Точные совпадения
Искать в заголовках
Искать в контенте
Искать в новостях
Искать на страницах
Фильтровать по категориям
Company’s news
Photo gallery
Significant events
{ "homeurl": "http://comitagroup.ru/en/", "resultstype": "vertical", "resultsposition": "hover", "itemscount": 4, "imagewidth": 70, "imageheight": 70, "resultitemheight": "70px", "showauthor": 0, "showdate": 0, "showdescription": 1, "charcount": 3, "noresultstext": "Нет результатов!", "didyoumeantext": "Вы имели ввиду:", "defaultImage": "http://comitagroup.ru/wp-content/plugins/ajax-search-lite/img/default.jpg", "highlight": 0, "highlightwholewords": 1, "scrollToResults": 0, "resultareaclickable": 1, "defaultsearchtext": "Искать..", "autocomplete": { "enabled" : 1, "lang" : "en" }, "triggerontype": 1, "triggeronclick": 1, "redirectonclick": 0, "trigger_on_facet_change": 1, "settingsimagepos": "right", "hresultanimation": "fx-none", "vresultanimation": "fx-none", "hresulthidedesc": "1", "prescontainerheight": "400px", "pshowsubtitle": "0", "pshowdesc": "1", "closeOnDocClick": 1, "iifNoImage": "description", "iiRows": 2, "iitemsWidth": 200, "iitemsHeight": 200, "iishowOverlay": 1, "iiblurOverlay": 1, "iihideContent": 1, "iianimation": "1", "analytics": 0, "analyticsString": "", "redirectonclick": 0, "redirectClickTo": "results_page", "redirect_on_enter": 0, "redirectEnterTo": "results_page", "overridewpdefault": "0" }
+ 7 495 786 63 61

The security of information systems

Lock and network cable with computer keyboard background

The objects of modern enterprises demand the higher level of data protection from possible plotters’ cyber-attacks on telecommunication systems and systems for management of technological processes.

Comita Group of Companies has a complex security system that cover all key area of an integrated protection of IT data:

The security systems for IT data include:

  • The protection from viruses and malicious codes;
  • The network displays i.e. firewall and the systems for detection and prevention of hackers’ intrusion (IDS, IPS);
  • The data backup, workstations, physical and virtual servers and various databases;
  • The hardware platforms – protection at the BIOS level.

Comita Group of Companies implements so-called trusted platforms with integrated certified systems of data protection (SZI) which allows realizing a broad complex of measure for neutralization of actual threats.

The trusted platform on “untrusted” component base of import production construct on hardware and software levels:

Hardware’s level:

  • The design and development of motherboards in Russia;
  • To buy the component bases in bulk;
  • To conduct a special inspection of the component base;
  • The maximum possibility to make localization of production (Including the installation of the motherboard);

The programme level:

  • Processing and localization of program support for microcontroller units (Bios, Firmware);
  • The integration of instruments for informations security at the lowest level (in the hardware part of the platform and in the program support of BIOS);
  • Centralized network control of security and IT-infrastructure.

The technological advantages of integrated security tools of informations over traditional

SZI (The instruments for informations security) integrated on BIOS-level (UEFI)

  • The preventive protection (starting at the earliest phase of computers work);
  • The neutralization of low-level threats;
  • The inability to eject, turn off or reset the settings even if it is possible to have a physical access;
  • There is no need for separate port for expansions;
  • The complete compatibility with any PC hardware (expansion cards, controllers, etc.);
  • The unification of SZI for the entire product line, regardless of the type of computer technology and form factor.

Traditional (external) SZI

  • “Traditional” instruments of informations protections performed by an external board
  • The lower level of security:

–           Because of starting on a later phase of a loading

–           Because of the possibility of extraction

  • It is necessary to have the port of expansion (computing bus PCI/PCI-X, PCI-E)
  • It is necessary to make adaptation for the specific motherboard