Developers: | IBS |
Date of the premiere of the system: | 2024/10/22 |
Branches: | Information security |
Technology: | Information Security - Authentication, Information Security - Information Leakage Prevention, Information Security - Fraud Detection System (Fraud) |
The main articles are:
2024: SoD PC Introduction
IBS has developed a software package to block unauthorized access to information systems based on an analysis of a conflict of authority - PC SoD, which is a product of cybersecurity and is already registered in Rospatent. The developer announced this on October 22, 2024.
IBS's SoD PC automates authority conflict control procedures in information systems, identifies and blocks potential SoD conflicts, including unauthorized access attempts by bypassing authority control systems.
For October 2024, the system allows you to automate:
- management of SoD conflicts in applications for access and creation or changes, when migrating information systems;
- analysis and identification of SoD conflicts in the existing roles and powers of users in information systems, including within the framework of blocking unauthorized access;
- operational reporting on SoD conflicts;
- control of compliance with authority in information systems with official and functional duties.
The use of the system from IBS guarantees effective management of the separation of powers in order to prevent unauthorized access and fraudulent actions, reduce the frequency of internal cyber incidents of abuse of powers and access rights to information systems, and reduce risks of information and economic security.
The product we developed solves one of the key problems of large companies, in which incorrectly configured access rights and powers of employees can lead to significant financial or reputational losses. For example, the SoD PC allows you to identify unnecessary or critical permissions in terms of access to personal data in the HR block for blocking purposes or to detail the control of user access to information under the "Confidential" or "Business Use" labels. Not only information security experts took part in the development of the system, but also specialists in economic security, internal control, audit, etc. This made it possible to implement all the functionality necessary to prevent information and economic threats that are usually caused by incorrectly configured rights and access, "said Oleg Bosenko IBS, director of the cybersecurity department. |