Balabit Shell Control Box extends its coverage

MICROSOFT AZURE (CLOUD)

You can now have SCB in your cloud environment, monitor and protect your data, here as an app in Microsoft Market Place:

https://azure.microsoft.com/en-us/marketplace/partners/balabit/balabit-shell-control-box/

SPLUNK INTEGRATION

SCB was able to be integrated with Splunk and now it is officially technical supported. Find more info here : https://splunkbase.splunk.com/app/3085/

ARCSIGHT INTEGRATION

Security events managed by ArcSight are broadened by privileged user activities captured by Shell Control Box. Daily security operation tasks are greatly simplified, as it is no longer necessary to manually download and inspect user activity logs, as all the information is searchable and visualized in the ArcSight GUI.

  • Speed up incident investigation by providing comprehensive view of high-risk users’ sessions.
  • Gain deep, forensics-level visibility by “movie-like” replaying of the complete session.
  • Improve ArcSight’s alerting and reporting quality by incorporating log data related to high-risk users.

Find out more:

https://saas.hpe.com/marketplace/arcsight/balabit-shell-control-box

 



Related Articles

Crucial backup strategies to defend against ransomware attacks

Ransomware payouts are trending upward once again. According to Chainalysis, a cryptocurrency tracing firm, 2021 saw ransomware payments reach nearly $1 billion—a record high. While there was a decline in 2022, the trend reversed in 2023, with estimated payouts approaching $900 million. This increase in ransomware activity can be attributed to the intensified operations of […]

A Tale of the Three *ishings: Part 3 – What is Vishing?

Over the past two decades, the security industry has made significant strides in using technology to secure technological assets. However, the human factor in cybersecurity often remains overlooked. Consequently, cyber attackers have shifted their focus from targeting technology to targeting people. Among the various methods they employ, the three most common are phishing, smishing, and […]

API monetization models: Strategies to leverage APIs for greater revenue

API monetization models showcase strategies and tactics for using APIs to generate revenue, impacting the bottom line both directly and indirectly. In this blog, we’ll define API monetization, explore different monetization models, and delve into a classic case study. Additionally, we’ll discuss various use cases and steps to consider when designing your API strategy for […]

syslog-ng Store Box Splunk/HEC and Sentinel destinations

The syslog-ng Store Box (SSB) appliance is built on syslog-ng Premium Edition (PE). SSB inherits most of syslog-ng PE’s features and makes them available with an easy-to-use graphical user interface. One of the typical use cases for SSB (and syslog-ng PE) is optimizing the logging infrastructure for SIEM / log analysis. Two recently introduced SSB […]

Taiwan CyberSec event

Reflecting on an incredible experience at the Taiwan CyberSec event! 🌟 Engaging discussions, groundbreaking insights, and invaluable connections made this event unforgettable. Thank you to all the participants, speakers, and organizers for contributing to this dynamic exchange of ideas. Let's continue working together to enhance cybersecurity worldwide! #DTAsia

Contact DT Asia Group Hong Kong

Address: Unit 929, Kowloon Bay Industrial Centre,
15 Wang Hoi Road, Kowloon Bay, Hong Kong
Tel: +852 58010001
Emailsales@hk.dtasiagroup.com

Like Our Facebook Page :)