Centralized management of user accounts and credentials in corporate information systems, including the best IGA solutions.
Automation system for information security departments. The system offers monitoring control tools for seven information security processes, and performs data collection and aggregation from various related systems.
Configuration management, security validation, and vulnerability detection system. A comprehensive IT infrastructure protection solution that includes configuration management, configuration security validation, and vulnerability detection. Advanced control of network devices, firewalls, OS, DBMS, SCADA, and virtualization environments.
Сomplex, that protects information resources from unauthorized access, both from the moment the workstations and servers are turned on, and after the operating system is loaded.
A comprehensive solution for control and analysis of ERP systems security.
Means of cryptographic protection of information for use in electronic document flow by internal corporate services, state executive bodies and to ensure legally significant cross-border exchange of documents.
A comprehensive solution for automating access control at facilities of any size, designed to automate the process of ordering, coordinating, processing passes, and allows you to organize access control at remote checkpoints.
Software for creating and managing relational databases and providing multi-user discover moreelf bar disposablenachhaltige handyhüllentelefoonhoesjes winkel access with different levels of confidentiality.
Automation system for monitoring and control of vehicles in near-real-time mode for the conditions of the planned heavy load on the system.