RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

OKB SAPR

Company

width=200px
300px

OKB SAPR is a company developer of software and hardware tools for protecting information (IPS) from unauthorized access (NSD), including cryptographic ones.

The company has been operating since 1989.

History

The company has created:

  • SIS of the ACCORD family - they became the first means of providing a trusted download and sandbox,
  • the SHIPKA family is the first domestic hardware personal means of cryptographic information protection,
  • PRIVACY is the first hardware and software complex for cryptographic protection ICQ,
  • SECRET is the first way to solve the problem of secure work with USB drives.
  • MARCH device, which laid the foundation for a new methodology for protecting information - the methodology of a trusted communication session.

Products and Systems

OKB SAPR offers solutions in the field of information protection:

  • NDS NSD CHORD family line:
    • Accord-AMDZ - a hardware module of trusted loading is designed for use on IBM-compatible PCs, LAN workstations in order to protect computer equipment and information resources from unauthorized access;
    • Hardware and software complex Accord-Win32 - as part of the Accord-AMDZ and special software that implements the rules for delimiting access to information, is designed to delimit user access to workstations, terminals and terminal servers running 32-bit Windows OS;
    • Hardware and software complex Accord-Win64 - as part of the Accord-AMDZ and special software that implements the rules for delimiting access to information, is designed to delimit user access to workstations, terminals and terminal servers running 64-bit Windows OS;
    • Hardware and software complex Accord-X - as part of the Accord-AMDZ and special software that implements the rules for delimiting access to information, is designed to delimit user access to workstations and servers running Linux OS;
    • Chord-B - a software and hardware complex designed to protect the virtualization infrastructure based on VMware vSphere 5.0,,; VMware vSphere 5.1 VMware vSphere 5.5
    • Chord-U - a software and hardware complex that combines the functions of AMDZ with the functions of cryptographic data protection.
    • ASHS - Remote centralized control system for data protection against unauthorized access "Accord" is designed for centralized monitoring of information security events and management of information protection against unauthorized access.

  • The PSKZI line of the SHIPKA family:
    • ShIPKA-1.6 - modification of PSKZI SHIPKA with higher rates of cryptographic transformations;
    • ShIPKA-2.0 - modification of PSKZI SHIPKA with high performance and - on a separate order - with a large encrypted disk;
    • SHIPKA-light is the most inexpensive in the line of devices on the basis of which PSKZI SHIPKA can be built;
    • SPIKE-light Slim is an advanced version of the SPIKE-light device;
    • SHIPKA-T (Terminal) is software (software) designed to provide the ability to work with cryptographic resources of PSKZI SHIPKA in terminal access mode;
    • Center-T - PAC SSI NSD is designed to provide secure loading of software images of terminal stations over the network.

  • Automation subsystems for operation with MPS Chord and SHIP:
    • The Accord-RAD distributed audit and control subsystem is software for automation of information protection management in NP;
    • Privacy - PAC for cryptographic protection using PKZI SHIPKA data on the hard disk and transmitted over the network.

  • SECRET line:

Personal secret - PAC for the secure use of personal USB drives or service media on autonomous workstations;

    • The secret of the company is PAC for the secure use of USB service media in an organization whose computers are combined into a network;
    • The Secret of Special Purpose is PAC for the secure use of USB service media in a large distributed organization whose computers are combined into a network whose servers are online.

  • Trusted Session Facilities
    • "MARSH!" - PAC to organize secure operation of remote users of untrusted computers with services of a trusted distributed information system (FIG) through data transmission networks within a trusted communication session (DSS).

  • SATA Device Switch.
  • USB Port Blocking Device.
  • Regulatory and methodological documents on information security policy.