[an error occurred while processing the directive]
RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Crypto IVK

Product
Developers: IVK
Date of the premiere of the system: 2019/03/14
Technology: VPN - Virtual private networks,  cybersecurity - Authentication,  cybersecurity - Means of enciphering

Main articles:


The CIPF of Crypto IVK is Russian technology independent hardware and software system for the organization of virtual private networks and automatic enciphering / deciphering of data which are transmitted between geographically distributed objects in private networks or through public service networks.

2020: The announcement of the protected workplace of office employee

On June 8, 2020 the company IVK reported that it developed the ready protected workplace of office employee. This solution on USB- the carrier, IVK including software products of production: certified operating system "Viola of 8 joint ventures", means cryptographic data protection (CIPF) Crypto IVK and set applied SOFTWARE for daily work from the OS distribution kit. In coordination with the customer on a flash drive the application software from Unified register of the Russian programs, compatible to OS "the Viola of 8 joint ventures" can be in addition set.

According to the company, work with the solution for remote work does not demand from the user of special qualification in the field of IT. The employee, being in every spot on the globe, connects the USB carrier to the computer available at present – and at once begins to work, as at office. The OS installation on the computer is not required, the workplace is localized on the USB carrier. The solution IVK will allow state structures and the commercial organizations to transfer employees to the mode of remote work, having provided them with a usual workplace for the period of absence at office.

The user can select solutions IVK one of two scenarios of work. The first scenario – work in the terminal mode. The employee gets access to the individual workplace which is in office of the organization on its personal computer, on server or century cloud. The session of remote work differs in nothing from work at office. At the disposal of the employee there is all usual software and necessary data. They are stored on corporate resources and are available only during the session. Connection is implemented on the basis of the RDP, SPICE, VNC protocols. The second scenario – work with software set on the USB carrier. These are programs from a distribution kit: the office suite, Internet- browser the client e-mail, means of scanning and printing of documents editors of multimedia, etc. All data of the user also are stored on the USB carrier.

As a part of the solution for the organization of a remote workplace:

Protection of interactive sessions is provided by a CIPF of Crypto IVK, intended for creation of virtual private networks with cryptoprotection of the data transferred on open communication links and accomplishment of functions of the firewall.

The solution IVK is suitable for any computer able to be loaded with USB. All softwares and data of the user are stored only on a flash carrier and are completely isolated from hard drives of the computer. For a secure access the procedure of user authentication is provided. User preferences of the operating system, application software and network connections remain and work at the next sessions.

File:Aquote1.png
The emergency transfer of employees to remote work in the period of a pandemic was a difficult task for many state structures, authorities, the commercial organizations, banks, educational institutions. Both corporate IT infrastructures, and employees were not ready to deployment of the protected jobs on remote computers. The solution IVK will allow any organization to adjust remote work of all personnel without cardinal reorganization of the IT infrastructure. The solution is constructed on Russian program and hardware therefore provides program implementation of technology independence.

Grigory Sizonenko, the CEO of IVK Group told
File:Aquote2.png

2019: Inclusion in the Unified register of the Russian programs

On March 14, 2019 IVK announced expansion of a line of the backbone products provided in Unified register of the Russian programs for electronic computers and databases. Now means cryptographic data protection (CIPF) Crypto IVK was added to them.

The order Ministry of Telecom and Mass Communications Russia of 2/22/2019 No. 63 CIPF of Crypto IVK appropriates registration number 5159 in the Unified register of the Russian programs in information security category "Utilities".

Crypto IVK is included in the Register of the Russian programs

According to the certificate of FSB of Russia, information which is not containing the data which are the state secret belongs to a scope of a CIPF of Crypto IVK. Cryptographic data protection is executed by method of their enciphering according to GOST 28147-89.

Crypto IVK is successfully used in state bodies, in law enforcement agencies and also in the large business forming a basis of the crucial industries of the Russian economy.

File:Aquote1.png
These organizations are engines of processes of creation of digital infrastructure on the basis of domestic technologies. Entering of a CIPF of Crypto IVK into the register will allow our customers to perform requirements of the regulatory base for purchase of software tools and to create geographically distributed information systems with high requirements to security and processing complexity of information.
Grigory Sizonenko, CEO of IVK company
File:Aquote2.png

The CIPF of Crypto IVK can be purchased as a part of the complex hardware-software platform for data protection by cryptographic methods in the virtual private area networks.

The program part of this platform is formed by software which is earlier entered in the unified register of the Russian programs.

The CIPF of Crypto IVK is delivered in different hardware configurations that allows each organization to pick up an optimal solution taking into account volumes of the transmitted data which are subject to protection and topology of automated information system.