Information Security Technology
Atlas has been granted a license to develop, manufacture, implement, analyze the efficiency of, and maintain information protection facilities in information systems, information technologies to protect information from unauthorized access, and to provide consulting services.
Unauthorized access protection can be implemented in various elements of the information system:
- applied and system software;
- server and workstation hardware;
- communications environment and links;
- information system perimeter.
In order to enable information security at applied and system software level, we use:
- information access differentiation systems;
- identification and authentication systems;
- audit and monitoring systems;
- antivirus systems.
In order to enable information security at hardware level, we use:
- hardware locks;
- alarm systems;
- lockout facilities for information input-output devices and interfaces.
In communications systems the following facilities to ensure network information protection are utilized:
- Firewall;
- Intrusion Detection Systems (IDS);
- Virtual Private Network (VPN);
- Protection analysis.
In order to protect the perimeter of an information system we create:
- Intrusion protection and fire alarm systems;
- Digital video surveillance systems;
- Access control and management systems (AMC).
