{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementationDetail":{"description":{"ru":"Описание","_type":"localeString","en":"Description"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"show":{"_type":"localeString","en":"Show more","ru":"Показать ещё"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"details":{"_type":"localeString","en":"Details","ru":"Подробности"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"additional-info":{"_type":"localeString","en":"Additional information","ru":"Дополнительная информация"},"project-was-put":{"en":"The project has been delivered on schedule","ru":"Проект был сдан в срок","_type":"localeString"},"budget-not-exceeded":{"en":"The budget has not been exceeded","ru":"Бюджет не был превышен","_type":"localeString"},"functionally-task-assignment":{"_type":"localeString","en":"Functionality complies with task","ru":"Функциональность соответствует задаче"},"similar-implementations":{"en":"Similar deployments","ru":"Схожие внедрения","_type":"localeString"},"source":{"_type":"localeString","en":"Source:","ru":"Источник:"},"price":{"ru":"Цена:","_type":"localeString","en":"Price: "},"pluses":{"ru":"Плюсы","_type":"localeString","en":"Advantages"},"raiting":{"en":"Raiting","ru":"Общая оценка","_type":"localeString"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"product":{"ru":"Продукт","_type":"localeString","en":"Product"},"canceled":{"_type":"localeString","en":"Canceled","ru":"Отменено"},"deal-canceled":{"_type":"localeString","en":"Deal canceled","ru":"Сделка отменена"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"en":"Finished","ru":"Завершено","_type":"localeString"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"_type":"localeString","en":"Planned","ru":"Планируется"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"date":{"_type":"localeString","en":"Deployment date","ru":"Дата внедрения"},"roi":{"ru":"ROI","_type":"localeString","en":"ROI"},"not-yet-converted":{"en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"ru":"Выйти","_type":"localeString","en":"logout"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"en":"to","ru":"до","_type":"localeString"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"category":{"en":"Category","ru":"Категория","_type":"localeString"},"follow":{"_type":"localeString","en":"Follow","ru":"Следить"},"add-product":{"en":"Add Product","ru":"Добавить продукт","_type":"localeString"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"_type":"localeString","en":"Filter","ru":"Фильтр"},"clear-button":{"en":"Сlear","ru":"Очистить","_type":"localeString"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"en":"product categories","ru":"категориz продуктаhjle","_type":"localeString"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"apply-filter-button":{"_type":"localeString","en":"Apply filter","ru":"Применить фильтр"},"sorting-toggle":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"en":"Product Categories","ru":"Категории продуктов","_type":"localeString"},"countries":{"en":"Countries","ru":"Страны","_type":"localeString"},"seller":{"en":"Seller","ru":"Продавец","_type":"localeString"},"vendors":{"en":"User products vendors","ru":"Производители продуктов пользователя","_type":"localeString"},"suppliers":{"en":"User suppliers","ru":"Поставщики пользователя","_type":"localeString"},"business-process":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"business-objectives":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"ru":"С референсами","_type":"localeString","en":"With reference"},"show-deal-checkbox":{"en":"Show deal with noname","ru":"Показывать сделки с noname","_type":"localeString"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"company-size":{"en":"Company size","ru":"Размер компании","_type":"localeString"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"en":"Sellers","ru":"Поставщики, Производители","_type":"localeString"},"supply-types":{"en":"Supply type","ru":"Тип поставки","_type":"localeString"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"en":"Company type","ru":"Тип компании","_type":"localeString"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"en":"Customers","ru":"Покупатели","_type":"localeString"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"_type":"localeString","en":"Deployment date","ru":"Дата внедрения"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"en":"Deal closed","ru":"Сделка закрыта","_type":"localeString"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"_type":"localeString","en":"Finished","ru":"Завершено"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"_type":"localeString","en":"Competencies","ru":"Компетенции"}}},"translationsStatus":{"implementationDetail":"success","filters":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"implementationDetail":{}},"pageMetaDataStatus":{"implementationDetail":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"drweb-desktop-security-suite-dlja-strakhovoi-kompanii":{"id":311,"title":"Dr.Web Desktop Security Suite для страховой компании","description":"Юрсофт компания поставила лицензии Dr.Web Desktop Security Suite для компании «Гарант-Авто», обеспечив тем самым информационную безопасность и защиту клиентской информации.\r\nВнедрение завершено в июне 2016 года. Наталья Шарвадзе, председатель правления страховой компании «Гарант-Авто» отметила, что работа антивируса компанию устраивает.","alias":"drweb-desktop-security-suite-dlja-strakhovoi-kompanii","roi":0,"seo":{"title":"Dr.Web Desktop Security Suite для страховой компании","keywords":"компании, Desktop, Гарант-Авто, страховой, Security, Suite, Шарвадзе, июне","description":"Юрсофт компания поставила лицензии Dr.Web Desktop Security Suite для компании «Гарант-Авто», обеспечив тем самым информационную безопасность и защиту","og:title":"Dr.Web Desktop Security Suite для страховой компании","og:description":"Юрсофт компания поставила лицензии Dr.Web Desktop Security Suite для компании «Гарант-Авто», обеспечив тем самым информационную безопасность и защиту"},"deal_info":"","user":{"id":3909,"title":"GARANT-AUTO","logoURL":"https://old.b4r.io/uploads/roi/company/GARANT-AVTO.gif","alias":"garant-avto","address":"","roles":[],"description":"СК «ГАРАНТ-АВТО» - одна из лидирующих компаний страховой отрасли в Украине, предоставляющая страхование для юридических и физических лиц.\r\nВиды страхования:\r\n- автомобильное,\r\n- добровольное медицинское страхование, \r\n- страхование строительно-монтажных рисков, финансовых рисков и т.д.\r\n","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.garant-auto.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"GARANT-AUTO","keywords":"GARANT-AUTO","description":"СК «ГАРАНТ-АВТО» - одна из лидирующих компаний страховой отрасли в Украине, предоставляющая страхование для юридических и физических лиц.\rВиды страхования:\r-","og:title":"GARANT-AUTO","og:description":"СК «ГАРАНТ-АВТО» - одна из лидирующих компаний страховой отрасли в Украине, предоставляющая страхование для юридических и физических лиц.\rВиды страхования:\r-","og:image":"https://old.b4r.io/uploads/roi/company/GARANT-AVTO.gif"},"eventUrl":""},"supplier":{"id":193,"title":"Yursoft","logoURL":"https://old.b4r.io/uploads/roi/company/Screen_Shot_2017-06-28_at_74101_PM.png","alias":"jursoft","address":"","roles":[],"description":"Yursoft is an experienced software reseller","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":31,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":3,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.yursoft.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Yursoft","keywords":"Yursoft, reseller, software, experienced","description":"Yursoft is an experienced software reseller","og:title":"Yursoft","og:description":"Yursoft is an experienced software reseller","og:image":"https://old.b4r.io/uploads/roi/company/Screen_Shot_2017-06-28_at_74101_PM.png"},"eventUrl":""},"vendors":[{"id":2794,"title":"Dr.Web","logoURL":"https://old.b4r.io/uploads/roi/company/Dr.Web.png","alias":"drweb","address":"","roles":[],"description":"Dr.Web is a Russian anti-malware company and the name of its flagship software suite. First released in 1992, it became the first anti-virus service in Russia.\r\n\r\nThe company also offers anti-spam solutions and is used by Yandex, Russia's biggest search provider, to scan e-mail attachments. There is also an add-on for all major browsers which checks links with the online version of Dr Web.\r\n\r\nDr.Web has withdrawn from AV tests such as Virus Bulletin VB100% around 2008 stating that they no longer represent the ability to counteract contemporary malware threats.\r\n\r\nSource: https://en.wikipedia.org/wiki/Dr._Web","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":1,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"http://www.drweb.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Dr.Web","keywords":"Russia, company, also, such, around, VB100, Virus, Bulletin","description":"Dr.Web is a Russian anti-malware company and the name of its flagship software suite. First released in 1992, it became the first anti-virus service in Russia.","og:title":"Dr.Web","og:description":"Dr.Web is a Russian anti-malware company and the name of its flagship software suite. First released in 1992, it became the first anti-virus service in Russia.","og:image":"https://old.b4r.io/uploads/roi/company/Dr.Web.png"},"eventUrl":""}],"products":[{"id":1005,"logo":false,"scheme":false,"title":"Dr.Web Desktop Security Suite","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"drweb-desktop-security-suite","companyTypes":[],"description":"Dr.Web products:\r\n\r\n Dr.Web for Windows (32&64 bit versions)\r\n Dr.Web KATANA (32&64 bit versions)\r\n Dr.Web for Linux (32&64 bit versions)\r\n Dr.Web for OS X (32&64 bit versions)\r\n Dr.Web Console scanners\r\n Dr.Web Control Center","shortDescription":"Dr.Web Desktop Security Suite - Protection of workstations, embedded system clients, clients of terminal and virtual servers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dr.Web Desktop Security Suite","keywords":"versions, 3264, Console, scanners, Control, Center, KATANA, Suite","description":"Dr.Web products:\r\r Dr.Web for Windows (32&64 bit versions)\r Dr.Web KATANA (32&64 bit versions)\r Dr.Web for Linux","og:title":"Dr.Web Desktop Security Suite","og:description":"Dr.Web products:\r\r Dr.Web for Windows (32&64 bit versions)\r Dr.Web KATANA (32&64 bit versions)\r Dr.Web for Linux"},"eventUrl":"","translationId":1006,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":336,"title":"Risk or Leaks of confidential information"}]}},"categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Media"}},"comments":[],"references":[],"referencesCount":0,"similarImplementations":[{"id":768,"title":"000012345IT","description":"","alias":"000012345it","roi":0,"seo":{"title":"000012345IT","keywords":"","description":"","og:title":"000012345IT","og:description":""},"deal_info":"","user":{"id":203,"title":"State Savings Bank of Ukraine","logoURL":"https://old.b4r.io/uploads/roi/company/oschadbank.png","alias":"oshchadbank","address":"","roles":[],"description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21, 1999, N 866","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":87,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.oschadbank.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"State Savings Bank of Ukraine","keywords":"Ukraine, Decree, Cabinet, Ministers, 1999, with, established, Company","description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:title":"State Savings Bank of Ukraine","og:description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:image":"https://old.b4r.io/uploads/roi/company/oschadbank.png"},"eventUrl":""},"supplier":{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"},"vendors":[{"id":4063,"title":"Supven","logoURL":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg","alias":"supven","address":"","roles":[],"description":"Описание компании","companyTypes":[],"products":{},"vendoredProductsCount":4,"suppliedProductsCount":7,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":6,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":2,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com/anastasia.filatova.7773","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Supven","keywords":"Supven","description":"Описание компании","og:title":"Supven","og:description":"Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg"},"eventUrl":""},{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"}],"products":[{"id":2152,"logo":false,"scheme":false,"title":"Supven eng","vendorVerified":0,"rating":"2.10","implementationsCount":5,"suppliersCount":0,"alias":"supven-eng","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Supven eng","keywords":"","description":"","og:title":"Supven eng","og:description":""},"eventUrl":"","translationId":2152,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2242,"logo":false,"scheme":false,"title":"IT service 0805","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"alias":"it-service-0805","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IT service 0805","keywords":"","description":"","og:title":"IT service 0805","og:description":""},"eventUrl":"","translationId":2242,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":152,"title":"Contact Center","alias":"contact-center","description":"A call centre or call center is a centralised office used for receiving or transmitting a large volume of requests by telephone. An inbound call centre is operated by a company to administer incoming product support or information inquiries from consumers. Outbound call centers are operated for telemarketing, solicitation of charitable or political donations, debt collection and market research. A contact centre is a location for centralised handling of individual communications, including letters, faxes, live support software, social media, instant message, and e-mail.\r\n\r\nA call centre has an open workspace for call centre agents, with work stations that include a computer for each agent, a telephone set/headset connected to a telecom switch, and one or more supervisor stations. It can be independently operated or networked with additional centres, often linked to a corporate computer network, including mainframes, microcomputers and LANs. Increasingly, the voice and data pathways into the centre are linked through a set of new technologies called computer telephony integration.\r\n\r\nThe contact centre is a central point from which all customer contacts are managed. Through contact centres, valuable information about company are routed to appropriate people, contacts to be tracked and data to be gathered. It is generally a part of company’s customer relationship management.\r\n\r\nSource: https://en.wikipedia.org/wiki/Call_centre","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/contact-center.png"},{"id":337,"title":"Sales","alias":"sales","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Sales.png"},{"id":339,"title":"Marketing","alias":"marketing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/internet_marketing.png"},{"id":341,"title":"Customer Service","alias":"customer-service","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/customer-service.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2244,"logo":false,"scheme":false,"title":"0aбвг","vendorVerified":0,"rating":"3.20","implementationsCount":5,"suppliersCount":0,"alias":"0abcd","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"0aбвг","keywords":"","description":"","og:title":"0aбвг","og:description":""},"eventUrl":"https://calendly.com/anastasia-filatova19/product-consultation","translationId":2245,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":152,"title":"Contact Center","alias":"contact-center","description":"A call centre or call center is a centralised office used for receiving or transmitting a large volume of requests by telephone. An inbound call centre is operated by a company to administer incoming product support or information inquiries from consumers. Outbound call centers are operated for telemarketing, solicitation of charitable or political donations, debt collection and market research. A contact centre is a location for centralised handling of individual communications, including letters, faxes, live support software, social media, instant message, and e-mail.\r\n\r\nA call centre has an open workspace for call centre agents, with work stations that include a computer for each agent, a telephone set/headset connected to a telecom switch, and one or more supervisor stations. It can be independently operated or networked with additional centres, often linked to a corporate computer network, including mainframes, microcomputers and LANs. Increasingly, the voice and data pathways into the centre are linked through a set of new technologies called computer telephony integration.\r\n\r\nThe contact centre is a central point from which all customer contacts are managed. Through contact centres, valuable information about company are routed to appropriate people, contacts to be tracked and data to be gathered. It is generally a part of company’s customer relationship management.\r\n\r\nSource: https://en.wikipedia.org/wiki/Call_centre","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/contact-center.png"},{"id":337,"title":"Sales","alias":"sales","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Sales.png"},{"id":339,"title":"Marketing","alias":"marketing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/internet_marketing.png"},{"id":341,"title":"Customer Service","alias":"customer-service","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/customer-service.png"},{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":767,"title":"011итсер","description":"","alias":"011itser","roi":0,"seo":{"title":"011итсер","keywords":"","description":"","og:title":"011итсер","og:description":""},"deal_info":"","user":{"id":203,"title":"State Savings Bank of Ukraine","logoURL":"https://old.b4r.io/uploads/roi/company/oschadbank.png","alias":"oshchadbank","address":"","roles":[],"description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21, 1999, N 866","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":87,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.oschadbank.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"State Savings Bank of Ukraine","keywords":"Ukraine, Decree, Cabinet, Ministers, 1999, with, established, Company","description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:title":"State Savings Bank of Ukraine","og:description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:image":"https://old.b4r.io/uploads/roi/company/oschadbank.png"},"eventUrl":""},"supplier":{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"},"vendors":[{"id":2957,"title":"AgiliWay","logoURL":"https://old.b4r.io/uploads/roi/company/linkedin-logo_1.png","alias":"agiliway","address":"","roles":[],"description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in Lviv, Ukraine. AgiliWay is a young and fast-growing company founded by a group of IT experts who have been working in IT outsourcing industry more than 20 years in USA and Ukraine and now leverage our experience to provide partners with flexible yet high-quality software development service. AgiliWay is focused on following 3 directions: 1. IT Outsourcing Consulting - full stack of services from helping our clients selecting outsourcing destination in Eastern and Central Europe to building and optimizing development centers using the most suitable approaches like BOT (build-operate-transfer model) or greenfielding or partnering 2.Custom Software Development – on-demand custom software development starting from requirements gathering to solution deployment and to post-implementation maintenance in wide range of technologies including: — Mainstream Technologies (Java, C/C++, MS stack) — BI and Big Data solutions — Web Development — Mobile Development — Quality Management 3. BPO – providing more value to our client by outsourcing different routine processes and functions","companyTypes":[],"products":{},"vendoredProductsCount":12,"suppliedProductsCount":12,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":6,"vendorPartnersCount":1,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"https://agiliway.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"AgiliWay","keywords":"Group, AgiliWay","description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in","og:title":"AgiliWay","og:description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in","og:image":"https://old.b4r.io/uploads/roi/company/linkedin-logo_1.png"},"eventUrl":""},{"id":2773,"title":"1C","logoURL":"https://old.b4r.io/uploads/roi/company/1c.png","alias":"1c","address":"test addressa777","roles":[],"description":"Фирма "1С" основана в 1991 г. и специализируется на разработке, дистрибьюции, издании и поддержке компьютерных программ делового и домашнего назначения. Из собственных разработок фирмы "1С" наиболее известны программы системы "1С:Предприятие", а также продукты для домашних компьютеров и образовательной сферы.","companyTypes":[],"products":{},"vendoredProductsCount":13,"suppliedProductsCount":28,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":5,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"http://www.1c.ru","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"https://slides.roi4presenter.com/iomcr","seo":{"title":"1C","keywords":"software, network, vendors, support, authorized, Novell, Microsoft, world-famous","description":"1C COMPANY\r\nFounded in 1991 1C Company specializes in development, distribution, publishing and support of mass-market software.\r\nAt present 8000 dealers from","og:title":"1C","og:description":"1C COMPANY\r\nFounded in 1991 1C Company specializes in development, distribution, publishing and support of mass-market software.\r\nAt present 8000 dealers from","og:image":"https://old.b4r.io/uploads/roi/company/1c.png"},"eventUrl":"https://calendly.com/solomiia-rymar"},{"id":4063,"title":"Supven","logoURL":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg","alias":"supven","address":"","roles":[],"description":"Описание компании","companyTypes":[],"products":{},"vendoredProductsCount":4,"suppliedProductsCount":7,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":6,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":2,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com/anastasia.filatova.7773","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Supven","keywords":"Supven","description":"Описание компании","og:title":"Supven","og:description":"Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg"},"eventUrl":""},{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"}],"products":[{"id":549,"logo":false,"scheme":false,"title":"Drupal","vendorVerified":0,"rating":"1.80","implementationsCount":1,"suppliersCount":0,"alias":"drupal","companyTypes":[],"description":"Drupal v 7 and v8","shortDescription":"Drupal v 7 and v8","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Drupal","keywords":"Drupal","description":"Drupal v 7 and v8","og:title":"Drupal","og:description":"Drupal v 7 and v8"},"eventUrl":"","translationId":542,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":32,"title":"IT outsourcing","alias":"it-outsourcing","description":"ИТ-аутсорсинг (англ. IT outsourcing) - частичная или полная передача работ по поддержке, обслуживанию и модернизации ИТ-инфраструктуры в руки компаний, специализирующихся на абонентском обслуживании организаций и имеющих штат специалистов различной квалификации. Для них выполнение подобных работ является профильным направлением деятельности.\r\n\r\nИТ-аутсорсинг предполагает делегирование внешней специализированной компании решение вопросов, связанных с разработкой, внедрением и сопровождением информационных систем, как целиком на уровне инфраструктуры предприятия (сопровождение оборудования или ПО), так и объёмов работ, связанных с развитием и/или поддержкой функционирования отдельных участков системы (программирование, хостинг, тестирование и т.д.)\r\nисточник - https://ru.wikipedia.org/wiki/%D0%98%D0%A2-%D0%B0%D1%83%D1%82%D1%81%D0%BE%D1%80%D1%81%D0%B8%D0%BD%D0%B3","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/100_Black_LineIcons_Business_original_vect82.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":650,"logo":false,"scheme":false,"title":"1С:ПРЕДПРИЯТИЕ","vendorVerified":0,"rating":"2.50","implementationsCount":5,"suppliersCount":0,"alias":"1spredprijatie","companyTypes":[],"description":"Первоначально «1С:Предприятие» было предназначено для автоматизации бухгалтерского и управленческого учётов (включая начисление зарплаты и управление кадрами), но сегодня этот продукт находит своё применение в областях, далёких от собственно бухгалтерских задач.\r\n\r\n<span style=\"font-weight: bold;\">Гибкость платформы позволяет применять 1С:Предприятие в самых разнообразных областях:</span>\r\n\r\n\r\n<ul><li>автоматизация производственных и торговых предприятий, бюджетных и финансовых организаций, предприятий сферы обслуживания и т.д.</li><li>поддержка оперативного управления предприятием;</li><li>автоматизация организационной и хозяйственной деятельности;</li><li>ведение бухгалтерского учета с несколькими планами счетов и произвольными измерениями учета, регламентированная отчетность;</li><li>широкие возможности для управленческого учета и построения аналитической отчетности, поддержка многовалютного учета;</li><li>решение задач планирования, бюджетирования и финансового анализа;</li><li>расчет зарплаты и управление персоналом;</li><li>другие области применения.</li></ul>\r\n</p>","shortDescription":"1С:Предприятие — программный продукт компании «1С», предназначенный для автоматизации деятельности на предприятии.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"1С:ПРЕДПРИЯТИЕ","keywords":"учета, автоматизация, Предприятие, зарплаты, поддержка, задач, областях, предприятий","description":"Первоначально «1С:Предприятие» было предназначено для автоматизации бухгалтерского и управленческого учётов (включая начисление зарплаты и управление кадрами),","og:title":"1С:ПРЕДПРИЯТИЕ","og:description":"Первоначально «1С:Предприятие» было предназначено для автоматизации бухгалтерского и управленческого учётов (включая начисление зарплаты и управление кадрами),"},"eventUrl":"","translationId":2431,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":75,"title":"ERP - Enterprise Resource Planning","alias":"erp-enterprise-resource-planning","description":"ERP (англ. Enterprise Resource Planning, планирование ресурсов предприятия) — организационная стратегия интеграции производства и операций, управления трудовыми ресурсами, финансового менеджмента и управления активами, ориентированная на непрерывную балансировку и оптимизацию ресурсов предприятия посредством специализированного интегрированного пакета прикладного программного обеспечения, обеспечивающего общую модель данных и процессов для всех сфер деятельности. ERP-система — конкретный программный пакет, реализующий стратегию ERP.\r\n\r\nКонцепция ERP сформулирована в 1990 году аналитиком Gartner как видение развития методик MRP II и CIM (англ.)\r\n\r\nВнедрение ERP-системы считается фактически необходимым условием для публичной компании и, начиная с конца 1990-х годов, ERP-системы, изначально внедрявшиеся только промышленными предприятиями, эксплуатируются большинством крупных организаций вне зависимости от страны, формы собственности, отрасли.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/ERP","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ERP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2151,"logo":false,"scheme":false,"title":"Supven ru","vendorVerified":0,"rating":"2.10","implementationsCount":5,"suppliersCount":0,"alias":"supven-ru","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Supven ru","keywords":"","description":"","og:title":"Supven ru","og:description":""},"eventUrl":"","translationId":2929,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2244,"logo":false,"scheme":false,"title":"0aбвг","vendorVerified":0,"rating":"3.20","implementationsCount":5,"suppliersCount":0,"alias":"0abcd","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"0aбвг","keywords":"","description":"","og:title":"0aбвг","og:description":""},"eventUrl":"https://calendly.com/anastasia-filatova19/product-consultation","translationId":2245,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[{"id":32,"title":"IT outsourcing","alias":"it-outsourcing","description":"ИТ-аутсорсинг (англ. IT outsourcing) - частичная или полная передача работ по поддержке, обслуживанию и модернизации ИТ-инфраструктуры в руки компаний, специализирующихся на абонентском обслуживании организаций и имеющих штат специалистов различной квалификации. Для них выполнение подобных работ является профильным направлением деятельности.\r\n\r\nИТ-аутсорсинг предполагает делегирование внешней специализированной компании решение вопросов, связанных с разработкой, внедрением и сопровождением информационных систем, как целиком на уровне инфраструктуры предприятия (сопровождение оборудования или ПО), так и объёмов работ, связанных с развитием и/или поддержкой функционирования отдельных участков системы (программирование, хостинг, тестирование и т.д.)\r\nисточник - https://ru.wikipedia.org/wiki/%D0%98%D0%A2-%D0%B0%D1%83%D1%82%D1%81%D0%BE%D1%80%D1%81%D0%B8%D0%BD%D0%B3","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/100_Black_LineIcons_Business_original_vect82.png"},{"id":75,"title":"ERP - Enterprise Resource Planning","alias":"erp-enterprise-resource-planning","description":"ERP (англ. Enterprise Resource Planning, планирование ресурсов предприятия) — организационная стратегия интеграции производства и операций, управления трудовыми ресурсами, финансового менеджмента и управления активами, ориентированная на непрерывную балансировку и оптимизацию ресурсов предприятия посредством специализированного интегрированного пакета прикладного программного обеспечения, обеспечивающего общую модель данных и процессов для всех сфер деятельности. ERP-система — конкретный программный пакет, реализующий стратегию ERP.\r\n\r\nКонцепция ERP сформулирована в 1990 году аналитиком Gartner как видение развития методик MRP II и CIM (англ.)\r\n\r\nВнедрение ERP-системы считается фактически необходимым условием для публичной компании и, начиная с конца 1990-х годов, ERP-системы, изначально внедрявшиеся только промышленными предприятиями, эксплуатируются большинством крупных организаций вне зависимости от страны, формы собственности, отрасли.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/ERP","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ERP.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":761,"title":"0805 IT service+","description":"","alias":"0805-it-service","roi":0,"seo":{"title":"0805 IT service+","keywords":"","description":"","og:title":"0805 IT service+","og:description":""},"deal_info":"","user":{"id":203,"title":"State Savings Bank of Ukraine","logoURL":"https://old.b4r.io/uploads/roi/company/oschadbank.png","alias":"oshchadbank","address":"","roles":[],"description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21, 1999, N 866","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":87,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.oschadbank.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"State Savings Bank of Ukraine","keywords":"Ukraine, Decree, Cabinet, Ministers, 1999, with, established, Company","description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:title":"State Savings Bank of Ukraine","og:description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:image":"https://old.b4r.io/uploads/roi/company/oschadbank.png"},"eventUrl":""},"supplier":{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"},"vendors":[{"id":2957,"title":"AgiliWay","logoURL":"https://old.b4r.io/uploads/roi/company/linkedin-logo_1.png","alias":"agiliway","address":"","roles":[],"description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in Lviv, Ukraine. AgiliWay is a young and fast-growing company founded by a group of IT experts who have been working in IT outsourcing industry more than 20 years in USA and Ukraine and now leverage our experience to provide partners with flexible yet high-quality software development service. AgiliWay is focused on following 3 directions: 1. IT Outsourcing Consulting - full stack of services from helping our clients selecting outsourcing destination in Eastern and Central Europe to building and optimizing development centers using the most suitable approaches like BOT (build-operate-transfer model) or greenfielding or partnering 2.Custom Software Development – on-demand custom software development starting from requirements gathering to solution deployment and to post-implementation maintenance in wide range of technologies including: — Mainstream Technologies (Java, C/C++, MS stack) — BI and Big Data solutions — Web Development — Mobile Development — Quality Management 3. BPO – providing more value to our client by outsourcing different routine processes and functions","companyTypes":[],"products":{},"vendoredProductsCount":12,"suppliedProductsCount":12,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":6,"vendorPartnersCount":1,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"https://agiliway.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"AgiliWay","keywords":"Group, AgiliWay","description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in","og:title":"AgiliWay","og:description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in","og:image":"https://old.b4r.io/uploads/roi/company/linkedin-logo_1.png"},"eventUrl":""},{"id":4063,"title":"Supven","logoURL":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg","alias":"supven","address":"","roles":[],"description":"Описание компании","companyTypes":[],"products":{},"vendoredProductsCount":4,"suppliedProductsCount":7,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":6,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":2,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com/anastasia.filatova.7773","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Supven","keywords":"Supven","description":"Описание компании","og:title":"Supven","og:description":"Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg"},"eventUrl":""},{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"}],"products":[{"id":546,"logo":false,"scheme":false,"title":"Java","vendorVerified":0,"rating":"1.80","implementationsCount":1,"suppliersCount":0,"alias":"java","companyTypes":[],"description":"Java","shortDescription":"Java","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Java","keywords":"Java","description":"Java","og:title":"Java","og:description":"Java"},"eventUrl":"","translationId":546,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":32,"title":"IT outsourcing","alias":"it-outsourcing","description":"ИТ-аутсорсинг (англ. IT outsourcing) - частичная или полная передача работ по поддержке, обслуживанию и модернизации ИТ-инфраструктуры в руки компаний, специализирующихся на абонентском обслуживании организаций и имеющих штат специалистов различной квалификации. Для них выполнение подобных работ является профильным направлением деятельности.\r\n\r\nИТ-аутсорсинг предполагает делегирование внешней специализированной компании решение вопросов, связанных с разработкой, внедрением и сопровождением информационных систем, как целиком на уровне инфраструктуры предприятия (сопровождение оборудования или ПО), так и объёмов работ, связанных с развитием и/или поддержкой функционирования отдельных участков системы (программирование, хостинг, тестирование и т.д.)\r\nисточник - https://ru.wikipedia.org/wiki/%D0%98%D0%A2-%D0%B0%D1%83%D1%82%D1%81%D0%BE%D1%80%D1%81%D0%B8%D0%BD%D0%B3","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/100_Black_LineIcons_Business_original_vect82.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2152,"logo":false,"scheme":false,"title":"Supven eng","vendorVerified":0,"rating":"2.10","implementationsCount":5,"suppliersCount":0,"alias":"supven-eng","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Supven eng","keywords":"","description":"","og:title":"Supven eng","og:description":""},"eventUrl":"","translationId":2152,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2242,"logo":false,"scheme":false,"title":"IT service 0805","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"alias":"it-service-0805","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IT service 0805","keywords":"","description":"","og:title":"IT service 0805","og:description":""},"eventUrl":"","translationId":2242,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":152,"title":"Contact Center","alias":"contact-center","description":"A call centre or call center is a centralised office used for receiving or transmitting a large volume of requests by telephone. An inbound call centre is operated by a company to administer incoming product support or information inquiries from consumers. Outbound call centers are operated for telemarketing, solicitation of charitable or political donations, debt collection and market research. A contact centre is a location for centralised handling of individual communications, including letters, faxes, live support software, social media, instant message, and e-mail.\r\n\r\nA call centre has an open workspace for call centre agents, with work stations that include a computer for each agent, a telephone set/headset connected to a telecom switch, and one or more supervisor stations. It can be independently operated or networked with additional centres, often linked to a corporate computer network, including mainframes, microcomputers and LANs. Increasingly, the voice and data pathways into the centre are linked through a set of new technologies called computer telephony integration.\r\n\r\nThe contact centre is a central point from which all customer contacts are managed. Through contact centres, valuable information about company are routed to appropriate people, contacts to be tracked and data to be gathered. It is generally a part of company’s customer relationship management.\r\n\r\nSource: https://en.wikipedia.org/wiki/Call_centre","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/contact-center.png"},{"id":337,"title":"Sales","alias":"sales","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Sales.png"},{"id":339,"title":"Marketing","alias":"marketing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/internet_marketing.png"},{"id":341,"title":"Customer Service","alias":"customer-service","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/customer-service.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"2020-05-09","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[{"id":32,"title":"IT outsourcing","alias":"it-outsourcing","description":"ИТ-аутсорсинг (англ. IT outsourcing) - частичная или полная передача работ по поддержке, обслуживанию и модернизации ИТ-инфраструктуры в руки компаний, специализирующихся на абонентском обслуживании организаций и имеющих штат специалистов различной квалификации. Для них выполнение подобных работ является профильным направлением деятельности.\r\n\r\nИТ-аутсорсинг предполагает делегирование внешней специализированной компании решение вопросов, связанных с разработкой, внедрением и сопровождением информационных систем, как целиком на уровне инфраструктуры предприятия (сопровождение оборудования или ПО), так и объёмов работ, связанных с развитием и/или поддержкой функционирования отдельных участков системы (программирование, хостинг, тестирование и т.д.)\r\nисточник - https://ru.wikipedia.org/wiki/%D0%98%D0%A2-%D0%B0%D1%83%D1%82%D1%81%D0%BE%D1%80%D1%81%D0%B8%D0%BD%D0%B3","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/100_Black_LineIcons_Business_original_vect82.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":152,"title":"Contact Center","alias":"contact-center","description":"A call centre or call center is a centralised office used for receiving or transmitting a large volume of requests by telephone. An inbound call centre is operated by a company to administer incoming product support or information inquiries from consumers. Outbound call centers are operated for telemarketing, solicitation of charitable or political donations, debt collection and market research. A contact centre is a location for centralised handling of individual communications, including letters, faxes, live support software, social media, instant message, and e-mail.\r\n\r\nA call centre has an open workspace for call centre agents, with work stations that include a computer for each agent, a telephone set/headset connected to a telecom switch, and one or more supervisor stations. It can be independently operated or networked with additional centres, often linked to a corporate computer network, including mainframes, microcomputers and LANs. Increasingly, the voice and data pathways into the centre are linked through a set of new technologies called computer telephony integration.\r\n\r\nThe contact centre is a central point from which all customer contacts are managed. Through contact centres, valuable information about company are routed to appropriate people, contacts to be tracked and data to be gathered. It is generally a part of company’s customer relationship management.\r\n\r\nSource: https://en.wikipedia.org/wiki/Call_centre","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/contact-center.png"},{"id":337,"title":"Sales","alias":"sales","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Sales.png"},{"id":339,"title":"Marketing","alias":"marketing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/internet_marketing.png"},{"id":341,"title":"Customer Service","alias":"customer-service","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/customer-service.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":762,"title":"0805 ИТ сервис+","description":"","alias":"0805-it-servis","roi":0,"seo":{"title":"0805 ИТ сервис+","keywords":"","description":"","og:title":"0805 ИТ сервис+","og:description":""},"deal_info":"","user":{"id":203,"title":"State Savings Bank of Ukraine","logoURL":"https://old.b4r.io/uploads/roi/company/oschadbank.png","alias":"oshchadbank","address":"","roles":[],"description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21, 1999, N 866","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":87,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.oschadbank.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"State Savings Bank of Ukraine","keywords":"Ukraine, Decree, Cabinet, Ministers, 1999, with, established, Company","description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:title":"State Savings Bank of Ukraine","og:description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:image":"https://old.b4r.io/uploads/roi/company/oschadbank.png"},"eventUrl":""},"supplier":{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"},"vendors":[{"id":2773,"title":"1C","logoURL":"https://old.b4r.io/uploads/roi/company/1c.png","alias":"1c","address":"test addressa777","roles":[],"description":"Фирма "1С" основана в 1991 г. и специализируется на разработке, дистрибьюции, издании и поддержке компьютерных программ делового и домашнего назначения. Из собственных разработок фирмы "1С" наиболее известны программы системы "1С:Предприятие", а также продукты для домашних компьютеров и образовательной сферы.","companyTypes":[],"products":{},"vendoredProductsCount":13,"suppliedProductsCount":28,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":5,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"http://www.1c.ru","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"https://slides.roi4presenter.com/iomcr","seo":{"title":"1C","keywords":"software, network, vendors, support, authorized, Novell, Microsoft, world-famous","description":"1C COMPANY\r\nFounded in 1991 1C Company specializes in development, distribution, publishing and support of mass-market software.\r\nAt present 8000 dealers from","og:title":"1C","og:description":"1C COMPANY\r\nFounded in 1991 1C Company specializes in development, distribution, publishing and support of mass-market software.\r\nAt present 8000 dealers from","og:image":"https://old.b4r.io/uploads/roi/company/1c.png"},"eventUrl":"https://calendly.com/solomiia-rymar"},{"id":2957,"title":"AgiliWay","logoURL":"https://old.b4r.io/uploads/roi/company/linkedin-logo_1.png","alias":"agiliway","address":"","roles":[],"description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in Lviv, Ukraine. AgiliWay is a young and fast-growing company founded by a group of IT experts who have been working in IT outsourcing industry more than 20 years in USA and Ukraine and now leverage our experience to provide partners with flexible yet high-quality software development service. AgiliWay is focused on following 3 directions: 1. IT Outsourcing Consulting - full stack of services from helping our clients selecting outsourcing destination in Eastern and Central Europe to building and optimizing development centers using the most suitable approaches like BOT (build-operate-transfer model) or greenfielding or partnering 2.Custom Software Development – on-demand custom software development starting from requirements gathering to solution deployment and to post-implementation maintenance in wide range of technologies including: — Mainstream Technologies (Java, C/C++, MS stack) — BI and Big Data solutions — Web Development — Mobile Development — Quality Management 3. BPO – providing more value to our client by outsourcing different routine processes and functions","companyTypes":[],"products":{},"vendoredProductsCount":12,"suppliedProductsCount":12,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":6,"vendorPartnersCount":1,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"https://agiliway.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"AgiliWay","keywords":"Group, AgiliWay","description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in","og:title":"AgiliWay","og:description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in","og:image":"https://old.b4r.io/uploads/roi/company/linkedin-logo_1.png"},"eventUrl":""},{"id":4063,"title":"Supven","logoURL":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg","alias":"supven","address":"","roles":[],"description":"Описание компании","companyTypes":[],"products":{},"vendoredProductsCount":4,"suppliedProductsCount":7,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":6,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":2,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com/anastasia.filatova.7773","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Supven","keywords":"Supven","description":"Описание компании","og:title":"Supven","og:description":"Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg"},"eventUrl":""},{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"}],"products":[{"id":650,"logo":false,"scheme":false,"title":"1С:ПРЕДПРИЯТИЕ","vendorVerified":0,"rating":"2.50","implementationsCount":5,"suppliersCount":0,"alias":"1spredprijatie","companyTypes":[],"description":"Первоначально «1С:Предприятие» было предназначено для автоматизации бухгалтерского и управленческого учётов (включая начисление зарплаты и управление кадрами), но сегодня этот продукт находит своё применение в областях, далёких от собственно бухгалтерских задач.\r\n\r\n<span style=\"font-weight: bold;\">Гибкость платформы позволяет применять 1С:Предприятие в самых разнообразных областях:</span>\r\n\r\n\r\n<ul><li>автоматизация производственных и торговых предприятий, бюджетных и финансовых организаций, предприятий сферы обслуживания и т.д.</li><li>поддержка оперативного управления предприятием;</li><li>автоматизация организационной и хозяйственной деятельности;</li><li>ведение бухгалтерского учета с несколькими планами счетов и произвольными измерениями учета, регламентированная отчетность;</li><li>широкие возможности для управленческого учета и построения аналитической отчетности, поддержка многовалютного учета;</li><li>решение задач планирования, бюджетирования и финансового анализа;</li><li>расчет зарплаты и управление персоналом;</li><li>другие области применения.</li></ul>\r\n</p>","shortDescription":"1С:Предприятие — программный продукт компании «1С», предназначенный для автоматизации деятельности на предприятии.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"1С:ПРЕДПРИЯТИЕ","keywords":"учета, автоматизация, Предприятие, зарплаты, поддержка, задач, областях, предприятий","description":"Первоначально «1С:Предприятие» было предназначено для автоматизации бухгалтерского и управленческого учётов (включая начисление зарплаты и управление кадрами),","og:title":"1С:ПРЕДПРИЯТИЕ","og:description":"Первоначально «1С:Предприятие» было предназначено для автоматизации бухгалтерского и управленческого учётов (включая начисление зарплаты и управление кадрами),"},"eventUrl":"","translationId":2431,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":75,"title":"ERP - Enterprise Resource Planning","alias":"erp-enterprise-resource-planning","description":"ERP (англ. Enterprise Resource Planning, планирование ресурсов предприятия) — организационная стратегия интеграции производства и операций, управления трудовыми ресурсами, финансового менеджмента и управления активами, ориентированная на непрерывную балансировку и оптимизацию ресурсов предприятия посредством специализированного интегрированного пакета прикладного программного обеспечения, обеспечивающего общую модель данных и процессов для всех сфер деятельности. ERP-система — конкретный программный пакет, реализующий стратегию ERP.\r\n\r\nКонцепция ERP сформулирована в 1990 году аналитиком Gartner как видение развития методик MRP II и CIM (англ.)\r\n\r\nВнедрение ERP-системы считается фактически необходимым условием для публичной компании и, начиная с конца 1990-х годов, ERP-системы, изначально внедрявшиеся только промышленными предприятиями, эксплуатируются большинством крупных организаций вне зависимости от страны, формы собственности, отрасли.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/ERP","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ERP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1412,"logo":false,"scheme":false,"title":"AgiliWay Custom Software development","vendorVerified":1,"rating":"2.80","implementationsCount":2,"suppliersCount":0,"alias":"agiliway-custom-software-development","companyTypes":[],"description":"<ul>\r\n<li>Business requirements gathering and analysis</li>\r\n<li>Solution architecture design</li>\r\n<li>Development</li>\r\n<li>Quality control strategy planning and solution testing</li>\r\n<li>Solution deployment</li>\r\n<li>End-users education and migration support from old systems</li>\r\n<li>Post-implementation maintenance and user support</li>\r\n</ul>\r\n<p>Products(services)</p>\r\n<ul>\r\n<li>Custom Software development </li>\r\n<li>Outsourcing Consulting</li>\r\n<li>Web Dev</li>\r\n<li>Mobile Dev</li>\r\n<li>BigData</li>\r\n<li>QC</li>\r\n<li>BPO</li>\r\n<li>CiviCRM implementation</li>\r\n<li>Odoo Implementation</li>\r\n<li>E-commerce</li>\r\n</ul>\r\n<p> </p>","shortDescription":"Closed-cycle custom software development services starting from client needs collection and analysis, architecture design, solution development, quality control, deployment and maintenance","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AgiliWay Custom Software development","keywords":"support, Solution, Development, education, deployment, End-users, from, migration","description":"\rBusiness requirements gathering and analysis\rSolution architecture design\rDevelopment\rQuality control strategy planning and solution testing\rSolution","og:title":"AgiliWay Custom Software development","og:description":"\rBusiness requirements gathering and analysis\rSolution architecture design\rDevelopment\rQuality control strategy planning and solution testing\rSolution"},"eventUrl":"","translationId":1310,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":538,"title":"Services","alias":"services","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Services.png"},{"id":32,"title":"IT outsourcing","alias":"it-outsourcing","description":"ИТ-аутсорсинг (англ. IT outsourcing) - частичная или полная передача работ по поддержке, обслуживанию и модернизации ИТ-инфраструктуры в руки компаний, специализирующихся на абонентском обслуживании организаций и имеющих штат специалистов различной квалификации. Для них выполнение подобных работ является профильным направлением деятельности.\r\n\r\nИТ-аутсорсинг предполагает делегирование внешней специализированной компании решение вопросов, связанных с разработкой, внедрением и сопровождением информационных систем, как целиком на уровне инфраструктуры предприятия (сопровождение оборудования или ПО), так и объёмов работ, связанных с развитием и/или поддержкой функционирования отдельных участков системы (программирование, хостинг, тестирование и т.д.)\r\nисточник - https://ru.wikipedia.org/wiki/%D0%98%D0%A2-%D0%B0%D1%83%D1%82%D1%81%D0%BE%D1%80%D1%81%D0%B8%D0%BD%D0%B3","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/100_Black_LineIcons_Business_original_vect82.png"},{"id":593,"title":"Mobile Software Development","alias":"mobile-software-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/mobile-application-development11.png"},{"id":595,"title":"iOS Software Development","alias":"ios-software-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ios-programming.png"},{"id":597,"title":"Android Software Application","alias":"android-software-application","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/android-programming.png"},{"id":598,"title":"Mobile Website development","alias":"mobile-website-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/website-development-for-mobile-devices.png"},{"id":601,"title":"Custom Software Development","alias":"custom-software-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/custom-software-development.png"},{"id":615,"title":"Web Development","alias":"web-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web_development.png"},{"id":619,"title":"Drupal Development","alias":"drupal-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/drupal.png"},{"id":621,"title":"WordPress","alias":"wordpress","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Programming-Wordpress.png"},{"id":623,"title":"Magento Development","alias":"magento-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Magento.png"},{"id":625,"title":"Typo3 Development","alias":"typo3-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Typo3.png"},{"id":627,"title":"CSS Development","alias":"css-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/css.png"},{"id":629,"title":"PHP Development","alias":"php-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PHP.png"},{"id":637,"title":"eCommerce development","alias":"ecommerce-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/e-commerce.png"},{"id":639,"title":"HTML Development","alias":"html-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/html.png"},{"id":645,"title":"JavaScript development","alias":"javascript-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/javascript-programming.png"},{"id":647,"title":"Software Testing","alias":"software-testing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/software-testing.png"},{"id":649,"title":"QA - Quality assurance","alias":"qa-quality-assurance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/qa-quality-assurance.png"},{"id":651,"title":"Interface Testing","alias":"interface-testing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/interface-testing.png"},{"id":653,"title":"Applications Development","alias":"applications-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-development.png"},{"id":665,"title":"User Interface Development","alias":"user-interface-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-interface-development.png"},{"id":667,"title":"Database Development","alias":"database-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/database-development.png"},{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/it-project-implementation-services.png"},{"id":731,"title":"IT Project Management","alias":"it-project-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/it-project-management.png"},{"id":733,"title":"Technical Support","alias":"technical-support","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/technical-support.png"},{"id":735,"title":"Installation and configuration","alias":"installation-and-configuration","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/installation-and-configuration.png"},{"id":737,"title":"IT System testing","alias":"it-system-testing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/it-system-testing.png"},{"id":739,"title":"Deployment and Integration Services","alias":"deployment-and-integration-services","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/implementation-and-integration-services.png"},{"id":741,"title":"Proof of Concept","alias":"proof-of-concept","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/justification-of-the-concept.png"},{"id":743,"title":"IT System documentation writing","alias":"it-system-documentation-writing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/writing-it-system-documentation.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1569,"logo":false,"scheme":false,"title":"VAFromEurope","vendorVerified":0,"rating":"1.80","implementationsCount":1,"suppliersCount":0,"alias":"vafromeurope","companyTypes":[],"description":"<p>Qualified Business Process Outsourcing specialists can help you cover routine processes in various areas like:</p>\r\n<ul>\r\n<li>Virtual Assistance</li>\r\n<li>Data Entry</li>\r\n<li>Website Content Management</li>\r\n<li>Virtual Project Management</li>\r\n<li>SEO/SMM and others.</li>\r\n</ul>","shortDescription":"VAFromEurope","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"VAFromEurope","keywords":"Virtual, Management, VAFromEurope, like, Project, Content, Website, Entry","description":"Qualified Business Process Outsourcing specialists can help you cover routine processes in various areas like:\r\rVirtual Assistance\rData Entry\rWebsite Content","og:title":"VAFromEurope","og:description":"Qualified Business Process Outsourcing specialists can help you cover routine processes in various areas like:\r\rVirtual Assistance\rData Entry\rWebsite Content"},"eventUrl":"","translationId":1564,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":538,"title":"Services","alias":"services","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Services.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2151,"logo":false,"scheme":false,"title":"Supven ru","vendorVerified":0,"rating":"2.10","implementationsCount":5,"suppliersCount":0,"alias":"supven-ru","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Supven ru","keywords":"","description":"","og:title":"Supven ru","og:description":""},"eventUrl":"","translationId":2929,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2241,"logo":false,"scheme":false,"title":"ИТ сервис 0805","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"alias":"it-servis-0805","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ИТ сервис 0805","keywords":"","description":"","og:title":"ИТ сервис 0805","og:description":""},"eventUrl":"","translationId":2977,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":503,"title":"Storage Networking","alias":"storage-networking","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/storage-networks.png"},{"id":505,"title":"Entry Level Storage","alias":"entry-level-storage","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/entry-level-storage.png"},{"id":507,"title":"Mission Critical Storage","alias":"mission-critical-storage","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/storage-for-mission-critical-applications.png"},{"id":33,"title":"UPS - Uninterruptible Power Supply","alias":"ups-uninterruptible-power-supply","description":"Исто́чник бесперебо́йного пита́ния, (ИБП) (англ. Uninterruptible Power Supply, UPS) — автоматическое электронное устройство с аккумуляторной батареей, предназначенное для бесперебойного кратковременного снабжения электрической энергией компьютера и его компонентов с целью корректного завершения работы и сохранения данных в случае резкого падения или отсутствия входного питающего напряжения системы.\r\n\r\nИсточник электропитания бесперебойный — вторичный источник электропитания, предназначенный для электропитания при кратковременном отключении основного источника электропитания, а также для защиты от существующих помех в сети с сохранением допустимых параметров для сети основного источника.\r\n\r\nИБП (UPS) — это прежде всего вспомогательное устройство, поэтому для постоянного и долговременного питания компьютера не годится. Лучше всего для этих целей служит другие устройства, например, ИРП — источники резервного питания, генераторы.\r\n\r\nСуществуют 3 типа ИБП: UPS Off-Line, UPS On-Line, UPS Line-Interactive. Другие варианты устройств фактически являются их производными.\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%98%D1%81%D1%82%D0%BE%D1%87%D0%BD%D0%B8%D0%BA_%D0%B1%D0%B5%D1%81%D0%BF%D0%B5%D1%80%D0%B5%D0%B1%D0%BE%D0%B9%D0%BD%D0%BE%D0%B3%D0%BE_%D0%BF%D0%B8%D1%82%D0%B0%D0%BD%D0%B8%D1%8F","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/kisspng-ups.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"2020-05-10","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[{"id":75,"title":"ERP - Enterprise Resource Planning","alias":"erp-enterprise-resource-planning","description":"ERP (англ. Enterprise Resource Planning, планирование ресурсов предприятия) — организационная стратегия интеграции производства и операций, управления трудовыми ресурсами, финансового менеджмента и управления активами, ориентированная на непрерывную балансировку и оптимизацию ресурсов предприятия посредством специализированного интегрированного пакета прикладного программного обеспечения, обеспечивающего общую модель данных и процессов для всех сфер деятельности. ERP-система — конкретный программный пакет, реализующий стратегию ERP.\r\n\r\nКонцепция ERP сформулирована в 1990 году аналитиком Gartner как видение развития методик MRP II и CIM (англ.)\r\n\r\nВнедрение ERP-системы считается фактически необходимым условием для публичной компании и, начиная с конца 1990-х годов, ERP-системы, изначально внедрявшиеся только промышленными предприятиями, эксплуатируются большинством крупных организаций вне зависимости от страны, формы собственности, отрасли.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/ERP","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ERP.png"},{"id":538,"title":"Services","alias":"services","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Services.png"},{"id":32,"title":"IT outsourcing","alias":"it-outsourcing","description":"ИТ-аутсорсинг (англ. IT outsourcing) - частичная или полная передача работ по поддержке, обслуживанию и модернизации ИТ-инфраструктуры в руки компаний, специализирующихся на абонентском обслуживании организаций и имеющих штат специалистов различной квалификации. Для них выполнение подобных работ является профильным направлением деятельности.\r\n\r\nИТ-аутсорсинг предполагает делегирование внешней специализированной компании решение вопросов, связанных с разработкой, внедрением и сопровождением информационных систем, как целиком на уровне инфраструктуры предприятия (сопровождение оборудования или ПО), так и объёмов работ, связанных с развитием и/или поддержкой функционирования отдельных участков системы (программирование, хостинг, тестирование и т.д.)\r\nисточник - https://ru.wikipedia.org/wiki/%D0%98%D0%A2-%D0%B0%D1%83%D1%82%D1%81%D0%BE%D1%80%D1%81%D0%B8%D0%BD%D0%B3","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/100_Black_LineIcons_Business_original_vect82.png"},{"id":593,"title":"Mobile Software Development","alias":"mobile-software-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/mobile-application-development11.png"},{"id":595,"title":"iOS Software Development","alias":"ios-software-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ios-programming.png"},{"id":597,"title":"Android Software Application","alias":"android-software-application","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/android-programming.png"},{"id":598,"title":"Mobile Website development","alias":"mobile-website-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/website-development-for-mobile-devices.png"},{"id":601,"title":"Custom Software Development","alias":"custom-software-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/custom-software-development.png"},{"id":615,"title":"Web Development","alias":"web-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web_development.png"},{"id":619,"title":"Drupal Development","alias":"drupal-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/drupal.png"},{"id":621,"title":"WordPress","alias":"wordpress","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Programming-Wordpress.png"},{"id":623,"title":"Magento Development","alias":"magento-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Magento.png"},{"id":625,"title":"Typo3 Development","alias":"typo3-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Typo3.png"},{"id":627,"title":"CSS Development","alias":"css-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/css.png"},{"id":629,"title":"PHP Development","alias":"php-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PHP.png"},{"id":637,"title":"eCommerce development","alias":"ecommerce-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/e-commerce.png"},{"id":639,"title":"HTML Development","alias":"html-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/html.png"},{"id":645,"title":"JavaScript development","alias":"javascript-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/javascript-programming.png"},{"id":647,"title":"Software Testing","alias":"software-testing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/software-testing.png"},{"id":649,"title":"QA - Quality assurance","alias":"qa-quality-assurance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/qa-quality-assurance.png"},{"id":651,"title":"Interface Testing","alias":"interface-testing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/interface-testing.png"},{"id":653,"title":"Applications Development","alias":"applications-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-development.png"},{"id":665,"title":"User Interface Development","alias":"user-interface-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-interface-development.png"},{"id":667,"title":"Database Development","alias":"database-development","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/database-development.png"},{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/it-project-implementation-services.png"},{"id":731,"title":"IT Project Management","alias":"it-project-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/it-project-management.png"},{"id":733,"title":"Technical Support","alias":"technical-support","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/technical-support.png"},{"id":735,"title":"Installation and configuration","alias":"installation-and-configuration","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/installation-and-configuration.png"},{"id":737,"title":"IT System testing","alias":"it-system-testing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/it-system-testing.png"},{"id":739,"title":"Deployment and Integration Services","alias":"deployment-and-integration-services","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/implementation-and-integration-services.png"},{"id":741,"title":"Proof of Concept","alias":"proof-of-concept","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/justification-of-the-concept.png"},{"id":743,"title":"IT System documentation writing","alias":"it-system-documentation-writing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/writing-it-system-documentation.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":503,"title":"Storage Networking","alias":"storage-networking","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/storage-networks.png"},{"id":505,"title":"Entry Level Storage","alias":"entry-level-storage","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/entry-level-storage.png"},{"id":507,"title":"Mission Critical Storage","alias":"mission-critical-storage","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/storage-for-mission-critical-applications.png"},{"id":33,"title":"UPS - Uninterruptible Power Supply","alias":"ups-uninterruptible-power-supply","description":"Исто́чник бесперебо́йного пита́ния, (ИБП) (англ. Uninterruptible Power Supply, UPS) — автоматическое электронное устройство с аккумуляторной батареей, предназначенное для бесперебойного кратковременного снабжения электрической энергией компьютера и его компонентов с целью корректного завершения работы и сохранения данных в случае резкого падения или отсутствия входного питающего напряжения системы.\r\n\r\nИсточник электропитания бесперебойный — вторичный источник электропитания, предназначенный для электропитания при кратковременном отключении основного источника электропитания, а также для защиты от существующих помех в сети с сохранением допустимых параметров для сети основного источника.\r\n\r\nИБП (UPS) — это прежде всего вспомогательное устройство, поэтому для постоянного и долговременного питания компьютера не годится. Лучше всего для этих целей служит другие устройства, например, ИРП — источники резервного питания, генераторы.\r\n\r\nСуществуют 3 типа ИБП: UPS Off-Line, UPS On-Line, UPS Line-Interactive. Другие варианты устройств фактически являются их производными.\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%98%D1%81%D1%82%D0%BE%D1%87%D0%BD%D0%B8%D0%BA_%D0%B1%D0%B5%D1%81%D0%BF%D0%B5%D1%80%D0%B5%D0%B1%D0%BE%D0%B9%D0%BD%D0%BE%D0%B3%D0%BE_%D0%BF%D0%B8%D1%82%D0%B0%D0%BD%D0%B8%D1%8F","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/kisspng-ups.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":764,"title":"0eng0eng1+1","description":"","alias":"0eng0eng1-1","roi":0,"seo":{"title":"0eng0eng1+1","keywords":"","description":"","og:title":"0eng0eng1+1","og:description":""},"deal_info":"","user":{"id":2897,"title":"1+1 media","logoURL":"https://old.b4r.io/uploads/roi/company/1_1_media.png","alias":"1-1-media","address":"","roles":[],"description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши корпоративные ценности: СМЕЛОСТЬ. ЧЕСТНОСТЬ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":39,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://media.345aanonstop1plus1.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"1+1 media","keywords":"media","description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши","og:title":"1+1 media","og:description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши","og:image":"https://old.b4r.io/uploads/roi/company/1_1_media.png"},"eventUrl":"https://calendly.com/anastasia-filatova19/nea-event"},"supplier":{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"},"vendors":[{"id":2957,"title":"AgiliWay","logoURL":"https://old.b4r.io/uploads/roi/company/linkedin-logo_1.png","alias":"agiliway","address":"","roles":[],"description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in Lviv, Ukraine. AgiliWay is a young and fast-growing company founded by a group of IT experts who have been working in IT outsourcing industry more than 20 years in USA and Ukraine and now leverage our experience to provide partners with flexible yet high-quality software development service. AgiliWay is focused on following 3 directions: 1. IT Outsourcing Consulting - full stack of services from helping our clients selecting outsourcing destination in Eastern and Central Europe to building and optimizing development centers using the most suitable approaches like BOT (build-operate-transfer model) or greenfielding or partnering 2.Custom Software Development – on-demand custom software development starting from requirements gathering to solution deployment and to post-implementation maintenance in wide range of technologies including: — Mainstream Technologies (Java, C/C++, MS stack) — BI and Big Data solutions — Web Development — Mobile Development — Quality Management 3. BPO – providing more value to our client by outsourcing different routine processes and functions","companyTypes":[],"products":{},"vendoredProductsCount":12,"suppliedProductsCount":12,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":6,"vendorPartnersCount":1,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"https://agiliway.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"AgiliWay","keywords":"Group, AgiliWay","description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in","og:title":"AgiliWay","og:description":"AgiliWay is software development outsourcing and consulting company headquartered in Austin, Texas. Our main development and consulting center is located in","og:image":"https://old.b4r.io/uploads/roi/company/linkedin-logo_1.png"},"eventUrl":""},{"id":2773,"title":"1C","logoURL":"https://old.b4r.io/uploads/roi/company/1c.png","alias":"1c","address":"test addressa777","roles":[],"description":"Фирма "1С" основана в 1991 г. и специализируется на разработке, дистрибьюции, издании и поддержке компьютерных программ делового и домашнего назначения. Из собственных разработок фирмы "1С" наиболее известны программы системы "1С:Предприятие", а также продукты для домашних компьютеров и образовательной сферы.","companyTypes":[],"products":{},"vendoredProductsCount":13,"suppliedProductsCount":28,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":5,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"http://www.1c.ru","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"https://slides.roi4presenter.com/iomcr","seo":{"title":"1C","keywords":"software, network, vendors, support, authorized, Novell, Microsoft, world-famous","description":"1C COMPANY\r\nFounded in 1991 1C Company specializes in development, distribution, publishing and support of mass-market software.\r\nAt present 8000 dealers from","og:title":"1C","og:description":"1C COMPANY\r\nFounded in 1991 1C Company specializes in development, distribution, publishing and support of mass-market software.\r\nAt present 8000 dealers from","og:image":"https://old.b4r.io/uploads/roi/company/1c.png"},"eventUrl":"https://calendly.com/solomiia-rymar"},{"id":4063,"title":"Supven","logoURL":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg","alias":"supven","address":"","roles":[],"description":"Описание компании","companyTypes":[],"products":{},"vendoredProductsCount":4,"suppliedProductsCount":7,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":6,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":2,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com/anastasia.filatova.7773","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Supven","keywords":"Supven","description":"Описание компании","og:title":"Supven","og:description":"Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg"},"eventUrl":""},{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"}],"products":[{"id":547,"logo":false,"scheme":false,"title":"JavaScript","vendorVerified":0,"rating":"1.80","implementationsCount":1,"suppliersCount":0,"alias":"javascript","companyTypes":[],"description":"JavaScript for Web Development","shortDescription":"JavaScript for Web Development","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"JavaScript","keywords":"JavaScript, Development","description":"JavaScript for Web Development","og:title":"JavaScript","og:description":"JavaScript for Web Development"},"eventUrl":"","translationId":541,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":32,"title":"IT outsourcing","alias":"it-outsourcing","description":"ИТ-аутсорсинг (англ. IT outsourcing) - частичная или полная передача работ по поддержке, обслуживанию и модернизации ИТ-инфраструктуры в руки компаний, специализирующихся на абонентском обслуживании организаций и имеющих штат специалистов различной квалификации. Для них выполнение подобных работ является профильным направлением деятельности.\r\n\r\nИТ-аутсорсинг предполагает делегирование внешней специализированной компании решение вопросов, связанных с разработкой, внедрением и сопровождением информационных систем, как целиком на уровне инфраструктуры предприятия (сопровождение оборудования или ПО), так и объёмов работ, связанных с развитием и/или поддержкой функционирования отдельных участков системы (программирование, хостинг, тестирование и т.д.)\r\nисточник - https://ru.wikipedia.org/wiki/%D0%98%D0%A2-%D0%B0%D1%83%D1%82%D1%81%D0%BE%D1%80%D1%81%D0%B8%D0%BD%D0%B3","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/100_Black_LineIcons_Business_original_vect82.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":556,"logo":false,"scheme":false,"title":"1C:Manufacturing Enterprise Management","vendorVerified":0,"rating":"1.80","implementationsCount":1,"suppliersCount":0,"alias":"1cmanufacturing-enterprise-management","companyTypes":[],"description":"Прикладное решение создает единое информационное пространство для отображения финансово-хозяйственной деятельности предприятия, охватывая основные бизнес-процессы. В то же время четко разграничивается доступ к хранимым сведениям, а также возможности тех или иных действий в зависимости от статуса работников.\r\n\r\nНа предприятиях холдинговой структуры общая информационная база может охватывать все организации, входящие в холдинг. Это существенно снижает трудоемкость ведения учета за счет повторного использования разными организациями общих массивов информации. При этом по всем организациям ведется сквозной управленческий и регламентированный (бухгалтерский и налоговый) учет, но регламентированная отчетность формируется раздельно по организациям.\r\n\r\nФакт совершения хозяйственной операции регистрируется один раз и получает отражение в управленческом и регламентированном учете. Необходимость повторного ввода информации исключена. Средством регистрации хозяйственной операции является документ, причем для ускорения работы широко используются механизмы подстановки данных "по умолчанию", ввод новых документов на основании ранее введенных.\r\n\r\nВ прикладном решении принято следующее соотношение данных различных учетов:\r\n\r\nнезависимость данных управленческого, бухгалтерского и налогового учета;\r\nсопоставимость данных управленческого, бухгалтерского и налогового учета;\r\nсовпадение суммовых и количественных оценок активов и обязательств по данным управленческого, бухгалтерского и налогового учета, при отсутствии объективных причин их расхождения.\r\nДанные, вводимые пользователями, оперативно контролируются прикладным решением. Так, при регистрации выплаты наличных денежных средств система проверит доступность денежных средств с учетом имеющихся заявок на их расходование. А при регистрации отгрузки продукции система проверит состояние взаиморасчетов с получателем груза.\r\n\r\nПрикладное решение поставляется с комплектом интерфейсов, что обеспечивает каждому пользователю первоочередный доступ к нужным именно ему данным и механизмам прикладного решения.\r\n\r\nРегламентированный (бухгалтерский и налоговый) учет по организациям ведется в национальной валюте, в том время как для управленческого учета по предприятию в целом может быть выбрана любая валюта. В разных организациях единой информационной базы могут использоваться разные системы налогообложения: в одних организациях — общая система налогообложения, в других — упрощенная; могут использоваться разные установки политики налогового и бухгалтерского учета. Кроме того, к отдельным видам деятельности организации может быть применена система налогообложения в виде единого налога на вмененный доход.\r\n\r\nВ дополнение к управленческому и регламентированному учетам можно вести учет по международным стандартам финансовой отчетности (МСФО). С целью снижения трудоемкости учет по МСФО ведется неоперативно, с использованием трансляции (пересчета) данных других видов учета.\r\n\r\nПри разработке решения "1С:Управление производственным предприятием 8" учитывались как современные международные методики управления предприятием (MRP II, CRM, SCM, ERP, ERP II и др.), так и опыт успешной автоматизации производственных предприятий, накопленный фирмой "1С" и партнерским сообществом. В проектировании и разработке конфигурации участвовали специалисты компаний "ИТРП" (управление производством) и "1С-Рарус" (учет по МСФО). По методологическим вопросам реализации управленческого, финансового учета и формирования отчетности по МСФО консультационную поддержку осуществляет всемирно известная аудиторско-консалтинговая компания PricewaterhouseCoopers.\r\n\r\nРешение "1С:Управление производственным предприятием 8" разработано на современной технологической платформе "1С:Предприятие 8". В комплект поставки программного продукта, помимо платформы, входит конфигурация "Управление производственным предприятием".\r\n\r\nОбеспечена высокая надежность и производительность прикладного решения, масштабируемость, построение территориально распределенных систем, интеграция с другими информационными системами. Внутреннее устройство прикладного решения полностью открыто для изучения и настройки под специфические потребности предприятия.\r\n\r\nФирма "1С" дорабатывает и развивает конфигурацию "Управление производственным предприятием" с целью отражения изменений законодательства и расширения функциональности. Обеспечено оперативное обновление установленных прикладных решений. Со стороны фирмы "1С" и ее партнеров предоставляется многоуровневая система технической поддержки.\r\n\r\n\r\n\r\nВсе механизмы автоматизации прикладного решения можно условно разделить на два больших класса:\r\n\r\nмеханизмы для поддержания операционной деятельности предприятия;\r\nмеханизмы для ведения неоперативного учета.\r\nУчастки, принадлежащие к операционной деятельности, можно выделить в каждом виде учета (за исключением учета по МСФО).\r\n\r\nКроме того, прикладное решение разделяется на отдельные подсистемы, ответственные за решение групп сходных задач: подсистема управления денежными средствами, подсистема управления персоналом, подсистема бухгалтерского учета и др. Подобное разделение представляет собой некоторую условность, которая облегчает освоение прикладного решения. В текущей работе пользователей границы между подсистемами практически не ощущаются.\r\n\r\nПоследняя редакция конфигурации "Управление производственным предприятием", которой присвоен номер 1.3, наглядно демонстрирует преимущества версии 8.2 платформы "1С:Предприятие". Конфигурация может использоваться в режиме обычного приложения, привычном для пользователей прежних редакций.\r\n\r\n"1C:Управление производственным предприятием 8" может использоваться в ряде подразделений и служб производственных предприятий, включая:\r\n\r\nдирекцию (генеральный директор, финансовый директор, коммерческий директор, директор по производству, главный инженер, директор по кадрам, директор по IT, директор по развитию);\r\nпланово-экономический отдел;\r\nпроизводственные цеха;\r\nпроизводственно-диспетчерский отдел;\r\nотдел главного конструктора;\r\nотдел главного технолога;\r\nотдел главного механика;\r\nотдел сбыта;\r\nотдел материально-технического обеспечения (снабжения);\r\nотдел маркетинга;\r\nсклады материалов и готовой продукции;\r\nбухгалтерию;\r\nотдел кадров;\r\nотдел организации труда и занятости;\r\nIT-службу;\r\nадминистративно-хозяйственный отдел;\r\nотдел капитального строительства;\r\nинформационно-аналитический отдел;\r\nотдел стратегического развития.","shortDescription":"1C: Manufacturing Enterprise Management is a complex solution covering the main control loops and accounting for a manufacturing company.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"1C:Manufacturing Enterprise Management","keywords":"отдел, учета, предприятием, директор, Управление, производственным, решения, может","description":"Прикладное решение создает единое информационное пространство для отображения финансово-хозяйственной деятельности предприятия, охватывая основные","og:title":"1C:Manufacturing Enterprise Management","og:description":"Прикладное решение создает единое информационное пространство для отображения финансово-хозяйственной деятельности предприятия, охватывая основные"},"eventUrl":"","translationId":556,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":75,"title":"ERP - Enterprise Resource Planning","alias":"erp-enterprise-resource-planning","description":"ERP (англ. Enterprise Resource Planning, планирование ресурсов предприятия) — организационная стратегия интеграции производства и операций, управления трудовыми ресурсами, финансового менеджмента и управления активами, ориентированная на непрерывную балансировку и оптимизацию ресурсов предприятия посредством специализированного интегрированного пакета прикладного программного обеспечения, обеспечивающего общую модель данных и процессов для всех сфер деятельности. ERP-система — конкретный программный пакет, реализующий стратегию ERP.\r\n\r\nКонцепция ERP сформулирована в 1990 году аналитиком Gartner как видение развития методик MRP II и CIM (англ.)\r\n\r\nВнедрение ERP-системы считается фактически необходимым условием для публичной компании и, начиная с конца 1990-х годов, ERP-системы, изначально внедрявшиеся только промышленными предприятиями, эксплуатируются большинством крупных организаций вне зависимости от страны, формы собственности, отрасли.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/ERP","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ERP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2152,"logo":false,"scheme":false,"title":"Supven eng","vendorVerified":0,"rating":"2.10","implementationsCount":5,"suppliersCount":0,"alias":"supven-eng","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Supven eng","keywords":"","description":"","og:title":"Supven eng","og:description":""},"eventUrl":"","translationId":2152,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2244,"logo":false,"scheme":false,"title":"0aбвг","vendorVerified":0,"rating":"3.20","implementationsCount":5,"suppliersCount":0,"alias":"0abcd","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"0aбвг","keywords":"","description":"","og:title":"0aбвг","og:description":""},"eventUrl":"https://calendly.com/anastasia-filatova19/product-consultation","translationId":2245,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[{"id":32,"title":"IT outsourcing","alias":"it-outsourcing","description":"ИТ-аутсорсинг (англ. IT outsourcing) - частичная или полная передача работ по поддержке, обслуживанию и модернизации ИТ-инфраструктуры в руки компаний, специализирующихся на абонентском обслуживании организаций и имеющих штат специалистов различной квалификации. Для них выполнение подобных работ является профильным направлением деятельности.\r\n\r\nИТ-аутсорсинг предполагает делегирование внешней специализированной компании решение вопросов, связанных с разработкой, внедрением и сопровождением информационных систем, как целиком на уровне инфраструктуры предприятия (сопровождение оборудования или ПО), так и объёмов работ, связанных с развитием и/или поддержкой функционирования отдельных участков системы (программирование, хостинг, тестирование и т.д.)\r\nисточник - https://ru.wikipedia.org/wiki/%D0%98%D0%A2-%D0%B0%D1%83%D1%82%D1%81%D0%BE%D1%80%D1%81%D0%B8%D0%BD%D0%B3","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/100_Black_LineIcons_Business_original_vect82.png"},{"id":75,"title":"ERP - Enterprise Resource Planning","alias":"erp-enterprise-resource-planning","description":"ERP (англ. Enterprise Resource Planning, планирование ресурсов предприятия) — организационная стратегия интеграции производства и операций, управления трудовыми ресурсами, финансового менеджмента и управления активами, ориентированная на непрерывную балансировку и оптимизацию ресурсов предприятия посредством специализированного интегрированного пакета прикладного программного обеспечения, обеспечивающего общую модель данных и процессов для всех сфер деятельности. ERP-система — конкретный программный пакет, реализующий стратегию ERP.\r\n\r\nКонцепция ERP сформулирована в 1990 году аналитиком Gartner как видение развития методик MRP II и CIM (англ.)\r\n\r\nВнедрение ERP-системы считается фактически необходимым условием для публичной компании и, начиная с конца 1990-х годов, ERP-системы, изначально внедрявшиеся только промышленными предприятиями, эксплуатируются большинством крупных организаций вне зависимости от страны, формы собственности, отрасли.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/ERP","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ERP.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":617,"title":"112112","description":"","alias":"112112","roi":0,"seo":{"title":"112112","keywords":"","description":"","og:title":"112112","og:description":""},"deal_info":"","user":{"id":452,"title":"112.ua","logoURL":"https://old.b4r.io/uploads/roi/company/112.ua.png","alias":"112ua","address":"04119, Киев, Дегтяревская, 21-г","roles":[],"description":"Everyday 112.UA News Agency brings you breaking news from Ukraine: Donbas conflict in facts, political and economic events, sport and lifestyle highlights, best of Ukrainian social nets.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":32,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://112.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"112.ua","keywords":"events, economic, sport, political, lifestyle, social, nets, Ukrainian","description":"Everyday 112.UA News Agency brings you breaking news from Ukraine: Donbas conflict in facts, political and economic events, sport and lifestyle highlights,","og:title":"112.ua","og:description":"Everyday 112.UA News Agency brings you breaking news from Ukraine: Donbas conflict in facts, political and economic events, sport and lifestyle highlights,","og:image":"https://old.b4r.io/uploads/roi/company/112.ua.png"},"eventUrl":""},"supplier":{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""},"vendors":[{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""}],"products":[{"id":2144,"logo":false,"scheme":false,"title":"Friday222","vendorVerified":0,"rating":"4.20","implementationsCount":3,"suppliersCount":0,"alias":"friday222","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Friday222","keywords":"","description":"","og:title":"Friday222","og:description":""},"eventUrl":"","translationId":2144,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":618,"title":"112221","description":"","alias":"112221","roi":220,"seo":{"title":"112221","keywords":"","description":"","og:title":"112221","og:description":""},"deal_info":"","user":{"id":452,"title":"112.ua","logoURL":"https://old.b4r.io/uploads/roi/company/112.ua.png","alias":"112ua","address":"04119, Киев, Дегтяревская, 21-г","roles":[],"description":"Everyday 112.UA News Agency brings you breaking news from Ukraine: Donbas conflict in facts, political and economic events, sport and lifestyle highlights, best of Ukrainian social nets.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":32,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://112.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"112.ua","keywords":"events, economic, sport, political, lifestyle, social, nets, Ukrainian","description":"Everyday 112.UA News Agency brings you breaking news from Ukraine: Donbas conflict in facts, political and economic events, sport and lifestyle highlights,","og:title":"112.ua","og:description":"Everyday 112.UA News Agency brings you breaking news from Ukraine: Donbas conflict in facts, political and economic events, sport and lifestyle highlights,","og:image":"https://old.b4r.io/uploads/roi/company/112.ua.png"},"eventUrl":""},"supplier":{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""},"vendors":[{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""}],"products":[{"id":2144,"logo":false,"scheme":false,"title":"Friday222","vendorVerified":0,"rating":"4.20","implementationsCount":3,"suppliersCount":0,"alias":"friday222","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Friday222","keywords":"","description":"","og:title":"Friday222","og:description":""},"eventUrl":"","translationId":2144,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":643,"title":"4к4","description":"","alias":"4k4","roi":0,"seo":{"title":"4к4","keywords":"","description":"","og:title":"4к4","og:description":""},"deal_info":"","user":{"id":203,"title":"State Savings Bank of Ukraine","logoURL":"https://old.b4r.io/uploads/roi/company/oschadbank.png","alias":"oshchadbank","address":"","roles":[],"description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21, 1999, N 866","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":87,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.oschadbank.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"State Savings Bank of Ukraine","keywords":"Ukraine, Decree, Cabinet, Ministers, 1999, with, established, Company","description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:title":"State Savings Bank of Ukraine","og:description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:image":"https://old.b4r.io/uploads/roi/company/oschadbank.png"},"eventUrl":""},"supplier":{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"},"vendors":[{"id":4063,"title":"Supven","logoURL":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg","alias":"supven","address":"","roles":[],"description":"Описание компании","companyTypes":[],"products":{},"vendoredProductsCount":4,"suppliedProductsCount":7,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":6,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":2,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com/anastasia.filatova.7773","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Supven","keywords":"Supven","description":"Описание компании","og:title":"Supven","og:description":"Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg"},"eventUrl":""}],"products":[{"id":2151,"logo":false,"scheme":false,"title":"Supven ru","vendorVerified":0,"rating":"2.10","implementationsCount":5,"suppliersCount":0,"alias":"supven-ru","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Supven ru","keywords":"","description":"","og:title":"Supven ru","og:description":""},"eventUrl":"","translationId":2929,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":637,"title":"56465565655566667770-","description":"","alias":"56465565655566667770","roi":0,"seo":{"title":"56465565655566667770-","keywords":"","description":"","og:title":"56465565655566667770-","og:description":""},"deal_info":"","user":{"id":515,"title":"Odessa Railways","logoURL":"https://old.b4r.io/uploads/roi/company/Odesskaja_zheleznaja_doroga.png","alias":"odesskaja-zheleznaja-doroga","address":"","roles":[],"description":"Одесская железная дорога (укр. Одеська залізниця) — железная дорога, обслуживающая юго-западные области Украины. Пролегает по территории шести областей: Одесской, Николаевской, Херсонской, Черкасской, Кировоградской и Винницкой.\r\n\r\nНа одесскую железную дорогу приходится около 20 % грузооборота и более 16 % пассажирооборота железных дорог Украины. В регионе Одесской железной дороги расположены большие морские и речные порты, что обеспечивает высокую транспортную нагрузку.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":4,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://odz.gov.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Odessa Railways","keywords":"дорога, железная, Украины, Одесской, Одесская, дорог, регионе, железных","description":"Одесская железная дорога (укр. Одеська залізниця) — железная дорога, обслуживающая юго-западные области Украины. Пролегает по территории шести областей:","og:title":"Odessa Railways","og:description":"Одесская железная дорога (укр. Одеська залізниця) — железная дорога, обслуживающая юго-западные области Украины. Пролегает по территории шести областей:","og:image":"https://old.b4r.io/uploads/roi/company/Odesskaja_zheleznaja_doroga.png"},"eventUrl":""},"supplier":{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""},"vendors":[{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""}],"products":[{"id":2144,"logo":false,"scheme":false,"title":"Friday222","vendorVerified":0,"rating":"4.20","implementationsCount":3,"suppliersCount":0,"alias":"friday222","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Friday222","keywords":"","description":"","og:title":"Friday222","og:description":""},"eventUrl":"","translationId":2144,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":668,"title":"alotofvendors","description":"","alias":"alotofvendors","roi":0,"seo":{"title":"alotofvendors","keywords":"","description":"","og:title":"alotofvendors","og:description":""},"deal_info":"","user":{"id":334,"title":"Avias","logoURL":"https://old.b4r.io/uploads/roi/company/avias.png","alias":"avias","address":"Украина, г.Харьков ул. Салтовское шоссе, 43","roles":[],"description":" «Авиас» для Вашего мобильного телефона или планшета (устройства Android и iOS / Apple)!\r\nПриложение покажет Вам: ближайшую АЗС или торговую точку, расположение АЗС на карте по проложенному Вами маршруту, актуальные цены на топливо; поможет позвонить в торговую точку, рассчитать реальную стоимость километра пробега и расход топлива. \r\nУстановите с Google Play Market или App Store (поисковое слово - авиас).\r\n\r\n\r\n\r\nООО ПТФ "Авиас" помогает экономить время и деньги при заправке автомобиля качественным бензином или дизельным топливом - будь то крупная транспортная компания или владелец собственного автомобиля - автолюбитель. Формі безналичного расчета на АЗС, предлагаемых фирмой "Авиас" - скретч-картах и топливных картах (аналог смарт-карт), их преимуществах, возможности приобретения в торговых точках и обслуживания на более чем 1 600 АЗС Украины .\r\nПреимуществами заправки транспорта по скретч-картам (талонам) "Авиас" на сегодняшний день пользуются более 14 000 предприятий и организаций.\r\nТопливной карте "Авиас", совместному с КБ "ПриватБанк" проекту, отдали предпочтение более 4 000 предприятий.\r\n\r\n\r\nВыражаем признательность нашим партнерам - компаниям, отпускающим нефтепродукты с АЗС по пластиковым талонам и топливным картам "Авиас". Для этих компании характерны высокие стандарты качества обслуживания: \r\n- профессионализм сотрудников; \r\n- наличие на АЗС высокоточных топливораздаточных колонок от лучших мировых производителей; \r\n- соответствующее стандартам топливо; \r\n- наличие передвижной автомобильной экспресс-лаборатории контроля качества топлива. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://avias.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Avias","keywords":"Авиас, более, топливо, обслуживания, качества, карте, автомобиля, топлива","description":" «Авиас» для Вашего мобильного телефона или планшета (устройства Android и iOS / Apple)!\rПриложение покажет Вам: ближайшую АЗС или торговую точку,","og:title":"Avias","og:description":" «Авиас» для Вашего мобильного телефона или планшета (устройства Android и iOS / Apple)!\rПриложение покажет Вам: ближайшую АЗС или торговую точку,","og:image":"https://old.b4r.io/uploads/roi/company/avias.png"},"eventUrl":""},"supplier":{"id":3328,"title":"IT Service +","logoURL":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg","alias":"it-servis","address":"","roles":[],"description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования. ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик программного обеспечения и оборудования.","companyTypes":[],"products":{},"vendoredProductsCount":42,"suppliedProductsCount":74,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":84,"vendorImplementationsCount":33,"vendorPartnersCount":4,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"IT Service +","keywords":"Service","description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:title":"IT Service +","og:description":"ИТ Сервис + - поставщик ИТ-услуг, направленных на удовлетворение потребностей бизнеса и на рост бизнеса. Консультант, системный интегратор, поставщик","og:image":"https://old.b4r.io/uploads/roi/company/it_servis_2.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19"},"vendors":[{"id":4063,"title":"Supven","logoURL":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg","alias":"supven","address":"","roles":[],"description":"Описание компании","companyTypes":[],"products":{},"vendoredProductsCount":4,"suppliedProductsCount":7,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":6,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":2,"b4r":1,"categories":{},"companyUrl":"https://www.facebook.com/anastasia.filatova.7773","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Supven","keywords":"Supven","description":"Описание компании","og:title":"Supven","og:description":"Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/images_(1)_1.jpg"},"eventUrl":""}],"products":[{"id":2152,"logo":false,"scheme":false,"title":"Supven eng","vendorVerified":0,"rating":"2.10","implementationsCount":5,"suppliersCount":0,"alias":"supven-eng","companyTypes":[],"description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Supven eng","keywords":"","description":"","og:title":"Supven eng","og:description":""},"eventUrl":"","translationId":2152,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":549,"title":"ESET Endpoint Protection for airline","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">ABOUT THE CUSTOMER</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The Budapest based Wizz Air operates in the region of the</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Central Europe. Originating in 2003, the company today offers</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">a choice of almost 200 fl ying routes, from a number of regional</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">airports: Katowice, Warsaw, Gdansk, Poznan and Wroclaw</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">in Poland; Budapest in Hungary; Sofi a in Bulgaria: Bucharest,</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Cluj Napoca and Timisoara in Romania;Prague in the Czech </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Republic; and Kiev in the Ukraine.</span>\r\n<span style=\"font-weight: bold;\"><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">PREVIOUS EXPERIENCE</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">WITH ANTIVIRUS</span></span>\r\n<span style=\"font-style: italic;\"><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">“Our previous antivirus system was often incompatible with the</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">various target applications used in our industry, and imposed</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">signifi cant restrictions on the performance of our servers and</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">workstations, which is simply inacceptable in the industry we’re</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">in. We were also dissatisfi ed with the level of technical support we</span></span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-style: italic;\">received,”</span> says Zsolt Csernák, CIO, Wizz Air Hungary.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Mr. Csernák’s team started looking for a different, more effective</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">antivirus system. After the fi rst screening, they asked for quotes </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">from three different AV vendors.<span style=\"font-style: italic;\"> “ESET NOD32 Antivirus matched </span></span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">our requirements, and it was also available at a very favorable price </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-style: italic;\">compared to the competition, so we began testing their solution,”</span> said </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">the IT Director.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">IMPLEMENTATION</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Wizz Air’s engineers built a Windows 2003-based test server and</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">configured three client PCs in order to test out the ESET Remote </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Administrator Server (ERAS). Once ERAS was successfully</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">configured and all the necessary policies were created, it was </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">time to start testing the solution. <span style=\"font-style: italic;\">“Our positive experience soon </span></span><span style=\"font-style: italic;\"><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">led us to extend the test to live clients, and after that we adopted the </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">solution across the board,” said Zsolt Csernák.</span></span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The launch went smoothly, with no di\u0013 culties at all and ESET </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">NOD32 Antivirus currently protects 500 client PCs distributed </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">over 13 sites. Updates are load-balanced and distributed via </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">mirror servers, preserving the company’s bandwidth, leaving </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">more room for core business tasks.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">PROTECTED BY ESET</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Soon after installing ESET on endpoints, the protection was </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">extended to the company’s MS Exchange server that handles </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">tens of thousands of messages each day, as well to a network </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">of file- and print-servers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“We have have positive feedback from our employees – they appreciate </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">that ESET’s solution doesn’t slow down computer performance, while </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">our system administrators are pleased with easy monitoring and </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">management of company security” – says Zsolt Csernák.</span>","alias":"eset-endpoint-protection-for-airline","roi":0,"seo":{"title":"ESET Endpoint Protection for airline","keywords":"ESET, with, Csernák, Zsolt, test, system, solution, Wizz","description":"ABOUT THE CUSTOMER\rThe Budapest based Wizz Air operates in the region of theCentral Europe. Originating in 2003, the company today offersa choice of almost 200","og:title":"ESET Endpoint Protection for airline","og:description":"ABOUT THE CUSTOMER\rThe Budapest based Wizz Air operates in the region of theCentral Europe. Originating in 2003, the company today offersa choice of almost 200"},"deal_info":"","user":{"id":4377,"title":"Wizz Air","logoURL":"https://old.b4r.io/uploads/roi/company/Wizz_Air.png","alias":"wizz-air","address":"","roles":[],"description":"Wizz Air, legally incorporated as Wizz Air Hungary Ltd. (Hungarian: Wizz Air Hungary Légiközlekedési Kft.) and stylised as Wizz Air, is a Hungarian low-cost airline with its head office in Budapest. The airline serves many cities across Europe, as well as some destinations in North Africa and the Middle East. It has the largest fleet of any Hungarian airline, although it is not a flag carrier, and currently serves 44 countries.\r\n\r\n ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://wizzair.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Wizz Air","keywords":"Wizz, airline, Hungarian, Hungary, serves, largest, East, Africa","description":"Wizz Air, legally incorporated as Wizz Air Hungary Ltd. (Hungarian: Wizz Air Hungary Légiközlekedési Kft.) and stylised as Wizz Air, is a Hungarian low-cost","og:title":"Wizz Air","og:description":"Wizz Air, legally incorporated as Wizz Air Hungary Ltd. (Hungarian: Wizz Air Hungary Légiközlekedési Kft.) and stylised as Wizz Air, is a Hungarian low-cost","og:image":"https://old.b4r.io/uploads/roi/company/Wizz_Air.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":315,"title":"Eset","logoURL":"https://old.b4r.io/uploads/roi/company/eset.jpeg","alias":"eset","address":"","roles":[],"description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET NOD32, hence competing in the antivirus industry market.","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":4,"vendorPartnersCount":0,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"www.eset.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Eset","keywords":"company, ESET, firewall, anti-virus, 2008, 2010, products, 2009","description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful","og:title":"Eset","og:description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful","og:image":"https://old.b4r.io/uploads/roi/company/eset.jpeg"},"eventUrl":""}],"products":[{"id":1730,"logo":false,"scheme":false,"title":"ESET Endpoint Protection advanced","vendorVerified":0,"rating":"1.80","implementationsCount":4,"suppliersCount":0,"alias":"eset-endpoint-protection-advanced","companyTypes":[],"description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection against ransomware</li> <li>Prevention of fileless attacks</li> <li>Remote management</li> </ul>\r\n<span style=\"font-weight: bold;\">Endpoint security</span> ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives. <span style=\"font-weight: bold;\">File server security</span> Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity. <span style=\"font-weight: bold;\">Manage products via on-premise console</span> ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.\r\n<ul> <li>Complete network visibility</li> <li>Full security management</li> <li>Flexible reporting</li> <li>Automated security management</li> </ul>\r\n<span style=\"font-style: italic;\">"ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally." - Richard Ford, Head of IT at SWFC</span>","shortDescription":"ESET ENDPOINT PROTECTION ADVANCED is a complete multilayered protection with remote security management: On-premise management, endpoint security, file server security\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET Endpoint Protection advanced","keywords":"ESET, security, management, Protection, protection, Endpoint, servers, advanced","description":"ESET Endpoint Protection Advanced Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r","og:title":"ESET Endpoint Protection advanced","og:description":"ESET Endpoint Protection Advanced Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r"},"eventUrl":"","translationId":1731,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":400,"title":"High costs"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":385,"title":"Risk of data loss or damage"},{"id":384,"title":"Risk of attacks by hackers"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://cdn1.esetstatic.com/ESET/INT/Docs/Others/Customer-Stories/Wizz-Air_HU.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":547,"title":"ESET Endpoint Protection for IT reseller","description":"<span style=\"font-weight: bold;\">KEY BENEFITS FOR CCS MEDIA</span>\r\n• Intuitive user interface making management straightforward and simple.\r\n• Issues are identified and dealt with quickly.\r\n• ESET’s UK based customer support is reliable and trust worthy.\r\n• ESET’s unobtrusive footprint allows CCS to run quickly and efficiently.\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE CUSTOMER</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">CCS Media are a privately owned IT reseller headquartered </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">on the outskirts of the historic market town of Chesterfield, </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Derbyshire. Winner of the ‘Cisco Rising Star’ award, ‘CRN </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Reseller of the Year’, and many more accolades over their </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">30 plus years of service. CCS have 16 offices around the UK </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">(including Wales and Scotland), over 250 employees and </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">around £120 million in annual turnover. Today, they work with </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">organisations all across the UK - delivering everyday IT, print </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">and office supplies - and large-scale IT projects. CCS Media’s </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">small IT department protects and maintains the company’s </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">IT infrastructure in offices around the UK - all from their data </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">centre in Chesterfield. Considering the nature of CCS Media’s </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">business, impeccable IT security is critical. The company needs </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">not only to protect its own information, but also sensitive </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">customer data and its reputation in the marketplace as a </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">trusted supplier of IT services.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">TIME TO CHANGE</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The geographic distribution of the organisation’s various </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">offices was causing problems for CCS. Onsite IT support was </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">proving to be both a very expensive and time-consuming </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">exercise. The company needed a solution that would allow </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">their small IT team to deploy, administer and maintain their </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">security software, without having to spend so much time </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">and money travelling. Additionally, they had found that </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">previous solutions were often slow to deploy, caused issues </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">with the end-user experience and did not provide effective </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">support when CCS needed it most.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE SOLUTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">CCS Media and ESET were introduced at a trade show through </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">a mutual connection. CCS’s IT Director, Tony Cooke, decided to </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">give ESET a try after recieving positive feedback from within </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">the industry. Migrating the infrastructure over to ESET was </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">seamless, happening over the course of a few days. ESET </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">supported CCS’s IT department throughout the process. The </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">install was silent and so flawless that most of the employees </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">were unaware of the changeover. ESET now provides CCS </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Media with endpoint security, as well as data encryption for all </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">of their client devices. Tony also commends the ESET interface </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">as he finds it, “easy to use, intuitive and modern, which is important </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">for today’s industry. “ This relationship has worked out to be </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">extremely cost effective for CCS Media. The firm’s two-person IT </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">team now manages what is essentially a network of hundreds </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">of end-users dispersed all over the country. And, with ESET’s </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">help, CCS’s team knows it can deal with any security threat the </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">organisation may face.</span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“Obviously, time is money. Using ESET makes my job much easier, </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">simply because of the tiny system footprint. Also, we don’t have any </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">downtime on the network, so I can access whatever information I </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">want at any time - and get on with selling and doing my job. I would </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">recommend ESET because of the speed, the simplicity and the very </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">helpful UK based tech support.” </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Chloe Butler, Business Development Manager, CCS Media</span></span>","alias":"eset-endpoint-protection-for-it-reseller","roi":0,"seo":{"title":"ESET Endpoint Protection for IT reseller","keywords":"ESET, over, with, Media, support, CCS’s, security, around","description":"KEY BENEFITS FOR CCS MEDIA\r• Intuitive user interface making management straightforward and simple.\r• Issues are identified and dealt with quickly.\r• ESET’s UK","og:title":"ESET Endpoint Protection for IT reseller","og:description":"KEY BENEFITS FOR CCS MEDIA\r• Intuitive user interface making management straightforward and simple.\r• Issues are identified and dealt with quickly.\r• ESET’s UK"},"deal_info":"","user":{"id":4378,"title":"CCS Media","logoURL":"https://old.b4r.io/uploads/roi/company/CCS_Media.gif","alias":"ccs-media","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our Company</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">CCS Media is a Technology and Supplies Reseller with over 30 years of experience delivering first-class IT solutions and services to organisations of every kind across the UK and beyond. Our network of 16 offices and 2 Advanced Technology Centres, secures unrivalled nationwide scale for supply and service, matched with the comfort of local presence. We work with more than 2,000 manufacturer partners and sell more than 1.3 million products as part of the solutions we deliver to our 14,000 customers. In 2017, we achieved revenues in excess of £180m and are recognised in the Sunday Times FastTrack 250 as one of the UK’s fastest growing companies.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our People</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our 350-strong team of experts are what makes our company a success. Encouraged to work in whatever way is most beneficial to our customers, our people are tasked with taking the raw materials at their disposal – our operational capability, finance, technology knowledge and customer context to shape the best possible outcome from every project.</span>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.ccsmedia.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CCS Media","keywords":"with, every, work, customers, solutions, than, more, Technology","description":"Our Company\r\rCCS Media is a Technology and Supplies Reseller with over 30 years of experience delivering first-class IT solutions and services to organisations","og:title":"CCS Media","og:description":"Our Company\r\rCCS Media is a Technology and Supplies Reseller with over 30 years of experience delivering first-class IT solutions and services to organisations","og:image":"https://old.b4r.io/uploads/roi/company/CCS_Media.gif"},"eventUrl":""},"supplier":{},"vendors":[{"id":315,"title":"Eset","logoURL":"https://old.b4r.io/uploads/roi/company/eset.jpeg","alias":"eset","address":"","roles":[],"description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET NOD32, hence competing in the antivirus industry market.","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":4,"vendorPartnersCount":0,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"www.eset.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Eset","keywords":"company, ESET, firewall, anti-virus, 2008, 2010, products, 2009","description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful","og:title":"Eset","og:description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful","og:image":"https://old.b4r.io/uploads/roi/company/eset.jpeg"},"eventUrl":""}],"products":[{"id":1730,"logo":false,"scheme":false,"title":"ESET Endpoint Protection advanced","vendorVerified":0,"rating":"1.80","implementationsCount":4,"suppliersCount":0,"alias":"eset-endpoint-protection-advanced","companyTypes":[],"description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection against ransomware</li> <li>Prevention of fileless attacks</li> <li>Remote management</li> </ul>\r\n<span style=\"font-weight: bold;\">Endpoint security</span> ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives. <span style=\"font-weight: bold;\">File server security</span> Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity. <span style=\"font-weight: bold;\">Manage products via on-premise console</span> ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.\r\n<ul> <li>Complete network visibility</li> <li>Full security management</li> <li>Flexible reporting</li> <li>Automated security management</li> </ul>\r\n<span style=\"font-style: italic;\">"ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally." - Richard Ford, Head of IT at SWFC</span>","shortDescription":"ESET ENDPOINT PROTECTION ADVANCED is a complete multilayered protection with remote security management: On-premise management, endpoint security, file server security\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET Endpoint Protection advanced","keywords":"ESET, security, management, Protection, protection, Endpoint, servers, advanced","description":"ESET Endpoint Protection Advanced Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r","og:title":"ESET Endpoint Protection advanced","og:description":"ESET Endpoint Protection Advanced Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r"},"eventUrl":"","translationId":1731,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":400,"title":"High costs"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":385,"title":"Risk of data loss or damage"},{"id":384,"title":"Risk of attacks by hackers"},{"id":387,"title":"Non-compliant with IT security requirements"},{"id":336,"title":"Risk or Leaks of confidential information"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://cdn1.esetstatic.com/ESET/INT/Docs/Others/Customer-Stories/CSS-Media_UK.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":550,"title":"ESET Endpoint Protection for IT service provider","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE PARTNER</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">GCS is a managed service provider located in El Paso, </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Texas. The company, which provides online cloud backup,</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">disaster recovery and managed IT services for home, office</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">& small business, became an ESET partner in early 2018.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Since joining the ESET Partner Program, company owner</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">John Gonzales says GCS has benefited from ESET’s trainings</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">and certifications, flexible Managed Service Provider</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">(MSP) program options and marketing resources.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">WHY THEY CHOSE ESET</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The company recommends ESET products to</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">their customers for the following reasons:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Efficient malware detection rate</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Low false positive rates</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Light system footprint</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Free U.S.-based customer support</span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“ESET is the most comprehensive security solution.</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">We recommend ESET security solutions to all our clients.”</span></span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">—John Gonzales – Owner – GCS</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Product:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">ESET Endpoint Security and ESET Endpoint Encryption</span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“I’ve tried and tested all the commercial security</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">solutions,” Gonzales said. “In my opinion, there’s</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">no comparison to the efficiency, effectiveness,</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">tools and support that ESET provides.”</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Gonzales added that the customizability and</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">functionality of the ESET Remote Administrator</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">gives GCS the tools to be more proactive for</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">their clients, thus providing better security.</span></span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“The ability to remotely install/update/manage ESET</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">endpoint products, and even operating system</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">updates, is essential and much more efficient</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">than other security endpoint solutions.”</span></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Partnering with ESET enabled GCS to extend its customer</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">base and offer more services by providing tailored solutions</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">based on the customers’ specific environments. “One of</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">the things to realize is that every business is different. ESET</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">empowers GCS, providing many integrated security products</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">for a wide range of solutions to fit a company’s needs.</span>","alias":"eset-endpoint-protection-for-it-service-provider","roi":0,"seo":{"title":"ESET Endpoint Protection for IT service provider","keywords":"ESET, security, Gonzales, solutions, Endpoint, company, providing, more","description":"THE PARTNER\rGCS is a managed service provider located in El Paso, Texas. The company, which provides online cloud backup,disaster recovery and managed IT","og:title":"ESET Endpoint Protection for IT service provider","og:description":"THE PARTNER\rGCS is a managed service provider located in El Paso, Texas. The company, which provides online cloud backup,disaster recovery and managed IT"},"deal_info":"","user":{"id":4379,"title":"GCS","logoURL":"https://old.b4r.io/uploads/roi/company/GCS_backup.png","alias":"gcs","address":"","roles":[],"description":"GCS is a locally owned business in El Paso, TX. We provide online cloud backup, disaster recovery and managed IT services for home, office & small business.\r\n ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://gcsbackup.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"GCS","keywords":"business, recovery, disaster, managed, services, office, small, home","description":"GCS is a locally owned business in El Paso, TX. We provide online cloud backup, disaster recovery and managed IT services for home, office & small","og:title":"GCS","og:description":"GCS is a locally owned business in El Paso, TX. We provide online cloud backup, disaster recovery and managed IT services for home, office & small","og:image":"https://old.b4r.io/uploads/roi/company/GCS_backup.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":315,"title":"Eset","logoURL":"https://old.b4r.io/uploads/roi/company/eset.jpeg","alias":"eset","address":"","roles":[],"description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET NOD32, hence competing in the antivirus industry market.","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":4,"vendorPartnersCount":0,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"www.eset.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Eset","keywords":"company, ESET, firewall, anti-virus, 2008, 2010, products, 2009","description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful","og:title":"Eset","og:description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful","og:image":"https://old.b4r.io/uploads/roi/company/eset.jpeg"},"eventUrl":""}],"products":[{"id":1730,"logo":false,"scheme":false,"title":"ESET Endpoint Protection advanced","vendorVerified":0,"rating":"1.80","implementationsCount":4,"suppliersCount":0,"alias":"eset-endpoint-protection-advanced","companyTypes":[],"description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection against ransomware</li> <li>Prevention of fileless attacks</li> <li>Remote management</li> </ul>\r\n<span style=\"font-weight: bold;\">Endpoint security</span> ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives. <span style=\"font-weight: bold;\">File server security</span> Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity. <span style=\"font-weight: bold;\">Manage products via on-premise console</span> ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.\r\n<ul> <li>Complete network visibility</li> <li>Full security management</li> <li>Flexible reporting</li> <li>Automated security management</li> </ul>\r\n<span style=\"font-style: italic;\">"ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally." - Richard Ford, Head of IT at SWFC</span>","shortDescription":"ESET ENDPOINT PROTECTION ADVANCED is a complete multilayered protection with remote security management: On-premise management, endpoint security, file server security\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET Endpoint Protection advanced","keywords":"ESET, security, management, Protection, protection, Endpoint, servers, advanced","description":"ESET Endpoint Protection Advanced Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r","og:title":"ESET Endpoint Protection advanced","og:description":"ESET Endpoint Protection Advanced Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r"},"eventUrl":"","translationId":1731,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":400,"title":"High costs"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":385,"title":"Risk of data loss or damage"},{"id":384,"title":"Risk of attacks by hackers"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://cdn1.esetstatic.com/ESET/US/resources/case-studies/ESET-Partner-Case-Study-GCS.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":548,"title":"ESET Endpoint Protection for the banking industry","description":"<span style=\"font-weight: bold;\">KEY BENEFITS FOR ERSTE GROUP, AUSTRIA</span>\r\n• A single product for both servers and endpoints\r\n• Simple operation, high suitability for daily use\r\n• High quality of malware recognition\r\n• Complete compatibility with all versions of Windows\r\n• Central management and dashboard via the ESET Remote Administrator\r\n• Lean installation package\r\n• High-performance, interruption-free operation which continues entirely behind the scenes\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE CUSTOMER</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">S IT Solutions Austria provides “all in one” IT solutions for the </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">banking industry. As a result, it needs solutions that off er </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">a particularly high level of data security in order to effi ciently </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">protect the critical data of business partners and their </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">customers from access by third parties. For its client, ERSTE </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Group, a total of 3,000 servers and 3,500 workstations had to </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">be protected across an array of operating systems: Windows XP </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">32 Bit, Windows 7 – EE 64 Bit, Windows Server 2003 (R2) 32 & 64 </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Bit, Windows Server 2008 (R2), and Windows Server 2012.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">HIGH PERFORMANCE, HIGH SECURITY REQUIRED</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The initial recommendation to use ESET Endpoint Antivirus </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">came from colleagues in other companies of the Erste </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Group, and the choice was validated by means of an internal </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">evaluation. ESET Endpoint Antivirus Business Edition’s high </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">performance and sparing use of hardware resources were </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">the essential purchase criteria, along with its good ratio of </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">price to performance. Among the other advantages were its </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">high-quality malware recognition, its central management </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">system — via the Remote Administrator dashboard — and its </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">lean installation package. </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">In total, four months were allocated for the migration. After </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">a two-month test phase with pilot clients, the roll-out on all </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">systems was begun. It was “absolutely remarkable,” according to </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Michael Todorovitsch, Head of Infrastructure Basis Systems </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">at s IT Solutions. “The complete roll-out on over 6,500 computers </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">passed off without notable incidents.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE SOLUTION</span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">In deploying the ESET solution, Todorovitsch commented that </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">“support and external help weren’t called on, and only a few directories</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">had to be exempted from scanning so that ESET Endpoint Antivirus </span></span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-style: italic;\">could run without issues.” </span></span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">The implementation of ESET Endpoint Antivirus at Erste </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Group has so far met all expectations in full. The fi rm has </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">commended its high performance, and interruption-free </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">operation which happens entirely behind the scenes and </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">does not impact users’ work.</span>","alias":"eset-endpoint-protection-for-the-banking-industry","roi":0,"seo":{"title":"ESET Endpoint Protection for the banking industry","keywords":"ESET, Windows, Endpoint, high, that, Server, with, from","description":"KEY BENEFITS FOR ERSTE GROUP, AUSTRIA\r• A single product for both servers and endpoints\r• Simple operation, high suitability for daily use\r• High quality of","og:title":"ESET Endpoint Protection for the banking industry","og:description":"KEY BENEFITS FOR ERSTE GROUP, AUSTRIA\r• A single product for both servers and endpoints\r• Simple operation, high suitability for daily use\r• High quality of"},"deal_info":"","user":{"id":4376,"title":"Erste Group Bank AG","logoURL":"https://old.b4r.io/uploads/roi/company/Erste_Group_Bank_AG.png","alias":"erste-group-bank-ag","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Welcome to Erste Group Bank AG</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Erste Group Bank AG was founded in 1819 as the first Austrian savings bank. Around 47,000 employees are serving 16.4 million clients in more than 2,500 branches in 7 countries. Erste Group is one of the largest financial services providers in Central and Eastern Europe.</span>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.erstegroup.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Erste Group Bank AG","keywords":"Group, Erste, Bank, branches, countries, Europe, more, than","description":"Welcome to Erste Group Bank AG\rErste Group Bank AG was founded in 1819 as the first Austrian savings bank. Around 47,000 employees are serving 16.4 million","og:title":"Erste Group Bank AG","og:description":"Welcome to Erste Group Bank AG\rErste Group Bank AG was founded in 1819 as the first Austrian savings bank. Around 47,000 employees are serving 16.4 million","og:image":"https://old.b4r.io/uploads/roi/company/Erste_Group_Bank_AG.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":315,"title":"Eset","logoURL":"https://old.b4r.io/uploads/roi/company/eset.jpeg","alias":"eset","address":"","roles":[],"description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET NOD32, hence competing in the antivirus industry market.","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":4,"vendorPartnersCount":0,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"www.eset.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Eset","keywords":"company, ESET, firewall, anti-virus, 2008, 2010, products, 2009","description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful","og:title":"Eset","og:description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful","og:image":"https://old.b4r.io/uploads/roi/company/eset.jpeg"},"eventUrl":""}],"products":[{"id":1730,"logo":false,"scheme":false,"title":"ESET Endpoint Protection advanced","vendorVerified":0,"rating":"1.80","implementationsCount":4,"suppliersCount":0,"alias":"eset-endpoint-protection-advanced","companyTypes":[],"description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection against ransomware</li> <li>Prevention of fileless attacks</li> <li>Remote management</li> </ul>\r\n<span style=\"font-weight: bold;\">Endpoint security</span> ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives. <span style=\"font-weight: bold;\">File server security</span> Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity. <span style=\"font-weight: bold;\">Manage products via on-premise console</span> ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.\r\n<ul> <li>Complete network visibility</li> <li>Full security management</li> <li>Flexible reporting</li> <li>Automated security management</li> </ul>\r\n<span style=\"font-style: italic;\">"ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally." - Richard Ford, Head of IT at SWFC</span>","shortDescription":"ESET ENDPOINT PROTECTION ADVANCED is a complete multilayered protection with remote security management: On-premise management, endpoint security, file server security\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET Endpoint Protection advanced","keywords":"ESET, security, management, Protection, protection, Endpoint, servers, advanced","description":"ESET Endpoint Protection Advanced Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r","og:title":"ESET Endpoint Protection advanced","og:description":"ESET Endpoint Protection Advanced Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r"},"eventUrl":"","translationId":1731,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":400,"title":"High costs"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://cdn1.esetstatic.com/ESET/INT/Docs/Others/Customer-Stories/Erste-Group_AT.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":132,"title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager for ARUP","description":"The Challenge\r\nWhen starting a new building project, Arup opens an office on site, which remains in place for the duration of the build, often for a number of years. It is paramount that employees have all the resources they need available to them and can start operating from the site straight away in order to work efficiently and meet deadlines. However, different parts of the company were using competing IT technologies from several vendors. As more project sites were built across the globe, it was becoming increasingly complex and difficult to manage the network and it was proving to be very costly for the infrastructure to keep up with user demands. Arup wanted to resolve this by consolidating the various systems into one; having one solution for all. By having a robust infrastructure that was easy to manage, it would bring operational efficiency and cost savings.\r\n\r\nThe Solution\r\nArup turned to SecureData, the independent IT security service provider, who it saw as a trusted consultant. SecureData reviewed the situation and recommended two innovative solutions. Firstly, SecureData deployed Application Delivery Network provider F5’s BIG-IP Local Traffic Manager (LTM). The application delivery controller allows the load balancing of multiple servers. It automatically points the user at the correct server depending on location, loading and availability. This turns the network into an agile infrastructure for application delivery – improving speed, and providing security and resilience. This would give Arup the flexibility and control to add applications and servers easily, as well as eliminate downtime and improve application performance.\r\nThe second solution to be deployed by SecureData was F5’s Big-IP Global Traffic Manager (GTM), which directs users to resources around the world depending on availability and location. It works by distributing user application requests based on business policies, data centre and network conditions, user location, and application performance to ensure high availability of global application. This gives holistic control of Arup’s global traffic to ensure better application performance, less downtime and simplified management. If a data centre goes down, it will automatically look for another and re-direct users to ensure that resources and support are always available. This enables Arup to optimise its application delivery across its globally distributed data centres as well as manage its complex distributed network simply and efficiently.\r\n\r\nThe Implementation\r\nPhase one of the implementation kicked off in mid-2009 which saw the initial evaluation right through to production. The implementation began in September of that year and saw the migration of the incumbent solution over to F5’s through a phased approach which took approximately nine months to complete. Phase two saw the process become automated. Arup is currently trialling the acceleration of the solution through various methods that speed up application performance ensuring that the users, wherever they are, get the same performance and experience even if it was a remote or local connection. Trial results have been good and Arup is now getting additional services from SecureData such as technical updates on its hardware.\r\nArup continues to leverage investment and is keen to begin trials to integrate functionality between F5 and other onpremise systems to automatically spin-up and –down servers automatically, providing fully ‘elastic’ server capacity when needed most, instead of investing in additional, seldom-used hardware.\r\n\r\nThe Benefits\r\nBy streamlining application delivery, Arup is provided with an agile and flexible infrastructure. This enables the company to obtain all the functionality it needs to optimise performance. This reduces the server load, bandwidth usage and related costs. Applications and data are secured and can be accelerated up to three times. Arup now has full control of application traffic to handle its ever-growing business, infrastructure and application demands.\r\n\r\n“Information Technology is moving at an unprecedented rate, we expect our trusted partners to be able to provide expert advice on-demand; technology solutions that are robust and reliable; pricing that is costeffective, and all backed up by professional support services. We believe that SecureData is able to meet our stringent requirements and we are happy to count them as a trusted partner.” - Mark Judge, Global IT Operations Manager, Arup","alias":"f5-big-ip-dns-big-ip-local-traffic-manager-dlja-globalnoi-konsaltingovoi-kompanii","roi":0,"seo":{"title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager for ARUP","keywords":"application, Arup, that, SecureData, This, performance, infrastructure, Manager","description":"The Challenge\rWhen starting a new building project, Arup opens an office on site, which remains in place for the duration of the build, often for a number of","og:title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager for ARUP","og:description":"The Challenge\rWhen starting a new building project, Arup opens an office on site, which remains in place for the duration of the build, often for a number of"},"deal_info":"","user":{"id":2951,"title":"Arup","logoURL":"https://old.b4r.io/uploads/roi/company/Arup.png","alias":"arup","address":"","roles":[],"description":"We are an independent firm of designers, planners, engineers, consultants and technical specialists offering a broad range of professional services. Through our work, we make a positive difference in the world. We shape a better world.\r\nRead the Key SpeechSir Ove Arup working at the Sydney Opera House site.\r\nFounded in 1946 with an initial focus on structural engineering, Arup first came to the world’s attention with the structural design of the Sydney Opera House, followed by its work on the Centre Pompidou in Paris. Arup has since grown into a truly multidisciplinary organisation. Most recently, its work for the Singapore Sports Hub has reaffirmed its reputation for delivering innovative and sustainable designs that reinvent the built environment.\r\nArup brings together broad-minded individuals from a wide range of disciplines and encourages them to look beyond the constraints of their own specialisms.\r\nThis unconventional approach to design springs in part from Arup’s ownership structure. The firm is owned in trust on behalf of its staff. The result is an independence of spirit that is reflected in the firm’s work, and in its dedicated pursuit of technical excellence.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.arup.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Arup","keywords":"Arup, work, from, design, world, Sydney, firm, Opera","description":"We are an independent firm of designers, planners, engineers, consultants and technical specialists offering a broad range of professional services. Through","og:title":"Arup","og:description":"We are an independent firm of designers, planners, engineers, consultants and technical specialists offering a broad range of professional services. Through","og:image":"https://old.b4r.io/uploads/roi/company/Arup.png"},"eventUrl":""},"supplier":{"id":2950,"title":"SecureData","logoURL":"https://old.b4r.io/uploads/roi/company/SecureData.jpg","alias":"securedata","address":"","roles":[],"description":"Founded in 1992, SecureData is one of Europe’s largest security service providers with an annual turnover in excess of £30 million. We specialise in delivering managed services that help businesses secure their data and networks to minimise disruption.\r\n\r\nHeadquartered in Maidstone, Kent, SecureData has more than a decade of experience as a managed security services provider and over 2500 blue-chip customers across Europe, Africa and the USA. We are currently expanding globally, with recent acquisitions including SensePost, Paterva, and Quadrant Networks. \r\n\r\nOur complete security services assess risk, detect threats in real-time, protect valuable assets and instantly respond to breaches when they happen. We help our customers fight an increasing array of cyberthreats, improve employee mobility, ensure regulatory compliance and allow the safe adoption of both cloud computing and consumer technologies in the workplace.","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.secdata.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SecureData","keywords":"SecureData, services, security, help, customers, with, managed, respond","description":"Founded in 1992, SecureData is one of Europe’s largest security service providers with an annual turnover in excess of £30 million. We specialise in delivering","og:title":"SecureData","og:description":"Founded in 1992, SecureData is one of Europe’s largest security service providers with an annual turnover in excess of £30 million. We specialise in delivering","og:image":"https://old.b4r.io/uploads/roi/company/SecureData.jpg"},"eventUrl":""},"vendors":[{"id":2950,"title":"SecureData","logoURL":"https://old.b4r.io/uploads/roi/company/SecureData.jpg","alias":"securedata","address":"","roles":[],"description":"Founded in 1992, SecureData is one of Europe’s largest security service providers with an annual turnover in excess of £30 million. We specialise in delivering managed services that help businesses secure their data and networks to minimise disruption.\r\n\r\nHeadquartered in Maidstone, Kent, SecureData has more than a decade of experience as a managed security services provider and over 2500 blue-chip customers across Europe, Africa and the USA. We are currently expanding globally, with recent acquisitions including SensePost, Paterva, and Quadrant Networks. \r\n\r\nOur complete security services assess risk, detect threats in real-time, protect valuable assets and instantly respond to breaches when they happen. We help our customers fight an increasing array of cyberthreats, improve employee mobility, ensure regulatory compliance and allow the safe adoption of both cloud computing and consumer technologies in the workplace.","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.secdata.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SecureData","keywords":"SecureData, services, security, help, customers, with, managed, respond","description":"Founded in 1992, SecureData is one of Europe’s largest security service providers with an annual turnover in excess of £30 million. We specialise in delivering","og:title":"SecureData","og:description":"Founded in 1992, SecureData is one of Europe’s largest security service providers with an annual turnover in excess of £30 million. We specialise in delivering","og:image":"https://old.b4r.io/uploads/roi/company/SecureData.jpg"},"eventUrl":""}],"products":[{"id":1507,"logo":false,"scheme":false,"title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager от SecureData","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"alias":"f5-big-ip-dns-big-ip-local-traffic-manager-ot-securedata","companyTypes":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Менеджер локального трафика BIG-IP Local Traffic Manager (LTM) выполняет роль полного посредника между пользователями и сервером приложений, создавая уровень абстракции для защиты, оптимизации и балансировки нагрузки трафика приложений. Таким образом, вы получаете необходимый уровень гибкости и управления, облегчающий добавление приложений и серверов, исключающий возможность простоя, повышающий производительность приложений и отвечающий вашим требованиям к обеспечению безопасности.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">BIG‐IP LTM – это полный прокси между пользователями и серверами приложений, обеспечивающий безопасность, оптимизацию трафика приложений и балансировку его нагрузки.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Преимущества F5 BIG-IP DNS:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<ul><li>глобальная балансировка нагрузки на приложения</li><li>легкая масштабируемость системы доменных имен.</li><li>повышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)</li><li>защита DNS от DDoS-атак</li></ul>","shortDescription":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM) — модуль, распределяющий запросы и нагрузки на корпоративные приложения и систему DNS\r\nМенеджер локального трафика BIG-IP Local Traffic Manager (LTM) ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager от SecureData","keywords":"приложений, BIG-IP, нагрузки, трафика, Manager, Traffic, уровень, системы","description":"Менеджер локального трафика BIG-IP Local Traffic Manager (LTM) выполняет роль полного посредника между пользователями и сервером приложений, создавая уровень","og:title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager от SecureData","og:description":"Менеджер локального трафика BIG-IP Local Traffic Manager (LTM) выполняет роль полного посредника между пользователями и сервером приложений, создавая уровень"},"eventUrl":"","translationId":2707,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"ITSM (IT Service Management, управление ИТ-услугами) — подход к управлению и организации ИТ-услуг, направленный на удовлетворение потребностей бизнеса. Управление ИТ-услугами реализуется поставщиками ИТ-услуг путём использования оптимального сочетания людей, процессов и информационных технологий. Для содействия реализации подхода к управлению ИТ-услугами используется серия документов ITIL.\r\n\r\nВ отличие от более традиционного технологического подхода, ITSM рекомендует сосредоточиться на клиенте и его потребностях, на услугах, предоставляемых пользователю информационными технологиями, а не на самих технологиях. При этом процессная организация предоставления услуг и наличие заранее оговоренных в соглашениях об уровне услуг параметров эффективности (KPI) позволяет ИТ-отделам предоставлять качественные услуги, измерять и улучшать их качество.\r\n\r\nВажным моментом при изложении принципов ITSM является системность. При изложении каждого составного элемента ITSM (управление инцидентами, управление конфигурациями, управление безопасностью и т. д.) в обязательном порядке прослеживается его взаимосвязь и координация с остальными элементами (службами, процессами) и при этом даются необходимые практические рекомендации.\r\n\r\nITIL не является конкретным алгоритмом или руководством к действию, но она описывает передовой опыт (best practices) и предлагает рекомендации по организации процессного подхода и управления качеством предоставления услуг. Это позволяет оторваться от особенностей данного конкретного предприятия в данной конкретной отрасли. Вместе с тем, несмотря на определённую абстрактность, ITIL всячески нацелено на практическое использование. В каждом разделе библиотеки приводятся ключевые факторы успеха внедрения того или иного процесса, практические рекомендации при этом превалируют над чисто теоретическими рассуждениями.\r\nИсточник: https://ru.wikipedia.org/wiki/ITSM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ITSM.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1508,"logo":false,"scheme":false,"title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager from SecureData","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"alias":"f5-big-ip-dns-big-ip-local-traffic-manager-from-securedata","companyTypes":[],"description":"BIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries.\r\nWith a set of features that includes multicore scalability, DNS Express, and IP Anycast integration, BIG-IP DNS handles millions of DNS queries, protects your business from DDoS attacks, and ensures top application performance for users.\r\nBIG-IP DNS delivers a real-time, signed DNSSEC query response and DNS firewall services for attack protection and mitigates complex threats by blocking access to malicious domains.\r\nWorks with what you already have in place.\r\nBIG-IP DNS services integrate with DNS zone management solutions, increase DNS performance at the network edge, and mask the DNS back-end infrastructure.\r\nBIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms the chaotic volume of network traffic into logically assembled streams of data, and then makes intelligent traffic management decisions, selecting the right destination based on server performance, security, and availability.","shortDescription":"BIG-IP DNS improves the performance and availability of your global applications.\r\nBIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager from SecureData","keywords":"BIG-IP, traffic, performance, queries, network, your, application, with","description":"BIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries.\rWith a set of features that includes multicore","og:title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager from SecureData","og:description":"BIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries.\rWith a set of features that includes multicore"},"eventUrl":"","translationId":1508,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"ITSM (IT Service Management, управление ИТ-услугами) — подход к управлению и организации ИТ-услуг, направленный на удовлетворение потребностей бизнеса. Управление ИТ-услугами реализуется поставщиками ИТ-услуг путём использования оптимального сочетания людей, процессов и информационных технологий. Для содействия реализации подхода к управлению ИТ-услугами используется серия документов ITIL.\r\n\r\nВ отличие от более традиционного технологического подхода, ITSM рекомендует сосредоточиться на клиенте и его потребностях, на услугах, предоставляемых пользователю информационными технологиями, а не на самих технологиях. При этом процессная организация предоставления услуг и наличие заранее оговоренных в соглашениях об уровне услуг параметров эффективности (KPI) позволяет ИТ-отделам предоставлять качественные услуги, измерять и улучшать их качество.\r\n\r\nВажным моментом при изложении принципов ITSM является системность. При изложении каждого составного элемента ITSM (управление инцидентами, управление конфигурациями, управление безопасностью и т. д.) в обязательном порядке прослеживается его взаимосвязь и координация с остальными элементами (службами, процессами) и при этом даются необходимые практические рекомендации.\r\n\r\nITIL не является конкретным алгоритмом или руководством к действию, но она описывает передовой опыт (best practices) и предлагает рекомендации по организации процессного подхода и управления качеством предоставления услуг. Это позволяет оторваться от особенностей данного конкретного предприятия в данной конкретной отрасли. Вместе с тем, несмотря на определённую абстрактность, ITIL всячески нацелено на практическое использование. В каждом разделе библиотеки приводятся ключевые факторы успеха внедрения того или иного процесса, практические рекомендации при этом превалируют над чисто теоретическими рассуждениями.\r\nИсточник: https://ru.wikipedia.org/wiki/ITSM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ITSM.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":177,"title":"Decentralized IT systems"}]}},"categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"ITSM (IT Service Management, управление ИТ-услугами) — подход к управлению и организации ИТ-услуг, направленный на удовлетворение потребностей бизнеса. Управление ИТ-услугами реализуется поставщиками ИТ-услуг путём использования оптимального сочетания людей, процессов и информационных технологий. Для содействия реализации подхода к управлению ИТ-услугами используется серия документов ITIL.\r\n\r\nВ отличие от более традиционного технологического подхода, ITSM рекомендует сосредоточиться на клиенте и его потребностях, на услугах, предоставляемых пользователю информационными технологиями, а не на самих технологиях. При этом процессная организация предоставления услуг и наличие заранее оговоренных в соглашениях об уровне услуг параметров эффективности (KPI) позволяет ИТ-отделам предоставлять качественные услуги, измерять и улучшать их качество.\r\n\r\nВажным моментом при изложении принципов ITSM является системность. При изложении каждого составного элемента ITSM (управление инцидентами, управление конфигурациями, управление безопасностью и т. д.) в обязательном порядке прослеживается его взаимосвязь и координация с остальными элементами (службами, процессами) и при этом даются необходимые практические рекомендации.\r\n\r\nITIL не является конкретным алгоритмом или руководством к действию, но она описывает передовой опыт (best practices) и предлагает рекомендации по организации процессного подхода и управления качеством предоставления услуг. Это позволяет оторваться от особенностей данного конкретного предприятия в данной конкретной отрасли. Вместе с тем, несмотря на определённую абстрактность, ITIL всячески нацелено на практическое использование. В каждом разделе библиотеки приводятся ключевые факторы успеха внедрения того или иного процесса, практические рекомендации при этом превалируют над чисто теоретическими рассуждениями.\r\nИсточник: https://ru.wikipedia.org/wiki/ITSM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ITSM.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.secdata.com/resource/arup-resilient-infrastructure","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":278,"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a food and beverage company","description":"OVERVIEW\r\nCrediton Dairy, based in the heart of Devon in southern England, is a food and beverage company that produces a variety of milk drinks. The company is best known for its “Moo Milk” and “Dairy Pride” brands and has products in 13,500 food retail stores nationwide, making it one of the UK’s leading dairy beverage companies. Its chairman, Neil Kennedy, was presented with the prestigious SW Dairy Industry Award for his outstanding contribution towards the development of the British dairy market.\r\nIn 2012, dairy companies Arla Foods UK and Milk Link were given approval to merge by the European Commission (EC). A condition for the approval of the merger was that Crediton Dairy operate as a separate business. Benjamin Evans, formerly with Milk Link, became IT Manager for Crediton Dairy. \r\nCHALLENGE\r\nEvans’ initial task was to implement a web security solution that addressed both security and business challenges Crediton Dairy had been struggling with at the time. Its network had seen continuous attacks from external threats masking as an insider in order to in ltrate and steal sensitive data. These threats would often be in the form of sophisticated ransomware and other advanced threats, with delivery methods that shifted between web and email channels in search of a weakness. Suspicious URLs sent to employees from Director-level positions and phony invitations to download a PDF instructing users to “please pay invoice” are just a few examples Evans saw rsthand within a few weeks of joining the company.\r\nSome attacks were being successfully filtered by the Office 365 Outlook client, but only to the extent of being redirected into a “junk” folder. Nothing was in place to effectively identify or classify information. Crediton Dairy also lacked a solution that delivered real- time security ratings to web or email traffic. \r\nAfter determining the security included in Office 365 was not up to the task, the challenge was to build a security posture from the ground-up— starting with web—that wouldn’t break the budget. With only a small team to work with, Evans began searching for cloud-based security solutions. On-premises appliances were out of the question —he simply didn’t have the resources to install and manage additional hardware. \r\nSOLUTION\r\nCrediton Dairy assessed multiple web security providers, including Barracuda Networks. But according to Evans, Barracuda Networks couldn’t meet their strict functionality or budgetary requirements.\r\n“There were a few let downs on the way the Barracuda URL filtering worked. It just didn’t feel like home.”\r\n— Evans\r\nAs a former Milk Link employee, Evans was familiar with the virtualized classification capabilities and hassle-free maintenance of the Forcepoint Web Security Cloud solution; it was the company’s primary solution for web security.\r\nFollowing Evans’ recommendation, Forcepoint Web Security Cloud went through a Proof of Concept (POC) at Crediton Dairy. It exceeded all expectations. Evans noted that other cloud versions on the market were too “light” in functionality, compared to the high level of protection with Forcepoint.\r\n“The Forcepoint solution offered more options around the Cloud. Rather than just black-listing or white-listing URLs and email addresses, Forcepoint ticked all of our boxes for functionality.”\r\n— Evans\r\nDeployment was straightforward and simple and the Forcepoint support team was there for Evans whenever needed.\r\n“The Forcepoint support team was very good. When we were originally getting set up, my account manager and the support team took control, had a look where any issues might be, configured the solution, and got it up and running while taking me through some of the new features.”\r\n— Evans\r\nCrediton Dairy’s IT department has always embraced innovation and new technologies. It was one of the first to adopt Office 365 when it became available in the UK. However, because Office 365 comes with only basic security features, it doesn’t properly secure the average working email environment. This was, unfortunately, the case for Crediton Dairy.\r\n“We were starting to see a bit more spam coming through Office 365, compared to where it was when it first came out. We started to look at the email side of Forcepoint, for sure.”\r\n— Evans\r\nEvans and Crediton Dairy chose to implement Forcepoint Email Security Cloud as well as Forcepoint Advanced Malware Detection for Email, incorporating cloud-hosted protection that surpasses the capability of on-premises sandboxes. Evans admits, it was a “no- brainer” for his organization.\r\n“Forcepoint Email Security Cloud has stopped anything suspicious from coming in and I can visibly see what is being stopped and what we’re being protected from. We’re protected and it’s one of those insurance policies that every company needs.”\r\n— Evans\r\nThe Crediton Dairy team took advantage of an easy cloud deployment by simply adding the Forcepoint Email Security Cloud to an already deployed Forcepoint Web Security Cloud for coordinated defenses against advanced threats. The deployment of Forcepoint Email Security Cloud was accomplished overnight. Evans and his team began the process on a Friday evening and nished Saturday. \r\nRESULTS\r\nForcepoint Web Security Cloud solutions met all of Crediton Dairy’s functionality and quality requirements without them having to purchase additional hardware. Staying within budget has freed up resources for other projects. At the same time, Forcepoint Email Security Cloud solution has empowered Crediton Dairy to safely embrace new technologies such as Office 365 and enjoy all of its ef ciencies and cost savings.\r\nEvans recalls how well Forcepoint Cloud solutions integrate well with Active Directory and enhance and complement the Office 365 solution already in place.\r\n“Forcepoint is able to work seamlessly with Office 365. We don’t see any problems at all when we run the two together.”\r\n— Evans\r\nAn easy deployment of Forcepoint Web Security Cloud and Forcepoint Email Security Cloud solutions have paved the way for Crediton Dairy to continue to evolve and innovate with safety and con dence.\r\nCrediton Dairy has relied on Forcepoint security solutions since 2015. ","alias":"forcepoint-advanced-malware-detection-forcepoint-email-security-cloud-forcepoint-web-security-cloud-for-a-food-and-beverage-company","roi":0,"seo":{"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a food and beverage company","keywords":"Forcepoint, Evans, Crediton, Dairy, Cloud, Security, with, security","description":"OVERVIEW\rCrediton Dairy, based in the heart of Devon in southern England, is a food and beverage company that produces a variety of milk drinks. The company is","og:title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a food and beverage company","og:description":"OVERVIEW\rCrediton Dairy, based in the heart of Devon in southern England, is a food and beverage company that produces a variety of milk drinks. The company is"},"deal_info":"","user":{"id":3869,"title":"Crediton Dairy","logoURL":"https://old.b4r.io/uploads/roi/company/Crediton_Dairy.jpg","alias":"crediton-dairy","address":"","roles":[],"description":"Crediton Dairy is one of the UK’s leading dairy drinks businesses producing a comprehensive range of fresh flavoured and functional chilled milk drinks, as well as long life milks & creams. Located in the heart of Devon, we are dedicated to producing great tasting dairy products made from British milk supplied by our group of local, family-run, dairy farms.\r\n We’re independently owned, financially strong and professionally run and focused on adding value to everything we do. To this end we constantly challenge ourselves:\r\nto do better;\r\nto listen to and meet the needs of our customers and consumers;\r\nto value and build strong relationships with our people, partners and farmer suppliers; and\r\nto act responsibly, ethically and treat others as we would want to be treated.\r\nOur great tasting milk drinks are for everyone from growing families to fitness fanatics. Our products are consumed in homes, restaurants and on-the-go across the country. From retailer own-label to our fast-growing Moo brand you’ll find Crediton Dairy products in over 13,500 food retail stores nationwide. We’re also a leading supplier of milks and creams across the foodservice and wholesale sectors. But we aren’t stopping there and we’re working on exciting new product innovations and formats to move the dairy drinks category forward.\r\nAll of this comes out of our well invested dairy situated in the middle of Devon, a county which is of course synonymous with dairy farming and great tasting dairy products and at Crediton Dairy we’re incredibly proud to be continuing this tradition.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.creditondairy.co.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Crediton Dairy","keywords":"Dairy, Crediton","description":"Crediton Dairy is one of the UK’s leading dairy drinks businesses producing a comprehensive range of fresh flavoured and functional chilled milk drinks, as","og:title":"Crediton Dairy","og:description":"Crediton Dairy is one of the UK’s leading dairy drinks businesses producing a comprehensive range of fresh flavoured and functional chilled milk drinks, as","og:image":"https://old.b4r.io/uploads/roi/company/Crediton_Dairy.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":1474,"logo":false,"scheme":false,"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"forcepoint-advanced-malware-detection-forcepoint-email-security-cloud-forcepoint-web-security-cloud","companyTypes":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Email Security Cloud (formerly TRITON AP-EMAIL Cloud) - Protecting from spam, phishing & ransomware attacks wherever email is accessed</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud) - Delivering premier cloud security to protect users and data everywhere</span>","shortDescription":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","keywords":"Cloud, Forcepoint, Security, Malware, Advanced, TRITON, formerly, Email","description":"Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats\rForcepoint Email Security Cloud (formerly TRITON AP-EMAIL","og:title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","og:description":"Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats\rForcepoint Email Security Cloud (formerly TRITON AP-EMAIL"},"eventUrl":"","translationId":1474,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":74,"title":"United Kingdom","name":"GBR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":281,"title":"No IT security guidelines"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/crediton-dairy","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":281,"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a global food provider","description":"Our goal was to keep everything as simple as possible, not complicated. Forcepoint™, in comparison with other systems, clearly, offered the best solution. \r\nWolfgang Allgäuer\r\nIT Infrastructure Manager OSI Food Solutions\r\nHave similar needs?\r\nOVERVIEW\r\nOSI Group, LLC (OSI) provides products and supplies for the food industry, worldwide. It supplies beef, pork, poultry and seafood, as well as vegetable, dough, fruit and cheese-based products. OSI is a well-known supplier for global food chains such as Subway, Starbucks, Pizza Hut and McDonalds. The company is based in Aurora, Illinois with additional offices in the United Kingdom, Germany and China. \r\nCHALLENGE\r\nEmail is a high-priority service for OSI due to its extensive use across all international locations. OSI experienced a strong uptick in the volume of threatening inbound emails containing malicious links or fraudulent content. These attacks were becoming more sophisticated and equally catastrophic. Employee carelessness with regards to email protocol became an easy way for hackers to inflict damage and steal confidential information. Additionally, the basic anti-spam solution that OSI had initially installed was strictly limited to on-premises protection and was unable provide the scalability necessary to protect a growing workforce of remote employees.\r\nOSI needed a solution to thwart phishing attacks, provide web protection and enforce usage policies that would ensure the security of its roaming users operating in any network. Reducing downtime while delivering a superior performance was prioritized to increase employee productivity and protect OSI’s reputation.\r\n“Our network continued to be compromised, which was significantly frustrating our administration. Therefore, we looked into the market for a new solution which would get rid of these issues once and for all.“\r\n— Wolfgang Allgäuer, IT Infrastructure Manager, OSI \r\nSOLUTION\r\nWhile searching for a new solution, OSI strived to avoid the expense of future on-site installations. With that in mind, Allgäuer and his colleagues concentrated their purchasing criteria exclusively on cloud-based security. They turned to long-term, trusted partner, EyeT Secure Technologies, in Ottobrunn, located near Munich.\r\nEyeT, specializing in IT security consulting, training and licensing, recommended the use of cloud-based email security from Forcepoint. TRITON AP-EMAIL Cloud (now Forcepoint Cloud Email Security) secures the communication channel most often used in the early stages of an advanced attack, empowering mobile workers and the safe adoption of new technologies without the need for additional hardware.\r\n“Deployment was quite simple. We only had to adjust the channels of communication to the Cloud and customize the MX records. That took a maximum of half a day to complete.”\r\n— Allgäuer\r\nEmpowering mobile workers was a large part of the Forcepoint project—about 60% of OSI’s endpoints are laptops, which are constantly connecting to third-party networks. Convinced by the success of TRITON AP-EMAIL Cloud, OSI implemented TRITON AP-WEB Cloud (now Forcepoint Cloud Web Security), which works effortlessly to protect roaming users operating out of any network.\r\n“If our employees connect from outside the corporate network, they now go through the web security solution seamlessly, as if they never left the office.”\r\n— Allgäuer\r\nThe OSI security team in Germany is responsible for securing all of OSI’s European offices. In this critical role, OSI security has the responsibility of creating uniform standards for protecting the organization’s reputation and assets. It must, therefore, deploy solutions that maximize Content Security across an entire infrastructure. TRITON AP-EMAIL Cloud and TRITON AP-WEB Cloud share a common architecture that unifies management and provides visibility into real-time global activity.\r\n“Our goal was to keep everything as simple as possible, not complicated. Forcepoint, in comparison with other systems, clearly offered the best solution.”\r\n— Allgäuer\r\nRESULTS\r\nBy deploying Forcepoint’s Cloud security solutions, OSI has drastically decreased the administrative burden on its IT team. The TRITON architecture ensures full unified management and coordination of inbound and outbound defenses across OSI gateways.\r\n“Our employees no longer receive emails that might contain malicious content and the solution requires little attention which makes a considerable difference to our IT administrators. We are very pleased with the Forcepoint solution.”\r\n— Allgäuer\r\nOSI was so convinced of these benefits that, to date, approximately 75% of its European locations now have a deployed security solution from Forcepoint. In addition, Allgäuer has confirmed that Forcepoint will be used as a pan-European standard for OSI moving forward. OSI Food Solutions has relied on Forcepoint security solutions since 2010. ","alias":"forcepoint-email-security-cloud-forcepoint-web-security-cloud-for-a-global-food-provider","roi":0,"seo":{"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a global food provider","keywords":"Forcepoint, Cloud, solution, security, Allgäuer, that, TRITON, Security","description":"Our goal was to keep everything as simple as possible, not complicated. Forcepoint™, in comparison with other systems, clearly, offered the best solution. ","og:title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a global food provider","og:description":"Our goal was to keep everything as simple as possible, not complicated. Forcepoint™, in comparison with other systems, clearly, offered the best solution. "},"deal_info":"","user":{"id":3872,"title":"OSI Group","logoURL":"https://old.b4r.io/uploads/roi/company/OSI_Group.png","alias":"osi-group","address":"","roles":[],"description":"As a premier global food provider, the OSI Group partners with the world’s leading foodservice and retail food brands to provide concept-to-table solutions that delight consumers around the globe.\r\n\r\nWith the infrastructure and financial resources of one of the largest privately held food providers, we offer you extensive capabilities to source, develop, produce and distribute custom food solutions anywhere in the world.\r\n\r\nAt the core of our company is an entrepreneurial passion and agility that brings curiosity and a can-do ethic to customer collaborations. You can turn to OSI for fresh, innovative ways to deliver next-generation food solutions — and turn your ideas into success.\r\nOSI offers you:\r\nCustom food solutions made to your precise specifications\r\nEfficient and trustworthy supply chain expertise\r\nExceptional culinary skill and global flavor knowledge\r\nInnovative research and design facilities that help bring your menu and meal ideas to life\r\nUnsurpassed food safety and quality assurance practices\r\nA commitment to sustainability throughout our extensive network","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.osigroup.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"OSI Group","keywords":"Group","description":"As a premier global food provider, the OSI Group partners with the world’s leading foodservice and retail food brands to provide concept-to-table solutions","og:title":"OSI Group","og:description":"As a premier global food provider, the OSI Group partners with the world’s leading foodservice and retail food brands to provide concept-to-table solutions","og:image":"https://old.b4r.io/uploads/roi/company/OSI_Group.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":1473,"logo":false,"scheme":false,"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"forcepoint-email-security-cloud-forcepoint-web-security-cloud","companyTypes":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email Security gives you the security you need by protecting you against multi-stage advanced threats that exploit email to penetrate your IT environment.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Email Security applies real-time behavioral sandboxing, enterprise-grade DLP and other advanced defense technologies to prevent leaks of sensitive information, empowering your workers — in the office or on the road — as you safely adopt technologies like Microsoft Office 365. In addition, detect phishing and secure email wherever users need access, even on mobile devices, through features like Phishing Education and URL Wrapping.</span>\r\nYour business and data are under constant attack. Traditional filtering and antivirus products no longer provide sufficient protection, and many web security solutions can’t address advanced threats as they occur.\r\n\r\nForcepoint Web Security provides advanced, real-time threat defense to stop advanced threats and prevent data loss. It provides robust protection through context- and content-aware defenses, coupled with integrated Cloud Access Security Broker (CASB) functionality, to provide control and visibility for cloud applications on both on-premises and roaming users. The combination of industry-leading web protection, CASB functionality and enterprise DLP delivers protection at a value no other vendor can match.","shortDescription":"Forcepoint Email Security Cloud (formerly TRITON AP-EMAIL Cloud) - Protecting from spam, phishing & ransomware attacks wherever email is accessed","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","keywords":"Security, advanced, Forcepoint, protection, threats, like, Email, Cloud","description":"Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email","og:title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","og:description":"Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email"},"eventUrl":"","translationId":1473,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":54,"title":"Germany","name":"DEU"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/osi-food-solutions","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":154,"title":"infotecs ViPNet Coordinator HW для сети магазинов бытовой техники, электроники и товаров для дома","description":"Продукты компании ИнфоТеКС защищают каналы связи в сети «Эльдорадо»\r\n\r\nСистемы защиты информации компании ИнфоТеКС, ведущего отечественного разработчика программно-аппаратных решений в сфере информационной безопасности, обеспечивают защиту каналов связи в распределенной ИТ-инфраструктуре крупнейшей в России сети магазинов бытовой техники, электроники и товаров для дома «Эльдорадо». \r\n\r\nКак рассказали в компании «Эльдорадо», предпосылкой проекта по защите каналов связи разветвленной сети магазинов средствами защиты информации компании ИнфоТеКС стал переезд систем заказчика на хостинг в Россию из зарубежного ЦОДа, в который ранее осуществлялась прямая трансграничная передача персональных данных. \r\n\r\nДля эффективной и надежной защиты данных, передаваемых на территории России, компания «Эльдорадо» выбрала системы компании ИнфоТеКС — семейство шлюзов безопасности ViPNet Coordinator HW, с помощью которых можно реализовывать множество сценариев защиты информации.\r\n\r\nПрограммно-аппаратные комплексы ViPNet Coordinator HW, интегрированные в распределенную ИТ-инфраструктуру заказчика, обеспечивают построение защищенных каналов связи между офисами компании, защищают данные заказчика от сетевых атак и несанкционированного доступа к информации, а также обеспечивают защиту магистральных каналов, соединяющих центральный офис и ЦОДы. Семейство шлюзов безопасности ViPNet Coordinator HW, функционирующее на площадке заказчика, зарекомендовало себя как высокоэффективное отечественное средство сетевой защиты, соответствующее самым жестким требованиям в части функциональности, надежности, отказоустойчивости и удобства эксплуатации. \r\n\r\n«После переезда бизнес-систем компании “Эльдорадо” на хостинг в Россию из Германии нам потребовалось надежное российское и, что очень важно, сертифицированное российским регулятором решение для эффективной защиты каналов связи, в том числе передачи критичной информации. Сейчас мы ведем активную полномасштабную работу на продуктах компании ИнфоТеКС по защите каналов связи и приведения их в соответствие с законодательством РФ, — рассказал менеджер по информационной безопасности компании «Эльдорадо» Федор Курносов, — Особо отмечу, что прямая вендорская поддержка продуктов, осуществляемая специалистами компании ИнфоТеКС, гарантирует нам надежную работу всех систем, что особенно важно для нашей компании в части отказоустойчивости и доступности оборудования». \r\n\r\n«Сегодня сфера ритейла активно развивается и становится все более восприимчивой и уязвимой к рискам информационной безопасности. Особенно это касается вопросов обеспечения защиты данных, когда утечка информации может оказаться критичной для бизнеса. Проект с компанией “Эльдорадо” по внедрению в распределенные филиалы средств защиты информации позволит крупнейшей в России сети магазинов бытовой техники, электроники и товаров для дома осуществлять безопасную передачу данных во множество филиалов, не заботясь о рисках для бизнеса. В дальнейшем мы планируем расширение проекта на все филиалы российской сети “Эльдорадо”», — рассказал заместитель генерального директора компании ИнфоТеКС Дмитрий Гусев. ","alias":"infotecs-vipnet-coordinator-hw-dlja-seti-magazinov-bytovoi-tekhniki-ehlektroniki-i-tovarov-dlja-doma","roi":0,"seo":{"title":"infotecs ViPNet Coordinator HW для сети магазинов бытовой техники, электроники и товаров для дома","keywords":"компании, защиты, Эльдорадо, ИнфоТеКС, информации, сети, каналов, связи","description":"Продукты компании ИнфоТеКС защищают каналы связи в сети «Эльдорадо»\r\rСистемы защиты информации компании ИнфоТеКС, ведущего отечественного разработчика","og:title":"infotecs ViPNet Coordinator HW для сети магазинов бытовой техники, электроники и товаров для дома","og:description":"Продукты компании ИнфоТеКС защищают каналы связи в сети «Эльдорадо»\r\rСистемы защиты информации компании ИнфоТеКС, ведущего отечественного разработчика"},"deal_info":"","user":{"id":572,"title":"Eldorado","logoURL":"https://old.b4r.io/uploads/roi/company/EHldorado.png","alias":"ehldorado","address":"","roles":[],"description":"«Эльдорадо» — торговая сеть по продаже бытовой электроники. По данным за 2012 год, занимала второе после «М.Видео» место в России как по продажам на рынке бытовой техники и электроники (8,6 % рынка), так и по доле занимаемых торговых площадей (21 %). Штаб-квартира — в Москве.\r\nВ Украине с 1999 года\r\nСтремительно набирая популярность по всей стране, Эльдорадо в 2003 г. Открывает в Киеве первый в Украине гипермаркет электроники и увеличивает число своих магазинов в 5 раз - до 32 торговых точек!","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.eldorado.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Eldorado","keywords":"электроники, Эльдорадо, торговых, Украине, бытовой, набирая, популярность, стране","description":"«Эльдорадо» — торговая сеть по продаже бытовой электроники. По данным за 2012 год, занимала второе после «М.Видео» место в России как по продажам на рынке","og:title":"Eldorado","og:description":"«Эльдорадо» — торговая сеть по продаже бытовой электроники. По данным за 2012 год, занимала второе после «М.Видео» место в России как по продажам на рынке","og:image":"https://old.b4r.io/uploads/roi/company/EHldorado.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":2979,"title":"infotecs","logoURL":"https://old.b4r.io/uploads/roi/company/InfoTeKS.png","alias":"infoteks","address":"","roles":[],"description":"infotecs Company (JSC \"Information Technology and Communication Systems\") is a leading Russian vendor of high-tech software and hardware-software of information security. The company was founded in 1989","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":34,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":1,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.infotecs.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"infotecs","keywords":"infotecs, information, software, security, hardware-software, company, 1989, founded","description":"infotecs Company (JSC \"Information Technology and Communication Systems\") is a leading Russian vendor of high-tech software and hardware-software of","og:title":"infotecs","og:description":"infotecs Company (JSC \"Information Technology and Communication Systems\") is a leading Russian vendor of high-tech software and hardware-software of","og:image":"https://old.b4r.io/uploads/roi/company/InfoTeKS.png"},"eventUrl":""}],"products":[{"id":576,"logo":false,"scheme":false,"title":"infotecs ViPNet Coordinator HW","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"alias":"infotecs-vipnet-coordinator-hw","companyTypes":[],"description":"ViPNet Coordinator — семейство шлюзов безопасности, входящих в состав продуктовой линейки ViPNet Network Security. В зависимости от настроек ViPNet Coordinator может выполнять следующие функции в защищенной сети ViPNet: \r\n<span style=\"font-weight: bold;\">Маршрутизатор VPN-пакетов:</span> маршрутизация зашифрованных IP-пакетов, передаваемых между сегментами защищенной сети.\r\n<span style=\"font-weight: bold;\">VPN-шлюз:</span> туннелирование (шифрование и имитозащита) открытых IP-пакетов, передаваемых между локальными сегментами сети.\r\n<span style=\"font-weight: bold;\">Межсетевой экран:</span> анализ, фильтрация и регистрация IP-трафика на границе сегмента сети.\r\n<span style=\"font-weight: bold;\">Транспортный сервер: </span>маршрутизация передачи защищенных служебных данных в сети ViPNet, почтовых сообщений, передаваемых программой «ViPNet Деловая почта».\r\n<span style=\"font-weight: bold;\">Сервер IP-адресов, сервер соединений:</span> обеспечивает регистрацию и доступ в реальном времени к информации о состоянии объектов защищенной сети и о текущем значении их сетевых настроек (IP- адресов и т.п.).\r\nПродукты ViPNet Coordinator адаптированы для использования в различных отраслях и сценариях применения. Семейство шлюзов безопасности ViPNet Coordinator подразделяется на решения, в зависимости от особенностей их исполнения, в том числе аппаратной платформы продукта, набора дополнительных сетевых сервисов, производительности, сетевых интерфейсов и др. ","shortDescription":"ViPNet Coordinator HW — семейство шлюзов безопасности, входящих в состав продуктовой линейки ViPNet Network Security","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"infotecs ViPNet Coordinator HW","keywords":"ViPNet, сети, Coordinator, защищенной, передаваемых, сетевых, маршрутизация, настроек","description":"ViPNet Coordinator — семейство шлюзов безопасности, входящих в состав продуктовой линейки ViPNet Network Security. В зависимости от настроек ViPNet Coordinator","og:title":"infotecs ViPNet Coordinator HW","og:description":"ViPNet Coordinator — семейство шлюзов безопасности, входящих в состав продуктовой линейки ViPNet Network Security. В зависимости от настроек ViPNet Coordinator"},"eventUrl":"","translationId":2413,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":43,"title":"Data Encryption","alias":"data-encryption","description":"Шифрова́ние — обратимое преобразование информации в целях сокрытия от неавторизованных лиц, с предоставлением, в это же время, авторизованным пользователям доступа к ней. Главным образом, шифрование служит задачей соблюдения конфиденциальности передаваемой информации. Важной особенностью любого алгоритма шифрования является использование ключа, который утверждает выбор конкретного преобразования из совокупности возможных для данного алгоритма[1][2].\r\n\r\nПользователи являются авторизованными, если они обладают определенным аутентичным ключом. Вся сложность и, собственно, задача шифрования состоит в том, как именно реализован этот процесс[1].\r\n\r\nВ целом, шифрование состоит из двух составляющих — зашифрование и расшифрование.\r\n\r\nС помощью шифрования обеспечиваются три состояния безопасности информации[1]:\r\n\r\nКонфиденциальность.\r\nШифрование используется для скрытия информации от неавторизованных пользователей при передаче или при хранении.\r\nЦелостность.\r\nШифрование используется для предотвращения изменения информации при передаче или хранении.\r\nИдентифицируемость.\r\nШифрование используется для аутентификации источника информации и предотвращения отказа отправителя информации от того факта, что данные были отправлены именно им.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-encryption.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"}]}},"categories":[{"id":43,"title":"Data Encryption","alias":"data-encryption","description":"Шифрова́ние — обратимое преобразование информации в целях сокрытия от неавторизованных лиц, с предоставлением, в это же время, авторизованным пользователям доступа к ней. Главным образом, шифрование служит задачей соблюдения конфиденциальности передаваемой информации. Важной особенностью любого алгоритма шифрования является использование ключа, который утверждает выбор конкретного преобразования из совокупности возможных для данного алгоритма[1][2].\r\n\r\nПользователи являются авторизованными, если они обладают определенным аутентичным ключом. Вся сложность и, собственно, задача шифрования состоит в том, как именно реализован этот процесс[1].\r\n\r\nВ целом, шифрование состоит из двух составляющих — зашифрование и расшифрование.\r\n\r\nС помощью шифрования обеспечиваются три состояния безопасности информации[1]:\r\n\r\nКонфиденциальность.\r\nШифрование используется для скрытия информации от неавторизованных пользователей при передаче или при хранении.\r\nЦелостность.\r\nШифрование используется для предотвращения изменения информации при передаче или хранении.\r\nИдентифицируемость.\r\nШифрование используется для аутентификации источника информации и предотвращения отказа отправителя информации от того факта, что данные были отправлены именно им.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-encryption.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.infotecs.ru/about/press-centr/news/produkty-kompanii-infoteks-zashchishchayut-kanaly-svyazi-v-seti-eldorado-.html","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":20,"title":"Kaspersky Business Space Security в банке \"Траст\"","description":"Защиту сетевой архитектуры банка от информационных угроз продолжают обеспечивать\r\n4 500 лицензий Kaspersky Business Space Security.\r\nСпециалисты компании отмечают высокий уровень защиты от вредоносных программ,\r\nоперативное устранение угроз и качественную техническую поддержку.\r\nАдминистраторы имеют возможность централизованно управлять настройками и политика-\r\nми на всех компьютерах, подключенных к серверу администрирования. Kaspersky Business\r\nSpace Security обеспечивает комплексную защиту IT-инфраструктуры банка, не замедляет\r\nрабочие процессы и полностью отвечает требованиям российского законодательства.","alias":"kaspersky-business-space-security-v-banke-trast","roi":0,"seo":{"title":"Kaspersky Business Space Security в банке \"Траст\"","keywords":"Kaspersky, Security, Space, Business, банка, угроз, компьютерах, всех","description":"Защиту сетевой архитектуры банка от информационных угроз продолжают обеспечивать\r4 500 лицензий Kaspersky Business Space Security.\rСпециалисты компании","og:title":"Kaspersky Business Space Security в банке \"Траст\"","og:description":"Защиту сетевой архитектуры банка от информационных угроз продолжают обеспечивать\r4 500 лицензий Kaspersky Business Space Security.\rСпециалисты компании"},"deal_info":"","user":{"id":356,"title":"Trust Bank","logoURL":"https://old.b4r.io/uploads/roi/company/trast_bank.png","alias":"trast-bank","address":"01014, г. Киев, ул. Болсуновская, 8","roles":[],"description":"ПАО Банк «ТРАСТ» работает на рынке с 2007 года и предоставляет широкий комплекс банковских услуг физическим и юридическим лицам. 78,9% акций Банка принадлежит украинскому бизнесмену, совладельцу группы компаний EasyPay и АВК Владимиру Авраменко.\r\n\r\nРозничная сеть Банка охватывает большинство регионов Украины и насчитывает 164 точки обслуживания клиентов.\r\n\r\nБанк является участником Фонда гарантирования вкладов физических лиц, членом международной платежной системы Visa, развивает партнерские программы с национальной системой электронных платежей EasyPay.\r\n\r\nНадежность и ответственность Банка перед своими клиентами подтверждены экспертными заключениями и рекомендациями постоянных клиентов.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.banktrust.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Trust Bank","keywords":"Банка, Банк, EasyPay, клиентов, системы, физических, членом, платежной","description":"ПАО Банк «ТРАСТ» работает на рынке с 2007 года и предоставляет широкий комплекс банковских услуг физическим и юридическим лицам. 78,9% акций Банка принадлежит","og:title":"Trust Bank","og:description":"ПАО Банк «ТРАСТ» работает на рынке с 2007 года и предоставляет широкий комплекс банковских услуг физическим и юридическим лицам. 78,9% акций Банка принадлежит","og:image":"https://old.b4r.io/uploads/roi/company/trast_bank.png"},"eventUrl":""},"supplier":{"id":2010,"title":"ARinteg","logoURL":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png","alias":"arinteg","address":"","roles":[],"description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software solutions for information security services. Impeccable work, you have all the necessary competencies and adherence to professional ethics principles have allowed us to gain a high reputation in the market. Among our clients - major Russian companies and government organizations, including leading banks and industrial enterprises, multinational corporations and governments. ARinteg company provides a full range of services in the field of information security and the creation of effective IT infrastructures. The results of projects carried out ARinteg, are as follows: - construction of effective information security systems businesses - bringing the customer information systems to meet the requirements of regulatory authorities of the Russian Federation - the formation of the IT infrastructure of any level of complexity. In the course of experts ARinteg projects meet all the necessary expert-analytical, technical and consulting services: - audit of information systems and business processes, expertise in information security solutions, expert information systems of enterprises to meet the requirements of regulatory authorities, to develop sets of organizational and administrative documentation information security - the supply, installation, configuration and maintenance of IT systems - advice, training experts of customers.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":76,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":5,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.arinteg.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ARinteg","keywords":"information, ARinteg, systems, security, services, meet, regulatory, authorities","description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:title":"ARinteg","og:description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:image":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png"},"eventUrl":""},"vendors":[{"id":173,"title":"Kaspersky Lab","logoURL":"https://old.b4r.io/uploads/roi/company/kaspersky_logo.png","alias":"kaspersky-lab","address":"","roles":[],"description":"Kaspersky Lab (Лаборатория Касперского, Laboratoriya Kasperskogo) is an international software security group operating in almost 200 countries and territories worldwide. The company is headquartered in Moscow, Russia, with its holding company registered in the United Kingdom. Kaspersky Lab currently employs over 2,850 qualified specialists. It has 31 representative territory offices in 30 countries and its products and technologies provide service for over 300 million users and over 250,000 corporate clients worldwide. The company is specially focused on large enterprises, and small- and medium-sized businesses.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":39,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":1,"supplierPartnersCount":172,"b4r":0,"categories":{},"companyUrl":"www.kaspersky.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Kaspersky Lab","keywords":"Kaspersky, over, company, worldwide, countries, service, provide, representative","description":"Kaspersky Lab (Лаборатория Касперского, Laboratoriya Kasperskogo) is an international software security group operating in almost 200 countries and territories","og:title":"Kaspersky Lab","og:description":"Kaspersky Lab (Лаборатория Касперского, Laboratoriya Kasperskogo) is an international software security group operating in almost 200 countries and territories","og:image":"https://old.b4r.io/uploads/roi/company/kaspersky_logo.png"},"eventUrl":""}],"products":[{"id":119,"logo":false,"scheme":false,"title":"Kaspersky Security для бизнеса","vendorVerified":0,"rating":"3.00","implementationsCount":7,"suppliersCount":0,"alias":"kaspersky-security-dlja-biznesa","companyTypes":[],"description":"\r\n<p> </p>\r\n<p>Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор возможностей, которые позволят вам видеть, контролировать и защищать вашу IT-инфраструктуру.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Продуктовая линейка включает в себя несколько уровней с возрастающим функционалом. Уровни – Kaspersky Endpoint Security для бизнеса СТАРТОВЫЙ, СТАНДАРТНЫЙ, РАСШИРЕННЫЙ и Kaspersky Total Security для бизнеса – построены по модульному принципу и позволяют расширять возможности решения в соответствии с растущими потребностями бизнеса: от базовой защиты рабочих мест от вредоносного ПО до безопасности каждого узла сети. Кроме того, многие из представленных решений могут быть приобретены отдельно. Таким образом, компании, желающие установить дополнительную защиту лишь на определенные узлы сети, могут сделать это без лишних затрат.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Линейка Kaspersky Security для бизнеса позволяет выбрать именно то решение, которое нужно вашей организации, чтобы вы могли контролировать рабочие места (от рабочих станций до смартфонов и виртуальных машин), серверы и интернет-шлюзы и обеспечить их надежной защитой. Наши продукты также позволяют управлять безопасностью всей вашей IT-инфраструктуры удаленно.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая консоль управления: администратор может наблюдать за состоянием защиты всех физических, виртуальных и мобильных устройств, а также управлять их безопасностью с помощью единой консоли администрирования.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая платформа: все используемые в продуктах «Лаборатории Касперского» ключевые технологии, функциональные компоненты и модули разрабатываются внутри компании на собственной технологической базе.Благодаря этому растет эффективность, снижается нагрузка на систему и повышается стабильность работы приложений.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая лицензия: вы не получаете несколько отдельных решений в рамках одной покупки — вы приобретаете единое комплексное решение, которое вы можете гибко настраивать в соответствии со своими бизнес-целями.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — СТАРТОВЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Это идеальный вариант для заказчиков, которым необходима только защита от вредоносного ПО. Единая консоль управления Kaspersky Security Center с интуитивно понятным интерфейсом дополняет все наши решения для рабочих станций.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — СТАНДАРТНЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Список средств защиты в решении уровня СТАНДАРТНЫЙ включает средства обеспечения безопасности рабочих станций и файловых серверов, динамические белые списки, а также средства контроля программ, устройств и веб-ресурсов. В него также входят инструменты для защиты мобильных устройств и управления ими. Если потребности вашего бизнеса включают защиту мобильных сотрудников и применение политик IT-безопасности, то вам подойдет решение уровня СТАНДАРТНЫЙ.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — РАСШИРЕННЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>На уровне РАСШИРЕННЫЙ «Лаборатория Касперского» добавила ко всем вышеперечисленным функциям шифрование данных. Еще одна новая разработка «Лаборатории Касперского» средство системного администрирования — обеспечивает безопасность и одновременно повышает производительность IT-инфраструктуры. <span style=\"font-weight: bold;\">Такой широкий набор функций и полезных инструментов позволяет:</span></p>\r\n<p> </p>\r\n\r\n\r\n<ul>\r\n<li>создавать и хранить образы систем и осуществлять их удаленное развертывание;</li>\r\n<li>устанавливать приоритет устранения уязвимостей в аппаратном и программном обеспечении благодаря эффективному сочетанию мониторинга уязвимостей и интеллектуального управления установкой исправлений;</li>\r\n<li>контролировать использование лицензий на программное обеспечение с помощью модуля управления лицензиями;</li>\r\n<li>задавать политики доступа к данным и IT-инфраструктуре для пользователей и гостей с помощью средства контроля доступа в сеть (NAC);</li>\r\n<li>удаленно развертывать и устанавливать программы и обновления на компьютеры пользователей с помощью единой централизованной консоли администрирования.</li>\r\n</ul>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Total Security для бизнеса</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Наш флагманский продукт — Kaspersky Total Security для бизнеса — включает в себя возможности всех предыдущих уровней и дополнительно укрепляет безопасность вашей IT-инфраструктуры с помощью средств для защиты почтовых серверов, интернет-шлюзов и серверов совместной работы. Это идеальное решение для организаций с высокими требованиями к IT-безопасности, которым нужна надежная защита каждого узла сети.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p> </p>\r\n<p> </p>\r\n","shortDescription":"Kaspersky Security для бизнеса – для обеспечения безопасности корпоративной информационной сети, позволят вам видеть, контролировать и защищать вашу IT-инфраструктуру.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Kaspersky Security для бизнеса","keywords":"бизнеса, Kaspersky, Security, управления, помощью, защиты, Единая, Endpoint","description":"Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор","og:title":"Kaspersky Security для бизнеса","og:description":"Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор"},"eventUrl":"","translationId":2329,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"2012-01-01","endDate":"2012-12-31","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"}]}},"categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.kaspersky.ru/about/news/business/2012/Bank_TRAST_i_Laboratoriya_Kasperskogo_prodoljayut_sovmestnuyu_rabotu","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}