Content |
Owners
History
2026: Building a Company
On February 20, 2026, it became known that PSB created the Tekhpromsoft company, which will specialize in solutions in the field of information security (information security). The new structure has entered into an agreement with Astra Consulting LLC (part of Astra Group) to form an integrated ecosystem of information security services. At the same time, the parties call their key task the creation of joint solutions that will cover the most important aspects of infrastructure protection.
Partners intend to develop specialized platforms and services based on domestic technologies. The structure of the future ecosystem will include information security management centers that allow "to conduct comprehensive monitoring of cyber threats and promptly respond to incidents on the scale of the distributed landscape."
Among the priority areas of work are the formation of trusted software and hardware systems (PAC) for a secure IT environment, as well as the creation of communication systems that ensure confidentiality and protection of interaction. We are talking about corporate email services and other means of exchanging information both within the organization itself and with its counterparties. Techpromsoft and Astra Consulting will pay special attention to meeting the requirements of regulators and architecture resiliency. Partners will focus on developing various information security tools and full-cycle services: threat detection and neutralization systems, control and automation of specialized processes, including incident investigation.
The goal of the collaboration is to offer the market a set of robust defenses at all levels, from detection and prevention of attacks to rapid response and recovery of health. Within the framework of the partnership, Astra Consulting will provide technological expertise and resources for developing solutions, while Tekhpromsoft will provide requirements for functionality, real-world testing capabilities and access to industry information security standards.[1]
Notes
| | The site content is translated by machine translation software powered by PROMT. The machine-translated articles are not always perfect and may contain errors in vocabulary, syntax or grammar. Read original article If you find inaccuracies or errors in the results of machine translation, please write to editor@tadviser.ru. We will make every effort to correct them as soon as possible. |

