The document provides a list of subjects in the information security market of Ukraine, including their names, websites, main areas of business, and alternative areas. It was developed by the Ukrainian Information Security Group and contains over 100 entries of organizations working in areas such as integration, consulting, distribution, education, and vendor representation in Ukraine. The table is intended to be a permanent address book of contacts in the information security industry in Ukraine.
This document summarizes a software consulting and distribution company called Business Softwares & Solutions (BSS) that has been in business for over 11 years. BSS distributes software related to communication, security, network management, storage solutions, and other areas. Their focus areas include communication software like email servers and SMS servers, security software like antivirus and firewall programs, and network management software. They also offer backup, storage, and other solutions from partners like Acronis, Cisco, and QNap.
BMS Consulting LLC is a consulting firm that has been in business for over 15 years with $70 million in annual sales volume and over 80 certified staff. They have completed over 450 projects and are ISO 9000 certified with over 60 partners. Their portfolio includes IT security services such as PCI DSS audits, penetration testing, vulnerability management, data leak prevention, mobile device management, web protection, and SIEM solutions from vendors such as Rapid7, Imperva, IBM, Symantec, AirWatch, MobileIron, Citrix, A10, F5, Radware, and HP. They offer security deployment, managed security services, PCI DSS testing, identity and access management, and cloud and IT support.
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
The presentation provides the following:
- Symantec Corporate Overview
- Solution Portfolio of Symantec
- Symantec Validation & ID Protection - Introduction
- Symantec Validation & ID Protection - Components
- Symantec Validation & ID Protection - Architecture
- Symantec Validation & ID Protection - Use Cases
- Symantec Validation & ID Protection - Licensing & Packaging
- Symantec Validation & ID Protection - Appendix (extra information)
This provides a brief overview of Symantec Validation & ID Protection (VIP). Please note all the information is based prior to May 2016 and the full integration of Blue Coat Systems's set of solutions.
The document discusses context automation and how it connects information between websites for users. Context automation is enabled by trends like cloud computing, extensible browsers, and internet identities. It can augment websites with additional context through approaches like JavaScript, media toolbars, search tools, and context platforms. Key technologies that help enable context automation include Kynetx, which uses a rule language called KRL, and information cards, which can securely store user identity and data. Context automation provides benefits to users like a more individualized and structured browsing experience with improved privacy and security.
The document discusses context automation and how it connects information between websites for users. Context automation is enabled by trends like cloud computing, extensible browsers, and internet identities. It can augment websites with additional context through approaches like JavaScript, media toolbars, search tools, and context platforms. Key technologies that help enable context automation include Kynetx, which uses a rule language called KRL, and information cards, which can securely store user identity and data. Context automation provides benefits to users like a more individualized and structured browsing experience with improved privacy and security.
Knowledge Konsultants (KK) is an IT services and solutions company that provides services including network integration, storage, security, software development, and website design. KK aims to satisfy clients' needs for business stability and growth. It is led by entrepreneurs with technical certifications and expertise implementing IT infrastructure projects. KK offers consultancy, implementation, maintenance, and management services to clients across industries in India.
Public Key Infrastructure (PKI) allows for trusted electronic business by establishing trust through the generation and distribution of public keys and certificates. A PKI consists of components that work together to publish, manage, and use public keys seamlessly. It provides capabilities for authentication, authorization, confidentiality, integrity, non-repudiation, and audit controls through the use of public key cryptography and digital signatures. The PKI market has grown significantly since the late 1990s as PKI enables new e-business processes and transactions. Common cryptographic algorithms used in PKI include symmetric algorithms like DES and public key algorithms like RSA.
This document summarizes a software consulting and distribution company called Business Softwares & Solutions (BSS) that has been in business for over 11 years. BSS distributes software related to communication, security, network management, storage solutions, and other areas. Their focus areas include communication software like email servers and SMS servers, security software like antivirus and firewall programs, and network management software. They also offer backup, storage, and other solutions from partners like Acronis, Cisco, and QNap.
BMS Consulting LLC is a consulting firm that has been in business for over 15 years with $70 million in annual sales volume and over 80 certified staff. They have completed over 450 projects and are ISO 9000 certified with over 60 partners. Their portfolio includes IT security services such as PCI DSS audits, penetration testing, vulnerability management, data leak prevention, mobile device management, web protection, and SIEM solutions from vendors such as Rapid7, Imperva, IBM, Symantec, AirWatch, MobileIron, Citrix, A10, F5, Radware, and HP. They offer security deployment, managed security services, PCI DSS testing, identity and access management, and cloud and IT support.
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
The presentation provides the following:
- Symantec Corporate Overview
- Solution Portfolio of Symantec
- Symantec Validation & ID Protection - Introduction
- Symantec Validation & ID Protection - Components
- Symantec Validation & ID Protection - Architecture
- Symantec Validation & ID Protection - Use Cases
- Symantec Validation & ID Protection - Licensing & Packaging
- Symantec Validation & ID Protection - Appendix (extra information)
This provides a brief overview of Symantec Validation & ID Protection (VIP). Please note all the information is based prior to May 2016 and the full integration of Blue Coat Systems's set of solutions.
The document discusses context automation and how it connects information between websites for users. Context automation is enabled by trends like cloud computing, extensible browsers, and internet identities. It can augment websites with additional context through approaches like JavaScript, media toolbars, search tools, and context platforms. Key technologies that help enable context automation include Kynetx, which uses a rule language called KRL, and information cards, which can securely store user identity and data. Context automation provides benefits to users like a more individualized and structured browsing experience with improved privacy and security.
The document discusses context automation and how it connects information between websites for users. Context automation is enabled by trends like cloud computing, extensible browsers, and internet identities. It can augment websites with additional context through approaches like JavaScript, media toolbars, search tools, and context platforms. Key technologies that help enable context automation include Kynetx, which uses a rule language called KRL, and information cards, which can securely store user identity and data. Context automation provides benefits to users like a more individualized and structured browsing experience with improved privacy and security.
Knowledge Konsultants (KK) is an IT services and solutions company that provides services including network integration, storage, security, software development, and website design. KK aims to satisfy clients' needs for business stability and growth. It is led by entrepreneurs with technical certifications and expertise implementing IT infrastructure projects. KK offers consultancy, implementation, maintenance, and management services to clients across industries in India.
Public Key Infrastructure (PKI) allows for trusted electronic business by establishing trust through the generation and distribution of public keys and certificates. A PKI consists of components that work together to publish, manage, and use public keys seamlessly. It provides capabilities for authentication, authorization, confidentiality, integrity, non-repudiation, and audit controls through the use of public key cryptography and digital signatures. The PKI market has grown significantly since the late 1990s as PKI enables new e-business processes and transactions. Common cryptographic algorithms used in PKI include symmetric algorithms like DES and public key algorithms like RSA.
GIS Company Profile detailed Overview (india)Sanket Shikhar
GeoSolutions India Pvt. Ltd. is a leading Geographic Information Systems (GIS) company headquartered in Mumbai, India. Established in 2005, the company has grown to become a trusted provider of GIS solutions, services, and products for a wide range of industries including government, utilities, transportation, agriculture, and environmental management.
The document provides information about EC-Council and its Certified Ethical Hacker certification. EC-Council was founded in 2001 in response to the 9/11 attacks to provide cybersecurity education and training. It has since become a leading provider of cybersecurity certifications, including the popular CEH certification. The document outlines the history and mission of EC-Council, lists its certifications and training partners, and provides details about its Certified Ethical Hacker certification course modules and eligibility.
DPA is a technology company that provides IT solutions and services such as infrastructure solutions, information management, security and auditing, custom software development, and software licensing. It began in Lithuania in the 1990s and has since expanded across Eastern Europe. DPA aims to put clients first by developing tailored solutions based on its expertise in Microsoft technologies and delivering high quality project management. It has many certifications and over 500 employees serving over 1000 clients.
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Designjonmccoy
This document outlines a presentation on securing .NET/C# applications. It discusses designing defendable systems through layered defenses, segmentation, and establishing a common security language between different teams. Examples are provided of strong versus weak software designs. The importance of security user stories and testing is emphasized to prevent vulnerabilities like SQL injection.
Suppliers of Finger Print Based Time Attendence System, Card Based Time Attendence System, Face Recognition based Time Attendance, PC Based Fingerprint Scanner, Biometrics Access Control System, RFID Based Access Control System, Accessories.
Secure Modern Workplace With Microsoft 365 Threat ProtectionAmmar Hasayen
Join me as I walk you through alll what Microsoft 365 has to offer to protect your business and organization. I am going to cover every security feature and how it fits in the big picture. Whether you are on-premises organization or migrating to the cloud, there is something for you to look at.
Follow me on twitter @ammarhasayen and connect on Linkedined https://www.linkedin.com/in/ammarhasayen
Here is the full blog post: https://blog.ahasayen.com/secure-modern-workplace-with-microsoft-365-advanced-threat-protection/
February 2016 Webinar Series - Best Practices for IoT Security in the CloudAmazon Web Services
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices.
This webinar will introduce the best practices for IoT Security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services. This allows you to build interesting, meaningful applications while owning little to no infrastructure.
Learning Objectives:
Common Internet of Things security issues
AWS IoT Security and Access Control Mechanisms
Build secure interactions with the AWS Cloud
Who Should Attend:
Developers, makers
Risk Factory: PCI Compliance in the CloudRisk Crew
The document discusses PCI compliance in the cloud. It begins with an overview of cloud computing models including IaaS, PaaS, and SaaS. It then discusses the PCI Data Security Standard and some of the challenges in implementing it in the cloud. Key points for cloud compliance are scoping requirements carefully, using service level agreements, and implementing compensating controls where needed. The document provides advice for both cloud clients and vendors in achieving PCI compliance.
This document lists the various partnership levels and accreditations for a company, including Premier Partner, Gold Partner, Platinum Partner, Certified Partner, and others. Over 30 different partnership levels or accreditations are named without any additional context about the company or programs.
This document provides guidance on navigating a career in cybersecurity. It introduces Segun Olaniyan, a cybersecurity analyst and educator, and outlines his experience working in roles such as cybersecurity analyst, content strategist, and R&D analyst. It then recommends understanding basic networking and programming concepts. The document suggests focusing on skills like SIEM, cloud security, and threat intelligence. It advises getting mentorship, work experience through labs and internships, and following a path in defending, detecting, responding or investigating. The conclusion is to get the skills needed to thrive in cybersecurity careers.
Trusted by Default: The Forge Security & Privacy ModelAtlassian
Security and trust have become increasingly important requirements for our customers in Cloud. We’re working to make it easier for you to build and maintain secure apps for Atlassian products.
In this session, Engineering Team Lead Dugald Morrow and Principal Product Manager Joël Kalmanowicz will explain how security and trust have been baked into the Forge framework and the benefits the platform can offer you and your users. Learn how much less work it can be to build trusted apps customers will love on Forge by going deep on the safeguards we’re putting in place.
Developers or attendees with some software security experience will get the most out of this session.
Blockchain Cyber Security is a unique security software that helps you to protect your data and information by creating a peer-to-peer network. It secures your transaction and makes it more secured, eliminating the chances of frauds, theft and other complexities that have always been associated with online transactions.
https://www.mobiloitte.com/blockchain-cybersecurity/
Blockchain Cyber Security is a unique security
software that helps you to protect your data
and information by creating a peer-to-peer
network. It secures your transaction and
makes it more secured, eliminating the
chances of frauds, theft and other
complexities that have always been
Khow More: https://bit.ly/3LPhw6A
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
Rajiv Dholakia, Nok Nok Labs
Basics of how FIDO protocols work, how they fit into the broader identity ecosystem, the benefits of the design and the state of implementation/deployment in the market; appropriate for both technical and non-technical individuals, giving orientation before diving into the details of the specific FIDO protocols.
CRENNO Technologies Network Consultancy & Session Border Controller Solut...Erol TOKALACOGLU
CRENNO Technologies provides network security consultancy and sells Acme-Packet session border controllers (SBCs). The document outlines CRENNO's capabilities, including SBC components that provide denial of service protection, access control, topology hiding, fraud prevention, monitoring and reporting. It also summarizes CRENNO's consultancy and on-demand solutions, and concludes that as a telecommunications software company, CRENNO has expertise in both network infrastructure and software development using SBCs.
NGN was established in 2005 to provide IT consulting services, application development, and hardware/software products. NGN's mission is to provide cost-effective technical skills to businesses through unique technologies that build solutions for future business needs. NGN has offices in Istanbul, Turkey and Moscow, Russia and generates over $12 million USD in annual revenue between the two locations. NGN offers a wide range of products, solutions, and services including enterprise risk management, security, collaboration, outsourcing, and more.
На сегодняшний день такие популярные анализаторы, как OWASP ZAP и Burp Suite, не всегда хорошо справляются с задачей автоматического сканирования приложений. Нередко они не могут найти какие-то специфические директории, автоматически отправить запрос без участия человека. И чаще данные инструменты запускаются локально. При этом, если в компании хорошо работает команда по автоматизации тестирования, их работу можно взять за основу динамического анализа и фазинга.
Как бонус, обсудим разницу Burp Suite Professional и Burp Suite Enterprise с точки зрения CI/CD и подключения автоматизированных тестов.
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfKlausSchwegler
Aryaka helps CIOs modernize their infrastructure and simplify operations by converging networking and security in an all-in-one service. In today’s distributed world, where applications are everywhere, and employees can be anywhere, this unified SASE approach provides enterprises the security, connectivity, and flexibility they need to adapt to an unpredictable future rapidly.
The document discusses SSL Labs, a free online service that analyzes the implementation of the SSL/TLS protocols on websites. It performs an audit checking for vulnerabilities and issues, and provides a report on the server's SSL configuration including the protocols and ciphers supported, certificate validation, and an overall score. The majority of servers are found to not be well configured for security, with only 31.24% receiving the top score of A.
GIS Company Profile detailed Overview (india)Sanket Shikhar
GeoSolutions India Pvt. Ltd. is a leading Geographic Information Systems (GIS) company headquartered in Mumbai, India. Established in 2005, the company has grown to become a trusted provider of GIS solutions, services, and products for a wide range of industries including government, utilities, transportation, agriculture, and environmental management.
The document provides information about EC-Council and its Certified Ethical Hacker certification. EC-Council was founded in 2001 in response to the 9/11 attacks to provide cybersecurity education and training. It has since become a leading provider of cybersecurity certifications, including the popular CEH certification. The document outlines the history and mission of EC-Council, lists its certifications and training partners, and provides details about its Certified Ethical Hacker certification course modules and eligibility.
DPA is a technology company that provides IT solutions and services such as infrastructure solutions, information management, security and auditing, custom software development, and software licensing. It began in Lithuania in the 1990s and has since expanded across Eastern Europe. DPA aims to put clients first by developing tailored solutions based on its expertise in Microsoft technologies and delivering high quality project management. It has many certifications and over 500 employees serving over 1000 clients.
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Designjonmccoy
This document outlines a presentation on securing .NET/C# applications. It discusses designing defendable systems through layered defenses, segmentation, and establishing a common security language between different teams. Examples are provided of strong versus weak software designs. The importance of security user stories and testing is emphasized to prevent vulnerabilities like SQL injection.
Suppliers of Finger Print Based Time Attendence System, Card Based Time Attendence System, Face Recognition based Time Attendance, PC Based Fingerprint Scanner, Biometrics Access Control System, RFID Based Access Control System, Accessories.
Secure Modern Workplace With Microsoft 365 Threat ProtectionAmmar Hasayen
Join me as I walk you through alll what Microsoft 365 has to offer to protect your business and organization. I am going to cover every security feature and how it fits in the big picture. Whether you are on-premises organization or migrating to the cloud, there is something for you to look at.
Follow me on twitter @ammarhasayen and connect on Linkedined https://www.linkedin.com/in/ammarhasayen
Here is the full blog post: https://blog.ahasayen.com/secure-modern-workplace-with-microsoft-365-advanced-threat-protection/
February 2016 Webinar Series - Best Practices for IoT Security in the CloudAmazon Web Services
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices.
This webinar will introduce the best practices for IoT Security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services. This allows you to build interesting, meaningful applications while owning little to no infrastructure.
Learning Objectives:
Common Internet of Things security issues
AWS IoT Security and Access Control Mechanisms
Build secure interactions with the AWS Cloud
Who Should Attend:
Developers, makers
Risk Factory: PCI Compliance in the CloudRisk Crew
The document discusses PCI compliance in the cloud. It begins with an overview of cloud computing models including IaaS, PaaS, and SaaS. It then discusses the PCI Data Security Standard and some of the challenges in implementing it in the cloud. Key points for cloud compliance are scoping requirements carefully, using service level agreements, and implementing compensating controls where needed. The document provides advice for both cloud clients and vendors in achieving PCI compliance.
This document lists the various partnership levels and accreditations for a company, including Premier Partner, Gold Partner, Platinum Partner, Certified Partner, and others. Over 30 different partnership levels or accreditations are named without any additional context about the company or programs.
This document provides guidance on navigating a career in cybersecurity. It introduces Segun Olaniyan, a cybersecurity analyst and educator, and outlines his experience working in roles such as cybersecurity analyst, content strategist, and R&D analyst. It then recommends understanding basic networking and programming concepts. The document suggests focusing on skills like SIEM, cloud security, and threat intelligence. It advises getting mentorship, work experience through labs and internships, and following a path in defending, detecting, responding or investigating. The conclusion is to get the skills needed to thrive in cybersecurity careers.
Trusted by Default: The Forge Security & Privacy ModelAtlassian
Security and trust have become increasingly important requirements for our customers in Cloud. We’re working to make it easier for you to build and maintain secure apps for Atlassian products.
In this session, Engineering Team Lead Dugald Morrow and Principal Product Manager Joël Kalmanowicz will explain how security and trust have been baked into the Forge framework and the benefits the platform can offer you and your users. Learn how much less work it can be to build trusted apps customers will love on Forge by going deep on the safeguards we’re putting in place.
Developers or attendees with some software security experience will get the most out of this session.
Blockchain Cyber Security is a unique security software that helps you to protect your data and information by creating a peer-to-peer network. It secures your transaction and makes it more secured, eliminating the chances of frauds, theft and other complexities that have always been associated with online transactions.
https://www.mobiloitte.com/blockchain-cybersecurity/
Blockchain Cyber Security is a unique security
software that helps you to protect your data
and information by creating a peer-to-peer
network. It secures your transaction and
makes it more secured, eliminating the
chances of frauds, theft and other
complexities that have always been
Khow More: https://bit.ly/3LPhw6A
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
Rajiv Dholakia, Nok Nok Labs
Basics of how FIDO protocols work, how they fit into the broader identity ecosystem, the benefits of the design and the state of implementation/deployment in the market; appropriate for both technical and non-technical individuals, giving orientation before diving into the details of the specific FIDO protocols.
CRENNO Technologies Network Consultancy & Session Border Controller Solut...Erol TOKALACOGLU
CRENNO Technologies provides network security consultancy and sells Acme-Packet session border controllers (SBCs). The document outlines CRENNO's capabilities, including SBC components that provide denial of service protection, access control, topology hiding, fraud prevention, monitoring and reporting. It also summarizes CRENNO's consultancy and on-demand solutions, and concludes that as a telecommunications software company, CRENNO has expertise in both network infrastructure and software development using SBCs.
NGN was established in 2005 to provide IT consulting services, application development, and hardware/software products. NGN's mission is to provide cost-effective technical skills to businesses through unique technologies that build solutions for future business needs. NGN has offices in Istanbul, Turkey and Moscow, Russia and generates over $12 million USD in annual revenue between the two locations. NGN offers a wide range of products, solutions, and services including enterprise risk management, security, collaboration, outsourcing, and more.
На сегодняшний день такие популярные анализаторы, как OWASP ZAP и Burp Suite, не всегда хорошо справляются с задачей автоматического сканирования приложений. Нередко они не могут найти какие-то специфические директории, автоматически отправить запрос без участия человека. И чаще данные инструменты запускаются локально. При этом, если в компании хорошо работает команда по автоматизации тестирования, их работу можно взять за основу динамического анализа и фазинга.
Как бонус, обсудим разницу Burp Suite Professional и Burp Suite Enterprise с точки зрения CI/CD и подключения автоматизированных тестов.
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfKlausSchwegler
Aryaka helps CIOs modernize their infrastructure and simplify operations by converging networking and security in an all-in-one service. In today’s distributed world, where applications are everywhere, and employees can be anywhere, this unified SASE approach provides enterprises the security, connectivity, and flexibility they need to adapt to an unpredictable future rapidly.
The document discusses SSL Labs, a free online service that analyzes the implementation of the SSL/TLS protocols on websites. It performs an audit checking for vulnerabilities and issues, and provides a report on the server's SSL configuration including the protocols and ciphers supported, certificate validation, and an overall score. The majority of servers are found to not be well configured for security, with only 31.24% receiving the top score of A.
The presentation for my talk at the "Ukraine and the Challenges of International Law: Annexation, Aggression, Cyber Warfare" conference hosted at the Cambridge University
This document discusses various cybersecurity issues facing the cryptocurrency and FinTech industries. It notes that 36 cryptocurrency exchanges are now defunct due to hacks that stole over 950,000 bitcoins. Mining software is also vulnerable to exploits that could allow attackers to redirect funds or install malware. The document recommends using multisignature wallets, key derivation, blockchain records, cold storage, backups and other techniques to better manage security risks for cryptocurrency projects.
The fifth conference of the Ukrainian Information Security Group was held on December 3, 2010 in Kyiv and attracted 55 information security professionals. The conference featured 14 presentations on topics such as IT governance, risk management, vulnerability management, security testing, and social aspects of information security. Products from sponsors Cisco, Checkpoint, RSA, and Zyxel were demonstrated. Feedback from attendees was positive about the quality of presentations and organization of the event.
The document discusses how network security assessments have traditionally been done manually, which is time-consuming and error-prone. It then describes how Cisco used automation to map their entire global network infrastructure in two weeks. Several case studies are presented that show how automation can efficiently analyze network topology and access, detect vulnerabilities and policy violations, and evaluate proposed configuration changes. Automation provides a consistent, repeatable process for network security that improves visibility, prioritization of issues, and decision making.
Copy of Кому нужна защита персональных данных censored edition
Uisg companies 4
1. Список субъектов рынка защиты информации Украины
Ver: 1.0 2010-08-15
Разработка и поддержка:
Ukrainian Information Security Group
Постоянный адрес таблицы
Контакт
Телефон
Описание полей
Name - узнаваемое название организации
Site - веб-ресурс организации
Главное направление - основне направление в бизнесе ИБ
Integrator - внедрение программных и аппаратных средств защиты
информации
Consulting - внедрение процессов системы управления защитой
информации
Distributor - дистрибъюция программных и аппаратных средств
Education - образовательное учреждение
Vendor - представительство производителя на территории Украины
Government - государственное учреждение
NGO - негосудраственная организация
Media - средства масс-медиа
Name
Бизнесс и Безопасность (журнал)
Государственный центр информационной безопасности
Днепр Техноцентр
Робоча группа ИНАУ по противодействию кибер преступности
Active audit agency
AG "BOGDAN"
Alladin Ukraine
AMI
Art Master
ASBIS
AT Vintage
ATLAS
ATMNIS
AXOFT
AZIS
Bakotech
Bartek
Beta-security
BIFIT
BMS consulting
Brainkeeper
Chamber of commerce in Ukraine (IT Comitet)
Cbit
Center
2. CERT-UA
Cherry group
Cisco
Comsec Consulting (Afenida)
Crime-research
Data expert
Delloite
Digital Security
DPA
Dr.WEB
DSTSZI
Ecomtech
EPOS
ERC
Ernst & Young
ESET
Evraas IT
FlexIt
Focus Integra
Glaive Security Group
GrantThorton
Headtechnology
HP
I-klass
IBM
Incom
Infobezpeka
Infopulse
Integrity systems
iPro Ukraine
ISACA
iSight
ISSP
IT Business solutions
ITC
IT Partner (Журнал)
IT stream consulting
I-Teko
InfoSecSolution
Itera consulting group Ukraine
ITLand
I.T. Pro
ITSEC
ITT-Consulting
Jet Infosystems
Kaitek (Artem Karpiniskiy)
KOTS
Kudin Security Group Ltd
3. Lanit LV
MCFER Consulting
Microsoft
MUK
MONT
MVS Cybercrime Unit
National Aviation University
NETBOX
NetSPI
Nexum IT
NICS
NT
NVision group
PC-Ware
Physical-technical institute (NTUU "KPI")
Priocom
ProNet
PWC
RDM
ReachManagement
RGData
RIIM2000
RRC
S&T
Servus system integration
SIBIS
SITRONICS Information Technologies
SETERE
SHALB
SmartNet
Softline
Softline international
Softprom
Software Business Solutions
SRC Security Research & Consulting
SST
Svit-IT
Supportio
Sysnet
System Integration Service
Telco
Techexpert
Trustwave
TUEV-NORD
UISG
ULYS
USS
UTKC
YUG
13. Краткое описание Вендоры:
Создание комплексных систем защиты информации (КСЗИ); Разработка и
внедрение национальной операционной системы (ОС) BBOS; Системная
интеграция
21. Microsoft PCI-DSS ASV PCI-DSS QSA Arcsight
Identity and Security
PCI ASV PCI QSA
Identity and Security
22. PCI QSA
PCI QSA
Identity and Security
Identity and Security
PCI QSA
Identity and Security PCI ASV PCI QSA
Identity and Security
Reseller
Identity and Security
Identity and Security
Identity and Security PCI ASV PCI QSA
23. Identity and Security
Identity and Security
PCI QSA
Identity and Security
Identity and Security
Identity and Security
Identity and Security Reseller
Identity and Security
Identity and Security
Reseller
Identity and Security
PCI QSA
PCI QSA
Identity and Security