terminal

Certification of informatization objects

We carry out certification tests in accordance with the current order of the FSTEC of Russia for information systems and protected premises

Each step is planned

01 data collection

02 Closing spaces

03 Methodology

04 tests

05 Issues of the certificate

01 data collection

We start with the analysis of the source data and acquaintance with the object that has to be certified

02 Closing spaces

We evaluate the object of protection of the object: is there everything you need to confirm security? If something is missing, we propose to develop the necessary documents or purchase the missing protective equipment (delivery, installation, configuration).

03 Methodology

We are developing a program and testing methods, we coordinate them with the customer.

04 tests

We conduct tests to make sure that everything meets the requirements. As a result, we draw up a conclusion.

05 Issues of the certificate

We carry out certification tests in accordance with the current order of the FSTEK of Russia for information systems and protected premises everything is in order, draw up, register and issue a certificate of conformity. Security is confirmed!

Madrigal in numbers and facts

Licenses

FSTEK and FSB of Russia

Social SOC

In the 25/8 mode

AI-laboratory

For the tasks of your business

Web server

Own development with built -in protection modules: Antiddos, WAF, NGFW
number-boxtable
glass
glass
\glass
glass
People
Years
customers from the TOP-100 RU companies
data centers is in the office
table

Its own II laboratory and data center

AI-laboratory

  • We build AI solutions for internal and client projects - models, consultants, assistants, decision support systems.
  • We launch projects, experiment, finalize. Everything is under control, on their infrastructure.
  • We highlight the power for research, experiments and our own development.

Data center

  • Safe connection schemes, isolated segments for backups.
  • Certified fault -tolerant hypervisor.
  • All infrastructure - under monitoring: from servers to climate sensors.
  • No compromises on accessibility and protection.