Solutions

Security today is achieved not only through professional staff and efficient processes, but first of all through effective solutions.
It is convenient to purchase solutions from us
Analytics, consultations
We select solutions taking into account technical or budget limitations, provide comparative analysis of several alternatives, host webinars and provide consulting services. You have everything you need to make a wise choice.
Pilot projects
Solution that you are interested in is tested in a war infrastructure over a period of several weeks. You will make a decision to purchase it only after the trial period.
Installation and setting up
By default we offer services for installation and initial setting. In case you have some difficulties, we can host a workshop or provide technical support services.
EndPoint Security, MDM, Virtualization security

Endpoint security

Solutions for protection of workstations, servers, virtual environments and mobile devices, as well as protection from unauthorized access (information security system agaisnt unauthorized access) and modules of trusted loading.
ENDPOINT SECURITY
ESET NOD32ESET NOD32
A comprehensive solution for protection of workstations and mobile devices.
ENDPOINT SECURITY
ESET NOD32 Secure Enterprise
A solution for protection of servers and services.
ENDPOINT SECURITY
Symantec Endpoint Protection
A comprehensive solution for protection of workstations.
ENDPOINT SECURITY
Symantec Protection Suite Enterprise Edition
A solution for mail server and gateway security.
FW, IDS/IPS, VPN, WAF, NGFW, UTM

Network security

Comprehensive network security, protection of web applications, streaming antivirus solutions, VPN builders, customized security solutions.
NGFW
PaloAlto NGFW
Highly effective next generation firewalls.
WAF
Imperva SecureSphere
Web application firewall.
NGFW
CheckPoint NGFW
Next generation firewalls with the use of software blade technology.
NGFW
Cisco ASA FirePower
A solution providing network perimeter protection and remote access.
WAF
PT Application Firewall
A self-learning application firewall.
VPN
S-terra gateway
A certified hardware and software system providing traffic filtration and encryption.
AV PROTECTION
PT Multiscanner
A streaming multi-core antivirus solution.
Encryption, DLP, Backup

Data protection

Secure storage devices, hard drive encryption, data loss prevention, backup systems.
DLP
Infowatch Traffic Monitor
Protection from internal threats and malicious activity of employees.
DLP
Symantec DLP
Discovering data and monitoring of data usage, prevention from confidential data leaks.
IDM, IAM, PAM, PKI

Authentication and user management

Software protection dongles, tokens and smart cards, cryptographic service providers, solutions for centralized user management, PAM, and tools for creating certificate authorities.
PAM
CyberArk Privileged Account Security
Control and monitoring of actions of privileged users, key information management.
PAM
Thycotic Secret Server
A solution for management of privileged users and secrets for access to automated systems.
Security Scanners, Security Management, SIEM, eGRC

Management of vulnerabilities, incidents and updates

Security scanners, application source code scanners, configuration control tools, update management systems, solutions for collection and correlation of security events.
NETWORK SCANNER
AppSpider
A web application security scanner.
NETWORK SCANNER
Nessus
A network security scanner of a wide range of technologies.
CODE SCANNER
PT Application Inspector
A tool for analysis of application source code.
CONFIG ANALYSIS
AlgoSec Firewall Analyzer
Control and assessment of network equipment configuration security.
CONFIG ANALYSIS
RedSeal
A solution for network equipment configuration analysis and modelling security threats in the network.
Haven’t found what you were looking for?
We publish just a limited list of solutions on our website, but we work with a much wider range of companies.
Контакты для связи
Контактные данные обрабатываются на условиях полной конфиденциальности.
Отправляя заявку, вы даете свое согласие на обработку персональных данных на условиях, указанных в Политике конфиденциальности.