RU | EN
 
:: home :: :: about us :: :: service :: :: vacancies :: :: contact us ::

Why US:

In the periods of lack of specialists we undertake part of your problems.

We deliver you from the necessity of solving the question of technical staff recruitment, particularly, for short term projects

We efficiently solve the problems set by you

We release you from solving the administrative questions of crew management on the projects delivered to us.

You work with the solidary team of specialists having successfully completed a great number of projects

We can as needed flow into the existing processes and rules of your company to the maximum

We always aim at optimum coefficient price/quality

System integration and automationInformation security of your company


The range of information security service and solutions includes the following points:

• Information systems test for vulnerability and risks analysis;
• Working out information security policy;
• Subsystems engineering and development, including access and outer protection management, monitoring, audit on the basis of our partners’ production and our own elaborations;
• Technical support of the information security systems installed at our customer’s place;
• Information protection consulting by our certified specialists.

We also offer the typical solution for medium- and small-scale business elaborated by us called AIST (Advance Information Security Technology) – comprehensive protection of your company on the basis of IT-1 technologies.

Standard cost of working with audit, ready-made system, introducing of the comprehensive system of information protection for 50 users is 15000 rubles excluding the software cost. Period 3-5 days.

IT-1 is an official partner of Kaspersky laboratory and ESET NOD32.

You can find products’ descriptions at the producers’ websites:

Kaspersky laboratory
Order key or test key for Kaspersky anti-virus system

ESET Nod32
Order key or test key for ESET Nod32 anti-virus system

Dr.Web
Order key or test key for Dr.Web anti-virus system

AIST technology is:

1. Two-level anti-virus protection
• Anti-virus solution for workstations. Depending on the speed of the computer equipment base ESET NOD32 or Kaspersky anti-virus solution is determined.

• Internet gateway and e-mail traffic protection.
In order to make the protection really effective, for Internet gateway and e-mail traffic protection we work with the software by different vendor from that one for the workstations.
The approximate cost of the software for 50 users is 30000 rubles.
2. Anti-spam protection
As a solution for anti-spam protection we use Kaspersky laboratory software as well as we adjust the software at our mail server correspondingly.
3. Traffic control and centralized Internet output through ISA server or Linux Squid
4. Safety control of the services adjustment on the outer servers
5. Development of information security regulations at the enterprise

Additional complex of information security measures:

1. For better protection locally, Sobol electric keys can be used. Computer operation is possible only with the USB key in.
2. It is possible to ban hardware, diskettes and USB devices loading.
3. Hidden video surveillance systems both software-based and hardware. User’s actions journaling. Incidents examining.
4. Filtering of the information content going from the corporate network outside. Blocking access to any resources group considered dangerous according to the safety policy established in company. These resources are for example the following:
• Free mail services;
• File exchange websites;
• Social networks (such as: http://odnoklassniki.ru, http://moikrug.ru, http://vkontakte.ru);
• live journals (ЖЖ);
• IM (ICQ, jabber, msn и etc.).
5. Corporate mail control. Total parse of messages with attaechments of all types. Quarantine of suspicious messages.
6. E-mail archive making in order to make it possible to undlete the lost messages and incidents examining.

As solutions to advanced security systems building for enterprises the following facilities can be used:
• Internetwork screens, means of protected networks generation by Cisco equipment.
• Facilities of traffic content analysis on IBM ISS Potenti Network, Alladin E-safe, Symantec WebSecurity base.
• Autentification facilities: “Sobol” electric keys.
• Security analysis facilities such as Positive Technologies xSpyder, IBM ISS Enterprise Scaner.
• Anti-virus facilities of Kaspersky Total Space Security.
• IBM ISS Proventia Network, Cisco IPS Appleans systems of break-in prevention.


Order our services by filling in this form.






The licence software Microsoft




Estimate advantages of servers Hewlett-Packard




All the logotypes and emblems used in the websites belong to their owners
Copyright "IT-1", 2008