19 yearson market
of security services
548 clientstrust us
their safety

Comprehensive PC protection

Development of solutions to problems, minimizing the cost of the solution of problematic situations.
 
1. Audit system.
1.1. Identification of AIS problems, failures, bottlenecks of the organization (including safety information).
1.2. Substantiation and evaluation of AIS investments.
1.3. Reduction of AIS ownership costs.
 
2. AIS technical modernization.
2.1. Implementation of recent technology potential.
2.2. Increase of AIS resiliency.
2.3. Delivery of ready-to-install AIS, including protected AIS.
 
3. Data protection hardware and software installation.
3.1. Increase of AIS functionality.
3.2. Protection of information from unauthorized access.
 
4. AIS support.
4.1. Monitoring, recovery of AIS software and hardware after a crash.
4.2. Updating AIS software environment.
 
Sample list of complex protection operations:
1. Analysis of the PC hardware and software configuration (visually and using testing programs) for nominal performance.
2. Submission of recommendations on modernization of PCs, servers, and LANs, in order to increase performance and fault tolerance (including information on which AIS elements need to be upgraded or replaced).
3. Purchase of spare parts, implementation of technical upgrading of PCs, servers, and LANs.
4. Installation of HDDs (including removable HDDs) on PCs for additional protection, backup, and fault tolerance of AIS.
5. Search of hard drives for information, including the hidden information, using the parameters specified by the client in order to secure its removal (with the use of certified search and info wiping software).
6. Installation and configuration software on the PC.
7. Data backup for emergency recovery in the event of failures or other emergencies.
8. Installation of systems of integrated monitoring of personnel actions during procession of information on PCs in order to organize control (Infoperimetr, InfoWatch or similar software products).
9. Installation and configuration of software (firmware) products that are used to protect information from unauthorized access.
10. Development of the organizational / management, design documents for the AIS.
 
Sample list of PC protection operations without the use of certified information protection software/hardware products:
- Analysis of the PC hardware and software configuration (Everest software is installed, and the PC configuration is analyzed);
- Submission of recommendations on modernization of PCs in order to increase performance and fault tolerance (including information on which PC elements need to be replaced), (if necessary, two removable HDDs are installed for additional protection, backup, and fault tolerance);
- PC technical upgrading;
- Search of hard drives for information, including the hidden information, using the parameters specified by the client in order to secure its removal (Terrier search and info wiping software);
- Operating system cleanup, configuration, and optimization in order to reduce the number of errors that can occur during further exploitation of the PC (or reinstallation of your operating system; the OS is selected on the basis of the PC hardware configuration), (Ausiogics BootSpeed and CCleaner software products are used to optimize the operating system);
- Installation and configuration of software products according to the client’s requests;
- Backup of the installed operating system and software for quick emergency recovery in case of failures and other emergencies (Acronis True Image, Acronis True Image Enterprise Server Echo software products are used);
- Encryption of partitions and different areas of PC hard drives with TrueCrypt; configuration of the product and training of your employees to use it;
- Connection and configuration of additional devices to work with your PCs: USB thumbstick drives, external hard drives, IPods, which are protected by TrueCrypt software as a whole or partially (an area of a certain size indicated by the customer). These devices are used on any PC, without software installation, access is granted on the basis of passwords;
 
Sample list of PC protection operations with the use of certified information protection software/hardware products:
- Analysis of the PC hardware and software configuration (Everest software is installed, and the PC configuration is analyzed);
- Submission of recommendations on modernization of PCs in order to increase performance and fault tolerance (including information on which PC elements need to be replaced), (if necessary, two removable HDDs are installed for additional protection, backup, and fault tolerance);
- PC technical upgrading;
- Search of hard drives for information, including the hidden information, using the parameters specified by the client in order to secure its removal (Terrier search and info wiping software);
- Operating system cleanup, configuration, and optimization in order to reduce the number of errors that can occur during further exploitation of the PC (or reinstallation of your operating system; the OS is selected on the basis of the PC hardware configuration), (Ausiogics BootSpeed and CCleaner software products are used to optimize the operating system);
- Installation and configuration of software products according to the client’s requests;
- Backup of the installed operating system and software for quick emergency recovery in case of failures and other emergencies (Acronis True Image, Acronis True Image Enterprise Server Echo software products are used);
- Installation of certified products directed at protection of information from unauthorized access by the given parameters (Strazh, SecretNet, Eshelon, Akkord software products);
- Connection and configuration of additional devices to work with your PCs: USB thumbstick drives, external hard drives, IPods, which are protected by TrueCrypt software as a whole or partially (an area of a certain size indicated by the customer). These devices are used on any PC, without software installation, access is granted on the basis of passwords;
- Training of the customer in the area of work on a PC with the installed information protection products;
 
PC protection with the use of encryption software:
- Encryption of partitions and different areas of PC hard drives with TrueCrypt; configuration of the product and training of your employees to use it;
- Connection and configuration of additional devices to work with your PCs: USB thumbstick drives, external hard drives, IPods, which are protected by TrueCrypt software as a whole or partially (an area of a certain size indicated by the customer). These devices are used on any PC, without software installation, access is granted on the basis of passwords.