Granular configuration options enable
administrators to fully implement
corporate security policies.
use case

iot security

IoT elements are exposed to be attacked permanently, so they need
solid security tools which can cut risks back to as little as possible.
In a world where everything joins networks, even networks too, you
need a tool to make these increased connections organized.
Button Text