85 terms
A

DevOps Lead, Softline IT. DevOps practice lead at Softline IT. Expertise: Kubernetes deployments for enterprise systems, infrastructure as code (Terraform, Ansible), observability stack (Prometheus, Grafana, Loki), disaster recovery for systems with regulatory uptime requirements. Hands-on with hybrid cloud/on-premise deployments.

Founder of Softline and Intecracy Group. Graduate of Kyiv Polytechnic Institute (KPI) and the International Institute of Management (MIM). In 1995 co-founded Softline, one of Ukraine's first large IT companies. Currently a member of the Supervisory Board of Intecracy Group. Actively participates in IT community events, sharing experience with younger generations of professionals.

Application Programming Interface — a set of protocols and specifications enabling different applications to interact. REST API, SOAP and GraphQL are the most common types. Forms the foundation of modern integration between information systems and microservice architecture.

Description not added yet.

REST, gRPC, GraphQL: designing API contracts for long-term system evolution.

A field of computer science developing systems capable of tasks requiring human intelligence: image recognition, natural language processing, decision-making. In business, used for analytics, automation and forecasting.

B

Large volumes of structured and unstructured data whose processing requires specialised technologies. Characterised by the three Vs: Volume, Velocity and Variety. Used for business analytics and machine learning.

A distributed database where records are grouped into blocks and linked cryptographically. Ensures immutability and transparency of transactions without a central governing authority. Applied for confirming the authenticity and integrity of electronic documents.

Business Continuity Planning — planning measures to ensure organisational operations during and after emergencies. Includes risk analysis, critical system redundancy and Disaster Recovery plans.

Technologies and tools for collecting, analysing and visualising business data to support management decisions. Includes dashboards, reporting and OLAP analysis. Transforms raw data into meaningful insights for leadership.

The use of software to perform repetitive business tasks without or with minimal human involvement. Includes BPM systems, RPA robots and integration platforms. Reduces costs, increases speed and eliminates errors.

C

IT services and technologies delivered over the internet under IaaS, PaaS or SaaS models. Enables resource scaling without purchasing own hardware, paying only for actual consumption.

Capability Maturity Model Integration Level 4: measurable development processes. What it actually delivers.

Code review practices that catch real defects and shape engineering culture.

Regulatory requirements: GDPR, SSSCIP G-3, ISO 27001, EU Cyber Resilience Act.

Customer Relationship Management — software for managing client relationships: storing contacts, tracking deals, automating sales and marketing. Provides a complete picture of every client interaction.

A set of organisational and technical measures ensuring information protection in automated systems in accordance with SSSCIP requirements. Mandatory for government information systems and systems processing classified information.

A set of measures, technologies and processes for protecting computer systems, networks and data from unauthorised access, attacks and damage. Covers technical protection tools, incident response procedures and personnel training.

Protecting enterprise systems from threats: threat modeling, penetration testing, vulnerability management.

D

The process of creating data copies for recovery in the event of loss, damage or a cyber incident. The baseline standard is the 3-2-1 rule: three copies, on two different media types, one stored off-site. Critical for protection against ransomware.

A strategic process of embedding digital technologies into all aspects of an organisation's operations — from business models to internal processes and client interaction. Requires changes to corporate culture and a transition to new ways of working.

Data loss prevention tools — software and hardware solutions that control the transfer of confidential information outside the corporate network. Monitor channels: email, USB, printers, cloud storage and messengers.

Lead Developer, Softline IT. Tech lead for the UnityBase application team. Expertise: TypeScript/Node.js on backend, REST and gRPC API design, query optimization for PostgreSQL and Oracle, observability in distributed systems. Active in code review and test automation practices for enterprise projects.

E

The use of ICT to deliver government services to citizens and businesses electronically, automate internal government processes and increase transparency. In Ukraine implemented via the Diia platform and interdepartmental document management.

Enterprise content management: document workflows, archives, legally binding documents.

A system for long-term storage, retrieval and management of electronic documents while maintaining legal validity. Involves document classification, retention period control, integrity and authenticity verification using a Qualified Electronic Signature.

A system for creating, approving, registering, sending and storing documents in electronic form. Replaces paper-based processes, reduces approval times and eliminates the risk of document loss. Regulated in Ukraine by the Law on Electronic Documents and Electronic Document Management.

Enterprise Resource Planning — a system that automates and integrates key business processes: finance, production, logistics, HR and procurement. Provides a single database for all organisational units.

European cyber-resilience regulation: requirements for commercial software and SaaS vendors in 2026.

G

Software energy efficiency: workload optimization, sustainable cloud, carbon-aware computing.

H

Software for automating human resources management: maintaining personnel records, calculating payroll, planning leave, conducting appraisals and developing competencies. Reduces the administrative burden on HR departments.

An IT architecture combining on-premises infrastructure with a public or private cloud. Critical data is stored locally while scalable workloads move to the cloud. The optimal choice for organisations with strict security requirements.

I

Three cloud service delivery models: IaaS (Infrastructure as a Service) — compute resources, PaaS (Platform as a Service) — development environment, SaaS (Software as a Service) — ready-to-use software via browser. Differ in the level of provider responsibility.

A group of Ukrainian high-technology companies that includes Softline. Develops and maintains the UnityBase platform and provides IT services to the public and corporate sectors. Founded in 2009.

IQusion IT LLC is one of the leading Ukrainian IT companies and a member of the Intecracy Group. The company specializes in the development of high-tech information and analytical systems for national security and defense, public administration, local government, financial institutions, large enterprises, and organizations of various forms of ownership. The company’s core software products have been certified by the State Service of Special Communications and Information Protection of Ukraine and have received expert conclusions confirming compliance with technical information protection requirements at trust level G-2 in accordance with ND TZI 2.5-004–99.

Solution Architect, Softline IT. Enterprise solution architect at Softline IT. Specialty: integrating legacy systems with modern platforms, designing end-to-end information flows, data modeling for ECM and BPM rollouts. Experience with state registries, banking systems, and ERP engagements.

State dependence on IT solutions from foreign — particularly adversarial — producers as a sovereignty threat. The use of Russian software in Ukraine's critical infrastructure was officially recognised as a national security threat following 2022.

Transferring IT functions or processes to external providers: infrastructure support, software development, cybersecurity. Allows organisations to focus on core business and gain access to highly specialised expertise.

An organisation's IT infrastructure capacity to maintain continuous operation under armed conflict conditions: power outages, missile strikes and personnel loss. Includes backup power, geographically distributed data centres and recovery plans.

K

Container orchestration: Kubernetes deployments for enterprise systems, ingress, service mesh.

L

Strangler pattern, gradual replacement of legacy systems without business interruption.

Platforms for rapid enterprise development: when low-code accelerates, when it becomes a constraint.

M

An electronic document management software suite built on the UnityBase platform. Used by government bodies, local authorities and large corporations. Has a certified secured version for handling classified information.

An identity verification method requiring confirmation via two or more independent factors: something you know (password), have (phone, token) or are (biometrics). Significantly reduces the risk of unauthorised access even when a password is compromised.

Multi-tenant architecture: tenant isolation, shared vs separate databases, data security.

Entrepreneur, investor and expert on attracting investment into startups. Holds two degrees — in law and finance. Co-owner and member of the Supervisory Board of Intecracy Group. Supports M&A processes for Ukrainian and foreign companies and actively promotes Ukrainian software in Europe. Presents on system integration, IT for the defence sector, decision support systems for the Armed Forces and PMI-standard project management.

N
O

Monitoring distributed systems: metrics, logs, traces. Prometheus, Grafana, OpenTelemetry.

The process of revoking an employee's access rights and accounts upon dismissal or transfer. Improper offboarding is a critical vulnerability: statistics show over 25% of cyber incidents involve actions by former or disgruntled employees.

CTO, Softline IT. Technical lead with over 20 years of experience designing and building enterprise systems on the UnityBase platform. Expertise: scalable architecture for systems with hundreds of thousands of concurrent users, high-load information system design, low-code platforms, multi-tenant deployments.

Head of Security, Softline IT. Head of information security across Softline products. Expertise: comprehensive information security system (KSZI) design, SSSCIP G-3 compliance, RBAC/ABAC access models, audit trails in systems with critical data. Background in penetration testing, threat modeling, regulatory compliance.

P

A set of legal, organisational and technical measures to safeguard citizens' personal information. Regulated in Ukraine by the Law on Personal Data Protection. Organisations are obliged to obtain consent for processing and to report breaches.

A form of cybercrime in which attackers impersonating trusted organisations obtain confidential data via fake emails, websites or messages. The most common attack vector: over 90% of successful attacks begin with a phishing email.

R

A type of malicious encryption software that blocks access to files and demands a ransom for restoration. Spreads via phishing emails, software vulnerabilities and compromised credentials. One of the most destructive cyber threats to businesses.

Access control models: role-based vs attribute-based, hybrid approaches in enterprise systems.

Return on Investment — a measure of investment efficiency showing the ratio of profit to cost. For IT projects, ROI is calculated through cost reduction, productivity gains, error elimination and new capabilities unlocked by the system.

S

A protected workstation — a set of technical and organisational measures for corporate device security: disk encryption, MDM management, VPN, antivirus, access rights configuration and automatic software updates.

Programmes for raising employee awareness on information security matters. Include training, phishing attack simulations and regular knowledge testing. The human factor is responsible for over 80% of successful cyberattacks.

Ukrainian IT expert with industry experience since the mid-1990s. Graduate of Kyiv Polytechnic Institute (KPI) and the International Institute of Management (MIM). Member of the Supervisory Board of Intecracy Group. Specialises in cybersecurity, information resource protection and IT for Ukraine's Defence and Security Forces. Regularly presents to the defence sector on HR systems for the Armed Forces, IT intelligence, cyber defence and automation.

Ukrainian IT specialist, working in the IT industry of Ukraine for over 30 years. Serhiy Balashuk has a specialized higher education, and also graduated from the International Institute of Management (IIM), where he defended his thesis on business process management, business strategies and management principles based on the concept of a balanced scorecard. Currently, Serhiy is implementing his professional skills and accumulated professional experience in numerous IT projects of the company "Aiquzhn IT", where he works as a director. Mr. Balashuk is respected in the professional community of Ukrainian IT specialists, as he regularly participates in international and all-Ukrainian professional events as a speaker and lecturer.

The use by employees of IT systems, applications and services without the knowledge or approval of the IT department. Creates hidden security risks, as such solutions do not comply with corporate standards for data protection and backup.

Information systems for centralised registration of objects, entities or rights in accordance with legislation. Ukraine operates registries of real estate, enterprises, greenhouse gases and others. Subject to heightened requirements for security and availability.

The process of combining separate IT systems, modules and databases into a unified information space. Enables heterogeneous systems to exchange data in real time via API, data buses or other integration mechanisms.

Integrating heterogeneous systems: ESB, message brokers, event-driven approach.

U

Unmanned aerial vehicles used for reconnaissance, surveillance, delivery and strike missions. During the war in Ukraine, UAVs have become a key means of conducting combat operations. Require specialised software for control and processing of reconnaissance data.

Intecracy Group's proprietary industrial low-code platform for developing corporate and government information systems. Supports 500,000 concurrent users and 130+ TB of data. Has a secured version, UnityBase Defense, with SSSCIP assurance level G-3.

Y

Yuriy Syvytsky is a Ukrainian IT expert with experience in the industry since the early 1990s, a graduate of Kyiv Polytechnic Institute and the International Institute of Management (MIM), and a co-owner of one of Ukraine’s first major IT companies — Softline JSC (now Softline IT). He currently serves as a member of the Supervisory Board of Intecracy Group, mentors IT startup founders, and is активно involved in public activities, including serving as Chairman of the Board of the Software Ukraine Association and participating in the Ukrainian Business Council and other initiatives.