OKB SAPR
Company
Information Technology
Russia
Central Federal District of the Russian Federation
Moscow
115114, 2nd Kozhevnichesky per.8
Top managers:
Pinchuk Vyacheslav
Russia
Central Federal District of the Russian Federation
Moscow
115114, 2nd Kozhevnichesky per.8
Top managers:
Pinchuk Vyacheslav
OKB SAPR is a company developer of software and hardware tools for protecting information (IPS) from unauthorized access (NSD), including cryptographic ones.
The company has been operating since 1989.
History
The company has created:
- SIS of the ACCORD family - they became the first means of providing a trusted download and sandbox,
- the SHIPKA family is the first domestic hardware personal means of cryptographic information protection,
- PRIVACY is the first hardware and software complex for cryptographic protection ICQ,
- SECRET is the first way to solve the problem of secure work with USB drives.
- MARCH device, which laid the foundation for a new methodology for protecting information - the methodology of a trusted communication session.
Products and Systems
OKB SAPR offers solutions in the field of information protection:
- NDS NSD CHORD family line:
- Accord-AMDZ - a hardware module of trusted loading is designed for use on IBM-compatible PCs, LAN workstations in order to protect computer equipment and information resources from unauthorized access;
- Hardware and software complex Accord-Win32 - as part of the Accord-AMDZ and special software that implements the rules for delimiting access to information, is designed to delimit user access to workstations, terminals and terminal servers running 32-bit Windows OS;
- Hardware and software complex Accord-Win64 - as part of the Accord-AMDZ and special software that implements the rules for delimiting access to information, is designed to delimit user access to workstations, terminals and terminal servers running 64-bit Windows OS;
- Hardware and software complex Accord-X - as part of the Accord-AMDZ and special software that implements the rules for delimiting access to information, is designed to delimit user access to workstations and servers running Linux OS;
- Chord-B - a software and hardware complex designed to protect the virtualization infrastructure based on VMware vSphere 5.0,,; VMware vSphere 5.1 VMware vSphere 5.5
- Chord-U - a software and hardware complex that combines the functions of AMDZ with the functions of cryptographic data protection.
- ASHS - Remote centralized control system for data protection against unauthorized access "Accord" is designed for centralized monitoring of information security events and management of information protection against unauthorized access.
- The PSKZI line of the SHIPKA family:
- ShIPKA-1.6 - modification of PSKZI SHIPKA with higher rates of cryptographic transformations;
- ShIPKA-2.0 - modification of PSKZI SHIPKA with high performance and - on a separate order - with a large encrypted disk;
- SHIPKA-light is the most inexpensive in the line of devices on the basis of which PSKZI SHIPKA can be built;
- SPIKE-light Slim is an advanced version of the SPIKE-light device;
- SHIPKA-T (Terminal) is software (software) designed to provide the ability to work with cryptographic resources of PSKZI SHIPKA in terminal access mode;
- Center-T - PAC SSI NSD is designed to provide secure loading of software images of terminal stations over the network.
- Automation subsystems for operation with MPS Chord and SHIP:
- The Accord-RAD distributed audit and control subsystem is software for automation of information protection management in NP;
- Privacy - PAC for cryptographic protection using PKZI SHIPKA data on the hard disk and transmitted over the network.
- SECRET line:
Personal secret - PAC for the secure use of personal USB drives or service media on autonomous workstations;
- The secret of the company is PAC for the secure use of USB service media in an organization whose computers are combined into a network;
- The Secret of Special Purpose is PAC for the secure use of USB service media in a large distributed organization whose computers are combined into a network whose servers are online.
- Trusted Session Facilities
- "MARSH!" - PAC to organize secure operation of remote users of untrusted computers with services of a trusted distributed information system (FIG) through data transmission networks within a trusted communication session (DSS).
- SATA Device Switch.
- USB Port Blocking Device.
- Regulatory and methodological documents on information security policy.