Software of Cross-platform system of data integrity monitoring

Software of Cross-platform system of data integrity monitoring

Purpose / Description

The Software of the cross-platform system of data integrity monitoring in automated systems is designed to implement data integrity monitoring of software files and data stored on PC and send messages on the results of running of the program to the security administrator. The monitoring is carried out by comparing the current values of the hash functions of software files with reference values that are generated when setting the program, as well as on the command of the administrator.

PRINCIPAL FEATURES

  • the program runs under Windows 7 operating system and next versions (for the back-end of cross-platform system of data integrity monitoring) and Windows 7 operating system and next versions or Linux family operating system (Ubuntu, Debian) (for the front-end of cross-platform system of data integrity monitoring);
  • cross-platform system of data integrity monitoring operates with the computation library of hash functions value according to Standard of the Republic of Belarus No. 34.101.77-2016.

Performed functions

Cross-platform system of data integrity monitoring performs the following functions:

  • the possibility of flexible setting of control parameters on clients, including remotely setting from the security administrator’s PC;
  • the possibility to create and use control parameter templates for the similar client PCs;
  • generation of reference values of hash functions of controlled files and their recording into the secure storage of the operating system (register or configuration files);
  • checking the integrity of controlled files by reference values of hash functions;
  • generation and transmission of the messages on the results of running of the program to the security administrator;
  • visual display of the system clients state in real time;
  • logging of work results in “Integrity” log on the PC of the security operator;
  • issuing messages on integrity violations to the administrator and user.

Features & Benefits

  • Ability to run under the operating systems of different families;
  • high speed of operation;
  • low network traffic even with a large number of client PCs;
  • reliable cryptographic algorithms that meet the requirements of Standard of the Republic of Belarus No. 34.101.77-2016 "Information technologies and security. Hashing algorithms";
  • Executive Analytical Center Certificate for compliance with the requirements of Standard of the Republic of Belarus No. 34.101.77-2016.