All-in-one enterprise-level device for comprehensive network security (UTM) with support for GOST algorithms
Centralized system for securing network infrastructure and creation of VPN-networks based on GOST algorithms
Virtual Machine Micro-Segmentation and Lifecycle Protection Tool
Protection of data, and server and workstation infrastructure
Protection of information against unauthorized access for Linux operating systems
Reliable software and hardware complex for trusted load of operating system
Information centric endpoint protection for MS Windows
System for secure remote access to web applications based on GOST encryption algorithms
Web application security system with automated business logic analysis
Enterprise mobility management and data protection
Thin client with built in security tools
Frequently asked questions