Best Practices to Control Your Privileged Users

Privileged identities have emerged as the primary target for cyber attacks and have been exploited to perpetrate the most destructive data breaches in recent years. That’s why monitoring the actions of privileged users has become a key part of enterprise risk management. It is a challenging excercise however. The following best practices can give you a helping hand to mitigate the risks related to your superusers, and to gain real benefits from a Privileged Activity Monitoring (PAM) solution: 1. Adopt the least-privilege principleGive a user…

BalaBit Secures $8M for Business-Friendly IT Security

NEW YORK, June 18, 2014 – BalaBit (www.balabit.com), a Europe-based IT security innovator, has raised a $8 million Series A round of funding to speed up the development and expansion of its pioneering IT security platforms. The new investment will be used to fuel BalaBit’s international expansion in North America and additional European markets including the UK and Scandinavia. The cash was raised from London based C5 Capital, Europe’s first dedicated investor in the security and data sector. Using the strong financial backing by C5…

Integration of Shell Control Box Improves and Secret Server Control and Visibility over Privileged Users’ Activities

New York, May 28, 2014– BalaBit IT Security (www.balabit.com) announced today its official technology alliance with Thycotic Software, provider of smart and effective privileged account management solutions for global organizations through integration of its Shell Control BoxTM, an activity monitoring appliance designed to control privileged access to remote servers and networking devices with Thycotic’s  flagship password management solution, Secret Server. The technology integration provides users of both products with improved, real-time threat protection and a deeper view into privileged users’ activity.