Back
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
Access control and endpoint security
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
Industrial Cyber Security (ICS)
All solutions
Unified communications (UC) and Group Video Systems
All solutions
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Database Management System (DBMS)
All solutions
Secure Web Gateways (SWG, Proxy)
All solutions
User Authentification (AU)
All solutions
Thin clients
All solutions
Cryptographic information protection facilities (CIPF)
All solutions
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
High-tech equipment to protect airspace from drones
All solutions
Contacts Vendors
Events & Specials
Solutions
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
DevSecOps
Social networks
Back
Access control and endpoint security
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Anti-APT
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
APCS protection
Industrial Cyber Security (ICS)
All solutions
Business Productivity
Unified communications (UC) and Group Video Systems
All solutions
Computing and network infrastructure
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Data management
Database Management System (DBMS)
All solutions
Network Infrastructure Protection
Secure Web Gateways (SWG, Proxy)
All solutions
Access control and endpoint security
User Authentification (AU)
All solutions
Computing and network infrastructure
Thin clients
All solutions
Data protection
Cryptographic information protection facilities (CIPF)
All solutions
Network Infrastructure Protection
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
Физическая безопасность
High-tech equipment to protect airspace from drones
All solutions
+(994)50-400-11-22
Write to us
Become a partner
  • Software
  • ["Information Security (Информационная безопасность)"]
  • ["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
  • ["Infrastructure (Инфраструктура)"]
  • ["Infrastructure (Инфраструктура)","Облачные сервисы"]
  • ["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
  • XaaS
  • Access control and endpoint security
  • Anti-APT
  • APCS protection
  • More
  • Hardware
  • Access control and endpoint security
  • Computing and network infrastructure
  • Data protection
  • More
DevSecOps

Cryptographic information protection facilities (CIPF)

List
Tile

КриптоПро .NET

CryptoPro .NET is a software product that allows you to use the cryptographic information protection tool CryptoPro CSP on the Microsoft .NET Framework. CryptoPro .NET is a new version of the previously existing CryptoPro Sharpei software product and implements a set of interfaces for accessing .NET Cryptographic Provider cryptographic operations
КриптоПро .NET

Smart card reader

Smart card readers from Aladdin R.D. — a series of professional devices for reading coded data from microprocessor cards. Models of the line can be connected to personal computers and smartphones or built into special equipment. You can buy smart card readers in different colors and housing options, if necessary, it is possible to apply the company's trademark and other types of customization.
Smart card reader

CryptoPro JCP / JCP 2.0

CryptoPro JCP is a cryptographic information protection tool that implements Russian cryptographic standards and was developed in accordance with the JCA (Java Cryptography Architecture) specification. CryptoPro JCP integration with Java architecture allows using standard procedures, such as creation and verification of EDS (including XMLdsig), encryption, key generation, calculation of authentication codes (Message Authentication Code - MAC) in Java Cryptography Extension (JCE) in accordance with specifications on various operating systems and hardware platforms.
CryptoPro JCP / JCP 2.0

CryptoPro HSM

CryptoPro HSM is a hardware and software cryptographic module compatible with CryptoPro CSP. "CryptoPro HSM" provides a cryptographic service to corporate network users and allows creating and verifying an electronic digital signature, calculating a hash function, encrypting and decrypting data blocks, calculating imitated insertion of data blocks, generating and securely storing key information (all keys are encrypted) , user account management of the cryptographic service.
CryptoPro HSM

CryptoPro CSP

"CryptoPro CSP" has a certificate of compliance of the FSB of Russia and can be used to generate encryption keys and electronic digital signature keys, encrypt and imitate protection of data, ensure the integrity and authenticity of information that does not contain information constituting a state secret. CryptoPro CSP includes an operating system kernel level module (cryptodriver), which allows using the basic cryptographic functions (encryption, decryption, signature verification, hashing) at the operating system kernel level. The cryptodriver is primarily intended for use in special applications (encoders of the IP protocol, file system, etc.).
CryptoPro CSP
Temporarily unavailable

КриптоПро .NET

CryptoPro .NET is a software product that allows you to use the cryptographic information protection tool CryptoPro CSP on the Microsoft .NET Framework. CryptoPro .NET is a new version of the previously existing CryptoPro Sharpei software product and implements a set of interfaces for accessing .NET Cryptographic Provider cryptographic operations
КриптоПро .NET

Smart card reader

Smart card readers from Aladdin R.D. — a series of professional devices for reading coded data from microprocessor cards. Models of the line can be connected to personal computers and smartphones or built into special equipment. You can buy smart card readers in different colors and housing options, if necessary, it is possible to apply the company's trademark and other types of customization.
Smart card reader

CryptoPro JCP / JCP 2.0

CryptoPro JCP is a cryptographic information protection tool that implements Russian cryptographic standards and was developed in accordance with the JCA (Java Cryptography Architecture) specification. CryptoPro JCP integration with Java architecture allows using standard procedures, such as creation and verification of EDS (including XMLdsig), encryption, key generation, calculation of authentication codes (Message Authentication Code - MAC) in Java Cryptography Extension (JCE) in accordance with specifications on various operating systems and hardware platforms.
CryptoPro JCP / JCP 2.0

CryptoPro HSM

CryptoPro HSM is a hardware and software cryptographic module compatible with CryptoPro CSP. "CryptoPro HSM" provides a cryptographic service to corporate network users and allows creating and verifying an electronic digital signature, calculating a hash function, encrypting and decrypting data blocks, calculating imitated insertion of data blocks, generating and securely storing key information (all keys are encrypted) , user account management of the cryptographic service.
CryptoPro HSM

CryptoPro CSP

"CryptoPro CSP" has a certificate of compliance of the FSB of Russia and can be used to generate encryption keys and electronic digital signature keys, encrypt and imitate protection of data, ensure the integrity and authenticity of information that does not contain information constituting a state secret. CryptoPro CSP includes an operating system kernel level module (cryptodriver), which allows using the basic cryptographic functions (encryption, decryption, signature verification, hashing) at the operating system kernel level. The cryptodriver is primarily intended for use in special applications (encoders of the IP protocol, file system, etc.).
CryptoPro CSP

By using our site, you agree to the use of cookies and services for collecting technical data of visitors (IP addresses, locations, etc.) to ensure performance and improve the quality of service. More