IT infrastructure transformation
We implement modern and high-quality IT solutions to improve the efficiency and security of your business
Find a solution

«Puzzle Systems», group of companies

A Russian system integrator provides a range of services of various scales and levels of complexity in the field of information technology (IT) and information security (IS)
More about the company
Experience of our employees is more than 10 years
Unique services in the field of information security
Modern technologies
Full support
Licensed activities
Official authorized partner

Creating and transforming IT infrastructure

We implement systems that meet modern market requirements to increase the productivity of customer companies
IDM OneIdentity
IDM OneIdentity
Asset access management System
BackBOX
BackBOX
Automation systems for management and backup of network equipment
Veritas
Veritas
Backup and recovery systems
Infowatch Traffic Monitor
Infowatch Traffic Monitor
DLP is a system that prevents leaks of confidential information
InfoWatch Person Monitor
InfoWatch Person Monitor
InfoWatch Person Monitor is an InfoWatch Traffic Monitor module for individual monitoring
McAfee Data Loss Prevention
McAfee Data Loss Prevention
Protects confidential data of all kinds
Micro Focus Arcsight
Micro Focus Arcsight
This product provides collection, processing and storage of security events
McAfee ESM SIEM
McAfee ESM SIEM
It provides threat data collection and protection integration
IBM Qradar
IBM Qradar
It helps security specialists to ensure high accuracy of threat detection
Positive Technologies SIEM
Positive Technologies SIEM
Helps security specialists to ensure high accuracy of threat detection
Garda technologies
Garda technologies
It conducts constant monitoring of database accesses and identifies suspicious transactions
Imperva
Imperva
A leading provider of solutions in the field of web application protection
McAfee Database Security
McAfee Database Security
It provides protection of critical databases in real-time mode
CyberArk
CyberArk
Modular platform for account protection and access control
Thycotic
Thycotic
Simple management of passwords, access and users
ObserveIT
ObserveIT
Control of the user's actions by creating a video recording of all their activity
Safe - T
Safe - T
The most modern protection of connections to web services, applications and Legacy systems
TrapX
TrapX
Deception cyberattack protection technology
Kaspersky Sandbox
Kaspersky Sandbox
Is a system for detecting malware
McAfee Advanced Threat Defense
McAfee Advanced Threat Defense
An advanced tool for detecting hidden "zero-day" threats
Forcepoint NGFW
Forcepoint NGFW
It protects corporate networks with high-performance security technology
Forcepoint Web Security
Forcepoint Web Security
Websense Web Security Gateway analyzes web traffic in real time, ensuring the safe use of the latest Web 2.0 technologies
McAfee Web Gateway
McAfee Web Gateway
A significant means of protection that allows to protect an organization from threats
Rapid7 Nexpose
Rapid7 Nexpose
It analyzes all components of the operating system, database, web applications
Rapid7 Metasploit
Rapid7 Metasploit
It simulates an attack on the network and identifies its security problems
Rapid7 AppSpider
Rapid7 AppSpider
It scans all applications and finds out all weaknesses
Skybox Security
Skybox Security
A set of tools for network security, analytics and reporting
McAfee ePO
McAfee ePO
Centralized presentation of information
McAfee TIE
McAfee TIE
Exchange of information about threats between different security solutions

Complex audits

Comprehensive audits for compliance with regulatory requirements - GOST 57580.1, 382-P, 187-FZ, 152-FZ

An information security audit allows to objectively assess the current state of IT infrastructure security, analyze organizational and administrative documents for compliance with legal requirements, identify vulnerabilities in the infrastructure in a timely manner, and eventually develop a plan for further actions to build or modernize the information security system in the company.

Supply of IT equipment

Our principles

The clients who cooperate with us are satisfied with the results of the work carried out. After all, we base our business on the principles of:
Professionalism
Our experience allows us to create systems with a high level of efficiency and reliability
Modern technologies
Our solutions are based on modern technologies that simplify and improve the efficiency of business processes
Efficiency
Preciseness is our responsibility, we deliver our projects strictly in time
Individual approach
We offer individual solutions based on the customer's IT infrastructure analysis

Our customers