📜 ⬆️ ⬇️

METRO IS

Today it is impossible to imagine a large city without the metro with its lines, rules and stations, sights and its history, sometimes even known all over the world and attracting special attention. Metro functions as a separate organism, but at the same time is an integral part of the city. Similarly, information security tools in our country can no longer be imagined without the decisions of domestic manufacturers (metro stations) of various classes of systems (metro lines).

We offer a ride with us on our subway under the name "Information Security" and in detail, if you wish, stop at known or not so, or maybe just your favorite stations ....

PS The IB metro map is only an informative tool, is not responsible for the performance of metro stations and is relevant at the end of 2017. The functionality and quality of the work of the stations does not depend on their location on the map, inside the ring or outside, there is no analogy with the reports of global analytical agencies, we are in the capital of Russia! Specify the work schedule and other functioning details in an independent order.
')
Any suggestions for the restoration of stations, their closure or suggestions for making unrecorded stations are welcome! After all, the metro lines are extended, and the ICC is being built at a rapid pace ...

See you in 2018!


Metro lines

SIEM
Security Information and Event Management
A tool to automate the process of identifying and responding to information security incidents, collects and analyzes information security events, and as a result identifies and signals the occurrence of incidents.
NoCompany / WebsiteProduct / Description
oneSearchInform / SearchInform LLC
searchinform.ru
SearchInform SIEM
searchinform.ru/products/siem
2RUSIEM / First Russian SIEM
rusiem.com
RUSIEM
rusiem.com/node/135
3NPO Echelon / NPO Echelon
npo-echelon.ru
Comrad
npo-echelon.ru/production/65/11174
fourPositive Technologies / Positive Technologies
www.ptsecurity.com
MaxPatrol SIEM
www.ptsecurity.com/ru-ru/products/mpsiem
fiveITB / ITB LLC
www.itb.spb.ru
Security Capsule SIEM
www.itb.spb.ru/products/Security_Capsule_SIEM



DLP

Data Loss Prevention
Information leakage protection systems are designed to track and block unauthorized data transfer attempts outside the corporate network. In addition to preventing information leaks, DLP can perform functions of tracking user actions, recording and analyzing their communications.
NoCompany / WebsiteProduct / Description
oneInfoWatch / Infofotch Group
www.infowatch.ru
InfoWatch Traffic Monitor
www.infowatch.ru/products/traffic_monitor
2SearchInform / SearchInform LLC
searchinform.ru
KIB Serchinform
searchinform.ru/products/kib
3StaffCop / Atom Security LLC
www.staffcop.ru
StaffCop Enterprise
www.staffcop.ru/uchet-rabochego-vremeni
fourStakhanovets / Stakhanovets LLC
stakhanovets.ru
PC STAKHANOVETS
stakhanovets.ru/kontrol-sotrudnikov
fiveMFI Soft / MFI Soft LLC
www.mfisoft.ru
Garda Enterprise
www.mfisoft.ru/direction/ib/garda-predpriyatie
6Zecurion / Company Zecurion
www.zecurion.ru
Zecurion DLP
www.zecurion.ru/solution/dlp/data-loss-prevention
7Solar Security / Solar Security Ltd.
www.solarsecurity.ru
Solar dozor
www.solarsecurity.ru/products/solar_dozor
eightFalcongaze / Falcongeys LLC
falcongaze.ru
SecureTower
falcongaze.ru/product/capabilities/data-leaks.html
9SmartLine / Smart Line Inc.
www.devicelock.com
DeviceLock DLP Suite
www.devicelock.com/ru/products



PKI
Public Key Infrastructure
Control system of cryptographic protection. The purpose of a PKI is to define a policy for issuing digital certificates, issuing and revoking them, storing the information necessary for subsequent verification of the validity of certificates.
NoCompany / WebsiteProduct / Description
oneAvanpost / Avanpost LLC
www.avanpost.ru
Avanpost PKI
www.avanpost.ru/products/avanpost_pki.php
2Aladdin-rd / Aladdin R.D.
www.aladdin-rd.ru
JaCarta Management System
www.aladdin-rd.ru/catalog/jms
3Aktiv Co. / Company Active
www.rutoken.ru
KeyBox Rutoken
www.rutoken.ru/products/all/rutoken-keybox
fourInfotecs / OAO InfoTeKS
infotecs.ru
ViPNet PKI Client
infotecs.ru/product/vipnet-pki-client.html
fiveIndeed Identity / Company Indid
indeed-id.ru
Indeed card management
indeed-id.ru/smart_card_management.html



IDM
Identity management
The main task of IDM systems is the centralized management of accounts and access rights to information resources.
NoCompany / WebsiteProduct / Description
oneInformzaschita / GK Informzaschita
www.infosec.ru
Kub
www.cube-system.ru/ru/products/O%20producte
2Solar Security / Solar Security Ltd.
www.solarsecurity.ru
Solar inRights
www.solarsecurity.ru/products/solar_inrights
3Avanpost / Avanpost LLC
www.avanpost.ru
Avanpost IDM
www.avanpost.ru/products/avanpost_idm.php
four1IDM / Odin Idyem LLC
1idm.ru
1IDM
1idm.ru/opportunities



SSO
Single sign-on
Single sign-on technology allows users to log in to systems or applications with a single identifier, without having to re-enter their account information.
NoCompany / WebsiteProduct / Description
oneAvanpost / Avanpost LLC
www.avanpost.ru
Avanpost SSO, WEB SSO
www.avanpost.ru/products/avanpost_sso.php
2Indeed Identity / Indeed Identity Company
indeed-id.ru
Indeed Enterprise SSO
indeed-id.ru/sso_login.html
3REAK SOFT / REAK SOFT LLC
identityblitz.ru
Blitz Identity Provider
identityblitz.ru/products/blitz-identity-provider




Sgrc
Security Governance, Risk, Compliance
Control system, automation and measurement of information security processes.
NoCompany / WebsiteProduct / Description
oneR-Vision / R-Vision LLC
rvision.pro
R-Vision Security GRC Platform
rvision.pro/sgrc
2ePlat4m / KIT LLC
www.eplat4m.ru
EPLAT4M SECURITY GRC
www.eplat4m.ru/catalog/id/3
3Security Vision / GK Intellectual Security
www.securityvision.ru
ASIMS Security Vision
www.securityvision.ru/overview/video



Waf
Web Application Firewall
Application level protective screen designed to detect and block modern attacks on web applications.
NoCompany / WebsiteProduct / Description
onePositive Technologies / Positive Technologies
www.ptsecurity.com
PT Application Firewall
www.ptsecurity.com/ru-ru/products/af
2InfoWatch / Infofotch Group
www.infowatch.ru
InfoWatch Attack Killer WAF
www.infowatch.ru/products/attack_killer/waf
3Security Code
www.securitycode.ru
WAF Continent
www.securitycode.ru/products/kontinent-waf
fourSolidSoft / SolidSoft LLC
solidwall.ru
Solidwall WAF
solidwall.ru/datasheets/SolidWall_WAF_DS_ru.pdf
fiveQrator Labs / LLC El-El El
qrator.net/ru
Qrator WAF
qrator.net/ru/solutions/waf



Code analysis
Automated process of reviewing code, identifying errors, flaws and vulnerabilities in the source code of programs.
NoCompany / WebsiteProduct / Description
onePositive Technologies / Positive Technologies
www.ptsecurity.com
PT Application Inspector
www.ptsecurity.com/ru-ru/products/ai
2Solar Security / Solar Security Ltd.
www.solarsecurity.ru
Solar incode
solarsecurity.ru/products/solar_inCode
3InfoWatch / Infofotch Group
www.infowatch.ru
InfoWatch Appercut
www.infowatch.ru/products/appercut



SKZI
Means of cryptographic protection of information
It allows you to store information in encrypted form by means of a special security program that encrypts and decrypts data based on a digital signature issued by the certification authority.
NoCompany / WebsiteProduct / Description
oneISBC Group / ISBC Group
www.isbc.ru
ESMART Token
www.esmart.ru/product
2Aktiv Co. / Company Active
www.rutoken.ru
RUTOKEN EDS 2.0
www.rutoken.ru/products/all/rutoken-ecp
3Security Code
www.securitycode.ru
Jinn client
www.securitycode.ru/products/jinn-client
fourCryptopro / CRYPTO-PRO LLC
www.cryptopro.ru
CryptoPro CSP
www.cryptopro.ru/products/csp



PUM
Privileged User Management
Solutions to control privileged users allow you to centrally manage privileged accounts, monitor the actions of internal system administrators, as well as external contractors, preventing possible leakage of critical data through access control, recording sessions, and auditing actions performed by users with advanced powers.
NoCompany / WebsiteProduct / Description
oneIT Bastion / IT BASTI LLC
it-bastion.com
SKDPU
it-bastion.com/production/skdpu
2NewInfosec / New Security Technologies LLC
www.newinfosec.ru
Safeinspect
www.newinfosec.ru/content/safeinspect
3Zecurion / Company Zecurion
www.zecurion.ru
Zecurion PAM
www.zecurion.ru/products/pam



Anti-apt
Anti-Advanced Persistent Threat
Protection against targeted attacks, detection of nonstandard external attacks carried out by attackers using specialized software.
NoCompany / WebsiteProduct / Description
oneInfoWatch / Infofotch Group
www.infowatch.ru
InfoWatch ASAP
www.infowatch.ru/products/asap
2Group-IB / Information Security Group
www.group-ib.ru
TDS complex
www.group-ib.ru/tds.html
3Kaspersky Lab / JSC Kaspersky Lab
www.kaspersky.ru
KATA Platform
www.kaspersky.ru/enterprise-security/anti-targeted-attacks



Anti-DDos
Anti-Distributed Denial of Service
DDoS attacks, distributed denial of service attacks, which result in the disruption or total blocking of users' access to a site or network resource. DDoS protection solutions analyze traffic and detect anomalies in real time. In the event of an attack, traffic clearing is turned on, only legitimate users are skipped, so there is no loss of clients who cannot connect to the Internet resource.
NoCompany / WebsiteProduct / Description
oneInfoWatch / Infofotch Group
www.infowatch.ru
InfoWatch Attack Killer AntiDDoS
www.infowatch.ru/products/attack_killer
2Variti / Variti Ltd.
variti.com
Active Bot Protection
variti.com/ru-ru/innovations/#protection-against-ddos-attacks-without-ip-address-blocking
3Qrator Labs / LLC El-El El
qrator.net/ru
Qrator DDoS Protection
qrator.net/ru/solutions/ddos/how-qrator-works
fourKaspersky Lab / JSC Kaspersky Lab
www.kaspersky.ru
Kaspersky DDoS Protection
www.kaspersky.ru/enterprise-security/ddos-protection



Edr
Endpoint Detection and Response
The system of detection of new threats of high complexity in the workplace and rapid response to them.
NoCompany / WebsiteProduct / Description
oneKaspersky Lab / Kaspersky Lab
www.kaspersky.ru
Kaspersky EDR
www.kaspersky.ru/enterprise-security/endpoint-detection-response-edr



UTM
Unified Threat Management
Universal solution in the field of computer security, providing powerful comprehensive protection against network threats.
NoCompany / WebsiteProduct / Description
oneZecurion / Company Zecurion
www.zecurion.ru
Zecurion UTM
www.zecurion.ru/products/utm
2Altell / AltEl
www.altell.ru
Altell neo
www.altell.ru/products/neo
3Entensys / LLC ESL Development
www.entensys.com
Userate UTM
www.entensys.com/ru/products/usergate-utm/overview



AntiVirus
The solution for detecting computer viruses, malware and recovering infected (modified) files, preventing the infection (modifying) of files or the operating system by preventing malicious code.
NoCompany / WebsiteProduct / Description
oneKaspersky Lab / JSC Kaspersky Lab
www.kaspersky.ru
Kaspersky Security for Business
www.kaspersky.ru/enterprise-security/endpoint
2Dr.Web / Doctor Web
www.drweb.ru
Dr.Web Enterprise Security Suite products.drweb.ru/enterprise_security_suite



ICC
The Moscow Central Ring is also an integral part of the modern transport system of the city, which distributes the passenger traffic of the city. It is not marked on our map, but we are happy to list the most significant stations.
NoDecision classCompany / WebsiteProduct / Description
oneIRM (Information Right Management)Perimetrix / Perimetrix
perimetrix.ru
Perimetrix SafeSpace
perimetrix.ru/content/view/43/154
2Data ClassificationCross Technologies / AO Cross Technologies
crosstech.su
Crosstech DSS crosstech.su/catalog/crosstech/crosstech-docs-security-suite-dss
3ILD (Information Leaks Detection)Everytag / EvryTag Company
everytag.ru
ILD - document distribution control
everytag.ru/produkty/ild.html
fourPrint protectionCross Technologies / AO Cross Technologies
crosstech.su
Printerguard
crosstech.su/catalog/crosstech/printerguard
fivePrint protectionARTI / Company ARTI
www.arti.ru
ARTI PrintXpert www.arti.ru/services/printxpert
6Database SecurityMFI Soft / MFI Soft LLC
www.mfisoft.ru
Garda DB
www.mfisoft.ru/direction/ib/garda-bd
7Database SecurityDataArmor / Armor LLC
www.dataarmor.ru
DataArmor Database Firewall
www.dataarmor.ru/products

Source: https://habr.com/ru/post/344002/


All Articles