<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2020-5-4-0-5</article-id><article-id pub-id-type="publisher-id">2238</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>INFORMATION SECURITY AS A SERVICE&amp;nbsp;IN THE NEW REMOTE WORLD</article-title><trans-title-group xml:lang="en"><trans-title>INFORMATION SECURITY AS A SERVICE&amp;nbsp;IN THE NEW REMOTE WORLD</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Velichko</surname><given-names>Maxim Sergeevich</given-names></name><name xml:lang="en"><surname>Velichko</surname><given-names>Maxim Sergeevich</given-names></name></name-alternatives><email>maksim_velichko_2000@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2020</year></pub-date><volume>5</volume><issue>4</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2020/4/ИТ_5.pdf" /><abstract xml:lang="ru"><p>The year 2020 in the Russian Federation led to changes in the work of companies, government agencies, and information security departments in particular, which in turn attracted the attention of all of the above to the redevelopment of further business operations.

The primary factor that has led to changes in the information security market in the Russian Federation and, in principle, around the world, is the transition of an overwhelming number of companies to remote operation due to an unexpected pandemic. Due to the spontaneous nature of changes, organizations were forced to rebuild on the go, change methods and methods of ensuring information security, and even make the transition to new technical means for recognition on the &amp;ldquo;friend&amp;ndash;foe&amp;rdquo; principle, including using artificial intelligence. There was also a huge problem with the staff, their experience, literacy and equipment of workplaces at home, including their security. There was a clear problem that required an immediate solution and a way out of the current situation without large losses and with minimal costs.</p></abstract><trans-abstract xml:lang="en"><p>The year 2020 in the Russian Federation led to changes in the work of companies, government agencies, and information security departments in particular, which in turn attracted the attention of all of the above to the redevelopment of further business operations.

The primary factor that has led to changes in the information security market in the Russian Federation and, in principle, around the world, is the transition of an overwhelming number of companies to remote operation due to an unexpected pandemic. Due to the spontaneous nature of changes, organizations were forced to rebuild on the go, change methods and methods of ensuring information security, and even make the transition to new technical means for recognition on the &amp;ldquo;friend&amp;ndash;foe&amp;rdquo; principle, including using artificial intelligence. There was also a huge problem with the staff, their experience, literacy and equipment of workplaces at home, including their security. There was a clear problem that required an immediate solution and a way out of the current situation without large losses and with minimal costs.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>business</kwd><kwd>remote mode of operation</kwd><kwd>information security</kwd><kwd>"remote"</kwd><kwd>information security technologies</kwd></kwd-group><kwd-group xml:lang="en"><kwd>business</kwd><kwd>remote mode of operation</kwd><kwd>information security</kwd><kwd>"remote"</kwd><kwd>information security technologies</kwd></kwd-group></article-meta></front><back /></article>