Options for cooperation
Full software development cycle (PDS)
On the agreed TOR (Fix price)
Outstaffing (Time & Materials)
Automation system for information security departments. The system offers monitoring control tools for seven information security processes, and performs data collection and aggregation from various related systems.
IT Infrastructure Control, Vulnerabilities and Compliance
Configuration management, security validation, and vulnerability detection system. A comprehensive IT infrastructure protection solution that includes configuration management, configuration security validation, and vulnerability detection. Advanced control of network devices, firewalls, OS, DBMS, SCADA, and virtualization environments.
Protection of information resources of workstations and servers
Сomplex, that protects information resources from unauthorized access, both from the moment the workstations and servers are turned on, and after the operating system is loaded.
Analysis and control of ERP systems security
A comprehensive solution for control and analysis of ERP systems security.
Cryptography and certification center
Means of cryptographic protection of information for use in electronic document flow by internal corporate services, state executive bodies and to ensure legally significant cross-border exchange of documents.
Access control automation
A comprehensive solution for automating access control at facilities of any size, designed to automate the process of ordering, coordinating, processing passes, and allows you to organize access control at remote checkpoints.
Database management system
Software for creating and managing relational databases and providing multi-user access with different levels of confidentiality.
Vehicle operation automation￼
Automation system for monitoring and control of vehicles in near-real-time mode for the conditions of the planned heavy load on the system.