Type your search criteria

explore zorp
the number one multi-purpose proxy gateway
use case


Enterprise class log management software
syslog-ng Premium Edition delivers the log data critical to understanding what is happening in your IT environment. Whether it's user activity, performance metrics, network traffic or any other type of log data, syslog-ng can collect and centralize it. You can remove data silos and gain full-stack visibility of your IT environment.

Why do you need api securiy?

Separation of critical systems
use case


contact sales
granular protocol control
Full interpretation and validaton of 20+ network protocols
Connection handling on application layer
Control of protocol channels ( e.g. file transfer, port forward)
comprehensive encryption support
control of SSL / TLS-encrypted protocols
TLS 1.3 cryptography support
use case

use cases

contact sales
Optimizing SIEM

Security Information and Event Management (SIEM) solutions form the core of many enterprises’ IT security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance.syslog-ng is the log management solution that improves the performance of your SIEM solution by reducing the amount and improving the quality of data feeding your SIEM.

big data ingestion

Many big data projects run into the 80/20 rule. 80% of resources is spent getting data into their analytic tools and only 20% on analyzing the data. syslog-ng can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others.

universal log collection and routing

Organizations using multiple analytic tools and storage solutions often use multiple log management tools. syslog-ng flexibly routes log data from X sources to Y destinations. Instead of deploying multiple agents on hosts, organizations can unify their log data collection and management.

rapid search and troubleshooting

Whether you need to respond to a security incident, troubleshoot infrastructure issues, or debug applications, searching millions or billions of logs quickly is usually the first step. Having the right log data at the right time easily accessible is critical to your success. With syslog-ng Store Box, you can find the answer. Search billions of logs in seconds using full text queries with Boolean operators to pinpoint critical logs.

meeting compliance requirements

IT departments increasingly find themselves spending ever more resources on compliance as laws, regulations and industry standards mandate increasing security awareness and the protection of sensitive data. A secure log management solution can help meet compliance requirements. The syslog-ng Store Box provides secure, tamper-proof storage and custom reporting to demonstrate compliance.

secure data archive

Log data often contains sensitive information - Personally Identifiable Information (PII), user activity, transactions, and more.syslog-ng Store Box provides automated archiving, tamper-proof encrypted storage and granular access controls to protect log data. You can securely manage and archive your log data for long term. The largest appliance can store up to 10TB of raw logs.

use case


contact US
one identity hybrid subscription
join the cloud at your pace of business
The One Identity Hybrid Subscription unlocks new hybrid capabilities for One Identity on-premises products. Join your One Identity on-premises solutions to our One Identity Starling software-as-a-service platform to give your organization immediate access to cloud-delivered features and services. It’s simple and easy – there’s no messy installs or infrastructure deployments. Plus, no updates, you will always have access to the newest cloud-delivered features.
Connect your One Identity on-premises solutions to the cloud
Receive additional functionality and more frequent releases without costly upgrade cycles
Immediately access new products and features via the One Identity Starling platform
Immediately access new products and features via the One Identity Starling platform
No hassle – a single subscription for all your One Identity products
Portfolio that meets today and tomorrow’s business needs
Enjoy a low annual subscription fee
Unlimited Starling Two-Factor Authentication
Starling Identity Analytics & Risk Intelligence (IARI) modules for Active Roles & One Identity Safeguard
Access Certification for One Identity Safeguard
starling two-factor authentication
secure and simple identity verification
Lock down administrator and user access with multi-factor authentication as a service. The One Identity Starling Two-Factor Authentication solves the password problem to secure your organization and keep your users productive.
Heightens security for virtually any system or application
Reduces risk of social engineering with an accelerated password-reset process
Push-to-Authenticate mobile-enabled authentication capabilities which includes automated texting of codes to admin and user phones for an additional level of security
Manage privileged access requests, without VPN – One Identity Safeguard users can approve or deny any request from anywhere
starling connect
Extend identity governance to the cloud
As a cloud-based SaaS offering, One Identity Starling Connect extends your current investment in identity governance capabilities to the cloud and significantly cuts the time it takes to onboard new cloud applications. Starling Connect builds on One Identity Manager, or other IAM systems, to unify governance and access controls, ensure compliance and accelerates the user-provision/de-provision process.
Total Identity Governance
Full Compliance
Cloud Provisioning
Hybrid enterprise-ready
access certification
Satisfy business requirements for attesting the access of your privileged users. With the expanded capabilities for One Identity Safeguard, you can run access certification campaigns against your Safeguard deployments to certify privileged access rights and ensure compliance.


Benefits of ZORP GPL product

- Comprehensive traffic inspection
- Encrypted channel control
- Content filtering and modification (optional)
- Modular, highly flexible configuration
- Free license and active community support
- Free solution to many unique network security problems

core features

responsive core

Granular configuration options enable
administrators to fully implement
corporate security policies.

open source

Granular configuration options enable
administrators to fully implement
corporate security policies.

high-end protection

Granular configuration options enable
administrators to fully implement
corporate security policies.
use case

iot security

IoT elements are exposed to be attacked permanently, so they need
solid security tools which can cut risks back to as little as possible.
In a world where everything joins networks, even networks too, you
need a tool to make these increased connections organized.
Button Text