Developers: | Russian High Technologies (RHT) |
Date of the premiere of the system: | 2014/11/06 |
Branches: | Government and social institutions, Information technologies, Pharmaceutics, medicine, health care, Financial services, investments and audit |
Technology: | Cybersecurity - Authentication, Information loss preventions are cybersecurity |
The phantom - the software tool for the organization of the protected workplace and server solution using technologies of virtualization.
The solution compensates information risks and threats during the work with information of a different confidentiality level without prejudice to convenience of work.
Options of use and advantage of the solution
- Information processing of different categorization on one hardware unit;
- Execution of a HSS by Forfeit on an external hard drive, thanks to protection against NSD of the carrier, communication channels and also existence of additional resources of protection allows exit employees, using any hardware unit (the notebook, stationary the computer, etc.), to work with confidential information in the conditions of the unsafe environment (in foreign business trips, in gifts, at home, etc.);
- Flexible integration with other information security tools (antiviruses, SRD, firewalls, analyzers of vulnerabilities, etc.) with the purpose to improve security of a workplace;
- Minimization of opportunities for vectors of the attacks via transferable devices by full control of the connected peripheral devices from hypervisor level;
- Monitoring of information exchange. The violator cannot influence journalizing mechanisms means of a hypervisor that does not allow it to hide influence traces;
- The increased fault tolerance and availability. At the expense of the mechanism of hot caching there is an opportunity to completely save a status of the virtual machine in any timepoint and in case of need to recover this status.
Main Characteristics
- Safe work on any computer (collective use, house) from an individual figurative USB disk;
- Control of OS using hardware technologies of virtualization;
- Control of peripheral devices of the computer, including the internal memory and a disk, from hypervisor level;
- Transparent functioning for the user;
- Reliable implementation of cryptographic functions at the level of a hypervisor;
- The increased fault tolerance at the expense of the mechanism of pictures of a status and storage of backup copies;
- Audit of the taking place events;
- Control of network interaction;
- The strengthened authentication of users;
- Possibility of separate placement of several jobs on one computer or on the external loaded USB disk;
- Opportunity for work only from an individual figurative external USB disk;
- Complete isolation of jobs (virtual domains);
- Control of work of computing resources in real time;
- Support of cryptographic functions according to security requirements;
- Existence of the mechanism of storage of backup copies that allows in case of a non-staff situation (failure in a case of influence of the malefactor, incorrectly working software, etc.) to any timepoint to return to the saved system status or its separate components;
- Control of integrity of the operating system, environment of the user and separate a component with the purpose to resist to penetration on Wednesday of a malicious code.
Sphere of use
- Public institutions
- Medical institutions
- Banking sector
- Industrial sector
- Multifilial organizations
- Management of the PCS
2014
Beginning of sales of a HSS by Forfeit
On November 6, 2014 RNT company announced the beginning of sales of the hardware and software system "Phantom".
Feature of the solution - execution on an external hard drive. When loading the computer from this disk work of a HSS Phantom and work of the user do not differ from work with the built-in disk of the computer in any way. At the same time the internal disk is completely isolated: all information is stored only on an external disk of the user, the internal disk is completely protected on information read and write. Thereby the opportunity for work on any computer without risk of information leak is implemented.
Possibilities of the device allow information processing of different categorization on one hardware unit, flexible integration with other information security tools (antiviruses, SRD, firewalls, analyzers of vulnerabilities, etc.) for increase in security of a workplace, monitoring of information exchange, minimization of an opportunity for vectors of the attacks by means of portable devices by full control of the connected peripheral devices at the level of a hypervisor.
The complex has necessary certificates of the information security facility, FSTEC and FSB.