The map shows over 250 domestic companies-developers of products and services in the field of information security, as well as suppliers of such services. During the preparation of the map, the company's solutions were segmented into 43 categories in 4 main groups: "Infrastructure Protection," "Monitoring, Research and Analysis," "Data Protection" and "Services and Services."
When preparing the map, analysts relied on:
- TAdviser Knowledge Base,
- Industry ratings
- Websites of information security companies
The partners of the new project were the leading players in the Russian cybersecurity market - InfoWatch, NGENIX and VolgaBlob.
InfoWatch Group is a leading Russian developer of solutions in the field of information security and protection of confidential information of companies participating in the digital economy. Solutions for protecting organizations from internal, external and hybrid threats and information attacks have been certified for compliance with the requirements of the FSB, FSTEC of the Russian Federation, industry standards and are included in the Register of Domestic Software. The company has about 40 software technologies and patents to optimize the work of the information security department. Among the clients are the largest banks, telecommunications operators, oil and gas companies, industrial companies and state organizations.
NGENIX is a Russian cloud provider of comprehensive security, availability and productivity services for public web resources. The distributed cloud platform NGENIX helps simultaneously protect a web resource from DDoS attacks, hacks and malicious bots, cope with high loads and speed up web page loading for audiences anywhere in Russia. The convenient platform management interface and professional support of the NGENIX team allow owners of Russian web resources to optimize the work of their IT and information security departments and focus on the growth and development of their business.
VolgaBlob is a developer with more than 20 years of experience in IT. The company's flagship solution is Smart Monitor, a universal platform for collecting, analyzing and processing machine data, which allows you to close practical tasks in the field of information security, monitoring IT infrastructure and analyzing business processes. SIEM, SOC, TI, NOC, UBA, Antifraud, BI, ITSI, IT Ops, Compliance - and these are not all applications of the Smart Monitor platform.
At the request of TAdviser, experts from partner companies of the project shared their opinion on the most important changes that are taking place in the Russian cybersecurity market and the prospects for its development in the coming years.
On the most important changes in the Russian information security market
Andrey Arefiev, Director of Innovative Projects, InfoWatch Group of Companies:
The main trend is the change in the information security market following the changes in the IT market. In the IT sector, the global transition from foreign vendor products to domestic solutions and a new IT landscape continues, this hybrid infrastructure needs to be protected.
If we consider the data protection market, it was formed more than ten years ago, and here we are seeing qualitative growth - vendors are working to develop their solutions in terms of efficiency.
As for the network security market and specifically NGFW, this is, in fact, a new market for Russian players, since up to a certain point there were no developed domestic solutions. Among the key tasks is the launch of new generation Russian firewalls (NGFW) on the market.
Konstantin Chumachenko, CEO of NGENIX:
Preparations for the implementation of the provisions of Presidential Decree No. 250 have a significant impact on the Russian information security market. Building an integrated protection based entirely on Russian solutions and meeting all the requirements of the regulator is a great challenge, despite the undoubted successes of Russian information security companies. We are seeing this trend in terms of web security solutions that NGENIX specializes in.
Alexander Skakunov, CEO of VolgaBlob:
There is a consolidation of the professional services market in the field of information security. This is the result of stratifying customers into those who can afford their own cybersecurity division and those who, for many reasons, benefit from outsourcing. There are fewer and fewer first ones. And this is not only a question of the budget, but also a question of personnel, motivation to keep them. As a result, MSSP models are becoming more popular, along with products that can work in this mode. Another current distinguishing feature of the Russian information security market is the gap from global trends caused by the sanctions policy and their replacement with such national cyber competitions as "create your own NGFW." This is a dangerous trend, but a topic that is understandable for marketers and manufacturers with a predictable sales market.
On the successes and difficulties of import substitution in the field of information security
Konstantin Chumachenko, CEO of NGENIX:
Russian developers of information security solutions have made great progress, being under pressure from the deadlines, regulatory requirements and customer expectations. However, the main consumer of Russian information security solutions today is still the "establishment" - large companies and government agencies. The cost of Russian developments remains quite high, which will make it difficult for companies from the SME segment to implement them. A significant amount of personal data passes through such companies and they are also vulnerable to modern cyber attacks. It is possible to increase the availability of information security for SMEs, for example, by applying domestic solutions based on public clouds.
There is an additional nuance in our segment of protecting public web resources - it is important to preserve the quality of user experience, since Russian users are accustomed to convenient interfaces and high speed of websites and applications. Domestic solutions for protecting the web are currently developing in accordance with the needs of the most significant and often attacked customers - government agencies, companies from the transport industry, e-commerce and the financial sector. Unfortunately, at the moment there are no prerequisites for the mass provision of services under the freemium model, for example, as Cloudflare does. But this does not mean that the situation will not change in the future.
Andrey Arefiev, Director of Innovative Projects, InfoWatch Group of Companies:
If we consider the network security market and specifically NGFW, then import substitution is the main driver of the development of this segment. There is an understandable high demand that Russian manufacturers, including Infowatch, seek to satisfy.
One of the obstacles for Russian developers of complex solutions for network security is that our solutions, which have only recently entered the market and are exploring this niche, are trying to compare with Western products, despite the fact that these technologies were already at their peak more than ten years ago. Simply take a foreign box and redo, replacing foreign technologies in a short time, will not work - it is not fast and difficult, it takes time, specialists, technological resources and financial investments.
Import substitution in IT has a huge impact on the development of the data protection market. Now the Russian business is at the stage of hybrid infrastructure, this is a mix of domestic solutions and products of foreign vendors that leave the Russian market. Therefore, one of the main challenges is to develop approaches to protecting this hybrid IT infrastructure. This is a non-trivial task that both customers and Russian vendors of information security tools learn to cope with. Alexander Skakunov, CEO of VolgaBlob
The import substitution processes themselves are going well. In terms of results, hardware-based, high-performance network security is still in short supply. Also rather sparse is the competitive field of the EDR/XDR class solution, especially from independent players who could act as highly specialized vendors in this very popular direction.
On the prospects of the Russian information security market for the coming years
Andrey Arefiev, Director of Innovative Projects, InfoWatch Group of Companies:
The dynamics of the information security market will largely depend on the dynamics of the IT market - the development of security tools is directly tied to the infrastructure that information security solutions protect. In the coming years, the information security market is waiting for redistribution, and positions in the updated market will depend on how much vendors can flexibly and quickly respond to the needs of the changing IT market.
Konstantin Chumachenko, CEO of NGENIX:
The importance of web applications will grow for companies in all areas of the economy, which means that attacks on them will be even more massive and complex, attackers will have more opportunities to influence the business logic of systems. The Russian information security market, no doubt, will continue to actively develop, and we will continue to create intelligent solutions for cyber protection of web applications, combining expertise and automation based on scalable cloud platforms.
Alexander Skakunov, CEO of VolgaBlob:
As soon as the market, including the information security market, gets used to the current stress factors, history presents new surprises. Probably, the main ones are waiting for us at the junction of classical means of protection and artificial intelligence. Let's call it a race armed with AI. Now the Russian market is developing in many ways as closed. I would like to believe that the geopolitical situation will change, and the Russian market will feel competition from foreign information security producers who have returned to the country. This will encourage domestic manufacturers of information protection tools and make their products more efficient, and possibly cheaper. One thing I can say with confidence: we will cope.
You can download the map in high resolution using the link.
Applications for the printed version of the card can be sent to the editor@tadviser.ru address. Free delivery is carried out in Moscow to the heads of structural divisions for information security in companies and state organizations. It is also possible to purchase a card.
The new map of the Russian information security market is already the 17th TAdviser product in this series. Previously prepared:
- Market map "Digitalization of banks 2024"
- Map of the Russian IT market 2024
- Russian software and hardware systems. Manufacturers Map
- Russian Software Market Map
- Digitalization of Construction Market Map
- Map "Employee's Digital Workplace 2023"
- Map of the Russian information security market 2023
- Map of the Russian IT market 2022
- Market Map Information Technology in the Bank
- Map of the Russian information security market 2021
- Industry IT Vendor Market Map
- Russian IT Market Map 2020
- Russian IT Market Map 2019
- Information Technologies in the Bank Market Map
- Information Technology in Retail Market Map
- Map of the Russian industrial robotics market
See also
Site Control and Blocking
- Internet censorship. World experience
- Censorship (control) on the Internet. China Experience, China Computer Emergency Response Team (CERT)
- Censorship (control) on the Internet. Experience of Russia, Roskomnadzor Policy on Internet Control, GRCC
- Requests from security officials for telephone and bank data in Russia
- Runet Regulation Act
- National Internet Traffic Filtering System (NaSFIT)
- How to get around internet censorship at home and in the office: 5 easy ways
- Blocking sites in Russia
- Auditor - site blocking control system in Russia
Anonymity
- Darknet (shadow internet, DarkNet)
- VPN and privacy (anonymity, anonymizers)
- VPN - Virtual Private Networks
- SORM (System of operational-search measures)
- State System for Detection, Prevention and Elimination of Consequences of Computer Attacks (State system of detection, prevention and elimination of consequences of computer attacks)
- Yastreb M Statistika of telephone conversations
Critical infrastructure
- Digital economy of Russia
- E-Government of Russia
- Information security of the digital economy of Russia
- Protection of Russia's critical information infrastructure
- Law on Security of Critical Information Infrastructure of the Russian Federation
- Fundamentals of the state policy of the Russian Federation in the field of international information security
- Russia's Information Security Doctrine
- Russian National Security Strategy
- Agreement of the CIS countries in the fight against crimes in the field of information technology
- Autonomous Internet in Russia
- Cyber police of Russia for information security training
- National Biometric Platform (NBP)
- Unified Biometric System (UBS) of Bank Customer Data
- Biometric identification (Russian market)
- Biometrics Solutions and Projects Catalog
- Russian State Network (RSNet)
- Article:Unified Software Documentation System (SPDS).
- Government Data Transmission Network (SPDD)
- Unified Telecommunication Network of the Russian Federation
- Unified Portal of Public Services (FSIS EPGU)
- Gosoblako - State Unified Cloud Platform (GEOP)
- Gosweb Unified platform of Internet portals of state authorities
Import substitution
- Import substitution in the field of information security
- Review: Import substitution of information technology in Russia
- The main problems and obstacles to import substitution of IT in Russia
- Advantages of replacing foreign IT solutions with domestic ones
- Main risks of IT import substitution
- Import substitution of information technologies: 5 "For" and 5 "Against"
- How did IT import substitution affect the business of foreign vendors? A look from Russia
- How the launch of the register of domestic software influenced the business of Russian vendors
- What changes are taking place in the Russian IT market under the influence of import substitution
- Assessment of import substitution prospects in the public sector by market participants
Information Security and Cybercrime
- Cybercrime in the world
- NIST Requirements
- Global Cyber Security Index
- Cyber War, Cyber War of Russia and the USA, Cyber War of Russia and Great Britain, Cyber War of Russia and Ukraine
- Locked Shields (NATO Cyber Training)
- Cybercrime and cyber conflicts: Russia, Cyber military of the Russian Federation, FSB, National Coordination Centre for Computer Incidents (NCCCI), Information Security Center (CIB) FSB, Investigative Committee under the Prosecutor's Office of the Russian federation, Department of the BSTM of the Ministry of Internal Affairs of Russia, MINISTRY OF INTERNAL AFFAIRS OF THE RUSSIAN, Ministry of Defense of the Russian Federation, National Guard of the Russian Federation, FinCERT
- The number of cybercrimes in Russia, Russian hackers
- Cybercrime and cyber conflicts: Ukraine, Cyber UA30 Center, National Cyber Warfare of Ukraine
- Norwegian National Health System Data Protection Centre (HelseCERT)
- CERT NZ
- UZINFOCOM Department CERT-UZ
- Internet regulation in Kazakhstan, KZ-CERT
- Cybercrime and cyber conflicts: US, Pentagon, CIA, NSA, NSA Cybersecurity Directorate, FBI, US Cyber Command (US Cybercom), US Department of Defense, NATO, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA)
- Information Security in the United States
- How the United States spied on the production of microcircuits in the USSR
- Cybercrime and cyber conflicts: Europe, ENISA, ANSSI, Joint Cyber Unit, National Cyber Force
- EU cybersecurity strategy
- Internet regulation in EU countries
- Information security in Germany
- Information security in France
- Information security in Greece
- Information Security in Australia
- Tactical Edge Networking (Military Internet)
- Cybercrime and cyber conflicts: Israel
- Cybercrime and cyber conflicts: Iran
- Cybercrime and cyber conflicts: China
- Import substitution of information technology in China
- Cybercrime and cyber conflicts: DPRK
- Internet security
- Internet Site Security
- Software Security (SW)
- Web Application Security
- Messenger security
- Mobile Network Security Threats
- Social media security
- Cyberbullying (cyberbullying, cyberstalking)
- Information security in banks
- Information Security in Courts
- CERT-GIB Computer Emergency Response Team - Group-IB
- Bank card fraud
- Hacking ATMs
- Review: IT in Banks 2016
- Central Bank policy in the field of information protection (cybersecurity)
- Loss of organizations from cybercrime
- Bank losses from cybercrime
- IT trends in insurance (cyber insurance)
- Cyber attacks
- The number of cyber attacks in Russia and in the world
- Cyber attacks on cars
- Overview: Security of Information Systems
- Information security
- Information security in the company
- Information Security in Medicine
- Information Security in E-Commerce
- Information security in retail
- Information Security (Global Market)
- Information security (Russian market)
- Information security in Ukraine
- Information security in Belarus
- Top Trends in Information Protection
- Information Security Software (Global Market)
- Information Security Software (Russian Market)
- Pentesting (pentesting)
- Information Security - Encryption Tools
- Cryptography
- Security Incident Management - Issues and Solutions
- Authentication systems
- Personal Data Law No. 152-FZ
- Protection of personal data in the European Union and the USA
- Prices for user data in the cybercriminal market
- Bootkit
- Software and hardware vulnerabilities
- Jackpotting
- Ransomware virus (ransomware), Ramsomware, WannaCry, Petya/ExPetr/GoldenEye, CovidLock, Ragnar Locker, Ryuk, EvilQuest Ransomware for MacOS, Ransomware of Things (RoT), RegretLocker, Pay2Key, DoppelPaymer, Conti, DemonWare (ransomware virus), Maui (ransomware virus)
- Ransomware Protection: Does it exist?
- Big Brother (malware)
- MrbMiner (miner virus)
- Protection against ransomware viruses (ransomware)
- Malware (malware)
- APT - Targeted or Targeted Attacks
- TAdviser and Microsoft study: 39% of Russian SMB companies faced targeted cyber attacks
- DDoS and DeOS
- Attacks on DNS servers
- DoS attacks on content delivery networks, CDN Content Delivery Network
- How to protect yourself from a DDoS attack. TADetali
- Visual Information Protection - Visual Hacking - Peeping
- Honeypots (traps for hackers)
- Rootkit
- Fraud Detection System
- Catalog of Anti-Fraud Solutions and Projects
- How to choose an anti-fraud system for the bank? TADetali
- Security Information and Event Management (SIEM)
- SIEM Solutions and Projects Catalog
- How is the SIEM system useful and how to implement it?
- Why SIEM is needed and how to implement TADparts
- Intrusion Detection and Prevention Systems
- Local Threat Reflections (HIPS)
- Protect sensitive information from internal threats (IPCs)
- Spoofing - Cyber attack
- Phishing, Phishing in Russia, DMARC, SMTP
- Stalker Software (spyware)
- Trojan, Trojan Source (cyber attack)
- Botnet Boats, TeamTNT (botnet), Meris (botnet)
- Backdoor
- Worms Stuxnet Regin Conficker EternalBlue
- APCS Safety Market
- Flood
- Information Loss Prevention (DLP)
- Skimming (shimming)
- Spam, Email Fraud
- Social engineering
- Telephone fraud
- Sound attacks
- Warshipping (Warship cyberattack)
- Antispam software solutions
- Classic file viruses
- Antiviruses
- Information security: protective equipment
- Backup system
- Backup System (Technology)
- Backup System (Security)
- Firewalls