Only in the spring is it planned that the President of the Russian Federation will approve the Regulation on the State SOPKE, and probably the above-mentioned Methodological Recommendations will finally be approved, which means that prudent departments can wait and implement their cyber-attack monitoring centers according to the already approved regulatory documents.
Apparently, similar considerations occurred to decision-makers, since the head of one of the country's most famous attack monitoring centers publicly agitated: "the road is mastered by the one walking" and "the main thing is to start." Apparently, despite the presence of serious competence and a strong brand, there is no queue to see him.
The import substitution trend showed its full force in 2016. australia whatsapp data cybersecurity architectures of government organizations suddenly changed their colors to the tricolor, and the statement “we have the only domestic solution in this class” became, if not a guarantee, then a reason for the product to get into the pilot in those top organizations where Asian and no-name brands, as well as startups, were previously not allowed in. However, there are still a few understandable niches in cybersecurity with only one Russian product, because, realizing the trend, Russian developers began to actively bring products to the market, and sometimes even acquire the source code abroad. Western vendors are not far behind, sometimes not averse to transferring the code and rights to trusted partners in Russia.
Import substitution and where to go next
-
- Posts: 45
- Joined: Sun Dec 22, 2024 8:38 am