Back
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
APCS protection
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
Access control and endpoint security
APCS protection
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
Industrial Cyber Security (ICS)
All solutions
Business process management (BPM)
Unified communications (UC) and Group Video Systems
All solutions
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Database Management System (DBMS)
All solutions
Secure Web Gateways (SWG, Proxy)
All solutions
User Authentification (AU)
All solutions
Industrial Cyber Security (ICS)
All solutions
Mobile devices
Thin clients
All solutions
Cryptographic information protection facilities (CIPF)
All solutions
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
High-tech equipment to protect airspace from drones
All solutions
Contacts Vendors
Events & Specials
Solutions
["Information Security (Информационная безопасность)"]
["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
["Infrastructure (Инфраструктура)"]
["Infrastructure (Инфраструктура)","Облачные сервисы"]
["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
Access control and endpoint security
Anti-APT
APCS protection
Business Productivity
Computing and network infrastructure
Data management
Network Infrastructure Protection
More
Access control and endpoint security
APCS protection
Computing and network infrastructure
Data protection
Network Infrastructure Protection
Физическая безопасность
More
DevSecOps
Social networks
Back
Access control and endpoint security
E-mail Security
Endpoint Protection Platform (EPP)
Server Protection Platform, Virtualization Platform Security (VPS & SPP)
All solutions
Anti-APT
Extended Detection and Response (XDR)
Managed Detection and Response (MDR)
Network Sandbox
Security Awareness
Security Information and Event Management (SIEM)
Security Threat Intelligence Products and Services (TIP)
All solutions
APCS protection
Industrial Cyber Security (ICS)
All solutions
Business Productivity
Business process management (BPM)
Unified communications (UC) and Group Video Systems
All solutions
Computing and network infrastructure
Operating Systems
Server Virtualization Infrastructure (SVI)
All solutions
Data management
Database Management System (DBMS)
All solutions
Network Infrastructure Protection
Secure Web Gateways (SWG, Proxy)
All solutions
Access control and endpoint security
User Authentification (AU)
All solutions
APCS protection
Industrial Cyber Security (ICS)
All solutions
Computing and network infrastructure
Mobile devices
Thin clients
All solutions
Data protection
Cryptographic information protection facilities (CIPF)
All solutions
Network Infrastructure Protection
Firewall or Unified Threat Management (FW, UTM)
SD-WAN - Software-Defined Wide Area Network
Virtual Private Network (VPN)
All solutions
Физическая безопасность
High-tech equipment to protect airspace from drones
All solutions
+7 (727) 355-66-30
Write to us
Become a partner
  • Software
  • ["Information Security (Информационная безопасность)"]
  • ["Information Security (Информационная безопасность)","Решения для сервис-провайдеров"]
  • ["Infrastructure (Инфраструктура)"]
  • ["Infrastructure (Инфраструктура)","Облачные сервисы"]
  • ["Infrastructure (Инфраструктура)","Решения для сервис-провайдеров"]
  • XaaS
  • Access control and endpoint security
  • Anti-APT
  • APCS protection
  • More
  • Hardware
  • Access control and endpoint security
  • APCS protection
  • Computing and network infrastructure
  • More
DevSecOps
All solutions

Secret Disk

Secret Disk is a line of solutions that ensure the security of confidential information on servers and personal computers. The products of the series are aimed at comprehensive protection of enterprise data from unauthorized access, theft, and damage. The solutions are included in the Unified Register of Domestic Software and fully comply with all the requirements of the regulator in the field of import substitution policy.

Product Features

Each solution in the series has its own characteristics. In particular:

  • Secret Disk 5 in the certified version is used to ensure the security of the PC with the possibility of collective work over the network. The solution uses modern disk encryption algorithms, implements two-factor authentication and allows you to hide confidential information from system administrators, repair service workers, or other persons without the right to access official information. The product also helps protect removable media.
  • Secret Disk Server NG protects confidential information on servers from unauthorized access, various damage, and theft. The product can be used as a standalone solution or as a component of a complex system.
  • Secret Disk Enterprise is aimed at comprehensive security of corporate infrastructure. The product monitors the current status of all workstations, reduces the load on information services, guarantees the protection of official information from unauthorized access and reduces the risk of leakage.

When deciding to buy Secret Disk, users can count on basic technical support for a period of 12 months by default.

3 facts about the brand

  • Over 25 years of experience.
  • Partner of Microsoft, Oracle, Apple and other giants of the IT industry.
  • 14th place in the top 30 largest Russian companies in the field of information security (according to CNews Analytics).

Need a quote, demo or consultation?

Leave a request and we will contact you
Fill in the form

Other solutions

Crypto BD

"Crypto DB" is a system for protecting against leaks of information stored in Oracle, Microsoft SQL Server, Tibero or PostreSQL DBMS. Included in the Unified Register of Domestic Software.

JaCarta SecurLogon

JaCarta Securlogon is a tool for a quick and easy transition from standard weak passwords to strong two-factor authentication. The solution allows you to set up an enhanced protection procedure without the need to deploy a PKI token infrastructure and AD. JCS can be seen as a means for a smooth transition to PKI.

JaCarta Authentication Server

JaCarta Authentication Server is an independent server for authenticating electronic access keys of various types: one-time password, two-factor, for mobile devices. Serves to ensure reliable protection of systems and services. Makes the authentication process easier and faster from a user's point of view

JaCarta Management System

JaCarta Management System is a solution for managing hardware and software tokens. The product fully automates the processes of item-by-instance accounting of funds and the application of information security policies. JaCarta JMS provides two-factor authentication and monitors the actions of administrators and users.

Smart card reader

Smart card readers from Aladdin R.D. — a series of professional devices for reading coded data from microprocessor cards. Models of the line can be connected to personal computers and smartphones or built into special equipment. You can buy smart card readers in different colors and housing options, if necessary, it is possible to apply the company's trademark and other types of customization.

JaCarta

JaCarta solutions allow you to organize and strengthen access checks for servers and systems, guarantee the safety of personal and corporate data. They have the appearance of a USB drive in cases of various colors and designs. Differ in the protected right of an input.

Aladdin LiveOffice

Aladdin LiveOffice is a professional solution for organizing secure remote work. The software has a FSTEC certificate and is suitable for working with lawyers, banks, doctors, auditors and other types of secrets and corporate information. The solution provides reliable protection of the organization's information system when employees work on personal devices outside the office.

More solutions of this class

By using our site, you agree to the use of cookies and services for collecting technical data of visitors (IP addresses, locations, etc.) to ensure performance and improve the quality of service. More