⬆️ ⬇️

METRO IS

Today it is impossible to imagine a large city without the metro with its lines, rules and stations, sights and its history, sometimes even known all over the world and attracting special attention. Metro functions as a separate organism, but at the same time is an integral part of the city. Similarly, information security tools in our country can no longer be imagined without the decisions of domestic manufacturers (metro stations) of various classes of systems (metro lines).



We offer a ride with us on our subway under the name "Information Security" and in detail, if you wish, stop at known or not so, or maybe just your favorite stations ....



PS The IB metro map is only an informative tool, is not responsible for the performance of metro stations and is relevant at the end of 2017. The functionality and quality of the work of the stations does not depend on their location on the map, inside the ring or outside, there is no analogy with the reports of global analytical agencies, we are in the capital of Russia! Specify the work schedule and other functioning details in an independent order.

')

Any suggestions for the restoration of stations, their closure or suggestions for making unrecorded stations are welcome! After all, the metro lines are extended, and the ICC is being built at a rapid pace ...



See you in 2018!





Metro lines



SIEM
Security Information and Event Management

A tool to automate the process of identifying and responding to information security incidents, collects and analyzes information security events, and as a result identifies and signals the occurrence of incidents.

NoCompany / WebsiteProduct / Description
oneSearchInform / SearchInform LLC

searchinform.ru
SearchInform SIEM

searchinform.ru/products/siem
2RUSIEM / First Russian SIEM

rusiem.com
RUSIEM

rusiem.com/node/135
3NPO Echelon / NPO Echelon

npo-echelon.ru
Comrad

npo-echelon.ru/production/65/11174
fourPositive Technologies / Positive Technologies

www.ptsecurity.com
MaxPatrol SIEM

www.ptsecurity.com/ru-ru/products/mpsiem
fiveITB / ITB LLC

www.itb.spb.ru
Security Capsule SIEM

www.itb.spb.ru/products/Security_Capsule_SIEM






DLP


Data Loss Prevention

Information leakage protection systems are designed to track and block unauthorized data transfer attempts outside the corporate network. In addition to preventing information leaks, DLP can perform functions of tracking user actions, recording and analyzing their communications.

NoCompany / WebsiteProduct / Description
oneInfoWatch / Infofotch Group

www.infowatch.ru
InfoWatch Traffic Monitor

www.infowatch.ru/products/traffic_monitor
2SearchInform / SearchInform LLC

searchinform.ru
KIB Serchinform

searchinform.ru/products/kib
3StaffCop / Atom Security LLC

www.staffcop.ru
StaffCop Enterprise

www.staffcop.ru/uchet-rabochego-vremeni
fourStakhanovets / Stakhanovets LLC

stakhanovets.ru
PC STAKHANOVETS

stakhanovets.ru/kontrol-sotrudnikov
fiveMFI Soft / MFI Soft LLC

www.mfisoft.ru
Garda Enterprise

www.mfisoft.ru/direction/ib/garda-predpriyatie
6Zecurion / Company Zecurion

www.zecurion.ru
Zecurion DLP

www.zecurion.ru/solution/dlp/data-loss-prevention
7Solar Security / Solar Security Ltd.

www.solarsecurity.ru
Solar dozor

www.solarsecurity.ru/products/solar_dozor
eightFalcongaze / Falcongeys LLC

falcongaze.ru
SecureTower

falcongaze.ru/product/capabilities/data-leaks.html
9SmartLine / Smart Line Inc.

www.devicelock.com
DeviceLock DLP Suite

www.devicelock.com/ru/products






PKI
Public Key Infrastructure

Control system of cryptographic protection. The purpose of a PKI is to define a policy for issuing digital certificates, issuing and revoking them, storing the information necessary for subsequent verification of the validity of certificates.

NoCompany / WebsiteProduct / Description
oneAvanpost / Avanpost LLC

www.avanpost.ru
Avanpost PKI

www.avanpost.ru/products/avanpost_pki.php
2Aladdin-rd / Aladdin R.D.

www.aladdin-rd.ru
JaCarta Management System

www.aladdin-rd.ru/catalog/jms
3Aktiv Co. / Company Active

www.rutoken.ru
KeyBox Rutoken

www.rutoken.ru/products/all/rutoken-keybox
fourInfotecs / OAO InfoTeKS

infotecs.ru
ViPNet PKI Client

infotecs.ru/product/vipnet-pki-client.html
fiveIndeed Identity / Company Indid

indeed-id.ru
Indeed card management

indeed-id.ru/smart_card_management.html






IDM
Identity management

The main task of IDM systems is the centralized management of accounts and access rights to information resources.

NoCompany / WebsiteProduct / Description
oneInformzaschita / GK Informzaschita

www.infosec.ru
Kub

www.cube-system.ru/ru/products/O%20producte
2Solar Security / Solar Security Ltd.

www.solarsecurity.ru
Solar inRights

www.solarsecurity.ru/products/solar_inrights
3Avanpost / Avanpost LLC

www.avanpost.ru
Avanpost IDM

www.avanpost.ru/products/avanpost_idm.php
four1IDM / Odin Idyem LLC

1idm.ru
1IDM

1idm.ru/opportunities






SSO
Single sign-on

Single sign-on technology allows users to log in to systems or applications with a single identifier, without having to re-enter their account information.

NoCompany / WebsiteProduct / Description
oneAvanpost / Avanpost LLC

www.avanpost.ru
Avanpost SSO, WEB SSO

www.avanpost.ru/products/avanpost_sso.php
2Indeed Identity / Indeed Identity Company

indeed-id.ru
Indeed Enterprise SSO

indeed-id.ru/sso_login.html
3REAK SOFT / REAK SOFT LLC

identityblitz.ru
Blitz Identity Provider

identityblitz.ru/products/blitz-identity-provider








Sgrc
Security Governance, Risk, Compliance

Control system, automation and measurement of information security processes.

NoCompany / WebsiteProduct / Description
oneR-Vision / R-Vision LLC

rvision.pro
R-Vision Security GRC Platform

rvision.pro/sgrc
2ePlat4m / KIT LLC

www.eplat4m.ru
EPLAT4M SECURITY GRC

www.eplat4m.ru/catalog/id/3
3Security Vision / GK Intellectual Security

www.securityvision.ru
ASIMS Security Vision

www.securityvision.ru/overview/video






Waf
Web Application Firewall

Application level protective screen designed to detect and block modern attacks on web applications.

NoCompany / WebsiteProduct / Description
onePositive Technologies / Positive Technologies

www.ptsecurity.com
PT Application Firewall

www.ptsecurity.com/ru-ru/products/af
2InfoWatch / Infofotch Group

www.infowatch.ru
InfoWatch Attack Killer WAF

www.infowatch.ru/products/attack_killer/waf
3Security Code

www.securitycode.ru
WAF Continent

www.securitycode.ru/products/kontinent-waf
fourSolidSoft / SolidSoft LLC

solidwall.ru
Solidwall WAF

solidwall.ru/datasheets/SolidWall_WAF_DS_ru.pdf
fiveQrator Labs / LLC El-El El

qrator.net/ru
Qrator WAF

qrator.net/ru/solutions/waf






Code analysis
Automated process of reviewing code, identifying errors, flaws and vulnerabilities in the source code of programs.

NoCompany / WebsiteProduct / Description
onePositive Technologies / Positive Technologies

www.ptsecurity.com
PT Application Inspector

www.ptsecurity.com/ru-ru/products/ai
2Solar Security / Solar Security Ltd.

www.solarsecurity.ru
Solar incode

solarsecurity.ru/products/solar_inCode
3InfoWatch / Infofotch Group

www.infowatch.ru
InfoWatch Appercut

www.infowatch.ru/products/appercut






SKZI
Means of cryptographic protection of information

It allows you to store information in encrypted form by means of a special security program that encrypts and decrypts data based on a digital signature issued by the certification authority.

NoCompany / WebsiteProduct / Description
oneISBC Group / ISBC Group

www.isbc.ru
ESMART Token

www.esmart.ru/product
2Aktiv Co. / Company Active

www.rutoken.ru
RUTOKEN EDS 2.0

www.rutoken.ru/products/all/rutoken-ecp
3Security Code

www.securitycode.ru
Jinn client

www.securitycode.ru/products/jinn-client
fourCryptopro / CRYPTO-PRO LLC

www.cryptopro.ru
CryptoPro CSP

www.cryptopro.ru/products/csp






PUM
Privileged User Management

Solutions to control privileged users allow you to centrally manage privileged accounts, monitor the actions of internal system administrators, as well as external contractors, preventing possible leakage of critical data through access control, recording sessions, and auditing actions performed by users with advanced powers.

NoCompany / WebsiteProduct / Description
oneIT Bastion / IT BASTI LLC

it-bastion.com
SKDPU

it-bastion.com/production/skdpu
2NewInfosec / New Security Technologies LLC

www.newinfosec.ru
Safeinspect

www.newinfosec.ru/content/safeinspect
3Zecurion / Company Zecurion

www.zecurion.ru
Zecurion PAM

www.zecurion.ru/products/pam






Anti-apt
Anti-Advanced Persistent Threat

Protection against targeted attacks, detection of nonstandard external attacks carried out by attackers using specialized software.

NoCompany / WebsiteProduct / Description
oneInfoWatch / Infofotch Group

www.infowatch.ru
InfoWatch ASAP

www.infowatch.ru/products/asap
2Group-IB / Information Security Group

www.group-ib.ru
TDS complex

www.group-ib.ru/tds.html
3Kaspersky Lab / JSC Kaspersky Lab

www.kaspersky.ru
KATA Platform

www.kaspersky.ru/enterprise-security/anti-targeted-attacks






Anti-DDos
Anti-Distributed Denial of Service

DDoS attacks, distributed denial of service attacks, which result in the disruption or total blocking of users' access to a site or network resource. DDoS protection solutions analyze traffic and detect anomalies in real time. In the event of an attack, traffic clearing is turned on, only legitimate users are skipped, so there is no loss of clients who cannot connect to the Internet resource.

NoCompany / WebsiteProduct / Description
oneInfoWatch / Infofotch Group

www.infowatch.ru
InfoWatch Attack Killer AntiDDoS

www.infowatch.ru/products/attack_killer
2Variti / Variti Ltd.

variti.com
Active Bot Protection

variti.com/ru-ru/innovations/#protection-against-ddos-attacks-without-ip-address-blocking
3Qrator Labs / LLC El-El El

qrator.net/ru
Qrator DDoS Protection

qrator.net/ru/solutions/ddos/how-qrator-works
fourKaspersky Lab / JSC Kaspersky Lab

www.kaspersky.ru
Kaspersky DDoS Protection

www.kaspersky.ru/enterprise-security/ddos-protection






Edr
Endpoint Detection and Response

The system of detection of new threats of high complexity in the workplace and rapid response to them.

NoCompany / WebsiteProduct / Description
oneKaspersky Lab / Kaspersky Lab

www.kaspersky.ru
Kaspersky EDR

www.kaspersky.ru/enterprise-security/endpoint-detection-response-edr






UTM
Unified Threat Management

Universal solution in the field of computer security, providing powerful comprehensive protection against network threats.

NoCompany / WebsiteProduct / Description
oneZecurion / Company Zecurion

www.zecurion.ru
Zecurion UTM

www.zecurion.ru/products/utm
2Altell / AltEl

www.altell.ru
Altell neo

www.altell.ru/products/neo
3Entensys / LLC ESL Development

www.entensys.com
Userate UTM

www.entensys.com/ru/products/usergate-utm/overview






AntiVirus
The solution for detecting computer viruses, malware and recovering infected (modified) files, preventing the infection (modifying) of files or the operating system by preventing malicious code.

NoCompany / WebsiteProduct / Description
oneKaspersky Lab / JSC Kaspersky Lab

www.kaspersky.ru
Kaspersky Security for Business

www.kaspersky.ru/enterprise-security/endpoint
2Dr.Web / Doctor Web

www.drweb.ru
Dr.Web Enterprise Security Suite products.drweb.ru/enterprise_security_suite






ICC

The Moscow Central Ring is also an integral part of the modern transport system of the city, which distributes the passenger traffic of the city. It is not marked on our map, but we are happy to list the most significant stations.

NoDecision classCompany / WebsiteProduct / Description
oneIRM (Information Right Management)Perimetrix / Perimetrix

perimetrix.ru
Perimetrix SafeSpace

perimetrix.ru/content/view/43/154
2Data ClassificationCross Technologies / AO Cross Technologies

crosstech.su
Crosstech DSS crosstech.su/catalog/crosstech/crosstech-docs-security-suite-dss
3ILD (Information Leaks Detection)Everytag / EvryTag Company

everytag.ru
ILD - document distribution control

everytag.ru/produkty/ild.html
fourPrint protectionCross Technologies / AO Cross Technologies

crosstech.su
Printerguard

crosstech.su/catalog/crosstech/printerguard
fivePrint protectionARTI / Company ARTI

www.arti.ru
ARTI PrintXpert www.arti.ru/services/printxpert
6Database SecurityMFI Soft / MFI Soft LLC

www.mfisoft.ru
Garda DB

www.mfisoft.ru/direction/ib/garda-bd
7Database SecurityDataArmor / Armor LLC

www.dataarmor.ru
DataArmor Database Firewall

www.dataarmor.ru/products

Source: https://habr.com/ru/post/344002/



All Articles