BalaBit Releases Blindspotter: Real-time, User-behavior Analytics Tool

BalaBit announced that its next-generation IT security tool, Blindspotter is now generally available. Blindspotter is a real-time, user behavior analytics (UBA) tool that analyzes user activities and identifies suspicious events occurring throughout IT systems. It is designed to help organizations mitigate the impact of advanced persistent threats (APTs) or identify malicious internal activity and to speed up the investigation process of any suspicious activity.

Blindspotter tracks and visualizes user activity in real-time to provide organizations with a better understanding of what is really happening on the network. The solution works by collecting and analyzing user-related events and user session activity in real-time or near real-time. It then compares every action to the corresponding baseline of users and their peers to spot anomalies in their behavior -- such as an administrator logging in outside of their normal hours. Blindspotter is even capable of detecting abnormality on the level of issued commands. This means that, if a system administrator uses a command that is different from the generally used command set, Blindspotter will alert the security team. Once this has been detected, Blindspotter can automatically react to minimize the impact of any threat.

It is designed to meet today's key security challenges and alert organizations to key threats, for example:

Detection of hijacked accounts: The activities of an attacker who has compromised a legitimate account will differ significantly from a normal user's activity; external attackers will typically try to map the IT system by accessing various systems to probe for available services or download a large amount of data, which would be of value to them. Blindspotter is able to detect and alert security analysts to deviations of this kind.

Detection of misuse of privileges: Blindspotter can help to detect if a user with high privilege rights has attempted to steal company data to copy or modify sensitive company data that is not required for his job. In this way the data breach can be prevented.

Detection of automated system account misuse:Automated system accounts are typically created by administrators to repeat regular tasks such as backing up the database or restarting certain services overnight. Automated system accounts increase the efficiency of administrators' jobs, however, to make their job easier, in many cases they take the risk to use their own credentials. This is a security risk; in the event that the script is hacked, the attacker not only has the account details of the system administrator but also gains access to all the services that the administrator has. Using Blindspotter, it is possible to distinguish between accounts used by automated jobs and humans.

Screen Content Analysis:Used in conjunction with Shell Control Box -- BalaBit's privileged activity monitoring appliance -- Blindspotter can also analyze screen content, including issued commands and applied software or any textual data that appears on the screen. This enables the detection of any anomalies, which are the obvious signs of an APT-attack or a serious misuse of privilege.

"The reality for most organisations is that security threats already lurk inside their perimeter, whether it's a sophisticated external attacker who has gained access to an internal account or a malicious insider attempting to steal data," said Zoltán Györkő, CEO of BalaBit. "In the past, spotting attacks from within the perimeter has been notoriously difficult. Blindspotter is designed to close this security gap, and protect critical data, without slowing down a business's day to day operations."

 

 

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.