RU
RU

Software and hardware

Выберите категорию

COMPREHENSIVELY AND RELIABLY

We offer a wide range of solutions, which are implemented both as a complex, connected in a single security infrastructure, and separately, including in the framework of pilot solutions. We can calculate the price of minimum implementation just to assess how the system works.

WHAT YOU MAY BE INTERESTED IN AND WHY?

1

WHAT IS A FIREWALL?
Firewalls are devices or hardware and software complexes designed to filter the traffic. In fact, it is a perimeter access control, a tool to distinguish the networks. This is where infrastructure protection begins. We use Cisco, Check Point, ALTELL NEO, Kontinent, ViPNet Coordinator, Rubikon and other solutions, as well as try to make a maximum use of firewalls that are already in place. The solutions for differentiation of access rights to virtual infrastructures, for example, VGate, are also worth mentioning.
2

WHAT ARE END NODES PROTECTION TOOLS INTENDED FOR?
If the firewall can be compared to the fence around the enterprise, then the antivirus (endpoint protection means) is a guard box. Streaming antivirus meets each incoming package at the entrance and sometimes searches the suspicious ‘guests’. Antivirus installed on end devices (in the workplace of the users and servers) is responsible for ensuring that no one had tried to misbehave there. If the antivirus is absent, the first incoming e-mail with a locker virus paralyses the company. So, usually at least most common solution is installed and working. Most often, we use the antivirus products by Kaspersky Lab, Dr.Web, ESET NOD, etc.
3

THERE IS A FENCE AND A GUARD. WHY DO WE NEED A MEANS OF INTRUSION DETECTION?
It is like video surveillance operators — they sit and spend days watching to ensure that nobody stole anything. More precisely, in the world of IT, they ensure normal network activity. As soon as there is some sort of abnormality, the intrusion detection tools should set an alarm to involve security officers to deal with the situation. We use ViPNet IDS, Kontinent, Rubicon, ALTELL NEO and other solutions.
4

OK, THEN WHAT ARE SECURITY ANALYSIS TOOLS?
They are patrol officers, who run across the network and check if everything is OK. They are the first to find a hole in the fence, they are the first to realise that someone forgot to install the correct settings when extending the network and so on. In a more aggressive mode, SAT attempt to ‘break’ the network as a middle-tier hacker and if they succeed, immediately report the security officer about location of a weak spot. Security analysis tools is unnecessary while upgrading infrastructure, but critical, if you want to maintain a good protection for years after implementation. That means, yes, they are necessary, but their acquisition may be slightly postponed in comparison with the basic implementation. We use MaxPatrol 8, XSpider, ViPNet TIAS, Skaner-VS and other solutions.
5

WHAT ARE INFORMATION CRYPTOGRAPHIC PROTECTION TOOLS INTENDED FOR?
ICPTs encrypt information. If encrypted information will be stolen from the channel of communication, from the external platform or somewhere else, the attacker will have a zero benefit from it. There is nothing more soothing than good encryption. Nevertheless, using encryption, one should adhere to many rules and regulators and use only certified equipment. We use ViPNet, Kontinent, Rubikon, S-Terra, KriptoPro and other ICPTs.
6

WHAT ABOUT MOBILE DEVICES PROTECTION?
There are solutions protecting of leaks from the phones of employees. We use Secret MDM, ViPNet Connect, SafePhone and others.
7

AND THE SWEETEST - DLP-SYSTEMS!
The pinnacle of engineering at the moment is the data loss protection systems. These are complexes, which relentlessly seek in all traffic, print queues, pictures — throughout the entire network - the signs of information that is not subject to transferring outside the enterprise. More details about this class of system can be found here. A separate part is test operation of the system, during which it checks a part of the company personnel. We use Falcongaze SecureTower solutions, DeviceLock, McAfee DLP, InfoWatch, Symantec, Zecurion and other solutions.

Projects direction

Ask the Manager