RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Solar SafeInspect

Product
Developers: Solar
Last Release Date: 2025/02/05
Technology: Information Security - Authentication,  PAM Privileged Access Management

Content

2026: Integration with TrafficSoft ADC

On February 5, 2026, Solar Group announced a technological partnership with TrafficSoft, a developer of solutions for network load balancing. Customers can use Solar SafeInspect's PAM system for privileged access management in conjunction with the domestic TrafficSoft ADC load balancer to build a fault-tolerant and scalable infrastructure. A comprehensive project based on two solutions will be especially in demand in telecommunications, e-commerce and the financial sector.

Large companies with a branch structure throughout the country and the world need to protect the entire infrastructure, distinguish access and uninterrupted operation of digital services and devices. As a rule, such organizations turn to contractors who are delegated part of the tasks to achieve business goals. According to Solar experts, in nine months almost a third of infrastructure penetrations occurred through contractors.

Thanks to the implementation of the Solar PAM system, large companies can build comprehensive protection of contractor accounts and privileged users and scale this practice to branch structures. It will be possible to ensure the uninterrupted operation of Solar SafeInspect in all branches and distribute the load on the network using the TrafficSoft ADC load balancer. Thus, clients gain protection of the entire infrastructure and centralized control of access to data centers, servers or individual file storage, even if there is a peak load on the network.

{{quote 'TrafficSoft's technology partnership with Solar Group is a combination of strong the Russian solutions. Our task is to give customers the opportunity to build a scalable infrastructure based on domestic technologies, without compromises in performance, fault tolerance and ease of use. The opportunity to replace both foreign open source ON and critical segments of the infrastructure, - said Ruslan Dobrynin, director of partner relations at TrafficSoft. }}

File:Aquote1.png
In 2025, 27% of cyber attacks go through contractors, and they will continue in 2026. Ensuring the safety and stability of work in the infrastructure is one of the key tasks of information security specialists. Now customers can import substitute foreign load balancers for the domestic one - TrafficSoft ADC and use it together with the Solar PAM system to increase the stability and resiliency of the protection of privileged users on dedicated networks, - said Anton Shcherbich, head of the support group for access control products of the Solar Group of Companies.
File:Aquote2.png

The first stage of the partnership was the confirmation of compatibility and integration of Solar SafeInspect and TrafficSoft ADC solutions. In the future, the companies plan to integrate the TrafficSoft balancer with other products of the Solar ecosystem.

2025

Integration with Red ADM

GC Solar"," an architect of complex, cyber security consistently improves the user experience of customers based on its products and services. The Company is bringing to a new stage the development of a customer-centric strategy, developing both its own personal account for customers and partners, and compatibility with partner platforms for centralized technology management. INFORMATION SECURITY Solar announced this on December 4, 2024. Vendors have implemented integration centralized management solutions IT infrastructure Ed ADM with the Solar product ecosystem, including Solar SafeInspect. More here.

MFASoft Secure Authentication Server Compatibility

Solar Group is expanding the pool of partners in the field of privileged account management. The company has confirmed the technological compatibility of the Solar SafeInspect PAM platform with the multifactor authentication software MFASOFT Secure Authentication Server (SAS). About this "Solar" reported on October 8, 2025.

According to industry estimates of the PAM systems market, most often such solutions are used for managing access rights and passwords (36%). Then - to monitor and record the actions of administrators (29%) and control the actions and labor costs of external contractors (12%). Solar experts note that the main challenge in controlling access to privileged accounts is the implementation and application of a uniform security policy to all accounts. For example, if employees and contractors in different branches use different two-factor authentication (2FA) systems, then a "patchwork" protection is formed in this way, which complicates access control and increases business risks.

Given the different use cases of the technology, there is a growing demand for versatile solutions that allow you to flexibly manage accounts with different ways authentications in one-stop shop mode. Solar experts also note several options where a comprehensive proposal based on two solutions can be applied. The PAM system allows you not only to monitor the work of administrators, but also to track the actions of attackers and collect retrospective data for investigation. cyber attacks Also in demand is an investigation into the facts of corporate fraud by contractors who may abuse their powers, overestimate the scope of work or, as in separate cases from the practice of Solar clients, demand compensation for the restoration IT of systems that were deliberately damaged.

File:Aquote1.png
The application of a solution for controlling privileged users in conjunction with the implementation of the multifactor authentication mechanism is not just good practice, but is critical for the security of a modern organization. Privileged accounts are key infrastructure entities whose compromise can lead to business loss, "said Mikhail Rozhnov, Technical Director of MFASOFT.
File:Aquote2.png

The sharing of MFASOFT Secure Authentication Server (SAS) and Solar SafeInspect PAM platform enables a comprehensive approach to protecting privileged accounts. The multi-tier multi-tenant architecture of MFASOFT can define stand-alone virtual servers authentication in one solution instance. In addition, it distributes users and tokens between them according to geographical, functional, organizational, role principles. By automating typical tasks: establishing users, assigning and recalling tokens, transferring tasks to the side of users - the company reduces the total cost of ownership of the system (TCO).

The user's connection to corporate resources goes through Solar SafeInspect, where the Solar PAM system sends a request to MFASOFT SAS. Next, the solution uses an additional authentication factor depending on the settings. The user can confirm his identity by entering a one-time password that is sent to him by corporate mail or mobile device, or otherwise. Solar SafeInspect prompts the user to enter the password sent to him, after which a check is made: the one-time password sent to the user and the one-time password entered by him or not match. After successful verification, the user can start working with a protected resource.

File:Aquote1.png
Thanks to the compatibility with MFASOFT Secure Authentication Server, our PAM platform can be flexibly integrated into the client infrastructure, which uses several two-factor authentication systems for branch office employees and access management, as well as manage contractor access. As a result, the business receives an adaptive solution to control access to privileged users, which prevents unauthorized intrusion into the infrastructure and saves time and money in investigating the incident, "explained Dmitry Orlenok, lead business development manager at Solar SafeInspect of Solar Group.
File:Aquote2.png

Multifactor Integration

MULTIFACTOR and Solar Group have confirmed the integration of their solutions to protect privileged accounts. Solar SafeInspect PAM together with MULTIFACTOR will ensure the security of vital data and critical IT resources of Russian customers. Multifactor announced this on August 19, 2025. Read more here.

2024

Inclusion in the "Bank of Technologies" of Moscow

In 2024, the Moscow Department of Investment and Industrial Policy included the Solar SafeConnect solution in the technology portfolio for the capital's business and public sector. Solar announced this on January 21, 2025. Read more here.

Compatibility with Aladdin 2FA

Solar Group and Aladdin R.D. have completed a project to implement technological compatibility of the Solar SafeInspect PAM system, the Solar SafeConnect web portal with the Aladdin 2FA two-factor authentication software. Solar announced this on November 27, 2024. Read more here.

Certificate of FSTEC of Russia for compliance with the requirements of the fourth level of trust and technical conditions

The Solar SafeInspect privileged access management system has confirmed compliance with the requirements for the fourth level of trust and the technical specifications of the FSTEC of Russia. The document officially testifies that the Solar SafeInspect software package can be used to protect against unauthorized access to information that does not contain information constituting a state secret. Solar (formerly Rostelecom-Solar) announced this on June 19, 2024.

The fourth level of trust of FSTEC Russia demonstrates that the solution can be used to protect significant objects (critical information infrastructure ZO), CUES state information systems (GIS) and automated process control systems (), APCS as well as to protect information systems (ISDS personal data).

File:Aquote1.png
The FSTEC certificate of the fourth level of trust confirms the security of the Solar SafeInspect PAM system at the state level, providing our clients with the opportunity to use this solution to protect and control the access of employees and contractors with increased privileges to the information and infrastructure of the organization, "said Dmitry Orlenok, Business Development Manager Solar SafeInspect Solar Group. - Privileged users work with data of a higher degree of confidentiality, operating with information protection tools, network infrastructure and code. The risks of unauthorized access to the accounts of the database operator or system administrator will be significantly higher than of hacking the accounts of the accountant or sales manager. Solar SafeInspect will now help even more companies identify and respond quickly to threats in the early stages before attackers have time to cause irreparable damage.
File:Aquote2.png

Solar SafeInspect 2.4.4 with improved in-system capabilities

Solar Group released an updated version of the Solar SafeInspect 2.4.4 privileged access management system on March 27, 2024. Updates enhance the functionality of the product and improve its effectiveness by improving the customer experience.

Solar Group introduced Solar SafeInspect to the market in March 2023 as a fully functional PAM platform for effective management of privileged accounts and sessions in information systems. The key advantages of the product are fast and flexible installation, the ability to integrate in transparent modes and a reliable system for storing recorded data.

The current functionality of the product closes the main tasks of customers in the field of access control for employees and contractors with increased privileges to information and infrastructure of the organization.

In addition to technical improvements, the updated release pays special attention to the development of user experience - improved capabilities of working within the system, optimized methods of storing information, added useful functions. These enhancements not only provide an uninterrupted and secure user experience, but also provide users with advanced functionality to optimize privileged access management processes.

Now, with the ability to limit working hours for privileged users and maintain work schedules, companies can improve compliance with organization policies. Advanced settings for creating an administrator account provide more options, including fields for specifying: position, shift time, account status, and others, which not only simplifies account management, but also increases security measures.

This version significantly improves the operation of the internal video module, which is used in the solution for recording actions performed on monitored devices - accelerated video generation, reduced video size file and improved image quality.

Thanks to the redesigned RDP audit logic, users can note the increased session recording speed and improved image quality. Enabling Remote Program Management simplifies process and application management during RDP sessions, improving performance and convenience. In addition, the updated version improves support for the PowerShell TLS protocol, user mapping mode for advanced access control, and the ability to view XML data directly from the connection page.

In order to simplify navigation and improve efficiency, the updated version has improved the web interface of the system and updated the sections. Improvements are aimed at ensuring that administrators interact more intuitively and efficiently with Solar SafeInspect.

To increase the informativeness of the event logs of the system operation, all stored in information the logging process data is now provided in an extended format. In addition, settings passwords for local users and administrators have been enhanced, and password policy sections have been updated. Advanced administrator action notification settings have been added to the Alerts section, which allows you to conveniently configure notifications about events such as adding, modifying, and deleting users.

Several technological improvements have been made to improve security measures and overall system performance, including completing the transition to Python3, including for working with the API, introducing a requirement for checking the collector name, replacing cryptographic libraries for RDP connections using TLS 1.2.

2022: Inclusion in Rostelecom-Solar product portfolio

As representatives of the Solar Group of Companies clarified to TAdviser, Solar SafeInspect appeared in the Rostelecom-Solar product portfolio as a result of the acquisition in December 2022 of 100% of the assets of NTB LLC.

2016

RuSIEM + SafeInspect=Remote Access Incident and Anomaly Management Tool

The company New security technologies"" (NTB), a Russian developer software for improving the security of information systems and critical management, and IT infrastructure the company LLC "" RUSIEM- announced in the summer of 2016 the creation of a tool for managing incidents information security and anomalies of remote access to critical information systems of organizations. This tool is a merger of two software products: the SafeInspect Privileged User Control System (NTB) and the RuSIEM Event Analysis System.

Integration of systems allows you to compare specific persons and processes that proceed with a high level of privilege when analyzing emerging security incidents. In particular, in real time, monitor operations on managing servers, equipment, technological processes, specialized software, authentication methods and formal access rights according to information security policies, as well as identify attempts to unauthorized access and use by exploiting vulnerabilities.

Value of integration:

  • Information about privileged users and management of their credentials,
  • Personalization of credentials for non-personalized accounts,
  • Identify unusual activity and make adjustments to block and prevent information security incidents.

The solution has the best features of two advanced Russian products. SIEM provides real-time analysis of security events from network devices and applications. SafeInspect technologies provide full visual control over operations using privileged accounts.

File:RuSIEM+SafeInspect=Инструмент для управления инцидентами ИБ и аномалиями удаленного доступа.jpg

Benefits of an integration solution:

  • Convenient information security management process in the company:
  • all information security incidents fall into a single SIEM console;
  • Compare events from SafeInspect with events from other systems that transmit information to the SIEM system for comprehensive situation analysis and prompt identification of real incidents.
  • significant simplification of the incident investigation process.
  • Prevention of possible internal threats:
  • identification of collusion between employees of the company;
  • comparing the actions of external intruders with the actions of employees within the organization, identifying collusion, accomplices and the circle of persons involved;
  • control of actions of employees with administrative rights;
  • control of actions through system accounts
  • Rapid response to information security incidents:
  • alerting the security officer to possible incidents using privileged accounts.

File:RuSIEM+SafeInspect=Инструмент для управления инцидентами ИБ и аномалиями удаленного доступа 02.jpg

SafeInspect version 1.3.2

SafeInspect is a protective barrier for super users, allows you to record all their actions for subsequent viewing in order to determine the cause of the incident. In addition, this solution helps to comply with the requirements of IT security standards, such as PCI DSS, SOX, Basel II, Bank of Russia, FSTEC of Russia, etc.

New features of SafeInspect 1.3.2:

1. Working with LDAP has been improved. Algorithms of operation have been changed and nested user groups in different combinations are now supported;

2. The HTTP algorithms have been changed:

  • the ability to combine HTTP (S) requests and responses into logical groups,
  • the ability to view files and images uploaded in audited sessions using HTTP (S) protocols,
  • Display HTML snapshots of pages visited by the user, including input content in input forms.

3. Standard support for the type of network adapter VMXNET3 on VMware ESXi;

4. Support for Common Event Format (CEF) to improve SIEM compatibility;

5. Improved TCP audit stability;

6. Fixed errors identified during the operation of the previous version.

SafeInspect version 1.3

New Security Technologies LLC (NTB), a Russian manufacturer of software for improving the security of information systems and managing critical IT infrastructure, announced in February 2016 the release of version 1.3 of the SafeInspect privileged user control system.

Version 1.3 will allow users to provide not only full control over access to privileged accounts, but also comprehensive monitoring of user activity with the ability to view performed operations in video mode, text search by events and keywords.

New SafeInspect features:

  • Improved support for HTTP (s);
  • Increased speed with video in SSH and RDP sessions;
  • Improved support with external SIEM systems, added support for the CEF log format;
  • Added support for Device CAL (device-based Client Access Licensing);
  • Fixed errors identified during the operation of the previous version.

"Today, control over the actions of privileged users is a mandatory requirement of various standards and regulatory bodies," says Mikhail Romanov, Director of Business Development at NTB. - "SafeInspect allows our customers to answer perennial questions about who, when and how they actually did, and to provide the necessary data to report to auditors."

2015: About SafeInspect

System administrators in most companies have virtually unlimited access to the systems they are responsible for managing. Critical to incident investigation are the ability to monitor the actions of administrators who have access to servers, telecommunications equipment, and other elements of the IT infrastructure. In addition, there is a need to also control other users with privileged rights, many of whom can be employees of partners, outsourcers, employees who have received extended rights for a short time, etc.

According to 2015 information, SafeInspect is a domestic solution that allows you to control the actions of employees with the rights of privileged users of various levels. The developer of the SafeInspect solution is New Security Technologies. Monitoring the actions of privileged users in real time in SSH and RDP sessions, the ability to search for executable commands, force interruptions of sessions, control authentication and the ability to identify the user using a single end account are only part of the functionality of SafeInspect solutions that allow you to calculate and eliminate information threats to business. SafeInspect can be integrated with various information security tools such as DLP, SIEM, IPS, IDM, allowing you to increase the efficiency of both your work and the work of other subsystems.