20+ solutions in the product portfolio

IS solutions to organizations from small businesses to the largest enterprises

Solar JSOC, Russia's largest commercial SOC, and Solar MSS, an ecosystem of managed IS services.

Its own product line includes Solar Dozor DLP solution, Solar webProxy web security gateway, Solar NGFW next-generation firewall, Solar inRights IdM system, Solar SafeInspect PAM system, Solar appScreener code analyzer, and others.

Solar Cyberworld and Solar 4RAYS Cyber Threat Research Center are developing a platform for practical training of cyber threat protection skills.

Solar Group in the cyber security market

Protecting the digital future

0

+

cybersecurity projects

We implement each year. We help clients build IS processes integrated into IT and the overall business structure, as well as provide the necessary level of specialist training

employees Solar's divisions

Are located in Moscow, St. Petersburg, Nizhny Novgorod, Samara, Rostov-on-Don, Tomsk, Khabarovsk and Izhevsk

billion IS events

We analyze and quickly identify incidents. Our comprehensive approach includes threat analysis, intrusion prevention, building and operating cybersecurity systems.

ensuring cyber security

24-hours support is available through the company's technologies and the availability of competence centers distributed throughout the country

Attack statistics

Vector of modern cyber attacks

#1

The attackers' goal

Destruction of critical information infrastructure

#2

The attackers' goal

Influencing media infrastructure and embedding anti-Russian political propaganda

445 million

lines of confidential information have hit the network since the beginning of 2023

91.8 TB

was the total volume of hosted data of Russian companies

170

attacks are recorded daily on Russian resources in 2023

65%

of attacks are of a targeted nature

economic cooperation between the Russian Federation and foreign countries

A comprehensive information security solution - "National Level Cyber Security Platform" for government customers

Public authorities, ministries and agencies

SOCIALLY IMPORTANT OBJECTS

Organizations with critical information infrastructure

"Platform" includes the following components

Gov-SOC: The State-level Information Security Command Center

is an operational center that counteracts cyber threats of any level of complexity (coming from both lone hackers and hacker groups supported by state intelligence services) that could potentially lead to attacks of political, terrorist, industrial and criminal nature.

Gov-Anti-DDoS: The National DDoS Protection System

a comprehensive system of protection against Distributed Denial of Services (DDoS) attacks provides reliable protection against massive distributed attacks on the nation's critical infrastructure at the L3/L4 levels of the OSI model. The deployed system neutralizes even the most complex and massive attacks up to 7.6 Tbps and ensures round-the-clock availability of Internet resources to users.

Gov-Firewall: National Firewall

information system for monitoring and management of national Internet traffic, organized to combat terrorism, child pornography, drug trafficking, providing response to massive attacks on the Internet, abuse of its resources, illegal activities, and allows blocking and reducing (degradation) the speed of access to dedicated Internet resources and mobile applications to prevent illegal actions.

Gov-VPN: Protected Network for Government Bodies and Socially Important Objects

a virtual protected network (networks) that provides secure and protected communications for government bodies and socially important objects (e.g., between educational and medical institutions), and is designed to provide secure access to information systems and the Internet. In addition, individual nodes of the Protected Network can be provided with a content filtering service that allows blocking in automatic mode legally prohibited resources and information (for example, extremist materials, pornographic materials, information about drugs and their distribution, calls for suicide, etc.).

Gov-SecWeb: Comprehensive System of Protection of Internet portals

providing various government services to the population. This system is a set of organizational measures and technical means aimed at ensuring secure communication between citizens and government agencies on the Internet. The System is protected against any attempts to hack the portal and unauthorized obtaining of personal (personal) data of legitimate users who have access to the System.

Gov-Cyber Early Warning: The system of early detection of cyber threats

is designed to detect previously unknown types and kinds of attacks on organizations' information security systems. The System represents individual servers, a group of servers, or a virtualized automated workstation of users located in different locations across the country and interconnected with each other, to which potential attackers are intentionally provided relatively easy access through pre-prepared "false" vulnerabilities. In the process of attempted penetration, the System identifies attackers and allows to study the methodology and technique of their actions to carry out attacks on information systems, as well as to identify the malicious software and equipment used, in order to practice and apply to "combat" systems methods of countering such attacks.

Gov-Cyber Range: The National Cyber Range

is a software and hardware complex designed to improve the state's readiness to repel cyber attacks and strengthen national security, including model infrastructures of facilities with critical information infrastructure, and is a platform for conducting cyber exercises of any scale to practice skills of interaction during cyber attacks, training specialists in actual practical skills of defense against cyber attacks.

Gov-AppSec: The National Center for Software Protection

(hereinafter - Software) ensures the implementation of interrelated organizational and technical activities aimed at the development and use of secure software of any type. Organizational measures include the development of a regulatory framework, definition of approaches, methodology and classification of software, compilation of a unified register of secure software, as well as the creation of accredited laboratories that control software security on a national scale. Technical measures imply the use of special tools for automatic checking of binary and source code for vulnerabilities, bookmarks and undeclared capabilities.