| Developers: | SKB Kontur |
| Last Release Date: | 2026/01/27 |
| Branches: | Information security |
| Technology: | VPN - Virtual Private Networks, Information Security - Authentication, PAM Privileged Access Management |
Content |
Contour. Aegis is a set of information security services to protect businesses from internal threats.
2026
Failover version with three-node cluster
SKB Kontur presented updates to the service for controlling privileged PAM users from Kontur. Guides. The changes help users ensure the stable operation of the service and control inputs using different protocols. The company announced this on January 27, 2026.
The main update is the fault-tolerant version. PAM provides uninterrupted services even if the primary server is unavailable due to failures or congestion. This is important for companies where any shutdown of the information system can lead to financial losses or a slowdown in business processes.
The failover version of PAM uses a cluster of three nodes (devices), each of which is ready for request processing. The system operates in active/active mode: any request can be directed to any of the three nodes, and the result of its processing is synchronously transmitted to all cluster members (devices). This ensures complete data consistency and service continuity even if one or more nodes fail.
This architecture ensures high availability of PAM services, minimizes downtime and eliminates data loss in case of failures.
Шаблон:Quote 'author=said Ivan Khaustov, head of the product group of Kontur.Aegis and Staffcop.
2025
Cost of ownership in information security: how to choose a solution with minimal costs
When it comes to buying an information security solution, the first thing you often think about is the number in the bill. The cost of a license or equipment seems to be the main criterion for choice: after all, the cheaper - the more profitable. But in reality, such logic is deceptive. Real expenses appear later - when the system needs to be implemented, maintained, adapted to business processes and trained employees. Experts from the Kontur product group. The guides will help you figure out how to correctly assess the cost of ownership and choose a solution that will save resources rather than consume them. Read more here.
5 invisible expenses for information security solution
The price in the commercial offer is only the beginning of the history of expenses for the information security solution. After signing the contract, non-obvious expenses await you, which are rarely discussed at the sale stage. Experts of the product group Kontur. The guide will talk about five options for hidden spending on information security and tell you how to protect not only the infrastructure, but also the company's budget from unpleasant surprises. Read more here.
Information security solution: what makes up the cost
When a company chooses an information security solution, one of the main issues, as a rule, is the cost of the license. This is logical - the figure in the bill seems to be the most obvious and tangible part of the expenses. But if you look more closely, it turns out: the license payment is just the tip of the iceberg. This is especially noticeable across the industry: the annual budget of one Russian company for information security in 2025 exceeded 294 million rubles on average. And the total volume of the Russian information security market in 2025 will reach 369 billion rubles, which is 48.5% more than in 2023 (248.5 billion rubles).
The cost of licenses for Contour services. Aegis depends on the number of users and the period for which the subscription is issued. Regular updates and support are included in the subscription, which minimizes additional maintenance costs. The intuitive service interface allows employees to quickly adapt and reduces the burden on IT and information security specialists. Read more here.
