Built-in security features of DEPO Security Systems
Comprehensive IT infrastructure protection
Technology partnerships with industry leaders
Certified Components
Solution description
DEPO Security Systems is a set of hardware and software solutions, embedded in DEPO Computers equipment, that allows to ensure data storage and processing security. Solutions are designed primarily for companies working with confidential information.
Trusted Boot Modules (TBMs) are used to verify a personal computer or server prior to BIOS startup. They perform initial user authentication and control the integrity of the BIOS firmware, operating system and data protection tools.
VPN tunneling software installed on thin clients and personal computers allows organizing a secure communication channel between the user's workplace and the server. This method can be used both for working in corporate networks and for connecting to cloud services.
To protect information from unauthorized access, the software and hardware complex is used. It serves for user authentication and confirms that the employee works from a secure terminal and with a secure server. Key information is stored in the memory of the trusted upload module.
The software part of DEPO Security Systems solution includes server and client operating systems, as well as antivirus tools that are periodically checked for compliance with security standards. DEPO Security Systems uses up-to-date certified versions of these programs.
In the DEPO Security Systems solution, user authentication is performed using smart cards and keypads with a built-in reader, which are supplied with PCs and thin clients. When using a certified Windows operating system, USB tokens are also used.
Benefits of implementation
Being one of the largest domestic manufacturers of servers, data storage systems, personal computers and thin clients, DEPO Computers adheres to the secure-by-design concept, which implies information security tools integration during the creation of computing equipment at all solution development stages. DEPO Security Systems is a set of components, built into the equipment, which were created in close cooperation with information security developers to build a reliable IT infrastructure.
Mainly, the market of information security products is represented by pre-configured computers and servers, whose technical characteristics do not always correspond to customer needs. DEPO Security Systems components can be built into any DEPO Computers equipment. Our approach allows creating a secure information infrastructure on the basis of computers, the configuration of which ideally matches the requirements dictated by the tasks the customer has to solve.
The DEPO Security Systems solution allows you to build the most secure information infrastructure. Use of repeatedly tested elements and technological partnership with the developers of information protection facilities minimize risks and guarantee the highest reliability and effectiveness of the security system. Component certification allows the solution to be used when handling confidential data.