Technical protection of information PDF

Validated trusted computing bases:

2016

·       secure workstations "ZARM Mono-1", "ZARM Mono-M";

·       operating system «Microsoft Windows Server 2012 R2 Standard Edition»;

·       module "Garant-KTZI";

·       secure electronic storage medium pension certificate.

 

2015

·       software "Typhoon-Web».

 

2014

·       module "MeDoSys 5";

·       analyzers "DrägerAlcotest 6820", "5510 DrägerAlcotest" "DrägerAlcotest 3000", DrägerMobilePrinter;

·       software "Mehapolis.Dokumentoobih-DSK";

·       modules CoralFlexiCom;

·       trusted computing base "Loza 1".

 

2013

·       software "Complex Resource Management Regulations";

·       software "1C: Enterprise version 8.2";

·       software «Prognoz Platform 7".

 

2012

·       device RSA enVision;

·       software "Galaxy ERP»;

·       software "Unified Education Network";

·       modules SafeNet eToken;

·       data leak prevention system RSA Data Leak Prevention;

·       software «M.E.Doc»;

·       software "IS-PRO";

·       gateway Juniper SRX;

·       gateway Juniper MX;

·        antivirus software avast! Endpoint Protection Suite.

 

2011

·       software «ABBYY Flexicapture, version 10.0";

·       software "Typhoon-Web»;

·       modules «Coral Flexicom»;

·       module «VTI-eDL»;

·       software "Prognoz-5";

·       antivirus software "Cora Antivirus".

 

2010

·       software "1C: Enterprise version 8.2";

·       modules Panasonic.