Close
Main
About
Solutions
Contacts
Technical support
Main
About
Solutions
Contacts
En
|
Tr
Ru
Technical support
IT infrastructure transformation
We implement modern and high-quality IT solutions to improve the efficiency and security of your business
Find a solution
IT Solutions
Implementation of Cybersecurity solutions
Professional Services
«Puzzle Systems», group of companies
A system integration company which provides a range of services of various scales and levels of complexity in the field of information technology and cybersecurity
More about the company
Experience of our employees is more than 10 years
Unique services in the field of information security
Modern technologies
Full support
Licensed activities
Official authorized partner
Creating and transforming IT infrastructure
We implement systems that meet modern market requirements to increase the productivity of customer companies
IT Solutions
Implementation of Cybersecurity solutions
Professional Services
IDM OneIdentity
Asset access management System
BackBOX
Automation systems for management and backup of network equipment
Veritas
Backup and recovery systems
DLP - Data Leak Prevention
Infowatch Traffic Monitor
DLP is a system that prevents leaks of confidential information
InfoWatch Person Monitor
InfoWatch Person Monitor is an InfoWatch Traffic Monitor module for individual monitoring
McAfee Data Loss Prevention
Protects confidential data of all kinds
SIEM (Security information and event management)
Micro Focus Arcsight
This product provides collection, processing and storage of security events
McAfee ESM SIEM
It provides threat data collection and protection integration
IBM Qradar
It helps security specialists to ensure high accuracy of threat detection
MaxPatrol SIEM
MaxPatrol SIEM provides 360º visibility into infrastructure and detects security incidents.
Alertix — more than SIEM
It is a universal tool for data collection and processing, search and automatic signature detection of unwanted events or their combinations.
Database/Web Security - Web Application Firewall/ Database Security Monitoring
Garda technologies
It conducts constant monitoring of database accesses and identifies suspicious transactions
Imperva
A leading provider of solutions in the field of web application protection
McAfee Database Security
It provides protection of critical databases in real-time mode
PAM - Privileged Access Management
CyberArk
Modular platform for account protection and access control
Thycotic
Simple management of passwords, access and users
Infrascope
A comprehensive product for privileged access management (PAM)
ATD - Advanced Threat Defence/Sandbox
TrapX
Deception cyberattack protection technology
Kaspersky Sandbox
Is a system for detecting malware
McAfee Advanced Threat Defense
An advanced tool for detecting hidden "zero-day" threats
Web Security - Internet access protection
Forcepoint NGFW
It protects corporate networks with high-performance security technology
Forcepoint Web Security
Websense Web Security Gateway analyzes web traffic in real time, ensuring the safe use of the latest Web 2.0 technologies
McAfee Web Gateway
A significant means of protection that allows to protect an organization from threats
PT Application firewall (WAF)
Web application firewall, WAF
Vulnerability Management
Rapid7 Nexpose
It analyzes all components of the operating system, database, web applications
Rapid7 Metasploit
It simulates an attack on the network and identifies its security problems
Rapid7 AppSpider
It scans all applications and finds out all weaknesses
MaxPatrol VM
Lets you build a full-fledged vulnerability management process and monitor the security of the IT infrastructure at all times.
Gytpol Validator
Providing a unique view of your misconfiguration security gaps with continuous monitoring of all your devices.
Threat Intelligence - Security Management
Skybox Security
A set of tools for network security, analytics and reporting
McAfee ePO
Centralized presentation of information
McAfee TIE
Exchange of information about threats between different security solutions
Asset Zero
Intelligence-Driven Attack Surface Management
PT Network Attack Discovery
Is a deep network traffic analysis system that detects attacks on the perimeter and inside the network.
PT XDR
A product for detecting and responding to cyber threats.
Supply of IT equipment
Our principles
The clients who cooperate with us are satisfied with the results of the work carried out. After all, we base our business on the principles of:
Professionalism
Our experience allows us to create systems with a high level of efficiency and reliability
Modern technologies
Our solutions are based on modern technologies that simplify and improve the efficiency of business processes
Efficiency
Preciseness is our responsibility, we deliver our projects strictly in time
Individual approach
We offer individual solutions based on the customer's IT infrastructure analysis