Back
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
APCS protection
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
Access control and endpoint security
APCS protection
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
Industrial Cyber Security (ICS)
All solutions
Business process management (BPM)
Unified communications (UC) and Group Video Systems
All solutions
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Database Management System (DBMS)
All solutions
Secure Web Gateways (SWG, Proxy)
All solutions
User Authentification (AU)
All solutions
Industrial Cyber Security (ICS)
All solutions
Mobile devices
Thin clients
All solutions
Cryptographic information protection facilities (CIPF)
All solutions
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
High-tech equipment to protect airspace from drones
All solutions
Contacts Vendors
Events & Specials
Solutions
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
APCS protection
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
DevSecOps
Social networks
Back
Access control and endpoint security
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Anti-APT
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
APCS protection
Industrial Cyber Security (ICS)
All solutions
Business Productivity
Business process management (BPM)
Unified communications (UC) and Group Video Systems
All solutions
Computing and network infrastructure
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Data management
Database Management System (DBMS)
All solutions
Network Infrastructure Protection
Secure Web Gateways (SWG, Proxy)
All solutions
Access control and endpoint security
User Authentification (AU)
All solutions
APCS protection
Industrial Cyber Security (ICS)
All solutions
Computing and network infrastructure
Mobile devices
Thin clients
All solutions
Data protection
Cryptographic information protection facilities (CIPF)
All solutions
Network Infrastructure Protection
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
Физическая безопасность
High-tech equipment to protect airspace from drones
All solutions
Write to us
Become a partner
  • Software
  • ["Information Security (Информационная безопасность)"]
  • ["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
  • ["Infrastructure (Инфраструктура)"]
  • ["Infrastructure (Инфраструктура)","Облачные сервисы"]
  • ["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
  • XaaS
  • Access control and endpoint security
  • Anti-APT
  • APCS protection
  • More
  • Hardware
  • Access control and endpoint security
  • APCS protection
  • Computing and network infrastructure
  • More
DevSecOps
All solutions

КриптоПро NGate

CryptoPro NGate is a high-performance VPN gateway based on the TLS protocol. CryptoPro NGate enables administrators to organize a protected remote user access to corporate resources via insecure networks (e. g. the Internet).

The CryptoPro NGate gateway has flexible access settings. Using it, employees of a company can log in to enterprise servers from any device (using different ways including an access via browser), according to access policies managed by an enterprise network administrator.

Need a quote, demo or consultation?

Leave a request and we will contact you
Fill in the form

Other solutions

КриптоПро Архив

The software complex "CryptoPro Archive" is designed to ensure long-term storage of documents signed with an electronic signature.

КриптоПро .NET

CryptoPro .NET is a software product that allows you to use the cryptographic information protection tool CryptoPro CSP on the Microsoft .NET Framework. CryptoPro .NET is a new version of the previously existing CryptoPro Sharpei software product and implements a set of interfaces for accessing .NET Cryptographic Provider cryptographic operations

CryptoPro JCP / JCP 2.0

CryptoPro JCP is a cryptographic information protection tool that implements Russian cryptographic standards and was developed in accordance with the JCA (Java Cryptography Architecture) specification. CryptoPro JCP integration with Java architecture allows using standard procedures, such as creation and verification of EDS (including XMLdsig), encryption, key generation, calculation of authentication codes (Message Authentication Code - MAC) in Java Cryptography Extension (JCE) in accordance with specifications on various operating systems and hardware platforms.

CryptoPro HSM

CryptoPro HSM is a hardware and software cryptographic module compatible with CryptoPro CSP. "CryptoPro HSM" provides a cryptographic service to corporate network users and allows creating and verifying an electronic digital signature, calculating a hash function, encrypting and decrypting data blocks, calculating imitated insertion of data blocks, generating and securely storing key information (all keys are encrypted) , user account management of the cryptographic service.

CryptoPro CSP

"CryptoPro CSP" has a certificate of compliance of the FSB of Russia and can be used to generate encryption keys and electronic digital signature keys, encrypt and imitate protection of data, ensure the integrity and authenticity of information that does not contain information constituting a state secret. CryptoPro CSP includes an operating system kernel level module (cryptodriver), which allows using the basic cryptographic functions (encryption, decryption, signature verification, hashing) at the operating system kernel level. The cryptodriver is primarily intended for use in special applications (encoders of the IP protocol, file system, etc.).

By using our site, you agree to the use of cookies and services for collecting technical data of visitors (IP addresses, locations, etc.) to ensure performance and improve the quality of service. More