
16.04.2021
iIT Distribution – офіційний дистриб’ютор компанії Lookout
12.04.2021
iIT Distribution expands its portfolio with networking solutions from Aruba Networks
12.04.2021
IIT Distribution received the status of a Business Partner in the Hewlett Packard Enterprise affiliate program
08.04.2021
Why should hosting providers pay attention to Infinidat data storage solution? Practical experience of use
05.04.2021
The ZTNA model helps reduce the stress loading of employees from remote work
30.03.2021
Сrowdstrike named leader in security Threat Detection, Response and Investigation of cyberincidents (MDMR)!
24.03.2021
Falcon X від CrowdStrike визнаний лідер у звіті Forrester Wave: External Threat Intelligence Services за перший квартал 2021 року!
15.03.2021
New Forrester study shows all the economic benefits of using the Falcon Complete!
02.03.2021
iITD is the official partner of the International Grand Forum "BIT & BIS-2021"!
24.02.2021
CrowdStrike has announced the acquisition of Humio's leading high-performance log management platform!
18.02.2021
Intelligent IT Distribution at the international conference "Go Digital - 2021: acceleration and migration. Money goes online".
08.02.2021
International Conference "Go Digital - 2021: acceleration and migration. Money goes online".
25.01.2021
Crowdstrike's response to recent supply chain attacks
08.10.2020
Intelligent IT Distribution takes part in the third annual international forum "Cybersecurity - protect business, protect the state"
29.09.2020
IITD - partner of the forum "Cybersecurity - protect business, protect the country" 2020
24.09.2020
iIT Distribution got the status of a distributor of Netbrain technologies solutions in the territory of Ukraine
28.08.2020
Fal.Con 2020 by CrowdStrike
25.08.2020
Compliance with cyberrisk insurance
25.08.2020
Automatically block compartment accounts with Lepide Active Directory Self Service 20.1
25.08.2020
Cossack Labs invites you to visit NONAMECON
22.07.2020
Signing a distribution agreement with SAFE-T
21.07.2020
International Conference "Online Banking - Time of Innovation!"
18.06.2020
Global Cyber Threat Report 2020
11.06.2020
Thursday, the 25-th of June, 2020. Do not miss!
20.05.2020
PandaLabs Report: Understanding Threats 2020
05.05.2020
Announcement: New version of ACRA Enterprise, which provides increased flexibility for high-loaded systems
13.04.2020
Lepide Remote Worker Monitoring Pack is a simple in deployment and lightweight security platform, which offers immediate protection of business data during an unforeseen period of remote work.
12.04.2020
Ensuring cybersecurity for remote users
08.04.2020
Labyrinth Technologies offers to take advantage of a special offer - a license for 12 months at a price of 6 months
07.04.2020
Crowdstrike: Remote work and IT security during the crisis - a reduced licensed program for 3-6 months
23.03.2020
IIT Distribution received the status of distributor solutions RedSeal Networks in Ukraine
23.03.2020
IIT DISTRIBUTION has received the status of a Lepide solutions distributor in Ukraine
Encryption of confidential and personal data is determined by the regulations (GDPR, HIPAA, PCI DSS) and the best practices of the industry. However, the integration of cryptography in the modern application is often a difficult task that has a limited impact on the increase in safety and many architectural compromises. ACRA goal - change this situation.
New version of ACRA Enterprise, which provides increased flexibility for high-loaded systems:
- Data masking - data is stored in encrypted form, users see disguised data, such as XXXX12. Useful to anonymize data for specific roles / users.
- Tochenization (Format-Preserving Tochenization) - The data is stored in an encrypted form in a separate storage, while your database stores "tokens" / "pseudonyms" that have the same format and length as the source data. It is useful for creating analytical reports based on confidential data without their disclosure.
- Ultrafine encryption is a special mode for those who take care of each cycle of the processor and the data storage space. As in other modes, each part of the data is encrypted with a unique key and each key to its key.
- Flexible search on encrypted data - Now you can search using the "accurate match", "starts with" and "ends on" without deciphering data.
ACRA Enterprise is a comprehensive data protection system. ACRA is used in many infrastructures: software development companies, international financial institutions, energy systems operators and others.
We invite you to cooperate!
Back