Activity‎ > ‎2. Products‎ > ‎

04 Information security

4.1 Equipment search reconnaissance equipment

4.1.1 Monitoring systems of radio emissions
4.1.1.1 Means DF radio emissions
4.1.1.1.1 Stationary systems DF
4.1.1.1.2 Mobile complexes DF
4.1.1.1.3 Handheld finders

4.1.1.2 Systems of radiomonitoring
4.1.1.2.1 Stationary Radio Monitoring complexes
4.1.1.2.2 Mobile radio monitoring systems
4.1.1.2.3 Optional equipment Radio Monitoring

4.1.1.3 Complexes monitoring WiFi, GSM and other networks
4.1.1.4 Hardware radio control
4.1.1.5 Reception and scanning equipment
4.1.1.6 Spectrum Analyzers
4.1.1.7 Indicators field
4.1.1.8 Frequency meters
4.1.1.9 Antennas and antenna systems
4.1.1.10 The devices control the activity of cell phones
4.1.1.11 Additional equipment for radio control

4.1.2 Nonlinear locators
4.1.3 Means of detection of hidden cameras and camcorders
4.1.4 Detectors dictaphones
4.1.5 The equipment inspection of wire communications
4.1.6 Multifunction search device
4.1.7 Tools for search operations and special checks

4.2 Equipment evaluation and analysis of information leakage channels

4.2.1 Means of assessment and analysis PEMIN
4.2.1.1 Complexes assessment and analysis PEMIN
4.2.1.2 Antennas
4.2.1.3 Optional equipment

4.2.2 Means of assessment and analysis acoustoelectric channels of information leakage
4.2.3 Means of assessment and analysis of vibration and acoustic channel of information leakage
4.2.4 Means of assessment and analysis of the optical channel of information leakage
4.2.5 Universal complex evaluation and analysis of information leakage channels
4.2.6 Assessment tools and analysis of other channels of information leakage
4.2.7 Additional equipment evaluation and analysis of information leakage channels

4.3 Information security tools

4.3.1 Means protection of negotiations on the premises
4.3.1.1 Vibro-acoustic noise generators
4.3.1.1.1 Portable generators vibro-acoustic noise
4.3.1.1.2 Stationary generators vibro-acoustic noise
4.3.1.2 Other remedies negotiations

4.3.2 Remedies telephone and low-voltage lines
4.3.2.1 Active protection of telephone lines
4.3.2.2 Passive protection of telephone and low-voltage lines
4.3.2.3 Other remedies telephone and low-voltage lines

4.3.3 Protection of the power supply means
4.3.3.1 Active means of mains protection
4.3.3.2 Line filter for interference suppression
4.3.3.3 Other means of mains protection

4.3.4 Means of protection from PEMIN
4.3.4.1 Generators of electromagnetic noise
4.3.4.2 Screening tools
4.3.4.2.1 Radio-absorbing materials
4.3.4.2.2 Other screening tools
4.3.4.3 Other means of protection against PEMIN

4.3.5 Means of protection of mobile phones and smartphones
4.3.5.1 Cell phone protection means listening
4.3.5.2 Protection of negotiations in cellular networks means

4.3.6 Blockirator
4.3.6.1 Suppressors GSM, GPS, WiFi, Bluetooth, DECT, LTE
4.3.6.2 Dictaphones suppressors
4.3.6.3 Universal suppressors
4.3.6.4 Other blockirator

4.3.7 Means of cryptographic protection of information
4.3.7.1 Means of cryptographic protection of telephone conversations
4.3.7.2 Means of cryptographic protection of talks on cellular
4.3.7.3 Means of cryptographic protection for radio talks
4.3.7.4 Means of cryptographic protection of information in computer networks and the Internet
4.3.7.5 Means of cryptographic protection of information on computers
4.3.7.6 Other means of cryptographic protection

4.3.8 Protected technical means
4.3.8.1 Computers for the treatment of sensitive and confidential information
4.3.8.2 Means of telecommunication, protected construction
4.3.8.3 Protected media
4.3.8.4 Other protected hardware

4.4 Emergency data destruction tools

4.4.1 Emergency data destruction tools on computers and servers
4.4.2 Emergency data destruction tools on paper
4.4.3 Means of emergency destruction of information on hard drives
4.4.4 Means of emergency data destruction on optical media
4.4.5 Means of emergency destruction of information on electronic media
4.4.6 Means of emergency data destruction on other media

4.5 Equipment for operatively-search activity

4.5.1 Acoustic control means
4.5.1.1 Directional microphones
4.5.1.2 Stethoscopes
4.5.1.3 Wired acoustic control system
4.5.1.4 Miniature / camouflage DVRs
4.5.1.5 Other means of acoustic control

4.5.2 Tools for monitoring of telephone conversations
4.5.2.1 Wired telephone calls control system
4.5.2.2 Other means of monitoring of telephone conversations

4.5.3 CCTV Means
4.5.3.1 Handheld tools CCTV
4.5.3.2 Mortgage funds CCTV
4.5.3.3 Accessories for CCTV

4.5.4 Hidden photographing means
4.5.4.1 Wearable means of covert photography

4.5.5 Systems for interception of communication channels 
4.5.5.1 Interception of cellular systems
4.5.5.2 Interception of satellite communications systems
4.5.5.3 Paging interception systems
4.5.5.4 Fax interception systems
4.5.5.5 Control Systems for optic communication lines 
4.5.5.6 Other channels of communication interception systems

4.5.6 Electronic Information Control Systems
4.5.6.1 Electronic information control systems in computer networks

4.5.7 Special funds metochnye
4.5.7.1 Invisible tags installation tools
4.5.7.2 Chemical traps

4.5.8 Covert tracking systems for vehicles
4.5.9 Audio noise reduction systems
4.5.10 Lock opening tools
4.5.11 Means of SORM
4.5.12 Lie detectors (polygraph)

4.6 Tools multi-channel video, audio and alarm

4.6.1 Tools multitrack recording telephone conversations
4.6.1.1 Tools multitrack recording telephone conversations to PC-based
4.6.1.2 Autonomous means multi-channel recording of telephone conversations

4.6.2 Tools multitrack recording of talks
4.6.2.1 Multichannel recording means of negotiation on the basis of PC
4.6.2.2 Stand-alone multi-channel negotiations recording means
4.6.2.3 Audio recorders
4.6.2.4 Voice Recorders
4.6.2.5 Optional equipment for the record

4.6.3 Video tools
4.6.3.1 Video features on a computer-based
4.6.3.2 Stand-alone video recording system
4.6.3.3 Video recorders

4.6.4 Warning means