Back
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
APCS protection
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
Access control and endpoint security
APCS protection
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
Industrial Cyber Security (ICS)
All solutions
Business process management (BPM)
Unified communications (UC) and Group Video Systems
All solutions
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Database Management System (DBMS)
All solutions
Secure Web Gateways (SWG, Proxy)
All solutions
User Authentification (AU)
All solutions
Industrial Cyber Security (ICS)
All solutions
Mobile devices
Thin clients
All solutions
Cryptographic information protection facilities (CIPF)
All solutions
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
High-tech equipment to protect airspace from drones
All solutions
Contacts Vendors
Events & Specials
Solutions
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
APCS protection
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
DevSecOps
Social networks
Back
Access control and endpoint security
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Anti-APT
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
APCS protection
Industrial Cyber Security (ICS)
All solutions
Business Productivity
Business process management (BPM)
Unified communications (UC) and Group Video Systems
All solutions
Computing and network infrastructure
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Data management
Database Management System (DBMS)
All solutions
Network Infrastructure Protection
Secure Web Gateways (SWG, Proxy)
All solutions
Access control and endpoint security
User Authentification (AU)
All solutions
APCS protection
Industrial Cyber Security (ICS)
All solutions
Computing and network infrastructure
Mobile devices
Thin clients
All solutions
Data protection
Cryptographic information protection facilities (CIPF)
All solutions
Network Infrastructure Protection
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
Физическая безопасность
High-tech equipment to protect airspace from drones
All solutions
Write to us
Become a partner
  • Software
  • ["Information Security (Информационная безопасность)"]
  • ["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
  • ["Infrastructure (Инфраструктура)"]
  • ["Infrastructure (Инфраструктура)","Облачные сервисы"]
  • ["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
  • XaaS
  • Access control and endpoint security
  • Anti-APT
  • APCS protection
  • More
  • Hardware
  • Access control and endpoint security
  • APCS protection
  • Computing and network infrastructure
  • More
DevSecOps
Does the market need a universal "pill" to protect the network
Vse novosti

Does the market need a universal "pill" to protect the network

Are there industry specifics when choosing a firewall? Is the development of the most versatile device for protecting network infrastructure capable of closing the tasks of customers from all industries - a myth or a reality? Do customers need such a “tablet”? We learned from developers and integrators how things are in this segment, and also shared their opinion on unified devices.

quote
A K
Anton Kovylyaev
Head of Representative Office of Axoft
The industrial segment has its own requirements. The financial sector is quite tightly regulated by the Central Bank. Will we come to the conclusion that we will get some kind of maximally universal device that covers the tasks of customers from all industries, or will industry specifics be taken into account and there will be separate devices and solutions? The question is open.

Alexander Barkhatov, Partner Relations Manager at Security Code, believes that the future belongs to some kind of universal devices that will cover 99% of customer tasks.

quote
A B
Alexander Barkhatov
Partner Relations Manager at «Security Code»
Let's leave 1% for some very specific, narrow market.

Vadim Idrisov, the leading presale of «IT Enigma Ufa», also agrees with the need for universalization.

quote
V I
Vadim Idrisov
Leading presale of «IT Enigma Ufa»
This would be relevant for medium-sized businesses - to use a lot of different functionality in one hardware. But for larger customers, specialized protective equipment will still be required.
quote
D L
Dmitry Lebedev
The leading expert of the «Security Code» company, says:
Here everything will depend on which side to approach this issue. If we look from the point of view of regulation, let's take the same FSTEC orders: No. 239, No. 21, No. 17 - they are all used for different segments: KII, APCS, ISPDN, GIS. The same documents have been developed for banks. But if we look at the requirements that are made within the framework of the orders, then for the most part they are all similar to each other. Of course, there are some key differences that are suitable for a particular area. But if a company fulfills, say, the requirements of Order No. 239, then with a greater degree of probability the company will also comply with all other requirements that are imposed under orders No. 31, No. 17, No. 21. The same with banks. If we consider this topic from the side of scenarios, that is, where solutions are used (for example, to protect the perimeter of an organization or to protect data centers), then the requirements will be different: to ensure the security of data centers, the functionality will have its own requirements, to protect the perimeter of an organization - others .
quote
A D
Andrey Duyun
UserGate Partner Manager confirms:
Yes, here it is necessary to look from tasks. Because if we are talking about automated process control systems, then there is often a need, for example, for a more secure housing in industrial design. Accordingly, some civilian platform does not meet these requirements. If we are talking about the protection of KSPD (corporate data transmission networks), for example, about proxies, then we need filtering lists that can be unified. But if we are talking about the protection of data centers, then most likely there will be a separate “hardware”, with the maximum performance of the ITU, with the implemented capabilities of hardware acceleration, stacking, etc. The experience of world leaders confirms this. Another thing is that the operating system itself for the most part will be unified. And there is hardly any point in sharing something. But in the hardware part, there will be a separation. It is already underway in UserGate: we have separate platforms for automated process control systems, for a corporate network, for data centers.
quote
A C
Alexander Chirkunov
Head of Business Development at Axoft, summed up:
Networks are divided at least into corporate and industrial segments. The corporate segment uses and will continue to use the most unified solutions. As for the protection of process control systems, here I can add that not only specialized cases of protective equipment are required (moisture-resistant, shock-resistant, etc.). The logic of the industrial network protection means must function in the monitoring mode, without disturbing the technological processes in case of false positives, and be able to analyze industrial protocols. This is a very important point.

More news

8 July
Axoft и SafenSoft объявляют о стратегическом сотрудничестве в области защиты банкоматов и мониторинга изменений конфигурации на ИТ-инфраструктуре
Центр экспертизы и дистрибуции цифровых технологий Axoft и разработчик решений в области информационной безопасности SafenSoft объявляют о начале стратегического сотрудничества, целью которого является расширение партнерской сети для предоставления комплексных решений для защиты банкоматов от несанкционированного доступа и мониторинга изменения конфигурации на ИТ-инфраструктуре для быстрого реагирования на инциденты.
23 June
Axoft стал официальным дистрибутором Granulex в России
Компания Axoft, центр экспертизы и дистрибуции цифровых технологий, объявляет о заключении дистрибуторского договора с разработчиком платформы Granulex – группой компаний «МД Информационные Системы» (ГК «МДИС»).
19 June
Axoft: решения Start X помогут минимизировать риски человеческого фактора и повысить безопасность разработки
Axoft подписал дистрибьюторское соглашение с разработчиком программного обеспечения в сфере кибербезопасности Start X (ООО «Антифишинг»).
27 March
Mailion 2.2 — это не только новый дизайн, но и...
Mailion 2.2: проще, быстрее, удобнее — обновленный интерфейс и другие улучшения для продуктивности.

By using our site, you agree to the use of cookies and services for collecting technical data of visitors (IP addresses, locations, etc.) to ensure performance and improve the quality of service. More