70
Russian Information Technology Export Products and Solutions 2017 r-it-e.ru part of R IT E

R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Russian Information Technology ExportProducts and Solutions 2017 r-it-e.ru

part of

R IT E

Page 2: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

RITE Is a One-Stop Provider of Russian IT Solutions

RITE is the face of the Russian IT industry abroad. The company brings together hundreds of IT products and solutions of Russia’s companies that can compete globally. It offers the only plausible alternative to world’s largest providers in the fields of Digital Sovereignty, е-Government, and Smart City management, as well as diverse industry solutions.

RITE is able to contract foreign governments directly and give them state-backed guarantees. RITE develops solutions that put the owner in complete control and thus assure their true digital sovereignty. RITE is flexible and agile in shaping deals due to strong financial partnerships.

RITE offers excellent, groundbreaking and reliable solutions, with state guarantees, financial support, and genuine digital sovereignty to its governmental partners.

RITE 2/70

Page 3: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Сontents Digital Sovereignty 4

е-Government 26

Smart City 44

Cross Industry Solutions 59

RITE 3/70

Page 4: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

RITE / Digital Sovereignty 4/70

Digital Sovereignty

Page 5: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

The rapid development of information techonologies, amid political, environmental, economic uncertainties, mean that national sovereignty is no longer a matter of borders and arms only. Cyber attacks and threats emanating from both outside and inside state borders can have powerful destructive effects.

Digital sovereignty and cyber security have become essential for any government. RITE develops solutions for a fully trusted digital environment (with no backdoors), ranging from microprocessors to operation systems. RITE can transfer the client’s current equipment towards a trusted digital environment, or build a 360 degrees cyber security protection around it.

RITE / Digital Sovereignty 5/70

Digital Sovereignty

Page 6: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

RITE / Digital Sovereignty 6/70

Trusted Environment 7

Security Information and Event Management 8

Security of User Workstations — Endpoint Security 9 — Mobile Security 10 — Embedded Systems Security 11 — Secure OS 12

Data Centers Security — Security for Data Centers 13 — Virtualization Security 14

Anti-Attack Security — Anti-Targeted Attack Platform 15 — DDoS Protection 16 — Fraud Prevention 17

Biometry Identification — Multimodel Biometry 18 — Video Biometry 19

Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21

Security Services — Threat Intelligence 22 — Telecom Connection Security System 23 — Other cyber security services 24

Industrial Security 25

Page 7: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Complete hardware Data Processing Centers based on Russian micropro-cessors, virtualization, storage and operating systems with full technical support.

KEY FEATURES: Location sovereignty — Physical control of equipment

Technological sovereignty — Reliable tech support

Cyber security — Defense against leaks and external attacks — Proven sustainability

RITE / Digital Sovereignty 7/70

Trusted Environment

Applications Operating systems Virtualization and storage systems

Hardware

(microprocessors and other

server equipment)

Page 8: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

SIEM

Work station

Applicationservers,

databases anddata protection

tools

Endpoint agentwork stations

Dataacquisition

module

Scanner

update.ptsecurity.

com

Scan of сomponentsand traffic data

SIEM componentmanagement

Update for componentsand SIEM

Web-interfacemanagement

Traffic datacollection and

analysis

Networkequipment

System provides real-time analysis of security alerts generated by possible elements of the network (DLP, IDS, antiviruses, firewalls, etc.)

KEY FEATURES: Consolidates and keeps event logs from all security tools Analyses attacks and incidents Сollates and analyses data against preset rules Live alerts and incident management

KEY PROCESSES:

1. Information entry and normalization 2. Adjustment to the system assets through core and infrastructure model3. Data check with online Knowledge Base (PTKB)4. Correlation based on information received at previous stages.

RITE / Digital Sovereignty 8/70

Security Information and Event Management (SIEM)

Page 9: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Endpoint security is a complex defense system that combines signature and cloud technologies, heuristic analysis methods, and proactive tools to create a multi-level security for work stations and mobile devices. De-fense technologies work together with tools to control user applications, external drives, and online access.

KEY FEATURES: Identifies attacks through continuous monitoring of communication Neutralizes attacks and complex threats Reacts to attacks by studying their source Prevents attacks through addressing IT infrastructure vulnerabilities

FEATURES: Patch management (Vulnerability detection & patch management plus extended client management capabilities)

— Including SIEM support

Data encryption — Fully integrated data protection — Including 2-stage authentication

Mobile security (Smartphone and tablet security and management) — Including self-service portal and web console

Anti-malware (Protection against known, unknown and advanced threats)

Control tools (Controls for online access, external devices and applica-tions) — Including Default Deny test environment

RITE / Digital Sovereignty 9/70

End Point Security

Page 10: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Security and control solutions for mobile devices on popular operating systems such as iOS, Android and WindowsPhone.

KEY FEATURES:

Security solutions + mobile device management Mobile security — Multi-layered anti-malware — Web Protection — Rooting/Jailbreak detection

Mobile device management — Exchange ActiveSync — iOS MDM — Samsung KNOX

Mobile application management — Containerization — App Control — Selective Wipe

Anti-theft — Lock/Wipe — Locate/Alarm/Mugshot — SIM Watch

Self-service portal — BYOD enablement — Certificate delivery — Anti-Theft

Centralized management — All major mobile platforms — Other IT security areas — Web Console

RITE / Digital Sovereignty 10/70

Mobile Security

Page 11: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

$

Applications

Drivers

Libraries

USB Storages

ATMPOS

ANTIVIRUSDEVICE CONTROLDEFAULT DENY

Applications

Libraries

Drivers

USB Storages Malware

Protects cash machines and payment terminals (ATM/POS) from target attacks, viruses and other types of cyber crime.

KEY FEATURES: Default deny Flexible management Device control File antivirus Support for ATM/POS operating systems

RITE / Digital Sovereignty 11/70

Embedded Systems Security

Page 12: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Mobile operating system with highest degree of protection with strict management of every device. Impossible to download any unauthorized software. Impossible to hack. No backdoors.

KEY FEATURES: Corporate Mobile Platform — Open for audit and upgrades — Works on most types mobile devices

Security — No viruses — All auxiliary services to the operational system are under client control — Defense against external attacks for mobile devices and software — Built-in cryptography systems — Secure downloading and oversight over system coherence

Development — Linux/Qt cross-platform environment — Proven and tested technologies — Fast prototyping with Qt QML live — High performance — True multitasking

Implementation — Customization for client needs — Corporate shop for trusted applications and software updating service — Simple process of implementation, available in stages — Substantial savings on additional software and services

RITE / Digital Sovereignty 12/70

Mobile Security (Secure OS)

Mobile OS Mobile OSMobile OS

Page 13: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Whether a company owns or rents its data centre, it needs to take care of the safety of information kept in it. Our Data centers protection sys-tems are flexible, so that to both meet security needs of today and be ready for scaling up and adjusting to challenges and needs of tomorrow.

KEY FEATURES: WOL and sensitive information protection Business continuity and high productivity support Easy integration with any data centre Security for Infrastructure as a Service and network attached storage Single management console

RITE / Digital Sovereignty 13/70

Security for Data Centers

Security for Data Centers

+ +Virtual Machine Security

Data Storage Virtual Machine Security Centralized Security Control

Page 14: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Modern business infrastructure comprises a complex mix of technologies and hypervisors. Attacks against virtual machines, networks and applianc-es can be most devastating, so they need dedicated security.

KEY FEATURES: Centralized protection for virtual machines (VM) Complete protection against malware using cloud technologies Personal firewall and HIPS Control of applications, web resources and peripherals Instant messages, mail and web antivirus Centralized management

RITE / Digital Sovereignty 14/70

Virtualization Security

Hardware

Security Virtual Appliance,

SVA

Virtual Machine

Light Agent

Virtual Machine

Light Agent

Virtual Machine

Light Agent

Page 15: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Targeted attacks can disrupt or ruin businesses, but may stay unnoticed for years. They are highly sophisticated and escape conventional security barriers. Proactive complex defense solutions are the only effective way to withstand targeted attacks.

Anti Targeted Attack Platform can detect and neutralize targeted attacks at all stages.

KEY FEATURES: Identifies attacks through constant monitoring of communication Neutralizes attacks and complex threats Reacts to attacks by studying their source Prevents attacks through addressing IT infrastructure vulnerabilities

DATA ACQUISITION: Network Web/Proxy Email Endpoint Analysis Processing engines Targeted Attack Analyzer Advanced Sandbox Threat Intelligence (KSN) Verdict Visualization Console Syslog Sandbox activity log Pcaps Detonated samples Response Security Intelligence Services

RITE / Digital Sovereignty 15/70

Anti Targeted Attack Platform

Page 16: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

A DDoS-attack may cost just a few hundred dollars but can lead to days of disruption and multimillion losses.

KEY FEATURES: 24/7 analysis of internet traffic Advanced attack warning Traffic redirection to data clearing centre Return of cleared data into the client network Detailed attack reports, including attack duration and neutralization

RITE / Digital Sovereignty 16/70

DDoS Protection

Web-serverBorder router

SwitchSDP-sensor

SPAN

DDoS Pervention:Filtration centres

Internet

Page 17: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

The two core types of threats for online banking and financial services are:

— Account hacking, based on account holder identity theft and transfer of funds from the account,

— Intervention in transactions, a change in transaction parameters or cre-ation of a new transaction in account holder’s name.

Fraud Prevention detects and blocks hacking attempts and reports on in-formation used in attempt to receive access to account.

KEY FEATURES: Protects online and mobile banking systems Effective against main types of threats Ensures security of Windows and Mac computers Protects account holders’ mobile devices Integrates into the bank network without disruption Easy to administrate through a single console

RITE / Digital Sovereignty 17/70

Fraud Prevention For Mobile and Online Banking and Financial Services

Page 18: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

KEY FEATURES:

Exceptionally reliable security solution based on both voice and video recognition technology.

It allows to create a remote identification system for your agency or company with the highest degree of security.

The technology has been successfully used in the number of companies including largest banks in the world.

RITE / Digital Sovereignty 18/70

Multimodal Biometry Solutions

Open application Look into camera Read password Access

Page 19: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Security solution based on video recognition technology that can be ap-plied from offices and banks to sports stadiums.

KEY FEATURES:

Face recognition in a video stream Identification in real time and on demand Security alerts

KEY METRICS: 97% identification success rate (trial on location) 100% success rate (trial for ISO standards) 3 seconds identification time 3 seconds search through 1 000 000 profiles database Resilience to appearance change (hairstyle, beard, mustache, glasses, hats, aging) Up to 10 faces followed by one camera

RITE / Digital Sovereignty 19/70

Video Biometry Solutions

Gate

Biometriq access based on face recognation

Page 20: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

This system concentrates on internal threats. DLP automatically scrutiniz-es data flow for confidential documents, prevents data leaks, and protects businesses against in-house wrongdoers. It analyses both formal attrib-utes of traffic and content to identify potential data leakage.

KEY FEATURES: Controls all information flow channels Understands meaning and content of documents Highlights confidential and suspicious information in the data flow Reports on the work activity of individual employees, departments and company as a whole Points to employees breaching security, idling time, or criminals using stolen access Collects statistical data on company infrastructure usage Provides adjustable access to company resources, external devices and clouds. Allows transparent coding of critical information Controls usage of applications online

USE CASES:

Threat protection from: Insider activity Conspiracies Poaching clients Corruption Industrial espionage Theft of personally identifiable information

RITE / Digital Sovereignty 20/70

Data Leakage Prevention (DLP)

Page 21: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

KEY FEATURES: Detect cyber attacks against businesses, individuals, or organizations Disclose current and potential fraudulent activities Oversee employee behavior in social media Discover data leaks Monitor and maintain brand reputation Identify and resolve critical situations before they grow out of control Retain loyalty by keeping in touch with target audiences

RITE / Digital Sovereignty 21/70

Social Media Monitoring

Social media monitoring and analysis service promptly delivers direct feedback from your target audiences, and thus helps your online reputation management.

Page 22: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Threat intelligence is an analytical tool for cyber security. Cyber threats come in different disguises and directions so that traditional security tools such as anti-viruses, firewalls or attack prevention systems cannot always provide a comprehensive and safe protection. In the absence of any single cyber security solution, intelligence about threats and their evolution becomes essential.

KEY FEATURES:

Strategic intelligence (timeframe: months to years) Deep investigation of cyber security trends, attacks, cyber criminal groups, their tactics and tools. Quarterly and annual reports on cy-berthreats and trends, key events and incidents in the cyber security sphere, forecasts, tailored analytics.

Operational intelligence (timeframe: hours to weeks) New malware tools and services, cybercriminal community trends and actions, changes in tactics and tools of cyber criminals. Deep investiga-tions of underground cyber-criminal communities and forums. Hacktiv-ists, their tactics, tools, profiles and attacks.

Tactical intelligence (timeframe: minutes to hours) Information on compromised accounts, banking cards, infected mobile devices plus rich context on each incident — time, tools6 C2, suspect cy-bercriminal groups. Configuration files of malicious software. Command and control server information with rich context about them. Intelligence on DDoS attacks. Suspicious IP address database (TOP, SOCKS, proxy).

KEY METRICS: 95% of intelligence originates from exclusive sources 2000+ phishing links discovered daily

RITE / Digital Sovereignty 22/70

Threat Intelligence

Page 23: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Helps detect dangerous traffic and lists active attack sources.

Analyzes and prioritizes real threats to networks and subscribers. Easily integrates into networks, and feeds on either raw traffic or traffic copy.

KEY FEATURES: Brand Protection — Maintains customer trust Finance — Reduces fraud and loss of revenues.  Legal — helps builds a case against hackers and claim damage Compliance — Conforms with regulatory standards Fraud protection Privacy protection DoS attacks identification and improved customer experience Competitive advantage and value-added service

RITE / Digital Sovereignty 23/70

Telecom Connection Security System

SS7

STP

HLR

MSC/VLR

Sensor +

Attack detector

Telecom Attack Discovery

Traffic copy

Page 24: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Tools to help detect system vulnerabilities, investigate cyber crimes and train user personnel in dealing with cyber crimes.

KEY FEATURES: Security training — Cybersecurity Fundamentals — Digital Forensics — Malware Analysis & Reverse Engineering

Investigation services — Malware Analysis — Digital Forensics — Targeted Attack Discovery — Incident Response

Security assessment — Pen Testing — Application Security Assessment

RITE / Digital Sovereignty 24/70

Cyber Security Services

Page 25: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Cyber attacks are already responsible for 35% of industrial network malfunctions incident. A single USB stick can spread malware to a whole industrial network and disrupt production management software. Our industrial security systems secure your complex specialized equipment such as SCADA servers, Programmable Logic Controllers and various Internet of Things (IoT) technologies.

KEY FEATURES: Protects industrial production from cyber threats Ensures safety of the production environment and technological process continuity Shortens technological delays and downtimes Secures both ethernet and programmable controllers

RITE / Digital Sovereignty 25/70

Industrial Security

FUNCTIONS: Vulnerability monitoring

Malware protection

Coherency control

Single point management

Anti-hacking system

Integration with other solutions

Incident investigation

SERVICES: Education— Trainings in Industrial Security— Analytics— Simulations

Expert services— Security assessment— Solution development— Support— Incident investigation

Page 26: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

RITE / е-Government 26/70

е-Government

Page 27: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

е-Government

е-Government solutions are ubiquitous today. Yet, they are not all the same. Russia as the largest country in the world, spanning 11 time zones and 85 regions, is naturally conduced to produce the world’s most advanced е-Government solutions that work across diverse physical and digital terrains.

Russia has gained significant benefits from its е-Government system, including increase of collection of taxes, excises and fines, higher public services efficiency, growth of voter satisfaction, reduction of public service costs. е-Government helps attract investment and improve country’s business rankings, as well as raise quality of its human capital.

RITE / е-Government 27/70

Page 28: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

01. National

е-Government infrastructure essential for the development of a full scale, well functioning and effective nation-wide е-Government system with large and diverse coverage.

RITE / е-Government / National — Regional and Local 28/70

National Segmentе-Government:

02. Regional and Local

Stand-alone е-Government solutions. Building blocks for specific purposes that together with е-Government infrastructure create a comprehensive е-Government ecosystem.

Regional and Localе-Government:

Page 29: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

National Public Services Portal 30

Inter-Department Network 31

National Identification and Authorization Systems 32

Industry Specific IT Systems — Election Support System 33 — Healthcare Information System 34 — State Information System For National and Local Payments 35 — National Information System for Public Utilities 36 — Online Sales Tax Register 37

RITE / е-Government / National 29/70

National Segmentе-Government:

Page 30: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

A single point of access to all governmental services for public. More than 1/3 of russian population is using e-gov services, it is crucially important for that the National level public service portals to be as much simple and convenient as possible for large number of different groups of citizens. On this premises we deliver a large scale on-line portals, mobile applica-tions and smm & ussd services

KEY FEATURES:

Single point of access Paperless transactions for most services

OUTCOMES IN RUSSIA: 45.3 million users Over 350 million transactions Over USD 120 million received in public payments Over 356 types of national public services Over 2000 types of regional public services Works in all 85 regions of Russia

RITE / е-Government / National 30/70

National Public Services Portal

Page 31: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

The Inter-Department Network permeates and brings together national, Regional and Local levels of government, fiscal authorities, information centers to ensure timely exchange of information and documentation.The networks is an essential part of е-Government infrastructure. This is a unique Russian solution that has proven highly effective.

KEY FEATURES:

Register of e-services and legal information Message routing Log record and transaction oversight Guaranteed message delivery Electronic signature

OUTCOMES IN RUSSIA: Over 11 000 national and regional departments Over 4.3 billion transactions per year Over 2000 types of data interchanged 100 federal authorities 1400 regional authorities 9500 local authorities 152 state registries 390 multifunctional centers 450 certification centers 924 credit organizations

RITE / е-Government / National 31/70

Inter-Department Network (SMEV)

Page 32: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

A key security pillar for е-Government in Russia since 2010, ESIA identifies and authenticate the user of е-Government services by way of either login/password, or verified digital signature.

It is an essential pillar for the development of e-IDs, on-line voting, e-border, remote biometry identification, telemedicine and other solutions.

KEY FEATURES:

User identification and authorization for both private users and organizations Registry of identification data Personal data aggregation Biometric data storage Register of user permits and access levels

OUTCOMES IN RUSSIA: 45.3 million registered citizens 450 certification centres

RITE / е-Government / National 32/70

National Identification and Authentication System (ESIA)

Page 33: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

A system for preparing for national elections and counting votes. A complex system for automating the electoral and voting process, that includes unique software and hardware solutions. It integrates easily with existing polling stations, with an option for creating mobile polling stations as well.

KEY FEATURES:

Vote counting Candidate information management Voting process monitoring Results aggregation On-line broadcast Exceptionally high information security Mobile voting centers Paperless process Stronger voter trust Fast voting results at a national level

RITE / е-Government / National 33/70

Election Support System (Elections)

Page 34: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Russia’s Healthcare Information System is the world’s largest in terms of the number of service provider users. EGISZ serves both the manage-ment of the national healthcare system, and the actual provision of medi-cal and healthcare services.

KEY FEATURES:

Nation-wide register of patients Medical history records for every patient Dedicated registers for particular illnesses, age groups, etc Nation-wide register of state medical institutions Analysis and optimization of the workload of clinics and doctors On-line appointments and doctor visits

RITE / е-Government / National 34/70

Healthcare Information System (EGISZ)

Page 35: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

The Information System provides a single access point for individuals and businesses alike to pay their taxes and governmental dues. The sys-tem ensures smooth and effective collection and sharing of information between fiscal bodies, public information centres, payment centres and online portals.

RITE / е-Government / National 35/70

State Information System for National and Local Payments

CALCULATION, ISSUE AND RECEIPT OF:

Taxes Fees Penalties Payments for national public services Payments for local services services Payment records

Page 36: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

The Housing Information System helps collect, consolidate, analyse, share and use information about residential building infrastructure, utilities con-sumption, tariffs, billing.

RITE / е-Government / National 36/70

National Information System for Public Utilities

KEY FEATURES:

Utilities payments Meter readings Repairs oversight Residents feedback

OUTCOMES IN RUSSIA: 11 million multi-apartment buildings 35 million personal accounts 74 000 organizations 1867 IT systems 475 banks 500 000 utilities payments

Page 37: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

The Register collects data about all sales transactions in retail to calculate appropriate tax.

RITE / е-Government / National 37/70

Online Sales Tax Register

KEY FEATURES:

Live input of all sales transactions in each retail shop for the fiscal authorities Online tax declaration Paperless receipts Tax calculation delivered live and for each transaction

Page 38: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Housing and Public Utilities Management 39

e-Healthcare 40

Procurement 41

Regional Government Situation Center 42

BigData Analysis 43

RITE / е-Government / Regional and Local 38/70

Regional and Localе-Government:

Page 39: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

A single solution for managing urban infrastructure. It helps manage public and private housing utility consumption with Internet of Things (IoT) technologies. Contributes to decrease in fraud and improves residents satisfaction.

RITE / е-Government / Regional and Local 39/70

Housing and Public Utilities Management

KEY FEATURES:

Electricity and water consumption monitoring across all housing stock Housing documentation Monitoring of housing stock condition Live monitoring and management of service trucks

Page 40: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Unified resource management and health monitoring system.

RITE / е-Government / Regional and Local 40/70

e-Healthcare

KEY FEATURES:

Online appointments Patient flow control Online appointments Cloud-based EHRs e-prescriptions Cloud-based accounting

OUTCOMES IN RUSSIA: 8.2 million patients 12.7 million e-prescriptions 85 million appointments scheduled annually 660 clinics and labs 21 thousand doctors

Page 41: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

A portal for public procurement at a regional level. Offers transparency of all procurement contracts and deals and significantly reduces corrup-tion opportunities.

RITE / е-Government / Regional and Local 41/70

Procurement

KEY FEATURES:

Access to all public procurement contacts Transparency of procurement budgets

OUTCOMES IN RUSSIA: 176 000 registered suppliers 61 000 tenders in 2015

Page 42: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Regional government promptly receives status data on core strategic projects, statistics and indicators on the regional development, as well as other relevant information.

RITE / е-Government / Regional and Local 42/70

Regional Government Situation Center

KEY FEATURES:

Monitoring — Core macroeconomic development indicators — Social and economic information — Сrime and public safety — Environment — Tasks status

Governors video-conference room Protected secure environment Conference video recording and archiving Remote access points for video-conferencing Mobile application

Page 43: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

This advanced analytical tool pulls together data from all relevant in-formational systems at national, regional and local levels, and provides a comprehensive, current, and trusted information support for regional government’s decision-making.

RITE / е-Government / Regional and Local 43/70

BigData Analysis

KEY FEATURES:

Data extraction from any data source Data enrichment and consolidation Additional abstract data layers Industry-specific analytical models Various visualization types, including heat maps, multi-layer map diagrams Interactive widgets Graphics optimization for any display type and size Self-service BI tools Web-portal and mobile app

Page 44: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Smart city

RITE / Smart City 44/70

Page 45: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Smart cities make life infinitely easier. From smart street lighting, traffic flow management, video surveillance to public participation, the opportunities for energy savings, better efficiency, greater security, and voter satisfaction are enormous.

The great variety of technologies in virtually all aspects of urban life have tangibly improved the quality of life in Russia’s busiest cities, and made their government and management substantially more transparent and effective.

Smart City

RITE / Smart City 45/70

Page 46: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Video Surveillance System 47

Smart Street Lighting 48

Smart Parking 49

Wi-Fi in Underground 50

Intelligent Transport System 51

Traffic Enforcement System 52

Emergency Services Management 53

e-Healthcare 54

e-Education 55

E-Democracy & Open Government 56

Utility Management 57

Public Service Centers 58

RITE / Smart City 46/70

Page 47: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Video Surveillance System

Integrated video surveillance platform for law enforcement agencies to monitor security in public areas. It helped Moscow achieve one of the lowest crime rates against foreigners in the world (better than Tokyo and New York).

KEY FEATURES:

Multi-source data collection and integration Face recognition and license plate identification Advanced video management and analytics State-of-the-art сontrol centre Inter-agency collaboration features

OUTCOMES IN MOSCOW: 142 550 CCTV cameras 3 500 police officers 10 000 local officials 15% decrease in major criminal activities 21% homicide rate reduction 30% reduction in petty robberies 32% reduction in burglaries 60%+ public confidence level in law enforcement bodies 70%+ of crimes and law violations identified and resolved with the use of the system

RITE / Smart City 47/70

Local policeLocal officersCCTV cameras

Page 48: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Smart Street Lighting

Urban lightning system with network of controller-equipped LED lights and management software. Intelligent controls based on either predefined schedules or in response to incoming data yield significant cost savings.

KEY FEATURES:

39% energy savings through dimming and smart scheduling to weather conditions 42% reduction in operational costs due to live grid monitoring Street light network can be used for other IoT-based Smart city appli-cations (including public safety and environmental monitoring) without adding more infrastructure

RITE / Smart City 48/70

Page 49: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Smart Parking

One of the most advanced in the world city parking system optimizes street and road space and regulates traffic flow through effective management of parking space, automated violation control.

KEY FEATURES:

Automated payments Violation control Live parking space monitoring Mobile application support

OUTCOMES IN MOSCOW: USD 216 million added city revenue 12% increase of average traffic speed 16% increase of traffic density 64% decrease of illegal parking 65% decrease of parking search time 79% of drivers pay for parking via application

RITE / Smart City 49/70

Page 50: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Wi-Fi in Underground

Free Wi-Fi network in the world’s second busiest underground (7 000 000 passengers daily). All 12 lines of the Moscow underground (a total length of 205 miles) are equipped with 900+ base stations, offering a data transfer rate exceeding 100 Mb/s.

KEY FEATURES:

Low latency life data communication End-to-end connectivity for the underground Digital advertising platform User identification capability Online access to train telemetry Infrastructure for mobile operators services

OUTCOMES IN MOSCOW: 1 200 000 unique users daily, largest free wi-fi network in Russia 500 000 000 connections per annum 50% share of Russian mobile advertising market Unique profile database covering 50% of city’s mobile users

RITE / Smart City 50/70

System Server

Smart CellSmart Cell Smart CellWi-Fi

APWi-Fi

APWi-Fi

AP

MAC-address and MSISDN registration. Geo positioning. Granting access to the internet.

MSISDN registration. Providing access to mobile networks to trusted users. Automatic discovery of untrusted users. Tracking routes across the metro.

Page 51: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

RITE / Smart City 51/70

A complex state-of-the art system for monitoring and managing road traffic and public transport, including traffic lights with intelligent controls.

Intelligent Transport System

KEY FEATURES:

Adaptive traffic light management Dynamic transport model Traffic assessment and forecast Live traffic warnings and announcements

KEY METRICS:OUTCOMES IN MOSCOW:

OVER 1 YEAR Congestion rates dropped by 25% Average surface transit speeds increased by 15–30% 95% of transit vehicles run on time 12–13% decrease in number of accidents

Page 52: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Traffic Enforcement System

A system of road cameras detecting traffic regulation violations (such as speeding, unauthorized use of a bus lane) with automated processing and ticketing system.

KEY FEATURES:

Automated number place recognition Stolen vehicle detection Traffic assessment and forecast Speeding tickets

OUTCOMES IN MOSCOW: 1 424 enforcement cameras 12 000 000 penalties per annum 24% reduction in accidents involving casualties 38% reduction in road accident fatalities 70%+ of penalties issued automatically Increase in number of stolen cars detection Eased congestion Control transit traffic and size of vehicles

RITE / Smart City 52/70

Page 53: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Emergency Services Management

A system for control and operation of emergency services vehicles.

KEY FEATURES:

All indicent data goes straight onto the emergency service team tablet Online incident reports Optimal navigation to the emergency site Online live access to video surveillance equipment at the emergency site

OUTCOMES IN MOSCOW: 20% reduction in response and arrival time

RITE / Smart City 53/70

Page 54: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

RITE / Smart City 54/70

The e-Healthcare system comprises an electronic registry, citizens health record, prescription and laboratory services.

KEY FEATURES:

Electronic medical records, electronic prescriptions Online appointments Clinics schedule and resource analysis Reports on services rendered, costs and insurance payments Automated laboratory and test results

OUTCOMES IN MOSCOW: 8.9 million patients 660 clinics and laboratories 23 000 healthcare professionals 12.7 million e-prescriptions (saving 600 000 doctor-hours annually) 85 million online appointments 98.5% accessibility rate of primary medical care in outpatient clinics 84% of patients spend less than 20 minutes in the waiting room 3+ days appointment waiting times dropped from 31.6% to 2.3% in less than one year

e-Healthcare

Page 55: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

e-Education

A digital environment for teachers, parents and pupils. A platform solution which allows to create number of applications in the field of e-Education. With currently on service such as e-diary, attendence control. “Kontingent” — service which collect data about a pupil during all lifetime.

KEY FEATURES:

Online school diaries, including schedule, homework, marks Register of all schools and activity clubs, with online enrollment Information and notifications for parents Attendance monitoring Teaching quality control, school ratings

OUTCOMES IN MOSCOW: 1600 schools 50 000 teachers 980 000 pupils

RITE / Smart City 55/70

Page 56: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

e-Democracy & Open Government

Citizen participation in city management has proven effective for economic and social development, and is gaining popularity around the globe. Our complex e-Democracy and Open Government platform solicits citizen’s opinions and decisions on city development, as well as ensures transparency over the city budget and public expenditure.

KEY FEATURES:

Active Citizen portal for weekly online resident opinion polls on city management issues gorod.mos.ru portal for public control over quality of urban infrastructure including allocation of residents’ notes and alerts to relevant services and control of their resolution Open access to the city budget and actual payments; Issue of bills for public utilities, control of payments Public service and products procurement portal

OUTCOMES IN MOSCOW: Over 1.3 million complaints resolved 1.5 million active participants Over 2000 online voting decisions Over USD 1.8 million budget savings due to open tenders and budget transparency

RITE / Smart City 56/70

Page 57: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

RITE / Smart City 57/70

Utility Management

A system to acquire, keep and analyze data on city’s energy expenditure. It monitors and forecasts energy consumption across the city and different utilities, and issues bills to individual consumers.

KEY FEATURES:

Data on actual energy and utility consumption from all housing and office buildings Bill issue to utilities users, with a flexible system of tariffs and discounts.

Page 58: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Public Service Centers

A single point of access for provision of public services. Multifunctional centers for providing public services. With 3 minutes average visitor waiting time, the system is the fastest in the world, ahead of Helsinki (5 min) and Madrid (5,5 min).

KEY FEATURES:

Automated information provision Payment terminals Automated queue management

OUTCOMES IN MOSCOW: 127 centres 87 000 users daily 355 types of public services 96.5% visitor satisfaction rate 10x decrease in average waiting time, from 40 minutes to 3 minutes

RITE / Smart City 58/70

Page 59: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Cross Industry Solutions

RITE / Cross Industry Solutions 59/70

Page 60: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

We offer an ever-expanding range of ready-to-use products that works across many industries. These universal horizontal products require minimal customization and integrate seamlessly into any IT environment. Further products and solutions can be developed to meet client needs and interests.

Cross Industry Solutions

RITE / Cross Industry Solutions 60/70

Page 61: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Systems Virtualization 62

Storage Systems 63

Database Management Systems 64

Video Conferences 65

Secure Datarooms 66

Application Framework 67

Application Server 68

Database Adapter 69

RITE / Cross Industry Solutions 61/70

Page 62: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Full Virtualized IT Infrastructure, as well as private and public clouds. We can create both isolated virtual machines, and high-density application containers.

RITE / Cross Industry Solutions 62/70

Systems Virtualization

KEY FEATURES:

1 BM:

Applications

Host OS

Hardware emulator

Hypervisor

Hardware

Isolated virtual machine High density containers

Core of host OS with a virtualization layer

Hardware

2 BM:

Applications

Host OS

Hardware emulator

3 BM:

Applications

Host OS

Hardware emulator

1 KT:

Applications

2 KT:

Applications

3 KT:

Applications

4 KT:

Applications

5 KT:

Applications

Distributed cloud storage

Page 63: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Unified virtual storage systems created from geographically distributed storage systems designed for excellent performance, reliability and scala-bility.

RITE / Cross Industry Solutions 63/70

Storage Systems

KEY FEATURES: Virtual, fail-safe data storage Hard drives on separate “common” servers

Virtual, fail-safe data storage

Hard drives on separate “common”

servers

Hard drives on separate “common”

servers

Hard drives on separate “common”

servers

Hard drives on separate “common”

servers

Hard drives on separate “common”

servers

Page 64: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Database management system is an important part of technological stack of any application and thus needs to be reliable, functional and with trust-ed technical support. Database management systems in our portfolio are based on open-source PostgreSQL, with increased functionality. Its relia-bility is proved by thousands clients across the world.

RITE / Cross Industry Solutions 64/70

Database Management Systems

KEY FEATURES: 64-bit transaction counter (XID) Incremental block-level backup Autonomous transactions Table partitioning Data compression Multimaster cluster Transportable tables Planner hints

SERVICES: 24х7 technical support for PostgreSQL DBMS solutions by skilled ad-ministrators, including monitoring, analysis of incidents, performance assurance, DBMS troubleshooting etc

Pre-migration complexity assessment. Migration-related application architecture optimization. Migrating systems (including seamless migra-tion) to PostgreSQL DBMS. Migration-related consulting.

Design and development of mission-critical high performance systems based on PostgreSQL. Optimizing DBMS configuration. Consultancy on database design, architecture and performance. Audit of industrial da-tabases, high-performance and fault-tolerant architectures. Deployment and integration of PostgreSQL.

Training courses on PostgreSQL Database Administration, Application Architecture and Development with accent on the effective use of Post-greSQL advanced features. PostgreSQL features and changes notifica-tion. Seminars and special trainging upon request.

Page 65: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Secure video communication platform for businesses and organizations.

KEY FEATURES: Enterprise meeting rooms Finance, banking Emergency operation centers Video-enabled Contact Center Tele-medicine Information terminals Webinars, interactive e-learning

Enterprise network

RITE / Cross Industry Solutions 65/70

Video Conferences

KEY FEATURES OF VIDEO CONFERENCING SOLUTION: РС, Mac, iOS, Android HD quality of video & audio 100 interactive video users in conf 1000 video ports on standard PC server Any web browser + desktop application Scalable video engine + WebRTC support Document sharing & whiteboard Moderation & recording Control & security SIP/H.323 support Supports legacy videoconferencing HW SIP telephony integration

Internet

VPN

External Users

Branch 1,2.. ..N

Internal Users

HW videoconferencing

Video conferencing server

Page 66: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Our virtual data rooms (VDR) are safe to keep and exchange sensitive data, including in biotechnology and pharmacy industries. They can also be used as a tender platform. Mobile operation platforms. VDR can be created both on clouds and on client servers.

RITE / Cross Industry Solutions 66/70

Secure Datarooms

KEY FEATURES: Data storage Corporate reports and documentation Board members communication Online audit IPOs Bankruptcy and restructurization Mergers and acquisitions Direct investment

Page 67: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Application framework is a modern Java runtime environment including virtual Java machine and application development platform for develop-ment, customization and deployment of software applications

RITE / Cross Industry Solutions 67/70

Application Framework

KEY FEATURES: Reduces average project time by by 37% and development costs by 42% Applies to banking, healthcare, government, insurance and HR man-agement, telecommunications, retail, energy and electronics and other industries

Allows creating multi-channel financial solutions providing

integrated access to the customer and product data

Java technologies (Java EE),Open standarts

and SOA principles

Hardware-, OS-. and Database-netutral

Business process driven, uses bluilt-in BPM-compliant

engines, and runs on enterprise-class Aplication Servers

Page 68: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

Applications server using Java EE 6 Web Profile technologies with a dedicated virtual machine (JVM). Ensures compatibility and transfer of solutions based on Java Enterprise Edition, includes administration tools for application server and its installation.

RITE / Cross Industry Solutions 68/70

Application Server

KEY FEATURES: Java EE 6 Web Profile. Servlets, JSP, JSF DBC и Java Persistence API (JPA) Java Message Service (JMS) Java Transaction API (JTA) Bean validation Java Management Extensions (JMX) Java API for XML Web Services (JAX-WS) Context Dependency Injection (CDI) Java API for RESTful Web Services (JAX-RS) EJB lite EJB full WebSocket (JSR 356) JSONP JNDI Java Connector Architecture (JCA) Java Auth. & Authorization Service (JAAS) JACC и JASPIC

Page 69: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

The product Database Adapter is designed to adapt Oracle-based applica-tions to PostgreSQL without changing their source code. The product can be used to replace proprietary database management systems with their open-source equivalents.

KEY FEATURES: Database Adapter provides a runtime environment for applications (DB Proxy) and utility programs for migration (DB Migrator).

The DB Migrator performs the following:

Migration of database schemas Migration of existing data Automated translation of query texts

Automated translation of database objects, such as: — PL/SQL packages — Functions — Stored procedures — Triggers — Object types — Complex types — Representations — Linked tables in external databases — Links to external databases — Tables — Indices — Sequences — Restrictions — Keys — Security objects

Existing application that uses Oracle

PostgreSQLDB Proxy: DB Parcer, PL/SQL Translator

Operational scheme of the DB proxy :

RITE / Cross Industry Solutions 69/70

Database Adapter

Page 70: R IT E · — Video Biometry 19 Protection from Internal Threats — Data Leakage Protection 20 — Social Media Monitoring 21 SeySer t i cceusr vi — Threat Intelligence 22 —

R IT E

part of

Russian Information Technology Export E-mail: [email protected] Web: r-it-e.ru Phone: +7 495 363–73–97