Cloud MTS
Advice
Get consultation
Cloud services
Virtual desktop
Advanced services for providing employees with secure remote access to powerful virtual desktops and corporate client resources from any device, from anywhere in the world.
Network services
We provide a set of solutions for building and optimizing network infrastructure. This will enable you to implement the required connectivity between different services with certain quality parameters  quickly and efficiently.
Data storage and backup
Reliable and stable with MTS Cloud. We provide storage of all data types and volumes. This will enable you to work with data and applications quickly and efficiently.
Equipment rent
Proprietary services that will help to improve  efficiency of your IT departments.

Outsourcing
of information security

Maintenance of information security processes,
technical protection means,
and internal documentation

  • Security
    as a Service
  • Information
    security documentation
  • Maintenance
    of protection means
bg

Security as a Service

Infrastructure protection
Network device configuration analysis and management.
Network device configuration analysis and management.
Account and access rights management (IGA).
Account and access rights management (IGA).
Database and application security.
Database and application security.
Unstructured data access control (DAG).
Unstructured data access control (DAG).
Vulnerability management.
Vulnerability management.
Mobile device security.
Mobile device security.
Protection against APT and 0-day attacks.
Protection against APT and 0-day attacks.
Web application protection.
Web application protection.
Communication channel protection.
Communication channel protection.
Network infrastructure protection.
Network infrastructure protection.
Network access control.
Network access control.
Protection against leaks and user action control (DLP).
Protection against leaks and user action control (DLP).
User and administrator action control.
User and administrator action control.
Public key infrastructure (PKI).
Public key infrastructure (PKI).

Information security process outsourcing

Information security incident management.
Information security incident management.
Management of employees' information security awareness.
Management of employees' information security awareness.
Asset management, stock count.
Asset management, stock count.
Information security events collection and correlation.
Information security events collection and correlation.

Information security documentation.

Compliance with regulatory and legal requirements
GIS security (FSTEC order No. 17).
CII facility security (187-FZ).
Personal data security (152-FZ).
Compliance with GDPR requirements.
Information security preparation and certification.
Compliance with PCI DSS.
Compliance with PA-DSS.
Compliance with PCI 3DS.
Compliance with PCI PIN Security.
Compliance with GOST R 57580.1-2017.
Compliance with requirements of the Bank of Russia Provision No. 382-P/719-P.

Compliance with regulatory and legal requirements

Information security management (ISO/IEC 27001).
Information security management (ISO/IEC 27001).
Information security risk management.
Information security risk management.
IT service management (ISO/IEC 20000-1).
IT service management (ISO/IEC 20000-1).
Business continuity management (ISO 22301).
Business continuity management (ISO 22301).
Performance control, metrics and reporting system.
Performance control, metrics and reporting system.
Information security training and awareness program.
Information security training and awareness program.
Organizational and administrative documentation development.
Organizational and administrative documentation development.

Protective means maintenance

Technical maintenance and operation
Providing OKZI (the body for cryptographic protection of information) function. Providing OKZI (the body for cryptographic protection of information) function.
Information security system maintenance at all stages of the life cycle. Information security system maintenance at all stages of the life cycle.

Key areas

Firewalls, web security gateways, proxies.
Penetration prevention systems.
Traffic analysis systems.
Email security gateways.
Secure remote access systems: VPN, 2FA, OTP, NAC, MDM.
Network access control systems, NAC.
Secure virtual networks, VPN / SSL VPN / GOST VPN.
DPCs communication channel protection.
Virtualization protection, virtual infrastructure protection.
Web application protection systems / Web Application Firewall / WAF.
Workspace and server protection: antivirus, EDR, unauthorized access protection.
Change and integrity control systems, configuration management (compliance).
Security analysis and penetration test automation systems.
Security Development Lifecycle / SDLC / SSDLC / DevSecOps.
Tools for dynamic analysis of web applications / Web Application Scanners.
Targeted attack protection system: Sandbox, Honeypot, EDR.
Threat Intelligence / TI, cyber intelligence platform / cybersecurity threat platform / threat feeds / IOC.
Data Leak Prevention System / DLP
Privileged access control / PAM.
Mobile device security / MDM.
Security information and event management system, SIEM.
SOAR and IRP systems for management automation and response to information security incidents.
Database protection systems.
Information security incident monitoring and response center (Security Operation Center - SOC).
Calculate cost

We ensure compliance with regulating and legal requirements

FZ-152
The Bank of Russia Provision No. 382
719-P
GOST 57580

Division Manager

Evgeny Svidersky
Evgeny Svidersky

Responsible for the MTS cloud project division.

Implements the following complex projects: HaaS, Private Cloud, SAP Hosting, including consulting and project services. Over 10 years of experience in the cloud technologies.

Advice on your project