Developers: | IVC |
Date of the premiere of the system: | 2019/03/14 |
Technology: | VPN - Virtual Private Networks, Information Security - Authentication, Information Security - Encryption Tools |
Content |
The main articles are:
CIPF "IVK Crypto" is a Russian technologically independent software and hardware complex for organizing virtual private networks and automatic encryption/decryption of data that are transmitted between geographically distributed objects within private networks or through public networks.
2025: Compatibility with Rutoken EDS 3.0
The specialists of the companies Aktiv"" and IVC"" confirmed the successful joint work of active cryptographic USB-token Rutoken EDS 3.0 CIPF and "IVK Crypto," the means of protecting the perimeter, organizing VPN networks and enciphering automatic/decryption, information which is transmitted between geographically distributed objects. This was announced by IVK on June 9, 2025.
{{quote 'author=Pavel Anfimov said, Head of Product and Integration at Aktiv Authentication.|based on uncloned, unrecoverable secret in the form of a private key inside the token increases security and trust. The companies "Aktiv" and IVK ensured the compatibility of CIPF "IVK Crypto" and active Rutoken EDS media 3.0, which allows you to create secure VPN networks between distributed objects and provides enciphering automatic data even when transmitted through public communication channels. The key quality of such a joint solution is the use of Rutoken devices to ensure strict reliable two-factor authentication and secure VPN connections, }}
To build a truly secure corporate IT infrastructure quickly and efficiently, organizations and enterprises need hardware and software complexes that combine Russian technology independent solutions developing in the territory and jurisdiction of the Russian Federation. The creation of such complexes is one of the priority tasks of IVK and Aktiv, noted Igor Korchagin, head of the information security department of IVK JSC.
|
The compatibility of CIPF "IVK Crypto" and Rutoken EDS 3.0 will be ensured in the future, as new versions of products are released.
2020: Secure Office Employee Workplace Announcement
On June 8, 2020, IVK announced that it had developed a ready-made secure workplace for an office employee. This is a USB solution that includes software products manufactured by IVK: the Alt 8 SP certified operating system, the cryptographic information protection tool (CIPF) IVK Crypto and a set of application software for everyday work from the OS distribution. By agreement with the customer, an application software from the Unified Register of Russian Programs compatible with the Alt 8 SP OS can be additionally installed on the flash drive.
According to the company, working with a solution for remote work does not require a special qualification from the user in the field of IT. An employee, being anywhere in the world, connects a USB stick to a computer currently available - and immediately starts working like in an office. OS installation on the computer is not required, the workplace is localized on a USB drive. The IVK solution will allow government agencies and commercial organizations to transfer employees to remote work mode, providing them with their usual workplace during their absence from the office.
The user of the ICV solution can choose one of two scenarios of operation. The first scenario is to work in terminal mode. An employee gets access to their individual workplace, which is located in the organization's office on his personal computer, on server or in. A remote cloud work session is no different from working in the office. The employee has at his disposal all the usual software and necessary. data They are stored on enterprise resources and are available only during a session. The connection is implemented based on the protocols RDP, SPICE, VNC. The second scenario is to work with software installed on a USB drive. These are programs from the distribution: office suite, -, Internetbrowser client, tools email for scanning and printing documents media editors, etc. data All users are also on are stored USB media.
As part of the solution for organizing a remote workplace:
- Operating system "Alt 8 SP" for workstations. The OS has a certificate of the FSTEC of Russia for compliance with the requirements for information security established in the documents "Information Security Requirements Establishing Levels of Trust in Information Security Tools and Information Technology Security Tools" - according to Level 4 of control, "Information Security Requirements for Operating Systems" and "Protection Profile of Operating Systems of Type A of the fourth protection class. IT.OS.A4.PZ. "
- User client of cryptographic information protection means (CIPF) "IVK Crypto Subscriber." It has a certificate of the FSB of Russia for compliance with the requirements for cryptographic protection of information that does not contain information constituting a state secret, class KS2.
Protection of interactive work sessions is provided by CIPF "IVK Crypto," designed to build virtual private networks with cryptographic protection of data transmitted over open communication channels and perform firewall functions.
The IVC solution is suitable for any computer that can boot from USB. All software and user data are stored only on a flash drive and are completely isolated from the hard drives of the computer. For secure access, a user authentication procedure is provided. User settings for the operating system, application software, and network connections are saved and applied for the next session.
Emergency transfer of employees to remote work during the pandemic period turned out to be a difficult task for many government agencies, authorities, commercial organizations, banks, educational institutions. Enterprise IT infrastructures and employees themselves were not ready to deploy secure desktops on remote computers. The IVK solution will allow any organization to establish remote work of all personnel without a radical restructuring of its IT infrastructure. The solution is based on Russian software and hardware, therefore it ensures the implementation of the technological independence program. told Grigory Sizonenko, CEO of IVK Group of Companies |
2019: Inclusion in the Unified Register of Russian Programs
On March 14, 2019, IVK announced the expansion of the line of system-forming products presented in the Unified Register of Russian Programs for Electronic Computers and Databases. Now a means of cryptographic information protection (CIPF) "IVK Crypto" has been added to them.
By order Ministry of Digital Development, Communications and Mass Media Russia of 22.02.2019 No. 63, CIPI "IVK Crypto" was assigned registration number 5159 in the Unified Register of Russian Programs in the category "Collateral information security."
In accordance with the certificate of the FSB of Russia, the scope of CIPF "IVK Crypto" includes information that does not contain information constituting a state secret. Cryptographic data protection is performed by their encryption method in accordance with GOST 28147-89.
IVK Crypto is successfully used in government bodies, in law enforcement agencies, as well as in large business, which forms the basis of critical sectors of the Russian economy.
author '= Grigory Sizonenko, CEO of IVK ' It is these organizations that are the locomotives of the processes of building a digital infrastructure based on domestic technologies. The inclusion of CIPF "IVK Crypto" in the register will allow our customers to comply with the requirements of the regulatory framework for the purchase of software and create geographically distributed information systems with high requirements for security and complexity of information processing. |
CIPF "IVK Crypto" can be purchased as part of a comprehensive software and hardware platform for protecting information by cryptographic methods in virtual private networks.
The software part of this platform is formed by software previously included in the unified register of Russian programs.
CIPF "IVK Crypto" is supplied in various hardware configurations, which allows each organization to choose the optimal solution taking into account the amount of transmitted data to be protected and the topology of the automated information system.