IT infrastructure transformation
We implement modern and high-quality IT solutions to improve the efficiency and security of your business
Find a solution

«Puzzle Systems», group of companies

A system integration company which provides a range of services of various scales and levels of complexity in the field of information technology and cybersecurity
More about the company
Experience of our employees is more than 10 years
Unique services in the field of information security
Modern technologies
Full support
Licensed activities
Official authorized partner

Creating and transforming IT infrastructure

We implement systems that meet modern market requirements to increase the productivity of customer companies
IDM OneIdentity
IDM OneIdentity
Asset access management System
BackBOX
BackBOX
Automation systems for management and backup of network equipment
Veritas
Veritas
Backup and recovery systems
RUSTACK
RUSTACK
Server virtualization and IT infrastructure management
Infowatch Traffic Monitor
Infowatch Traffic Monitor
DLP is a system that prevents leaks of confidential information
InfoWatch Person Monitor
InfoWatch Person Monitor
InfoWatch Person Monitor is an InfoWatch Traffic Monitor module for individual monitoring
McAfee Data Loss Prevention
McAfee Data Loss Prevention
Protects confidential data of all kinds
Micro Focus Arcsight
Micro Focus Arcsight
This product provides collection, processing and storage of security events
McAfee ESM SIEM
McAfee ESM SIEM
It provides threat data collection and protection integration
IBM Qradar
IBM Qradar
It helps security specialists to ensure high accuracy of threat detection
MaxPatrol SIEM
MaxPatrol SIEM
MaxPatrol SIEM provides 360º visibility into infrastructure and detects security incidents.
Alertix — more than SIEM
Alertix — more than SIEM
It is a universal tool for data collection and processing, search and automatic signature detection of unwanted events or their combinations.
Garda technologies
Garda technologies
It conducts constant monitoring of database accesses and identifies suspicious transactions
Imperva
Imperva
A leading provider of solutions in the field of web application protection
McAfee Database Security
McAfee Database Security
It provides protection of critical databases in real-time mode
CyberArk
CyberArk
Modular platform for account protection and access control
Thycotic
Thycotic
Simple management of passwords, access and users
Infrascope
Infrascope
A comprehensive product for privileged access management (PAM)
TrapX
TrapX
Deception cyberattack protection technology
Kaspersky Sandbox
Kaspersky Sandbox
Is a system for detecting malware
McAfee Advanced Threat Defense
McAfee Advanced Threat Defense
An advanced tool for detecting hidden "zero-day" threats
Forcepoint NGFW
Forcepoint NGFW
It protects corporate networks with high-performance security technology
Forcepoint Web Security
Forcepoint Web Security
Websense Web Security Gateway analyzes web traffic in real time, ensuring the safe use of the latest Web 2.0 technologies
McAfee Web Gateway
McAfee Web Gateway
A significant means of protection that allows to protect an organization from threats
PT Application firewall (WAF)
PT Application firewall (WAF)
Web application firewall, WAF
Rapid7 Nexpose
Rapid7 Nexpose
It analyzes all components of the operating system, database, web applications
Rapid7 Metasploit
Rapid7 Metasploit
It simulates an attack on the network and identifies its security problems
Rapid7 AppSpider
Rapid7 AppSpider
It scans all applications and finds out all weaknesses
MaxPatrol VM
MaxPatrol VM
Lets you build a full-fledged vulnerability management process and monitor the security of the IT infrastructure at all times.
Gytpol Validator
Gytpol Validator
Providing a unique view of your misconfiguration security gaps with continuous monitoring of all your devices.
Skybox Security
Skybox Security
A set of tools for network security, analytics and reporting
McAfee ePO
McAfee ePO
Centralized presentation of information
McAfee TIE
McAfee TIE
Exchange of information about threats between different security solutions
Asset Zero
Asset Zero
Intelligence-Driven Attack Surface Management
PT Network Attack Discovery
PT Network Attack Discovery
Is a deep network traffic analysis system that detects attacks on the perimeter and inside the network.
PT XDR
PT XDR
A product for detecting and responding to cyber threats.
Supply of IT equipment

Our principles

The clients who cooperate with us are satisfied with the results of the work carried out. After all, we base our business on the principles of:
Professionalism
Our experience allows us to create systems with a high level of efficiency and reliability
Modern technologies
Our solutions are based on modern technologies that simplify and improve the efficiency of business processes
Efficiency
Preciseness is our responsibility, we deliver our projects strictly in time
Individual approach
We offer individual solutions based on the customer's IT infrastructure analysis