Solutions

SOLUTIONS BY OKBSAPR

The data security tool (DST) line that we propose encompasses the whole range of computer-related tasks existing today and implements the most up-to-date technical solutions.

DST PUA line of ACCORDTM family:

  • Accord-TSHM (Trusted Startup Hardware Module) ‑ a trusted startup hardware module designed for use on IBM-compatible personal computers and LAN workstations in order to protect computer equipment and information resources from unauthorized access;
  • Hardware and software complex Accord-Win32 consisting of Accord-TSHM and special software implementing the rules of control of access to information, is designed to isolate users' access to workstations, terminals and terminal servers;
  • Hardware and software complex Accord-Win64 consisting of Accord-TSHM and special software implementing the rules of control of access to information, is designed to isolate users' access to workstations, terminals and terminal servers running under 64-bit OS Windows;
  • Hardware and software complex Accord-X consisting of Accord-TSHM and special software implementing the rules of control of access to information, is designed to isolate users' access to workstations running under Linux;
  • Accord-V. is a hardware and software complex designed to protect VMware virtualization infrastructure;
  • Accord-U is a hardware and software complex that combines the functions TSHM and those of cryptographic data protection.

 PCDST (Personal cryptographic data security tools) line of SHIPKATM family:

  • SHIPKA-1.6 KC3 ‑ PCDST SHIPKA, basic edition, certified by FSS for class KC3, a medium size case;
  • SHIPKA-1.6 KC2 ‑ PCDST SHIPKA, basic edition, with higher speed of cryptographic computations, a small case;
  • SHIPKA-2.0 ‑ a modification of PCDST SHIPKA with high performance and (on request) with a high-volume encrypted disc, a small case;
  • SHIPKA-lite is one of the cheapest devices in the line, on the basis of which PCDST SHIPKA can be built. It is designed for use as an identifier in DST PUA and OS, and as a carrier of keys and certificates of CDSS software. It includes a removable hardware key container and a reader;
  • SHIPKA-lite Slim is one of the cheapest devices in the line, on the basis of which PCDST SHIPKA can be built. It is designed for use as an identifier in DST PUA and OS, and as a carrier of keys and certificates of CDST software. A small case is available;
  • SHIPKA-T (Terminal) is the software designed to provide opportunities to work with cryptographic resources of PCDST SHIPKA in the terminal access mode;
  • Center-T ‑ a hardware and software complex DST PUA designed to provide secure startup of software images of terminal stations through the network. It is built entirely on SHIPKA-2.0, from which all of the components of the complex are loaded (three components). Cases are small.

Subsystems for automation of work with DST Accord and SHIPKA:

  • Subsystem of distributed audit and management of Accord-RAU is software for automation of data security management in automated systems;
  • Privacy ‑ a hardware and software complex for cryptographic protection of data stored on the hard disk and transmitted through the network using PCDST SHIPKA .
  • SRCC (a system of remote centralized control) ‑ a centralized control system of DST PUA of Accord family. It consists of a server and a client part (centralized control server and centralized control client).

Tools for providing trusted communication sessions:

  • "MARSH!" ‑ a hardware and software complex designed for ensuring secure work of remote users of untrusted computers with the servers of a trusted distributed information system (DIS) through information transmission networks within a trusted communication session (TCS).

SECRET line:

  • Personal secret ‑ a hardware and software complex for secure use of personal USB-carriers or service USB-carriers on autonomous workstations, which exists on the basis of simple cryptographic service carriers;
  • Business Secret - a hardware and software complex for secure use of service USB-carriers in an organization, the computers of which are networked. It exists on the basis of simple cryptographic service carriers;
  • Special Secret - a hardware and software complex for secure use of service USB-carriers on autonomous workstations or stations in the network having a hardware system for logging all attempts to connect the carrier. It is developed on the basis of cryptographic service carriers. Upon request it can be produced without a support of disk encryption.

Commutator of SATA-devices

USB-port blocking device