Developers: | Atlas of STC of federal state unitary enterprise |
Last Release Date: | 2019/06/19 |
Branches: | Government and social institutions |
Technology: | Cybersecurity - Authentication, cybersecurity - Information loss preventions, cybersecurity - Information management and events in a security system (SIEM) |
2019: Development of the second version of a HSS of Torahs
Avtomatika concern State corporations Rostec started development of the second version of the hardware and software system intended for detection network computer attacks on components information system – Torahs. The release of upgraded version of the version is expected in the fall of 2019. On June 19, 2019 reported about it in Avtomatika Concern.
Need for product update of Federal State Unitary Enterprise STC Atlas arose in connection with emergence of new calls in the field of data protection. Development of technologies leads to increase in intensity of the computer attacks. For prevention of threats of cyber security the Concern updates a product of Torahs.
According to the developer, the HSS of Torahs is applied to information security support of computer networks. The product is held for use in automated information systems of the state bodies and other organizations of the Russian Federation processing the data making confidential information. The complex of Torahs allows to reveal suspicious actions which can do harm to the most critical components of an information system — to operating systems and applications which implement network services of an information system.
Function of Torahs consists in automatic identification of impacts on automated information system controlled by it which can be classified as the network computer attacks and also for monitoring of observance of security policy of internal network.
As noted in Avtomatika Concern, distinctive feature of a HSS of Torahs is implementation of functions of monitoring of observance of security policy of internal network of an information system that provides its effective application for corporate information systems. The HSS of Torahs is built in an information network and becomes a part of an end-to-end system of its information security. Management of a HSS of Torahs and also its monitoring are performed from the management console or far off from the uniform center of security of the distributed information system.