Moscow. October 12. INTERFAX - The Astra Linux Group of Companies and the IT Expertise company, the developer of the SAKURA software package designed to ensure information security, have signed an agreement on technological partnership, the press service of the GC reports.
"The document provides for the certification of SAKURA software under the Ready for Astra Linux program, as well as vendor cooperation in the creation, implementation and maintenance of high-tech solutions for secure IT systems," the press release said on Tuesday.
The message quotes the words of Vyacheslav Savlyuk, CEO of IT Expertise, who noted that the partnership with Astra Linux is a strategic step for the company. "The Astra Linux operating system (OS) is used to work in secure environments, and the SAKURA complex is already being used where import-substituting products from the cybersecurity segment are needed.
"We hope that the technological partnership will be mutually beneficial, expand the Astra Linux ecosystem and provide new options for joint solutions to users of the SAKURA complex," he said.
According to Anton Rudevsky, head of the Department for work with partners of Astra Linux Group, referred to by the press service, the use of SAKURA software running Astra Linux OS will allow any organizations to build effective protection of IT infrastructure and data, even if they do not have a unified security policy or a dedicated information security specialist (U1).
It is reported that the program participants at the testing stage conduct a series of compatibility checks of their products with Astra Linux software and, if necessary, implement improvements that ensure the correctness of the integrated solutions. As a result, users get a significant advantage: officially guaranteed compatibility of IT products saves them from having to invest their own resources in checking the ability to integrate certain components into their infrastructures.
According to the press service, the SAKURA PC is designed to monitor the state of workplace security based on security policy, detect threats and respond to them, as well as to control access to corporate resources. The product is an integrated internal mechanism that allows you to monitor the status of remote workstations and other devices 24 hours a day, immediately eliminate possible threats to information security, instantly respond to non-compliance with its standards and prevent their consequences.