Back
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
Access control and endpoint security
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
Industrial Cyber Security (ICS)
All solutions
Unified communications (UC) and Group Video Systems
All solutions
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Database Management System (DBMS)
All solutions
Secure Web Gateways (SWG, Proxy)
All solutions
User Authentification (AU)
All solutions
Thin clients
All solutions
Cryptographic information protection facilities (CIPF)
All solutions
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
High-tech equipment to protect airspace from drones
All solutions
Contacts Vendors
Events & Specials
Solutions
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
DevSecOps
Social networks
Back
Access control and endpoint security
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Anti-APT
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
APCS protection
Industrial Cyber Security (ICS)
All solutions
Business Productivity
Unified communications (UC) and Group Video Systems
All solutions
Computing and network infrastructure
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Data management
Database Management System (DBMS)
All solutions
Network Infrastructure Protection
Secure Web Gateways (SWG, Proxy)
All solutions
Access control and endpoint security
User Authentification (AU)
All solutions
Computing and network infrastructure
Thin clients
All solutions
Data protection
Cryptographic information protection facilities (CIPF)
All solutions
Network Infrastructure Protection
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
Физическая безопасность
High-tech equipment to protect airspace from drones
All solutions
+(994)50-400-11-22
Write to us
Become a partner
  • Software
  • ["Information Security (Информационная безопасность)"]
  • ["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
  • ["Infrastructure (Инфраструктура)"]
  • ["Infrastructure (Инфраструктура)","Облачные сервисы"]
  • ["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
  • XaaS
  • Access control and endpoint security
  • Anti-APT
  • APCS protection
  • More
  • Hardware
  • Access control and endpoint security
  • Computing and network infrastructure
  • Data protection
  • More
DevSecOps
Vendors

INFOWATCH

InfoWatch Group is one of the industry leaders in the development of software solutions that protect the information space of companies.

Each organization operates with a large amount of data, the leakage of which will lead to a loss of reputation, a decrease in profits, and a loss of competitive advantages. By purchasing InfoWatch products, the management ensures the safe use of the system, the exclusion of the human factor, and the prevention of external attacks.

InfoWatch products

To ensure the security of information, InfoWatch offers the following products that are certified by the FSTEC and the FSB of Russia:

  • Traffic Monitor. Performs multidimensional analysis, which allows not only to identify and block the leak, but also to recognize disguised, modified objects and fraudulent schemes of employees. Allows you to predict the onset of risks, find pathologies in the system.
  • Vision. Serves for data analysis. Generates reports on any indicators, finds anomalies in information flows, collects "dossiers"; by activity in the system for each employee.
  • Person Monitor. Allows you to collect information about the behavior of an employee in the workplace. With it, you can restore the event log, prepare an evidence base, and identify the causes of information leakage.
  • Endpoint Security. Regulates the integrity of the IT infrastructure. Provides data encryption, monitoring, automation of repetitive actions.

For the security of applications, there are two InfoWatch products that differ in price and purpose. Attack Killer eliminates external threats, while Appercut detects vulnerable application components. InfoWatch ARMA ensures the safety of process control systems. The product detects and prevents flashing controllers, attempting to connect devices, address spoofing, and prohibited actions.

InfoWatch products are able not only to repel attacks and prevent data leakage, but also to predict the risk of their occurrence, which improves system security and information security.


Advantages

  • Over 20 000 clients
  • 15 representative offices in different countries
  • 16 years of experience
  • More than 30 largest Russian companies are clients

InfoWatch provides effective products for more than 20 industries, as evidenced by customer feedback. Being a Russian organization, it perfectly understands the requirements for the security of the domestic market. Solutions can be purchased through partners.

Need a quote, demo or consultation?

Leave a request and we will contact you
Fill in the form

By using our site, you agree to the use of cookies and services for collecting technical data of visitors (IP addresses, locations, etc.) to ensure performance and improve the quality of service. More