Digital Pioneers: Where Information Security Goes

Digital Pioneers: Where Information Security Goes

Ilya Borisov

Modern technologies are blurring borders, changing cultures and thus setting a new level of competition in the market, including opening the way for small technology companies to enter the B2B market, even
in spite of the inherent inertia of consumers and the relatively low risk appetite. The historic “from the garage” to the “unicorns” still works, but the dinosaurs of the market also got involved
into this game, creating and promoting internal startups – changing to compete.

This approach has created the preconditions for the emergence of internal competition for digital transformation projects, especially in the wake of leadership’s interest in breakthrough technologies and the need for change
traditional business models.

From the point of view of information security services, it is the perfect time to move from resource center to profit center.


The chilling comparisons of data with the oil and blood of the digital economy have a practical basis. Most modern digitization solutions are based on data processing,
the more data, the better. This allows you to find not always obvious patterns and connections, as well as obtain more sophisticated and flexible management tools that can change and
track parameters are generally not visible to company management.

In recent years, information security services have received not only tools to collect a large variety of data from enterprise information systems, but also great opportunities
for their processing. The key to this is the understanding of the company’s business executives, in particular, the mechanisms of revenue and cost generation, as well as the ability to build processes
and communication skills.

Classic examples are time and attendance systems that can be improved by enriching data on running applications, processes, and
files from employees’ devices are opened.

A deeper level of analytics is the transition to estimating the volume of project work based on changes in files and data in information systems. After all, even the smallest effect leaves
the digital footprint, and the ability to cumulatively evaluate such footprints, especially in the face of a temporary retrospective, is an invaluable tool for managerial decision making.

At the next level, it is possible to build predictive models based on historical data and current performance, identify key employees and financial risks.

To demonstrate the idea, imagine that the project requires 100 files, each containing 10,000 characters. Obviously, counting the number of characters is
metric, however, is not the best, since the input is dependent on many external factors and the distribution of the number of characters over time is not uniform. However, by tying the number of characters to
employees and the status of the document, you can already talk about the expected time (with the average number of characters for each employee) and productivity, as well as the quality of documentation – by
the number of changes after the project is transferred to the customer.

By normalizing datasets by project teams, we can talk about the effectiveness of executives, adding financial metrics and the success of individual activities or even the feasibility
work with certain customers.


Henry Ford came up with a conveyor belt – an ideal model for profit by consistently repeating the same operations. In today’s world, each of the operations has not only a digital footprint
not only the data at each step, but also the mechanisms that allow you to make adjustments on the go.

The evolutionary step of IB is the transition from infrastructure, data and IT services protection to business protection, be it reputation losses or losses due to changes in business processes.

Searching for anomalies and deviations in the data has long been and successfully used in antifrod systems, and in recent years, the IB service has been available to SIEM systems, which are also
offer advanced analytics and search for variances.

All the more striking is the lack of such functionality in modern enterprise performance management systems, which contain information on key production indicators,
and the logic of business processes. And here the information security services have the opportunity to apply their existing experience and tools beyond the usual range of tasks.

Process analysis based on the example of our project can also answer questions related to efficiency. If there are deviations from standard procedures on successful projects, it means that
project staff and managers find ways to get around inefficient and outdated requirements. For example, by analyzing timing labels, you can draw conclusions about how and by whom you are actually
the document is approved and whether or not the responsible person examines the submitted material before signing, and does not really look at it. You can also see who has the documents
depend on how much it affects the timing.

Competition and cooperation

Digitalization is not only a competitive advantage in the market, but also within the company. Departments that will be able to offer a quicker transition to new ways to profit will benefit
access to resources and their executives the opportunity to sit at the same table with top management.

However, it is not the rivalry but the cooperation that matters to the management of the companies. Willingness to negotiate, jointly seek results and, consequently, the need for
to employees with pronounced leadership qualities, communication skills and advanced emotional intelligence – what is now commonly combined under the term soft-skills.

For information security departments, the above means a paradigm shift and a shift to new functionality. From the role model of the watchman and the observer to the profit center or as
minimum, competitive advantage, which is difficult to achieve alone.


Digital transformation is the same as the exploration of the New World – vastly poorly explored and apparently rich territories. The pioneering pioneers changed North America and largely formed the classic
a model based on personal initiative, a spirit of entrepreneurship, independence and independence, a lack of habit to rely on the protection of the state, and in general on any protection.

Information security services are well placed to become digital pioneers, those who make a significant contribution to shaping the future of culture. It is not enough to believe in yourself and yourself
proven tools – you need to manage risks, be flexible and look for opportunities where others have not found anything.

The digital age is already here, and the cry of the Soviet pioneers is more relevant than ever: “Always be ready!”

digital transformation

IT-Manager Magazine [№ 01/2020],

Ilya Borisov

Ilya Borisov

Thyssenkrupp Industrial Solutions COO

Twenty-eight years on: what digital transformation has shown

Twenty-eight years on: what digital transformation has shown

Paul Poti

In 1992, by chance, I started working in the IT profession. Five different industries, eleven countries, a wide range of corporate cultures, have flowed into the travel suitcase over time,
organizations of various scales – public, private, public. In addition to IT and consulting, he worked with neighbors on organizational structure – in the service of staff, with manufacturers, in
sales and finance.

Twenty-eight years is enough to get older at least three times. It is not enough to make forecasts twenty-eight years in advance. The normal term is to compare what was in the organization,
what went on is what will become important in the coming years and that he does not want to go.

Digit: deep penetration

Nine years ago, we talked to Pekka Villakainen, creator of IT companies and products, consultant, visionary, on the pages of the magazine. In the interview, I asked the traditional question about the role and place of information technology in
to the work of organizations and received the following answer: “Let’s imagine a not so distant future, say, 2020. How do you think there will be more IT or less in organizations (in any field of activity)? ».

The 90s systems covered only the core business processes within organizations and were built around transactions. In addition, at the heart of their work were completely different cycles: the financial statements were summarized in
At the end of the first decade of next month, the sales report also became available at the end of the period. The systems of different organizations have just begun to “talk” to each other.

The two thousand and twentieth year came much faster than desired. IT solutions today have penetrated processes both in breadth and in depth. Production and service can be tracked separately
operations and their effectiveness, the sales system can track how a customer makes a purchase decision (we all know that our smartphone is not looking and listening to us, right?), financial
the condition is desirable to predict, at least – to see online. With the dynamics of sales – the same.

Note not a word about artificial intelligence and the Internet of Things. More importantly, the figure has penetrated the processes of interaction of participants and changed the rules of the game. The number of ordering platforms counted
taxis abolished all dispatches at once, food order aggregators changed the landscape of catering establishments, completely different players came to the glass and granite bank buildings, and
the impact of social networks and e-commerce companies falls within the eyes of top-level regulators.

IT can change an organization, but it can make it part of the past. Depending on the industry, this happens at different speeds, but IT has definitely grown more in all processes. Only this is quite
other technologies than twenty-eight, and even fifteen years ago. No wonder the first manager of a very large bank said the phrase: “We spent a lot of time on automation.
Now you have to throw it away and do everything from scratch and differently. ”

Borders and Arrangements

From the point of view of the landscape of systems, the last decade of the twentieth century was difficult: at each site of a geographically distributed enterprise, a set of systems that were associated with
centrally and through each other through reporting or information sharing (for example, TMC internal relocation orders). The two thousand have brought the Internet and centralization – first to systems, and then to
business processes and units.

Technology has made possible the emergence of internal and external service centers. They solved the tasks of receiving orders, accounting, HR administration, IT services, which were previously the prerogative
field units. It was then that the CIOs came under the first serious fire from the management of the units, which lost control of business processes, management.
requirements for IT systems. The work and results of these executives have become many times more transparent than before.

The pendulum of centralization has often moved so that new processes are either lost in quality or sabotaged. When outsourcing processes (outsourcing), not everything worked out as well
conceived, so the fashion for outsourcing is often changed to “everything back”, “doing as it was.”

That level of complexity is no match for the landscape of our time: business processes can be performed on the internal systems of the enterprise, on external platforms, in state
systems (there may later migrate a number of accounting and reporting processes), even on management and maintenance platforms for machinery and equipment, from machine tools to agricultural machinery.

It is not easy to deal with data: they can relate to the traditional perimeter of the enterprise, buy from commercial operators, borrow from state systems. The data manager can
face the challenge of purchasing or even renting data sets to train their AI systems. Therefore, there must be completely different competencies within its organization – both legal and

Visionary companies are quite serious about the need for a metric of the workforce of humans and robots (both virtual and physical). It will affect the business processes at
licensing, security, organizational culture.

For an IT executive, this means that other stakeholders, both internally and externally, will appear in his field of view. New questions will arise that will need to be achieved
arrangements. And not at any time in the future, but with the speed of IT implementation inherent in 2020.

Competition and evolution

The future is unevenly distributed. Perhaps this is for the better if post-apocalypse is considered a possible future option. In this case, there are a significant number of organizations for which
the trends I have marked go beyond their field of view. Not visible – not relevant. A shared service center may well be an innovation and business process reengineering
a competence that they have just begun to master.

The life of an IT executive can proceed quite calmly, especially in the case of favorable market position of the enterprise. However, there are a number of factors that did not appear yesterday and may change
the situation is very fast:

  1. Platforms and solutions are rapidly crossing borders of markets and countries. Previously, technology companies took months and years to build a presence in a new country, but now
    getting a trial license, such as RPA, is a matter of one hour of correspondence with their fast, digital, centralized sales team. If the new solution does not try the CIO – to him
    business executives will look at it, and then they will deliver the IT worker before the fact of implementation.

  2. Business executives already understand: you control your processes, structure, data only if you control your IT system. So now to see among those responsible for the implementation of systems
    CIOs are more of a hello than the past. I do not mean to say that the CIO is dead, after all, everyone decides for themselves, but the role, balance, powers have definitely shifted.

  3. The IT field, as long as I know no less than highes, unfulfilled hopes and disappointments, than the noble industries of achieving eternal beauty and immortality. It’s been years of tuning in to what will happen
    a long-term trend that is really new that will change organizations and raise them to another level of effectiveness. Most likely, we will see not one or two “digital
    Transformation “through the introduction of a monolithic integrated IT system, while leading world companies at the same time will analyze completely different scenarios – for example, to compare options
    between the outsourcing of processes to external platforms and our own specialized IT development.

IT systems are crossing the boundaries of organizations and countries, changing the principles of activity of companies, industry, states. The IT Leader Opportunity Window is monitoring what the world is doing
organizations – leaders of digital change, forecasting, strategy development and implementation, mediation in complex decision making and internal and external agreements
stakeholders. You will need a range of skills from builder to psychotherapist.

Architectures and solutions will become more complex, there will be other risks, scenarios, ethical dilemmas. There are other requirements for the speed achieved through the ability to experiment,
make and admit mistakes, move on. Transformation is not easy, it’s when you don’t always know what the end result will look like.

We look 360 degrees on the sides, up, down and especially in the future. Fasten your seat belts. And the future 28 years later is again thoroughly closed by the fog of IT.

digital transformation

IT-Manager Magazine [№ 01/2020],

Paul Potie

Paul Poti

IT expert. Permanent author of the magazine

Tattelecom provided free access to socially significant Internet services

Tattelecom provided free access to socially significant Internet services

Tattelecom, operating in the Volga Federal District, has provided its subscribers with free access in a test mode to a number of socially significant Internet services. use
they will NOT be charged and will be possible even with zero or negative balance.

On January 15, President of Russia Vladimir Putin instructed to prepare and implement the project “Accessible Internet”, which will provide people with free access to the Federal Assembly
socially relevant internet services. These include the portal of state services, websites of federal and regional authorities. It is expected that access to such resources across the country will be free of charge from 1
March 2020. Currently, a complete list of services is formed in the Ministry of Digital Development, Communications and Mass Communications of the Russian Federation, together with the operators is another preparatory

For Tattelecom subscribers – individuals – access to the federal and Tatarstan portals of state services ( and became free of charge
mobile applications – “state services” and “state services RT”, access to the sites of the President of the Russian Federation (, the Government of the Russian Federation (, the Federation Council of the Russian Federation (, the State Duma of the Russian Federation
(, President of RT (, Government of RT (, State Council of RT (, portal «E-education in the Republic
Tatarstan »( and the Health Portal of the Republic of Tatarstan (

electronic government services, Mobile Communications

How are you, Ilon Musk? 14% of Russians sympathize with Tesla’s founder

How are you, Ilon Musk? 14% of Russians sympathize with Tesla

Superjob found out which of the foreign businessmen like Russians. The open poll was attended by 1000 representatives of economically active population from all districts of the country.

Ilon Musk wins the hearts of Russians – 14% of respondents favor CEO Tesla and SpaceX. US President Donald Trump and Microsoft Bill Co-Founder got 6% of the vote
Gates. Steve Jobs is sympathetic to 5% of Russians. 2% of respondents admire the description of the automotive industry – Henry Ford. 1% of Russians sympathize with Virgin Group founder Richard
Branson, investment banker Warren Buffett, Facebook social network founder Mark Zuckerberg, entrepreneur and writer Robert Kyosaki, the first dollar billionaire John Rockefeller and Jack
Founder of Alibaba Group.

In the seven years since the conduct of a similar study, Russians’ sympathy for Ilon Mask has increased many times: from 1% in 2013 to 14% today. There was also some interest in Donald
Trump: 4 and 6% respectively. Russians were less likely to sympathize with Bill Gates, Steve Jobs, and Richard Branson. They left Barack Obama and George Soros (not mentioned by any respondent).
Beginner of the 2020 rating – Alibaba Group founder Jack Ma.

By the way, Russia’s top-ranked favorite could increase his $ 2.3 billion worth of assets in an hour by raising Tesla’s market capitalization. The value of the stock increased in New York
the stock exchange rose 2.49% to the level of $ 80.99, followed by another 12% to reach $ 649. As a result, Ilona’s state is estimated at $ 36 billion.

The survey results are as follows:

respondents’ answers



No one is cute



Ilon Musk



Bill Gates



Donald Trump



Steve Jobs



Henry Ford



Richard Branson



Warren Buffett



Mark Zuckerberg



Robert Kiosaki



John Davison Rockefeller



Jack Ma



George Soros



Barak Obama






Difficult to answer



Ilon Musk, Tesla Electric Cars


Print securely and in full control with Kyocera Net Manager

Print securely and in full control with Kyocera Net Manager

Maxim Belous

No matter how organized business is, it has never been profitable, but nowadays, lack of care in business is tantamount to virtually complete commercial failure. Competitors in any field
enough of them, and many of them do not mind living on other people’s trade secrets. Customers are free to choose from dozens, even hundreds, of similar offers online. In such a situation it is simple
do not do without reliable protection of your data and profound optimization of non-core costs.

The most logical first step on this path is the reorganization of office printing, which many businessmen, unfortunately, do not even think about. But keep away from the humble eyes
Confidential information, as well as material savings, is today quite realistic with minimal financial, time and labor costs – by increasing efficiency
printing and document management. Kyocera’s Kyocera Net Manager (KNM) software is ready to help.

Being a comprehensive integrated platform for optimizing control over printing costs and ensuring enterprise information security, this software acts as a
an intermediate node between digital document creation and storage devices, on the one hand, and printing, scanning, and copying hardware, on the other. The result is sent to
print jobs from any PC, smartphone, or other device connected to the LAN, are pre-processed according to predefined policies, and then
redirect to the optimal printer for this task.

The stage of automatic pre-processing provides, first and foremost, a dramatic increase in information security during the office workflow. With built-in function
Print & Follow documents are in the queue and are waiting for the moment when the employee authorized to get them will personally approach the specified printer or MFI to confirm their readiness
get a printout for him. Thus, virtually eliminating the entry of important papers (preconditions for a contract not yet concluded, for example) is not in the wrong hands, but
hence further leakage of confidential data to competitors.

In addition, clearly tying each page to a clearly defined employee’s account fine-tunes the staff, reducing the organization’s non-core costs
without any additional effort on the part of its management. Nobody dares to use the printed resource in an improper way in the conditions of complete deanonymization of the printing tasks. Moreover,
most often, business owners are truly amazed at the cost reduction after KNM implementation – in the absence of specialized controls it is extremely difficult to evaluate the entire scope
misuse of printing technique by unscrupulous employees.


And the fact is that, compared to the turnover of even a small company, a separate cartridge, not to mention a stack of paper, is not prohibitively expensive. Regular replenishment of consumables
materials are perceived by all departments – from the central office accounting department to the last remote branch – as an inevitability. No one particularly monitors the cost of printing,
and it is extremely difficult technically in the absence of special software. As a result, printers and MFPs are operated under heavy load and, unfortunately, are far from always targeted

KNM completely eliminates this problem by automatically monitoring the operation of printing devices and controlling the costs involved. Each job is sent to the printer
recorded in the statistics log on the server. KNM allows you to assign differentiated print policies to any employee and business unit: maximum permissible
the quality of the print, the permission / prohibition of color printing, the limit on the number of pages for a certain period, etc. And in parallel, such a problem as “junk” printing is eliminated. every task
is displayed on the paper only after the mentioned authorization of the employee ready to receive it directly on the printer or MFP: is there still no one more “forgets” ceased to be suddenly necessary
paper in the output trays. Any unused print jobs that are stored in KNM are automatically deleted after some time.

Another important aspect of the organization of office printing and workflow in general is often completely neglected by management: the low efficiency of handling incoming papers. on a routine
Operations such as scanning documents, manually indexing and markup, detecting frequent errors during text recognition are very time consuming. Now, thanks to KNM, it works
to effectively automate these processes and to achieve not only fast and accurate digitization of papers, but also to route the digitally translated documents on pre-specified routes, without
human involvement by forming operational and long-term thematic archives with the ability to search effectively for metadata.


Despite the breadth of the KNM’s functional palette, it does not require specially trained staff for its initial setup and regular operation. Administrators and ordinary users of the system
have a well-structured, intuitive interface that provides deep personalization to simplify and accelerate the most commonly performed
printer or MFP tasks. Yes, the integrated authentication tool gives employees access to perform certain tasks by entering a PIN, name / password, or application
VD-cards, if the unit is equipped with the appropriate module. Two-step authentication is also possible – for example, by combining a VD card and a PIN code, which significantly reduces
the likelihood of unauthorized access to print jobs, copying and scanning.

If the MFP is often used to digitize documents with the digital mail being forwarded to a designated folder, fax machine, or e-mail address, to an external
cloud repository or corporate document management system, optimizing these tasks will help the scanner to a function where the function is meant in advance
the destination specified. After that, digital copy delivery (including metadata) will be digitally pressed, which will greatly speed up routine inbound processing

A dedicated application for mobile document management is KYOCERA Mobile, which supports both cellphone and tablet printing and later scanning
digital copy to mobile device. Mobile printing, like any other within the KNM controlled office infrastructure, is fully reflected in a sophisticated reporting system.
It keeps detailed statistics of all printed, scanned and copied documents, keeps a record of printing costs with layout for each user separately and in queues, or

The ability to roam tasks using KNM will be required by large organizations that have large offices and / or have a well-developed affiliate structure. This allows you to choose automatically
closest to the user and best suited to the tasks created by the printer or MFP. Employees, who often need to scan documents, will come to the rescue
separately licensed KNM capability as an intelligent workflow: managing scanning with subsequent text recognition and subsequent automatic sending of digitized
documents to a predefined location (file server folder, cloud storage, mailing address, etc.) according to current metadata.

Another feature of KNM, essential for customers with a developed branch structure, is local print buffering. It allows you to do without print servers in each of the branches by using
only KNM offline login for user authentication and task management. The ability to synchronize users provides support for various authentication methods, including
integration with Azure Active Directory.

If the enterprise LAN needs unloading, KNM provides client spooling – a noticeable reduction in network traffic by spooling up the task on the client PC and releasing it to
any printer. At the same time, users have the ability to print jobs using the functions of offline login, local spooling and KNM Port Monitor
even in the absence of communication with the server, which significantly increases the print resiliency.

System administrators, IB staff, or managers have the ability to archive all printed, copied, and scanned documents using the task archiving feature.
However, for the sake of security, reporting details (job titles, user ID) can only contain the number of prints per department or cost center, providing
thus, anonymity and privacy of tasks.

Before submitting a task to KNM, the user must undergo an authentication procedure that allows them to confidently distinguish even employees working on the same computer. There will be no task
Sent if the selected user’s print limit is exhausted – in which case the user will receive a notification of the current print policies through integration with the KX driver. Unified
Kyocera interface provides KNM integration with other Kyocera software as well as third-party software. Users can view previews of digital imaging tasks in
print queues and individual confirmation of each job, as well as offline login – the printer will cache users’ credentials for seven days,
allows them to copy and print even if the connection to the server is unavailable.

In general, KNM web-based printers provide customers with a particularly convenient way of managing the digitization and output of documents at each level, thereby reducing costs
operation of printing technique and increasing the level of information security. All of this is available virtually out of the box – right after installing the latest Kyocera printing equipment.

In other words, optimization of non-core business expenses should not be delayed, but it just makes sense to start with the office printing infrastructure – for which KNM provides the widest range

print management

IT-Expert Magazine [№ 01/2020],


HP has launched new Chromebooks

HP has launched new Chromebooks

HP Inc. introduced new laptops based on the Chrome OS operating system at BETT 2020. The devices are designed to work for students and teachers and are highly durable.

The new HP Chromebook 11 G8 Education Edition (EE), HP Chromebook 11A G8 EE, HP Chromebook 11 x360 G3 EE and HP Chromebook 14 G6 are secured collaboration devices that
will help schools to develop students ‘and students’ critical thinking skills, creativity and teamwork skills.


The HP Chromebook 11 G8 EE and HP Chromebook 11A G8 EE get an 11-inch screen. They run on Intel or AMD processors running Chrome OS. Novelties withstand a fall from a height of 76 cm
concrete surface, 122 cm high on a wooden surface, and have been tested by HP Total Test Process and meet the MIL-STD 810G standard. The new chromebook keyboard is resistant to spilling up to 350
ml of fluid and protected from keystrokes. During collaborative projects, students can share Android and G Suite applications on an HD IPS anti-glare touchscreen (available
optional). In addition, students can work together remotely in real-time using a webcam and HP Extended Range Wireless LAN technology to increase network coverage.


The Intel Chromebook x360 11 G3 EE Intel-based processor comes with a transformer body, an optional HP Wacom EMR stylus and two cameras. Students can shoot, print, write by hand or
draw in any of four modes: presentation, multimedia console, tablet or classic laptop.

The HP Chromebook 14 G6, based on Chrome OS and Intel processor, comes with USB-C and HDMI ports, as well as a 14-inch screen, an HD camera, two microphones, support for up to 8GB of operative
memory and storage capacity of 128 GB. Students can also connect to wireless networks even at high coverage density with WLAN 802.11 ac, MU-MIMO and HP Extended adapters
Range Wireless LAN. With the optional Chrome Enterprise Upgrade service, IT professionals have the ability to control devices, user actions, and downloaded software for up to ten,
one hundred or even thousands of HP Chromebooks.


Students interact with HP Classroom Manager software, which is required to manage and lock devices from the console on the teacher’s work computer.

In Russia, models are available on request.



LG has released a home 4K CineBeam HU70LS projector

LG has released a home 4K CineBeam HU70LS projector

LG Electronics (LG) Introduces Compact Home Cinema Projector LG CineBeam HU70LS with 4K UHD (3840×2160), 4-Channel LED Light Source, Brightness 1500
Lumens and ample opportunities for wireless connections.

The 4-channel LED light source uses a separate 3 RGB colors and dynamic green. Because dynamic green adjusts brightness and tone, LG CineBeam LED provides more
realistic image.

LG HU70LS projection diagonal up to 140 inches. The projector, using XPR technology, delivers 4K UHD (3840 x 2160) resolution, equivalent to 8.3 million pixels.

The device also uses Wheel-less LED technology, that is, without a color wheel, to help avoid flaws in the type of fading of LCD panels and the effect of rainbow DLP. thanks to an improved one
zoom functions up to 1.25 times and remote focus allows the user to adjust the screen size without moving the projector. Even if the HU70LS is mounted on the ceiling, it can be operated from
using the Magic remote control. Among other things, the HU70LS uses HDR10 c Dynamic Tone Mapping technology, optimizing frame-by-frame based on flower information laid
in the original, and with TruMotion technology it generates additional frames, which increases the smoothness in dynamic scenes. TruMotion even works in 4K, HDR and high frame rate up to

The HU70LS, like other CineBeam models, works with webOS 4.5 and supports Miracast wireless connectivity for displaying a mobile screen to a large projection
screen. IOS devices are connected using the LG TV Plus mobile application.

Also, any Bluetooth-enabled audio device can be connected to the LG HU70LS projector.



Cisco has offered a comprehensive IIoT IB architecture

Cisco has offered a comprehensive IIoT IB architecture

Cisco has introduced an IoT security architecture that monitors and protects IT infrastructure, operating environment, and production processes. New solutions provide collection and
getting data across the IoT border to help organizations grow, make better business decisions, and accelerate digital transformation.

One of the components of the architecture is Cisco Cyber ​​Vision, a software security solution for the automatic detection of production objects, implemented on a portfolio basis
Cisco Industrial IoT (IIoT) Industrial Internet of Things. It analyzes traffic from connected production facilities, creates a segmentation policy for Cisco ISE and DNA Center solutions,
interfere with the horizontal movement of threats in the operating environment, and, using Cisco Talos threat analytics, monitor cybersecurity threats in real time for
production facilities and processes that affect performance time, productivity and safety.

In addition, the solutions implement strategic data governance (Data Governance) from border to multi-cloud. Combined with industry networks, Cisco Edge Intelligence makes it easy to get
data at the network border. It streamlines data delivery to multi-cloud and local recipients, helping businesses improve data management at critical stages of their lifecycle from startup to

Cisco has simplified infrastructures that include multi-vendor hardware, multiple data sources, and manufacturing facilities by offering cybersecurity solutions to the Internet of Things
can be managed on any of Cisco’s gateways, switches or routers, combining end-to-end information security with simplified data management.



How big data helps telecom companies

How big data helps telecom companies

Ilya Semenov

Big Data is changing virtually every area of ​​our lives, and business first. But for some reason, not all companies, even large ones, have switched to using this technology.

As you know, Big Data allows you to analyze the behavior of shoppers or Internet users by tracking which sites they visit, where they are, and where they regularly visit, at which
hours and to whom they call, what programs they download and how they use them, etc.

Big Data and telecom operators

One of the biggest owners of big data in Russia is the telecom operators, through whose billing systems daily flow streams of information about many thousands of subscribers. As a result, they are
really know almost everything about us, down to passport data and phone models. And all this information can be monetized. As soon as the business understands this, Big Data is turning from a trend into a must
have, under which the whole structure of telecommunication operators begins to be rebuilt.

Using Big Data, Operators Increase Revenue: Flexibility of Offers and Context Retains Customers and Attracts New, and Big Data Analytics Enables Product Managers
it is directed to act in accordance with the product development strategy.

But to offer something, we need services that will provide the client with content, and the operator with data on which to analyze and generate new content. The more data, the more
the better you can build a portrait or customer avatar, the better you can analyze. The portrait of the client must be constantly enriched, as many data quickly become out of date on the axis of time.


The world around is changing fast, and the model of work of companies should change thereafter. The modern subscriber is the consumer of many services, and the monomodels of work with the user are a thing of the past.
Providing only communication services is not enough – the world is becoming an ecosystem. A true customer-oriented operator, provides converged services, organizes its own
marketplace, interoperability interaction with external services and operators, and its data is syntactically and semantically homogeneous, which gives a marked field for learning models of algorithms
intellectual analysis. Customer-centricity is perceived by the individual: if previously relevant offers were targeted at Group customer segments, now –
to a specific customer. The interoperability of the interaction of services with each other leads to the fact that in a heterogeneous network of heterogeneous services, information becomes equally interpreted and
semantically consistent. Recommendation systems are starting to work more accurately, personalized, using predictive models.

Keeping up-to-date customers requires new technologies, new interfaces, new communications and new content. Subscribers can no longer offer static content – they need it
adjust. This leads to the transformation of the industry. Ecosystems entails the development of various services that are related to communication services. Not only operators, but also,
for example, financial and IT businesses, creating cross-ecosystem competition. New technologies, such as IoT, will help to associate additional activities with the client.
This is a new data source that will enhance the quality of the virtual client model in the carrier’s systems. The client’s transparency will increase, which will allow him to work with him more personalized.


Now, carriers collect large amounts of data per subscriber – as structured (actions, events, completed forms, transactions, transactions, purchases, favorite restaurants, websites visited and
etc.) and unstructured (e.g., voice traffic). Any client events are recorded with respect to the time axis.

What Big Data Solve?

Of particular value are the specialized applications in which the data is marked. Their analysis becomes simpler and more accurate. Those operators whose ecosystems have financial and medical services,
you can say they know everything. Any human activity on the Web is a source of new information that participates in forecasting its needs at some point in time. Accumulated data and
environmental data contribute to the development of algorithms for quality content generation. For example, customer geolocation surrounding external geolocation services (such as movie theaters,
restaurants and stores), customer-driven applications on a smartphone, visited resources, spending time in relevant resources and services, the content of those resources are all data sources,
enter the decision support system.

So, the British company JJ Food Service, which supplies food to restaurants and cafes, fills its customers’ shopping carts online based on their shopping history and recommendations,
this takes into account the recipes of establishments, similar orders from other users, etc. About 80% of these goods are actually left in the shopping cart and paid for.

Large retailers, such as Target, identify customers by bank card, name, or email, track their shopping histories, preferences, and activity in
social networks and make appropriate proposals.


Big Data is the key to an operator’s future success. Whoever learns to analyze them well will be the winner. Data analysis enables you to make the right decisions. One of the main goals
operators – retaining loyal customers and increasing profitability from one subscriber. We need to work on this. There are great examples of profitable businesses on the market that have focused on big ones
data: for example, Netflix earns up to 75% on purchases of goods offered by the recommendation system, which is based on both collaborative filtering algorithms and
personalized. Amazon is working in the same direction, increasing the profitability of its business.

Regardless of the methods used to handle big data, most tasks are a simple one: identify patterns of subscribers / users and provide appropriate
product or service on time. The operator knows his subscriber better, it is easier for the operator to build a strategy of its development, to estimate potential demand. Big data analytics helps you take it
optimal management decisions and reduce errors.

Big Data Tasks:

  • Customer segmentation by behavioral characteristics (descriptive analytics).

  • Development and launch of new products / services.

  • Formation of predicative proposals.

  • Product / service life cycle forecasting.

  • Speeding up customer service and deciding whether to provide / deny service.

  • Reduced support costs.

Big Data telecoms are used to evaluate the existing subscriber pool and to predict their behavior to adequately expand the list of services. Now subscribers are increasingly calling,
send SMS and use the Internet more. This allows Big Data telecom operators to analyze their customers’ preferences and then offer them
personalized sets, such as downloadable content. Another thing is, not everyone likes that his traffic is being analyzed by anyone, not even a human, but a robot. But this issue is already being addressed in
each country in its own way.

The future behind Big Data

Many telecom operators are already learning to work with big data and offer solutions based on it. But all the fun is ahead. Big Data and machine learning can be used to build intellectual ones
services of analysis of voice data, video stream. By understanding the meaning of language content, you can build online customer interaction. Scientists at the Massachusetts Institute of Technology have developed
neural network models that have learned to recognize human health by biomarkers in his voice. Video content analysis can be used to classify emotions with application
Deep Learning technologies. The combination of both technologies – audiovisual content recognition – will improve the accuracy and naturalness of communication with the client.


The IT market is already offering systems for data analysis and decision making, and we anticipate a technological leap in consumers of these decisions in the coming years. Obviously, the future of the operator
is built on Big Data and AI technologies, including:

  • decision support systems (DSS);

  • predictive analytics and data mining systems;

  • natural language processing systems;

  • systems of language technologies;

  • computer vision systems;

  • process control systems, etc. technology.

Thus, it is safe to say that operators will transform, diversify, develop their services and infrastructure, train their data analysis systems to
fight for the customer and keep him in his ecosystem.

Big Data, Telecommunications

IT-Expert Magazine [№ 01/2020],

Ilya Semenov

Director of Development and Quality Management at Bercut.

Russian MIG T10 x86 goes on sale

Russian MIG T10 x86 goes on sale

Anna Savelyeva

Russia’s Astra Linux and Mobile Inform Group (MIG) have launched a secure MIG T10 tablet focused on electricity, mining, manufacturing, construction and
transport. The novelty is the older MIG T8 and, according to the manufacturers, is able to withstand 100-degree temperature fluctuations.

The Russian tablet works on Astra Linux Eagle, Astra Linux Smolensk or Windows 10 Pro. Inside the protected domestic solutions not Elbrus or Baikal, which have already been optimized
Astra Linux, and a quad-core Intel Celeron N3450 up to 2.5 GHz. It also houses a 11500 mAh lithium-polymer battery. Can he work 14 hours in the cold at -20
degrees, and 4-5 hours at -30 degrees – a controversial issue, but the manufacturer is confident in this, as well as the fact that the novelty will withstand the fall of 1.2 meters on the concrete floor. But the device accurately supports
Hot swap batteries.


The diagonal of the display was 10 inches, the resolution was 1920×1200. The amount of MIG T10 memory is 4 or 8 GB, the internal memory is 64, 256 or 512 GB. In addition to two USB 3.0 Type-A connectors, a microSD slot
up to 256 GB and support for two SIM cards, the “strict” tablet was lucky to get USB Type-C, 13.56 MHz NFC and a QR code scanner. To connect the periphery, it was awarded a Pogo-pin port as well
LTE modem, Wi-Fi 802.11ac and Bluetooth 4.1. From satellite navigation to solution are GPS, GLONASS, BeiDou and Gallileo. Weighs a “one-of-a-kind product” at 1060 grams in size
256x185x17 mm.

Not to forget about the 8MP camera with sensor, autofocus and flash, as well as the front camera with a resolution of 5 MP.


Since this is an industrial device, it must be protected. Digging noted the “special architecture” of the tablet, which should save it from vibrations, shocks and falls. And support
Astra Linux, among other things, makes it safe in the eyes of the FSTEC GIS, the Defense Ministry and the FSB of Russia. Optionally, you can insert a fingerprint scanner to check information, check
identity and biometric data collection right outside.

Potentially, the manufacturer wants to release about 18,000 devices and, in the name of import substitution, identify them to government customers, in anticipation of high demand. It is worth this “unique product” 105 118
rubles. You can also buy on AliExpress, there is a painfully familiar and very similar tablet offered for 45,000


Tablet, Import Substitution