Customers: Kuban Credit Krasnodar; Financial services, investments and audit Contractors: Leta IT-company Product: StoneGate IPSProject date: 2010/11
|
Announced Leta IT-company project completion on creation of an intrusion prevention system in CB Kuban Credit. As a technical basis of IT solution products of StoneSoft corporation, developer of products in the field of network security and business continuity, says Leta IT-company are used. The implemented system already is in commercial operation.
As noted, in the work the Kuban Credit bank widely applies modern information technologies, implements new highly effective IT solutions and, in particular, on-line products. "Kuban the Credit" stands the information security policy according to requirements of the industry standard of service station of BR IBBS-1.0-2010. Within implementation of requirements of this standard of Bank of Russia the large-scale project on creation of the end-to-end system reducing the risks of direct and consequential financial loss entering model of threats of information security was started. Creation of the cybersecurity solution on an intrusion prevention from the Internet in computer systems of bank became an important part of this end-to-end system. This solution had to reveal, register, trace and block harmful activity of network traffic, noted in Leta.
The contractor on this project it was selected by Leta IT-company. The choice as a technical basis of this project of the product StoneGate IPS was caused by a full integration of a product with the existing infrastructure and also an opportunity to carry out implementation to a short time, explained in Leta. Along with high technical characteristics, feature of StoneGate IPS existence of the FSTEC certificate of Russia No. 2163 is of 8/31/2010.
System implementation passed on the typified scheme repeatedly approved by Leta company in projects on implementation of the different IB technical means. At the first stage specialists of Leta IT-company carried out the analysis of network, activity in the field of IT and cybersecurity and also the existing documents of bank. The next stage was devoted to joint formation of technical specifications on an intrusion prevention system. Further system implementation was carried out. At a final, fourth stage a system passed the test program and was transferred to an operating mode.