SlideShare a Scribd company logo
1 of 41
Список субъектов рынка защиты информации Украины
Ver: 1.0 2010-08-15

Разработка и поддержка:
Ukrainian Information Security Group
Постоянный адрес таблицы
Контакт
Телефон
Описание полей
Name - узнаваемое название организации
Site - веб-ресурс организации
Главное направление - основне направление в бизнесе ИБ
Integrator - внедрение программных и аппаратных средств защиты
информации
Consulting - внедрение процессов системы управления защитой
информации
Distributor - дистрибъюция программных и аппаратных средств
Education - образовательное учреждение
Vendor - представительство производителя на территории Украины
Government - государственное учреждение
NGO - негосудраственная организация
Media - средства масс-медиа




Name
Бизнесс и Безопасность (журнал)
Государственный центр информационной безопасности
Днепр Техноцентр
Робоча группа ИНАУ по противодействию кибер преступности
Active audit agency
AG "BOGDAN"
Alladin Ukraine
AMI
Art Master
ASBIS
AT Vintage
ATLAS
ATMNIS
AXOFT
AZIS
Bakotech
Bartek
Beta-security
BIFIT
BMS consulting
Brainkeeper
Chamber of commerce in Ukraine (IT Comitet)
Cbit
Center
CERT-UA
Cherry group
Cisco
Comsec Consulting (Afenida)
Crime-research
Data expert
Delloite
Digital Security
DPA
Dr.WEB
DSTSZI
Ecomtech
EPOS
ERC
Ernst & Young
ESET
Evraas IT
FlexIt
Focus Integra
Glaive Security Group
GrantThorton
Headtechnology
HP
I-klass
IBM
Incom
Infobezpeka
Infopulse
Integrity systems
iPro Ukraine
ISACA
iSight
ISSP
IT Business solutions
ITC
IT Partner (Журнал)
IT stream consulting
I-Teko
InfoSecSolution
Itera consulting group Ukraine
ITLand
I.T. Pro
ITSEC
ITT-Consulting
Jet Infosystems
Kaitek (Artem Karpiniskiy)
KOTS
Kudin Security Group Ltd
Lanit LV
MCFER Consulting
Microsoft
MUK
MONT
MVS Cybercrime Unit
National Aviation University
NETBOX
NetSPI
Nexum IT
NICS
NT
NVision group
PC-Ware
Physical-technical institute (NTUU "KPI")
Priocom
ProNet
PWC
RDM
ReachManagement
RGData
RIIM2000
RRC
S&T
Servus system integration
SIBIS
SITRONICS Information Technologies
SETERE
SHALB
SmartNet
Softline
Softline international
Softprom
Software Business Solutions
SRC Security Research & Consulting
SST
Svit-IT
Supportio
Sysnet
System Integration Service
Telco
Techexpert
Trustwave
TUEV-NORD
UISG
ULYS
USS
UTKC
YUG
VERNA
Zillya
http://uisg.org.ua
http://tinyurl.com/29k7q79
gpaharenko@gmail.com
'+380503116172




Site
http://www.bsm.com.ua
http://ukrscis.com
http://www.dtcenter.com.ua
http://inau.org.ua/cybercrime.phtml
http://www.auditagency.com.ua/
http://ag.bogdan.ua
http://www.ealaddin.com.ua/
http://www.ami.ua
http://www.am-soft.ua
http://www.asbis.ua
http://www.at-vintage.com.u
http://www.atlas.kiev.ua
http://www.atmnis.com/
http://www.axoft.ua
http://www.bezpeka.org
http://www.bakotech.ua/
http://www.bartec.kiev.ua/
http://www.betta-security.com.u
http://www.bifit.com.ua
http://www.bms-consulting.com/
http://www.brainkeeper.com.ua
http://www.chamber.ua/committee/1
http://www.cbit.com.ua
http://center.ua
http://www.cert.gov.ua
http://www.thecherrygroup.co.uk
http://www.cisco.com/web/UA/index.html
http://www.comsecglobal.com, http://www.afenidasecit.com
http://www.crime-research.org/
http://www.dataexpert.com.ua
http://www.deloitte.com
http://dsec.ru
http://dpa.lv
http://www.drweb.com.ua
http://www.dstszi.gov.ua
http://www.ekomtech.kiev.ua
http://www.epos.ua
http://www.erc.ua/
http://www.ey.com/ua
http://www.eset.ua
http://www.evraasit.ru/
http://flexit.com.ua
 http://focus-integra.com.ua
http://g-sg.net
http://gtukraine.com
http://www.headtechnology.com.ua/
http://www.hp.com
http://www.i-klass.com
http://www.ibm.com
http://www.incom.ua
http://www.infobezpeka.com/
http://www.infopulse.com.ua
http://www.integritysys.com.ua
http://www.ipro.lv
http://www.isaca.kiev.ua
http://www.isightpartners.com/
http://www.issp.ua
http://itbiz.com.ua
http://www.itcsecurity.com/
http://sibis.com.ua/contents/article/index/section/160/article/103
http://itstream.net
http://www.i-teco.ru
http://www.searchinform.ru
http://www.iteraconsulting.com
http://www.itland.com.ua
http://www.itpro.ua/
http://itsec.com.ua/
https://www.itt-consulting.com/
http://www.jet.ua/
kaitek-security.com (under development)
http://www.kots.kiev.ua/
https://kudinsecurity.com/
http://www.lanit-iv.com/
http://www.mcfr-consulting.ru/en/
http://microsoft.com
http://www.muk.ua
http://mont.kiev.ua
http://cybercrime.gov.ua
http://www.nau.edu.ua
http://netbox.net.ua
http://netspi.com
http://www.nexum-it.com
http://www.nics.com.ua/
http://www.nt.ua
http://nvisiongroup.ru/
http://www.pc-ware.com/pcw/ua/ua/main.htm
http://pti.kpi.ua
http://priocom.com
http://www.pronet.ua
http://www.pwc.com/ua/uk/index.jhtml
http://www.rdm.kiev.ua
http://www.reachmanagement.co.uk/
http://www.rgdata.com.ua
http://www.rim2000.com
http://www.rrc.com.ua
http://www.snt.ua
http://www.ssi.com.ua/
http://sibis.com.ua
http://it.sitronics.com/ukr/about/contacts/ukraine/
http://www.setere.com/
http://shalb.com/en/
http://smartnet.in.ua
http://www.softline.kiev.ua
http://softline.ua
http://softprom.ua/
http://sbs.com.ua/
http://www.src-gmbh.de/en/index.html
http://sst.kiev.ua
http://www.svit-it.com.ua
http://supportio.net.ua
http://www.sysnetglobalsolutions.com/en/home.aspx
http://www.sis.com.ua
http://www.telco.ua
http://techexpert.ua
https://www.trustwave.com
http://www.tuev-nord.com.ua/
http://uisg.org.ua
http://www.ulyssys.com/
http://www.uss.gov.ua
http://www.uktc.com.ua
http://yug.com.ua
http://verna.com.ua/
http://www.zillya.ua
Главное направление   Альтернативное направление
Media
Integrator
Integrator
NGO
Consulting
Integrator
Vendor
Integrator
Integrator
Distributor
Integrator
Integrator
Vendor                Integrator
Distributor
NGO
Distributor
Integrator
Integrator            Consulting
Vendor                Integrator
Integrator            Consulting
Integrator
NGO
Distributor
Integrator
Government
Consulting
Vendor
Consulting
NGO
Integrator    Consutlint
Consulting
Consulting
Integrator
Vendor
Government
Integrator
Integrator    Data Recovery
Distributor
Consulting
Vendor
Integrator
Consulting
Integrator
Consulting
Consulting
Distributor
Vendor
Education
Vendor
Integrator    Consulting
Integrator
Consulting
Ing
Integrator
NGO
Consulting
Integrator
Integrator
Consulting
Media
Integrator
Integrator
Vendor
Integrator
Integrator
Integrator
Consulting
Consulting
Integrator
Consulting
Integrator
Consulting
Integrator
Integrator
Vendor
Distributor
Distributor
Government
Education
Integrator
Consulting
Integrator
NGO             НД ТЗИ
Education
Integrator
Integrator
Education       Consulting
Integrator
Integrator
Consulting
Data recovery
Consulting
Integrator
Integrator
Distributor
Integrator
Integrator
Integrator
Integrator
Vendor
Consulting
Integrator
Integrator
Integrator
Distributor
Integrator
Consulting
Integrator
Integrator
Integrator
Consulting
Integrator
Distributor
Integrator
Integrator
Education
NGO
Integrator
Integrator
Consulting
Integrator
Integrator
Vendor
Краткое описание                                                     Вендоры:




Создание комплексных систем защиты информации (КСЗИ); Разработка и
внедрение национальной операционной системы (ОС) BBOS; Системная
интеграция
Cisco   Checkpoint   Juniper      Qualys     Fortinet




        Bronze




                     ESP Select,
                     SPI Select,
                     Firewall/IPSec
        Golden       VPN, Routing, VAS,PCI   Silver
                     Switching



        Bronze
Advanced
Security   Bronze




           Bronze
Distributor




Advanced            ESP Elite,
Security            Routing
           Silver




                                        Silver
                    ESP Select,
Advanced            Routing,
Security   Bronze   Switching


Advanced
Security




           Silver                 VAS   Silver




           Bronze
Advanced
Security
Microsoft               PCI-DSS ASV   PCI-DSS QSA   Arcsight




Identity and Security




                        PCI ASV       PCI QSA




Identity and Security
PCI QSA




                                  PCI QSA
Identity and Security



Identity and Security




                                  PCI QSA




Identity and Security   PCI ASV   PCI QSA



Identity and Security




                                            Reseller




Identity and Security

Identity and Security



Identity and Security   PCI ASV   PCI QSA
Identity and Security




Identity and Security



                        PCI QSA
Identity and Security



Identity and Security




Identity and Security



Identity and Security             Reseller

Identity and Security




Identity and Security




                                  Reseller
Identity and Security
                        PCI QSA




                        PCI QSA



Identity and Security
Identity and Security
Alladin   Astaro   Websense




2*
Platinum (web sec; data sec)




Gold (web sec; data sec)
1*




                Gold (web sec; data sec)




     Reseller
                Distributor




4*
ISO 27001
Lumension                     Max Patrol    certificator




                              Distributor



Associate solution provider



Associate solution provider
27001 certificator




Distributor
Partner
PGP          Bluecoat   Dr.Web               Radware




PGP Bronze




PGP Bronze   Partner

                                             Reseller




                        Enterprise Partner
PGP Authorized Distributor   Distributor




                                           Enterprise Partner
PGP Silver




                             Partner




                             Partner       Enterprise Partner
PGP Bronze



                             Partner
PGP Bronze




                       Distributor

                       Reseller

             Partner




PGP Bronze




PGP Bronze   Partner   Reseller
Partner
Watchguard   Impreva    Cyber-ark




             Reseller   Reseller
Reseller
Glib Pakharenko     gpaharenko@gmail.com
Pavel Khmelevskiy   pavel.khmelyovsky@gmail.com

More Related Content

Similar to List of Ukrainian information security market participants

GIS Company Profile detailed Overview (india)
GIS Company Profile detailed Overview (india)GIS Company Profile detailed Overview (india)
GIS Company Profile detailed Overview (india)Sanket Shikhar
 
Dpa perfecting-it
Dpa perfecting-itDpa perfecting-it
Dpa perfecting-itebuc
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Designjonmccoy
 
Digital Identification Systems, pune, Security Solutions
Digital Identification Systems, pune, Security SolutionsDigital Identification Systems, pune, Security Solutions
Digital Identification Systems, pune, Security SolutionsIndiaMART InterMESH Limited
 
Secure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat ProtectionSecure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat ProtectionAmmar Hasayen
 
February 2016 Webinar Series - Best Practices for IoT Security in the Cloud
February 2016 Webinar Series - Best Practices for IoT Security in the CloudFebruary 2016 Webinar Series - Best Practices for IoT Security in the Cloud
February 2016 Webinar Series - Best Practices for IoT Security in the CloudAmazon Web Services
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
Official Accreditations
Official AccreditationsOfficial Accreditations
Official Accreditationsbonito1987
 
Trusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelTrusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelAtlassian
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
 
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...Erol TOKALACOGLU
 
NGN Company Profile November08
NGN Company Profile November08NGN Company Profile November08
NGN Company Profile November08Serdar Salepcioglu
 
DAST в CI/CD, Ольга Свиридова
DAST в CI/CD, Ольга СвиридоваDAST в CI/CD, Ольга Свиридова
DAST в CI/CD, Ольга СвиридоваMail.ru Group
 
Enterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveEnterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveAnusha Vaidyanathan
 
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfAryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfKlausSchwegler
 

Similar to List of Ukrainian information security market participants (20)

GIS Company Profile detailed Overview (india)
GIS Company Profile detailed Overview (india)GIS Company Profile detailed Overview (india)
GIS Company Profile detailed Overview (india)
 
CEH
CEHCEH
CEH
 
Dpa perfecting-it
Dpa perfecting-itDpa perfecting-it
Dpa perfecting-it
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
 
Digital Identification Systems, pune, Security Solutions
Digital Identification Systems, pune, Security SolutionsDigital Identification Systems, pune, Security Solutions
Digital Identification Systems, pune, Security Solutions
 
Secure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat ProtectionSecure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat Protection
 
February 2016 Webinar Series - Best Practices for IoT Security in the Cloud
February 2016 Webinar Series - Best Practices for IoT Security in the CloudFebruary 2016 Webinar Series - Best Practices for IoT Security in the Cloud
February 2016 Webinar Series - Best Practices for IoT Security in the Cloud
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Official Accreditations
Official AccreditationsOfficial Accreditations
Official Accreditations
 
Navigating Cybersecurity
Navigating CybersecurityNavigating Cybersecurity
Navigating Cybersecurity
 
Trusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelTrusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy Model
 
Blockchain Cybersecurity Development
Blockchain Cybersecurity DevelopmentBlockchain Cybersecurity Development
Blockchain Cybersecurity Development
 
Blockchain Cybersecurity
Blockchain CybersecurityBlockchain Cybersecurity
Blockchain Cybersecurity
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
 
NGN Company Profile November08
NGN Company Profile November08NGN Company Profile November08
NGN Company Profile November08
 
DAST в CI/CD, Ольга Свиридова
DAST в CI/CD, Ольга СвиридоваDAST в CI/CD, Ольга Свиридова
DAST в CI/CD, Ольга Свиридова
 
Enterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveEnterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's Perspective
 
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfAryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
 
QualysGuard InfoDay 2012 - SSL LABS
QualysGuard InfoDay 2012 - SSL LABSQualysGuard InfoDay 2012 - SSL LABS
QualysGuard InfoDay 2012 - SSL LABS
 

More from Glib Pakharenko

Cloud orchestration risks
Cloud orchestration risksCloud orchestration risks
Cloud orchestration risksGlib Pakharenko
 
Top mistakes that allows to make a successful pentest
Top mistakes that allows to make a successful pentestTop mistakes that allows to make a successful pentest
Top mistakes that allows to make a successful pentestGlib Pakharenko
 
State of cyber-security in Ukraine
State of cyber-security in UkraineState of cyber-security in Ukraine
State of cyber-security in UkraineGlib Pakharenko
 
Огляд атак на критичну інфраструктуру в Україні
Огляд атак на критичну інфраструктуру в УкраїніОгляд атак на критичну інфраструктуру в Україні
Огляд атак на критичну інфраструктуру в УкраїніGlib Pakharenko
 
Кращі практики керування ризиками хмарних технологій
Кращі практики керування ризиками хмарних технологійКращі практики керування ризиками хмарних технологій
Кращі практики керування ризиками хмарних технологійGlib Pakharenko
 
Кібер-атаки на критичну інфраструктуру в Україні
Кібер-атаки на критичну інфраструктуру в УкраїніКібер-атаки на критичну інфраструктуру в Україні
Кібер-атаки на критичну інфраструктуру в УкраїніGlib Pakharenko
 
Uisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ayUisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ayGlib Pakharenko
 
Using digital cerificates
Using digital cerificatesUsing digital cerificates
Using digital cerificatesGlib Pakharenko
 
Automating networksecurityassessment
Automating networksecurityassessmentAutomating networksecurityassessment
Automating networksecurityassessmentGlib Pakharenko
 
социальные аспекты иб V3
социальные аспекты иб V3социальные аспекты иб V3
социальные аспекты иб V3Glib Pakharenko
 
Isaca kyiv chapter_2010_survey_finding_summary_v07_ay
Isaca kyiv chapter_2010_survey_finding_summary_v07_ayIsaca kyiv chapter_2010_survey_finding_summary_v07_ay
Isaca kyiv chapter_2010_survey_finding_summary_v07_ayGlib Pakharenko
 
Кому нужна защита персональных данных
Кому нужна защита персональных данныхКому нужна защита персональных данных
Кому нужна защита персональных данныхGlib Pakharenko
 
Copy of Кому нужна защита персональных данных censored edition
Copy of  Кому нужна защита персональных данных censored editionCopy of  Кому нужна защита персональных данных censored edition
Copy of Кому нужна защита персональных данных censored editionGlib Pakharenko
 

More from Glib Pakharenko (20)

Cloud orchestration risks
Cloud orchestration risksCloud orchestration risks
Cloud orchestration risks
 
Top mistakes that allows to make a successful pentest
Top mistakes that allows to make a successful pentestTop mistakes that allows to make a successful pentest
Top mistakes that allows to make a successful pentest
 
State of cyber-security in Ukraine
State of cyber-security in UkraineState of cyber-security in Ukraine
State of cyber-security in Ukraine
 
Fintech security
Fintech securityFintech security
Fintech security
 
Огляд атак на критичну інфраструктуру в Україні
Огляд атак на критичну інфраструктуру в УкраїніОгляд атак на критичну інфраструктуру в Україні
Огляд атак на критичну інфраструктуру в Україні
 
Кращі практики керування ризиками хмарних технологій
Кращі практики керування ризиками хмарних технологійКращі практики керування ризиками хмарних технологій
Кращі практики керування ризиками хмарних технологій
 
Кібер-атаки на критичну інфраструктуру в Україні
Кібер-атаки на критичну інфраструктуру в УкраїніКібер-атаки на критичну інфраструктуру в Україні
Кібер-атаки на критичну інфраструктуру в Україні
 
Uisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ayUisg5sponsorreport eng v03_ay
Uisg5sponsorreport eng v03_ay
 
Uisg5sponsorreport
Uisg5sponsorreportUisg5sponsorreport
Uisg5sponsorreport
 
Using digital cerificates
Using digital cerificatesUsing digital cerificates
Using digital cerificates
 
Abra pocket office
Abra pocket officeAbra pocket office
Abra pocket office
 
Utm
UtmUtm
Utm
 
Automating networksecurityassessment
Automating networksecurityassessmentAutomating networksecurityassessment
Automating networksecurityassessment
 
социальные аспекты иб V3
социальные аспекты иб V3социальные аспекты иб V3
социальные аспекты иб V3
 
Uisg opening
Uisg openingUisg opening
Uisg opening
 
Pentest requirements
Pentest requirementsPentest requirements
Pentest requirements
 
Kke
KkeKke
Kke
 
Isaca kyiv chapter_2010_survey_finding_summary_v07_ay
Isaca kyiv chapter_2010_survey_finding_summary_v07_ayIsaca kyiv chapter_2010_survey_finding_summary_v07_ay
Isaca kyiv chapter_2010_survey_finding_summary_v07_ay
 
Кому нужна защита персональных данных
Кому нужна защита персональных данныхКому нужна защита персональных данных
Кому нужна защита персональных данных
 
Copy of Кому нужна защита персональных данных censored edition
Copy of  Кому нужна защита персональных данных censored editionCopy of  Кому нужна защита персональных данных censored edition
Copy of Кому нужна защита персональных данных censored edition
 

List of Ukrainian information security market participants