Quote
Work of many companies is inconceivable without electronic accounting and document flow, ERP, CRM and other information systems. But mass transfer of business processes to a digital format can turn back risk of loss of integrity and confidentiality of data. Therefore implementation of information systems stimulates demand for solutions cybersecurity.
Not the last role in the course of increase in demand is played also by development of the legislation. The most striking example — FZ-152 "About personal data protection" which affected practically all companies in all branches of the economy.
The Ural enterprises are in most cases equipped with "IB gentlemen's set": the firewall on network edge and anti-virus software at workstations and servers. However modern threats require more end-to-end and modern systems of protection.
The difference in approach to cybersecurity between small, medium-sized and large enterprises, undoubtedly, exists. For example, the companies of the SMB-sector aim to use class UTM devices (in one device the IB most different functions - the firewall, an intrusion detection and prevention system, a network antivirus, web filtering and others are combined). More powerful systems of protection implemented in the form of separate subsystems are required for the large enterprises. But the format of creation of an information security system depends not only and not just on the size of the enterprise.