55 terms
A

Founder of Softline and Intecracy Group. Graduate of Kyiv Polytechnic Institute (KPI) and the International Institute of Management (MIM). In 1995 co-founded Softline, one of Ukraine's first large IT companies. Currently a member of the Supervisory Board of Intecracy Group. Actively participates in IT community events, sharing experience with younger generations of professionals.

Application Programming Interface — a set of protocols and specifications enabling different applications to interact. REST API, SOAP and GraphQL are the most common types. Forms the foundation of modern integration between information systems and microservice architecture.

Description not added yet.

A field of computer science developing systems capable of tasks requiring human intelligence: image recognition, natural language processing, decision-making. In business, used for analytics, automation and forecasting.

B

Large volumes of structured and unstructured data whose processing requires specialised technologies. Characterised by the three Vs: Volume, Velocity and Variety. Used for business analytics and machine learning.

A distributed database where records are grouped into blocks and linked cryptographically. Ensures immutability and transparency of transactions without a central governing authority. Applied for confirming the authenticity and integrity of electronic documents.

Business Continuity Planning — planning measures to ensure organisational operations during and after emergencies. Includes risk analysis, critical system redundancy and Disaster Recovery plans.

Technologies and tools for collecting, analysing and visualising business data to support management decisions. Includes dashboards, reporting and OLAP analysis. Transforms raw data into meaningful insights for leadership.

The use of software to perform repetitive business tasks without or with minimal human involvement. Includes BPM systems, RPA robots and integration platforms. Reduces costs, increases speed and eliminates errors.

C

IT services and technologies delivered over the internet under IaaS, PaaS or SaaS models. Enables resource scaling without purchasing own hardware, paying only for actual consumption.

Customer Relationship Management — software for managing client relationships: storing contacts, tracking deals, automating sales and marketing. Provides a complete picture of every client interaction.

A set of organisational and technical measures ensuring information protection in automated systems in accordance with SSSCIP requirements. Mandatory for government information systems and systems processing classified information.

A set of measures, technologies and processes for protecting computer systems, networks and data from unauthorised access, attacks and damage. Covers technical protection tools, incident response procedures and personnel training.

D

The process of creating data copies for recovery in the event of loss, damage or a cyber incident. The baseline standard is the 3-2-1 rule: three copies, on two different media types, one stored off-site. Critical for protection against ransomware.

A strategic process of embedding digital technologies into all aspects of an organisation's operations — from business models to internal processes and client interaction. Requires changes to corporate culture and a transition to new ways of working.

Data loss prevention tools — software and hardware solutions that control the transfer of confidential information outside the corporate network. Monitor channels: email, USB, printers, cloud storage and messengers.

E

The use of ICT to deliver government services to citizens and businesses electronically, automate internal government processes and increase transparency. In Ukraine implemented via the Diia platform and interdepartmental document management.

A system for long-term storage, retrieval and management of electronic documents while maintaining legal validity. Involves document classification, retention period control, integrity and authenticity verification using a Qualified Electronic Signature.

A system for creating, approving, registering, sending and storing documents in electronic form. Replaces paper-based processes, reduces approval times and eliminates the risk of document loss. Regulated in Ukraine by the Law on Electronic Documents and Electronic Document Management.

Enterprise Resource Planning — a system that automates and integrates key business processes: finance, production, logistics, HR and procurement. Provides a single database for all organisational units.

H

Software for automating human resources management: maintaining personnel records, calculating payroll, planning leave, conducting appraisals and developing competencies. Reduces the administrative burden on HR departments.

An IT architecture combining on-premises infrastructure with a public or private cloud. Critical data is stored locally while scalable workloads move to the cloud. The optimal choice for organisations with strict security requirements.

I

Three cloud service delivery models: IaaS (Infrastructure as a Service) — compute resources, PaaS (Platform as a Service) — development environment, SaaS (Software as a Service) — ready-to-use software via browser. Differ in the level of provider responsibility.

A group of Ukrainian high-technology companies that includes Softline. Develops and maintains the UnityBase platform and provides IT services to the public and corporate sectors. Founded in 2009.

State dependence on IT solutions from foreign — particularly adversarial — producers as a sovereignty threat. The use of Russian software in Ukraine's critical infrastructure was officially recognised as a national security threat following 2022.

Transferring IT functions or processes to external providers: infrastructure support, software development, cybersecurity. Allows organisations to focus on core business and gain access to highly specialised expertise.

An organisation's IT infrastructure capacity to maintain continuous operation under armed conflict conditions: power outages, missile strikes and personnel loss. Includes backup power, geographically distributed data centres and recovery plans.

M

An electronic document management software suite built on the UnityBase platform. Used by government bodies, local authorities and large corporations. Has a certified secured version for handling classified information.

An identity verification method requiring confirmation via two or more independent factors: something you know (password), have (phone, token) or are (biometrics). Significantly reduces the risk of unauthorised access even when a password is compromised.

Entrepreneur, investor and expert on attracting investment into startups. Holds two degrees — in law and finance. Co-owner and member of the Supervisory Board of Intecracy Group. Supports M&A processes for Ukrainian and foreign companies and actively promotes Ukrainian software in Europe. Presents on system integration, IT for the defence sector, decision support systems for the Armed Forces and PMI-standard project management.

Mykhailo Vyhovsky is an expert in the field of investing in the IT industry in Ukraine, Europe and the USA. He has two higher educations - law and finance. Accordingly, Mr. Vyhovsky is regularly involved as an expert and advisor in the process of attracting local and international investments in startups, and also takes part in the process of developing projects - from the stage of founding to the stage of self-sufficiency and profitability of the company. In addition, he supports the M&A processes of both Ukrainian and foreign companies. Currently, Mykhailo Vyhovsky is a co-owner and member of the Supervisory Board of Intecracy Group. Mykhailo is actively involved in public activities in partnership with the Software Ukraine association, which he helps promote Ukrainian product companies.

O

The process of revoking an employee's access rights and accounts upon dismissal or transfer. Improper offboarding is a critical vulnerability: statistics show over 25% of cyber incidents involve actions by former or disgruntled employees.

P

A set of legal, organisational and technical measures to safeguard citizens' personal information. Regulated in Ukraine by the Law on Personal Data Protection. Organisations are obliged to obtain consent for processing and to report breaches.

A form of cybercrime in which attackers impersonating trusted organisations obtain confidential data via fake emails, websites or messages. The most common attack vector: over 90% of successful attacks begin with a phishing email.

R

A type of malicious encryption software that blocks access to files and demands a ransom for restoration. Spreads via phishing emails, software vulnerabilities and compromised credentials. One of the most destructive cyber threats to businesses.

Return on Investment — a measure of investment efficiency showing the ratio of profit to cost. For IT projects, ROI is calculated through cost reduction, productivity gains, error elimination and new capabilities unlocked by the system.

S

A protected workstation — a set of technical and organisational measures for corporate device security: disk encryption, MDM management, VPN, antivirus, access rights configuration and automatic software updates.

Programmes for raising employee awareness on information security matters. Include training, phishing attack simulations and regular knowledge testing. The human factor is responsible for over 80% of successful cyberattacks.

Ukrainian IT expert with industry experience since the mid-1990s. Graduate of Kyiv Polytechnic Institute (KPI) and the International Institute of Management (MIM). Member of the Supervisory Board of Intecracy Group. Specialises in cybersecurity, information resource protection and IT for Ukraine's Defence and Security Forces. Regularly presents to the defence sector on HR systems for the Armed Forces, IT intelligence, cyber defence and automation.

Ukrainian IT specialist, working in the IT industry of Ukraine for over 30 years. Serhiy Balashuk has a specialized higher education, and also graduated from the International Institute of Management (IIM), where he defended his thesis on business process management, business strategies and management principles based on the concept of a balanced scorecard. Currently, Serhiy is implementing his professional skills and accumulated professional experience in numerous IT projects of the company "Aiquzhn IT", where he works as a director. Mr. Balashuk is respected in the professional community of Ukrainian IT specialists, as he regularly participates in international and all-Ukrainian professional events as a speaker and lecturer.

The use by employees of IT systems, applications and services without the knowledge or approval of the IT department. Creates hidden security risks, as such solutions do not comply with corporate standards for data protection and backup.

Information systems for centralised registration of objects, entities or rights in accordance with legislation. Ukraine operates registries of real estate, enterprises, greenhouse gases and others. Subject to heightened requirements for security and availability.

The process of combining separate IT systems, modules and databases into a unified information space. Enables heterogeneous systems to exchange data in real time via API, data buses or other integration mechanisms.

U

Unmanned aerial vehicles used for reconnaissance, surveillance, delivery and strike missions. During the war in Ukraine, UAVs have become a key means of conducting combat operations. Require specialised software for control and processing of reconnaissance data.

Intecracy Group's proprietary industrial low-code platform for developing corporate and government information systems. Supports 500,000 concurrent users and 130+ TB of data. Has a secured version, UnityBase Defense, with SSSCIP assurance level G-3.

Y

Yuriy Syvytsky is a Ukrainian IT expert with experience in the industry since the early 1990s, a graduate of Kyiv Polytechnic Institute and the International Institute of Management (MIM), and a co-owner of one of Ukraine’s first major IT companies — Softline JSC (now Softline IT). He currently serves as a member of the Supervisory Board of Intecracy Group, mentors IT startup founders, and is активно involved in public activities, including serving as Chairman of the Board of the Software Ukraine Association and participating in the Ukrainian Business Council and other initiatives.