DLP - Information leak prevention systems
InfoWatch develops technologies and products to reduce information security risks, protect and analyze corporate data for companies that see their future as digital.
ATD - Targeted Attack Protection system
Kaspersky Lab is an international company working in information security and digital privacy for more than 25 years. More than 5 thousand highly qualified specialists are building an ecosystem that can meet all the cybersecurity needs of both organizations and individuals and ensure a cyber-immune future.
Positive Technologies is a leader in the field of effective cybersecurity. The company is a leading developer of products, solutions and services that enable the detection and prevention of cyber attacks before they cause unacceptable damage to businesses and entire sectors of the economy. Positive Technologies is used by about 4,000 organizations worldwide.
SIEM - Information security incident monitoring and management systems
Kaspersky Lab is an international company working in information security and digital privacy for more than 25 years. More than 5 thousand highly qualified specialists are building an ecosystem that can meet all the cybersecurity needs of both organizations and individuals and ensure a cyber-immune future.
Positive Technologies is a leader in the field of effective cybersecurity. The company is a leading developer of products, solutions and services that enable the detection and prevention of cyber attacks before they cause unacceptable damage to businesses and entire sectors of the economy. Positive Technologies is used by about 4,000 organizations worldwide.
PAM - privileged access control systems
Is a Russian software vendor. Our software systems are designed to solve problems related to managing digital certificates and their media, user access to information resources of companies and organizations
A set of methods and technologies for managing user credentials and access control systems aimed at improving the security and performance of information systems while reducing costs and optimizing downtime.
The advanced Russian platform 1IDM is designed for building modern systems for managing user accounts and access rights (identity management system) of any scale and complexity for both government agencies and commercial organizations.
A set of methods and technologies for managing user credentials and access control systems aimed at improving the security and performance of information systems while reducing costs and optimizing downtime.
Solar is an architect of comprehensive cybersecurity systems.
Is a system-forming Russian IT company, the main field of activity is the development of information security tools.
Нетхаб (Nethub) solutions provide collection, correlation, comprehensive analysis and configuration management of network equipment.
Solidwall is an intelligent firewall to protect web applications.
Threat Intelligence - Security Management
Solutions to prevent cyber attacks, anti-fraud and brand protection
Garda Technologies is a Russian developer of protection systems against internal and external threats to information security, anti-fraud and incident investigation.
Vulnerability Management - Security scanners. Penetration testing
Positive Technologies is a leader in the field of effective cybersecurity. The company is a leading developer of products, solutions and services that enable the detection and prevention of cyber attacks before they cause unacceptable damage to businesses and entire sectors of the economy. Positive Technologies is used by about 4,000 organizations worldwide.
Cyber attack simulation platform
Continuous objective assessment of the level of security and increasing the effectiveness of the protection system
Document management systems
Organization of information support for projects with the participation of external contractors
Garda Technologies is a Russian developer of protection systems against internal and external threats to information security, anti-fraud and incident investigation.
Cyberattack detection systems
Platform for preventing targeted attacks using cyber deception technology
Cyber attack simulation platform
Continuous objective assessment of the level of security and increasing the effectiveness of the protection system
Remote workplace monitoring system
An information security complex for monitoring remote workplaces and actively responding to non-compliance with security profiles.
Data backup and recovery system
Киберпротект (Cyberprotect) is a Russian software developer for data protection, backup and recovery of virtual, physical and cloud environments.
Vulnerability management system for information resource configurations
Spacebit is a Russian developer of modern software products in information security
Container and orchestration protection system
Luntry is Comprehensive Protection throughout the entire lifecycle of containerized applications and orchestration tools based on Kubernetes
Positive Technologies is a leader in the field of effective cybersecurity. The company is a leading developer of products, solutions and services that enable the detection and prevention of cyber attacks before they cause unacceptable damage to businesses and entire sectors of the economy. Positive Technologies is used by about 4,000 organizations worldwide.
Virtualization System
A comprehensive software solution for securely managing a virtualization environment
Numa Technologies Company is a Russian developer of specialized software and information security tools. The company's activities are focused on carrying out developments in key areas of information technology significant for creating secure information systems: endpoint protection (Numa BIOS, Numa Arce, Numa uGate), network protection (Numa Edge) and secure virtualization (Numa vServer).
Operating systems
A certified OS with built-in information security tools (SDI) for stable and secure operation of IT infrastructures of any scale and processing of information of varying degrees of confidentiality. Versions are available for server, desktop, mobile and embedded application scenarios