{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementations":{"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"more":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"en":"From Z to A","ru":"от Я до А","_type":"localeString"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"en":"Rebate descending","ru":"По убыванию скидки","_type":"localeString"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"product":{"en":"Product","ru":"Продукт","_type":"localeString"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"with-reference":{"ru":"С референсом","_type":"localeString","en":"With reference"},"items-found":{"en":"Deployments found","ru":"Внедрений найдено","_type":"localeString"},"canceled":{"en":"Canceled","ru":"Отменено","_type":"localeString"},"deal-canceled":{"_type":"localeString","en":"Deal canceled","ru":"Сделка отменена"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"roi":{"_type":"localeString","en":"ROI","ru":"ROI"},"implementations-fetching-error":{"_type":"localeString","en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу."}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"_type":"localeString","en":"Sign out","ru":"Выйти"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"_type":"localeString","en":"from","ru":"от"},"to":{"en":"to","ru":"до","_type":"localeString"},"filter-price-title":{"_type":"localeString","en":"Filter by price","ru":"Фильтр по цене"},"view-type-label":{"en":"View","ru":"Вид","_type":"localeString"},"sort-type-label":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"category":{"_type":"localeString","en":"Category","ru":"Категория"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"en":"Add Product","ru":"Добавить продукт","_type":"localeString"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"_type":"localeString","en":"Сlear","ru":"Очистить"},"delivery-type-field":{"en":"Delivery type","ru":"Тип поставки","_type":"localeString"},"product-categories-field":{"_type":"localeString","en":"product categories","ru":"категориz продуктаhjle"},"providers-field":{"_type":"localeString","en":"Providers","ru":"Поставщик, производитель"},"business-tasks-field":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"en":"With discounts","ru":"Со скидками","_type":"localeString"},"expert-price-checkbox":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"roi-calculator-checkbox":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"en":"Show all","ru":"Показать все","_type":"localeString"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"_type":"localeString","en":"With deployments","ru":"С внедрениями"},"bonus-4-reference":{"en":"Bonus 4 Reference","ru":"Бонус за референс","_type":"localeString"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"en":"Countries","ru":"Страны","_type":"localeString"},"seller":{"_type":"localeString","en":"Seller","ru":"Продавец"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"en":"User suppliers","ru":"Поставщики пользователя","_type":"localeString"},"business-process":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"en":"Info source","ru":"Информационный ресурс","_type":"localeString"},"with-reference-checkbox":{"en":"With reference","ru":"С референсами","_type":"localeString"},"show-deal-checkbox":{"en":"Show deal with noname","ru":"Показывать сделки с noname","_type":"localeString"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"find":{"_type":"localeString","en":"Find","ru":"Выполнить поиск"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"en":"Add deployment","ru":"Добавить внедрение","_type":"localeString"},"sort-title-asc":{"en":"From A to Z","ru":"От А до Я","_type":"localeString"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"От Я до А"},"sellers-field":{"en":"Sellers","ru":"Поставщики, Производители","_type":"localeString"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"_type":"localeString","en":"Partners","ru":" Партнеры"},"customers":{"_type":"localeString","en":"Customers","ru":"Покупатели"},"product-supplier":{"en":"Product supplier","ru":"Поставщик продукта","_type":"localeString"},"product-vendor":{"en":"Product vendor","ru":"Производитель продукта","_type":"localeString"},"implementation-date":{"en":"Deployment date","ru":"Дата внедрения","_type":"localeString"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"en":"Deal canceled","ru":"Сделка отменена","_type":"localeString"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"_type":"localeString","en":"Deal in progress","ru":"Сделка в процессе"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"_type":"localeString","en":"Stopped","ru":"Остановлено"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"implementations":"success","filters":"success"},"sections":{"implementations-text-block":{"body":{"en":[{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference.","_key":"0e40f9075bd00"}],"_type":"block","style":"normal","_key":"0e40f9075bd0"}],"ru":[{"markDefs":[],"children":[{"_key":"1435aa0421110","_type":"span","marks":[],"text":"Каталог внедрений ROI4CIO - это база данных о внедрениях программного обеспечения, оборудования и ИТ-услуг. Находите внедрения по вендору, поставщику, пользователю, бизнес-задачам, проблемам, статусу, фильтруйте по наличию ROI и референса."}],"_type":"block","style":"normal","_key":"1435aa042111"}],"_type":"localeBlock"},"label":"catalog-implementations-text-block"}},"sectionsStatus":{"implementations-text-block":"success"},"pageMetaData":{"implementations":{"translatable_meta":[{"name":"og:title","translations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"}},{"name":"og:description","translations":{"ru":"Каталог внедрений различных видов программного обеспечения, ИТ проектов. Результаты внедрений ИТ, результаты, референсы, ROI","_type":"localeString","en":"Implementations"}},{"name":"title","translations":{"ru":"Внедрения","_type":"localeString","en":"Implementations"}},{"name":"description","translations":{"ru":"Описание внедрений","_type":"localeString","en":"Implementations description"}},{"translations":{"_type":"localeString","en":"Implementations keywords","ru":"Внедрения ключевые слова"},"name":"keywords"}],"title":{"_type":"localeString","en":"ROI4CIO: Implementations","ru":"ROI4CIO: Внедрения"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"implementations":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"hp-arcsight-esm-dlja-banka":{"id":75,"title":"HP ArcSight ESM для банка","description":"Особенность проекта внедрения SIEM – это большие объемы интеграционных работ, которые значительно усложняются, если есть кастомизированные или самописные информационные системы. Необходима серьезная вовлеченность службы ИТ и привлечение к проекту ключевых сотрудников бизнес подразделений.\r\nФункцию управления проектом банк ПУМБ выполнял своими силами. Это удалось за счет достаточно высокого уровня зрелости внутренней системы проектного менеджмента.\r\nСтратегия интеграции была построена с целью максимального заполнения работой всех возможных временных промежутков. Последовательный план подключения систем к ArcSight начинался не от простого к сложному, а наоборот. Это позволило быстрее выявить технологические нюансы и начать цикл их проработки. А возникающие паузы заполняли подключением простых, стандартных систем.\r\nСовместно с Управлением информационной безопасности ПУМБ компания ISSP разработала и провела тренинг для специалистов основных подразделений банка. С помощью широких функциональных возможностей такого инструмента, как HP ArcSight, компания ISSP сумела реализовать интересные, адаптированные под банк задачи, которые выходят за рамки стандартно проекта по внедрению SIEM-системы. Выбранная Управлением ИБ стратегия развития системы управления инцидентами демонстрирует высокую эффективность. Дальнейшее развитие стратегии автоматизированных контролей и обнаружения инцидентов в ПУМБ позволит автоматизировать множество операционных задач и установить важные контроли, для повышения операционной эффективности и противодействию кибермошенничеству.\r\nЗа месяц активной фазы интеграции к ArcSight было подключено 15 разнородных информационных систем, в составе которых 45 серверов и 17 единиц коммуникационного оборудования. Это очень хороший результат, учитывая, что сотрудники компании-интегратора ISSP все это время работали в режиме командировки в Донецке.","alias":"hp-arcsight-esm-dlja-banka","roi":0,"seo":{"title":"HP ArcSight ESM для банка","keywords":"ArcSight, систем, системы, ПУМБ, ISSP, которые, подразделений, Управлением","description":"Особенность проекта внедрения SIEM – это большие объемы интеграционных работ, которые значительно усложняются, если есть кастомизированные или самописные","og:title":"HP ArcSight ESM для банка","og:description":"Особенность проекта внедрения SIEM – это большие объемы интеграционных работ, которые значительно усложняются, если есть кастомизированные или самописные"},"deal_info":"","user":{"id":530,"title":"First Ukrainian International Bank (FUIB)","logoURL":"https://old.b4r.io/uploads/roi/company/Pervyi_Ukrainskii_Mezhdunarodnyi_Bank__PUMB_.png","alias":"pervyi-ukrainskii-mezhdunarodnyi-bank-pumb","address":"","roles":[],"description":"First Ukrainian International Bank (FUIB) is a large, sustainable, privately owned bank with two-decades of operations in Ukraine’s financial market, delivering high quality banking services, consiste","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://pumb.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"First Ukrainian International Bank (FUIB)","keywords":"Ukraine’s, financial, operations, market, delivering, services, consiste, banking","description":"First Ukrainian International Bank (FUIB) is a large, sustainable, privately owned bank with two-decades of operations in Ukraine’s financial market,","og:title":"First Ukrainian International Bank (FUIB)","og:description":"First Ukrainian International Bank (FUIB) is a large, sustainable, privately owned bank with two-decades of operations in Ukraine’s financial market,","og:image":"https://old.b4r.io/uploads/roi/company/Pervyi_Ukrainskii_Mezhdunarodnyi_Bank__PUMB_.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":4386,"title":"Micro Focus","logoURL":"https://old.b4r.io/uploads/roi/company/Micro_Focus.png","alias":"micro-focus","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to mobile to cloud.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">We are one of the largest pure-play software companies in the world, focused from the ground up on building, selling, and supporting software. This focus allows us to deliver on our mission to put customers at the center of innovation and deliver high-quality, enterprise-grade scalable software that our teams can be proud of. We help customers bridge the old and the new by maximizing the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.</span>","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.microfocus.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Micro Focus","keywords":"software, innovation, customers, deliver, Micro, existing, Focus, hybrid","description":"Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to","og:title":"Micro Focus","og:description":"Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to","og:image":"https://old.b4r.io/uploads/roi/company/Micro_Focus.png"},"eventUrl":""}],"products":[{"id":434,"logo":false,"scheme":false,"title":"Micro Focus ESM","vendorVerified":0,"rating":"2.30","implementationsCount":2,"suppliersCount":0,"alias":"micro-focus-esm","companyTypes":[],"description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process.\r\nCategorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats.\r\nImprove incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most.\r\nRapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface.\r\nEnriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process.\r\nCategorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats.\r\nImprove incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most.\r\nRapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface.\r\nAccelerate your SIEM deployment with a large library of predefined security use cases and compliance automation and reporting tools that are the cornerstone of building Security Operations.\r\nAutomatically or manually escalate events to the right people in the right time frame. The robust workflow framework comes with built in case management and can integrate with your existing systems.","shortDescription":"Micro Focus ESM is a comprehensive security information and event management solution that identifies and prioritize threats in real time so you can respond and remediate quickly.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Micro Focus ESM","keywords":"with, data, most, search, that, simple, investigation, threats","description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to","og:title":"Micro Focus ESM","og:description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to"},"eventUrl":"","translationId":435,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"}]}},"categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=163","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"hp-arcsight-esm-dlja-pishcheproma":{"id":74,"title":"HP ArcSight ESM для пищепрома","description":"Компания ISSP вместе с сотрудниками компании «КОНТИ» осуществили внедрение HP/ArcSight SIEM в инфраструктуру предприятия.\r\nВ рамках проекта создан контент для контроля изменений в Active Directory, оценке количества событий от целевых источников. Осуществляется контроль почтового и веб-трафика.\r\nНаписан флекс-коннектор, который позволяет хранить и анализировать события в информационной системе предприятия.\r\nИТ специалисты компании «КОНТИ» получили мощный инструмент для отслеживания любых ИТ-процессов на предприятии.","alias":"hp-arcsight-esm-dlja-pishcheproma","roi":150,"seo":{"title":"HP ArcSight ESM для пищепрома","keywords":"компании, КОНТИ, предприятия, ArcSight, позволяет, хранить, Осуществляется, анализировать","description":"Компания ISSP вместе с сотрудниками компании «КОНТИ» осуществили внедрение HP/ArcSight SIEM в инфраструктуру предприятия.\rВ рамках проекта создан контент для","og:title":"HP ArcSight ESM для пищепрома","og:description":"Компания ISSP вместе с сотрудниками компании «КОНТИ» осуществили внедрение HP/ArcSight SIEM в инфраструктуру предприятия.\rВ рамках проекта создан контент для"},"deal_info":"","user":{"id":472,"title":"KONTI","logoURL":"https://old.b4r.io/uploads/roi/company/KONTI.png","alias":"konti","address":"","roles":[],"description":"The company "KONTI" was set up in 1997 as a closed joint stock company under the name “Production Association “Kiev-Konti”. At that moment the enterprise comprised of one confectionery factory, that i","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.konti.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KONTI","keywords":"that, company, Association, moment, Kiev-Konti, comprised, factory, confectionery","description":"The company "KONTI" was set up in 1997 as a closed joint stock company under the name “Production Association “Kiev-Konti”. At that moment the","og:title":"KONTI","og:description":"The company "KONTI" was set up in 1997 as a closed joint stock company under the name “Production Association “Kiev-Konti”. At that moment the","og:image":"https://old.b4r.io/uploads/roi/company/KONTI.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":4386,"title":"Micro Focus","logoURL":"https://old.b4r.io/uploads/roi/company/Micro_Focus.png","alias":"micro-focus","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to mobile to cloud.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">We are one of the largest pure-play software companies in the world, focused from the ground up on building, selling, and supporting software. This focus allows us to deliver on our mission to put customers at the center of innovation and deliver high-quality, enterprise-grade scalable software that our teams can be proud of. We help customers bridge the old and the new by maximizing the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.</span>","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.microfocus.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Micro Focus","keywords":"software, innovation, customers, deliver, Micro, existing, Focus, hybrid","description":"Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to","og:title":"Micro Focus","og:description":"Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to","og:image":"https://old.b4r.io/uploads/roi/company/Micro_Focus.png"},"eventUrl":""}],"products":[{"id":434,"logo":false,"scheme":false,"title":"Micro Focus ESM","vendorVerified":0,"rating":"2.30","implementationsCount":2,"suppliersCount":0,"alias":"micro-focus-esm","companyTypes":[],"description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process.\r\nCategorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats.\r\nImprove incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most.\r\nRapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface.\r\nEnriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process.\r\nCategorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats.\r\nImprove incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most.\r\nRapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface.\r\nAccelerate your SIEM deployment with a large library of predefined security use cases and compliance automation and reporting tools that are the cornerstone of building Security Operations.\r\nAutomatically or manually escalate events to the right people in the right time frame. The robust workflow framework comes with built in case management and can integrate with your existing systems.","shortDescription":"Micro Focus ESM is a comprehensive security information and event management solution that identifies and prioritize threats in real time so you can respond and remediate quickly.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Micro Focus ESM","keywords":"with, data, most, search, that, simple, investigation, threats","description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to","og:title":"Micro Focus ESM","og:description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to"},"eventUrl":"","translationId":435,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":350,"title":"No monitoring of corporate IT processes"}]}},"categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=182","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"imperva-web-application-firewall-dlja-1-1-media":{"id":70,"title":"Imperva Web Application Firewall для 1+1 медиа","description":"Постоянное стремление к увеличению охвата аудитории и непрерывной связи и общении с ней, побуждает медиа-компании вести активную деятельность в сети Интернет. Для этих целей в их распоряжении имеется большое количество порталов и веб-ресурсов с разветвлённой и сложной структурой веб-страниц, которые без надлежащей защиты могут поставить под угрозу доступность веб-приложений, сохранность конфиденциальных данных и репутацию самой компании.\r\nКомпания ISSP успешно завершила проект с 1+1 медиа по защите веб-приложений. Выбор был сделан в пользу Imperva WAF. Решение очень гибкое, его легко развернуть в любой инфраструктуре и настроить под потребности безопасности, что было отмечено еще при первом тестировании решения в идентичной рабочей среде компании-заказчика. С помощью Imperva WAF ИТ-отдел теперь может выстроить сильную линию обороны.\r\nImperva WAF покрывала следующие обязательные требования:\r\nцентрализованное управление\r\nгранулирование политик\r\nвысокая производительность\r\nудобство в использовании\r\nблокировка внешних атак на веб-приложения\r\nпрофилирование страниц\r\nмонитор трафика веб-приложений\r\nпредотвращение несанкционированного доступа к определенным веб-серверам извне\r\nКак ключевой компонент защиты внешней среды, Imperva WAF ежедневно обеспечивает безопасность веб-приложениям компании-заказчика от кибератак, уменьшает риски, связанные с кражей и модификацией конфиденциальных данных, что для медиа компании – главный приоритет.","alias":"imperva-web-application-firewall-dlja-1-1-media","roi":0,"seo":{"title":"Imperva Web Application Firewall для 1+1 медиа","keywords":"Imperva, медиа, веб-приложений, данных, защиты, компании, конфиденциальных, компании-заказчика","description":"Постоянное стремление к увеличению охвата аудитории и непрерывной связи и общении с ней, побуждает медиа-компании вести активную деятельность в сети Интернет. ","og:title":"Imperva Web Application Firewall для 1+1 медиа","og:description":"Постоянное стремление к увеличению охвата аудитории и непрерывной связи и общении с ней, побуждает медиа-компании вести активную деятельность в сети Интернет. "},"deal_info":"","user":{"id":2897,"title":"1+1 media","logoURL":"https://old.b4r.io/uploads/roi/company/1_1_media.png","alias":"1-1-media","address":"","roles":[],"description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши корпоративные ценности: СМЕЛОСТЬ. ЧЕСТНОСТЬ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":39,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://media.345aanonstop1plus1.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"1+1 media","keywords":"media","description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши","og:title":"1+1 media","og:description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши","og:image":"https://old.b4r.io/uploads/roi/company/1_1_media.png"},"eventUrl":"https://calendly.com/anastasia-filatova19/nea-event"},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":207,"title":"Imperva","logoURL":"https://old.b4r.io/uploads/roi/company/imperva_logo.png","alias":"imperva","address":"","roles":[],"description":"Imperva provides cyber security software and services to protect companies’ sensitive data and application software from both external attacks and internal threats, and to ensure regulatory compliance. Headquartered in Redwood Shores, California, Imperva has more than 4,500 customers and 500 partners in over 90 countries.","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"www.imperva.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Imperva","keywords":"Imperva, software, Shores, California, Redwood, Headquartered, over, countries","description":"Imperva provides cyber security software and services to protect companies’ sensitive data and application software from both external attacks and internal","og:title":"Imperva","og:description":"Imperva provides cyber security software and services to protect companies’ sensitive data and application software from both external attacks and internal","og:image":"https://old.b4r.io/uploads/roi/company/imperva_logo.png"},"eventUrl":""}],"products":[{"id":154,"logo":false,"scheme":false,"title":"Imperva SecureSphere Web Application Firewall","vendorVerified":0,"rating":"2.10","implementationsCount":1,"suppliersCount":0,"alias":"imperva-securesphere-web-application-firewall","companyTypes":[],"description":"Imperva SecureSphere Web Application Firewall (WAF) analyzes all user access to your business-critical web applications and protects your applications and data from cyber attacks. SecureSphere WAF dynamically learns your applications’ “normal” behavior and correlates this with the threat intelligence crowd-sourced from around the world and updated in real time to deliver superior protection. The industry leading SecureSphere WAF identifies and acts upon dangers maliciously woven into innocent-looking website traffic; traffic that slips right through traditional defenses. This includes blocking technical attacks such as SQL injection, cross-site scripting and remote file inclusion that exploit vulnerabilities in web applications; business logic attacks such as site scraping and comment spam; botnets and DDoS attacks; and preventing account takeover attempts in real-time, before fraudulent transactions can be performed. SecureSphere WAF uses patented Dynamic Application Profiling to learn all aspects of web applications, including the directories, URLs, parameters, and acceptable user inputs to detect attacks with exceptional accuracy and block only bad parties, while eliminating impact to legitimate customers. SecureSphere WAF mitigates both technical attacks such as DDoS and SQL injection, as well as non-technical attacks such as comment spamming and site scraping.\r\nOVERVIEW SPECIFICATIONS\r\nProtect Your Critical Web Applications and Data Imperva SecureSphere Web Application Firewall (WAF) analyzes all user access to your business-critical web applications and protects your applications and data from cyber attacks. SecureSphere WAF dynamically learns your applications’ “normal” behavior and correlates this with the threat intelligence crowd-sourced from around the world and updated in real time to deliver superior protection. The industry leading SecureSphere WAF identifies and acts upon dangers maliciously woven into innocent-looking website traffic; traffic that slips right through traditional defenses. This includes blocking technical attacks such as SQL injection, cross-site scripting and remote file inclusion that exploit vulnerabilities in web applications; business logic attacks such as site scraping and comment spam; botnets and DDoS attacks; and preventing account takeover attempts in real-time, before fraudulent transactions can be performed.\r\nDYNAMIC APPLICATION PROFILING\r\nSecureSphere WAF uses patented Dynamic Application Profiling to learn all aspects of web applications, including the directories, URLs, parameters, and acceptable user inputs to detect attacks with exceptional accuracy and block only bad parties, while eliminating impact to legitimate customers. SecureSphere WAF mitigates both technical attacks such as DDoS and SQL injection, as well as non-technical attacks such as comment spamming and site scraping.\r\nGRANULAR CORRELATION POLICIES REDUCE FALSE POSITIVES\r\nSecureSphere WAF distinguishes attacks from unusual, but legitimate, behavior by correlating web requests across security layers and over time. SecureSphere Correlated Attack Validation capability examines multiple attributes such as HTTP protocol conformance, profile violations, signatures, special characters, and user reputation, to accurately alert on or block attacks with the lowest rate of false positives in the industry.\r\nFLEXIBLE DEPLOYMENT OPTIONS\r\n'SecureSphere WAF can be deployed as a physical or virtual appliance on-premises, and as a virtual image on Amazon Web Services or Microsoft Azure. Physical appliance deployments are particularly flexible in that they allow SecureSphere WAF to run transparently, requiring virtually no changes to the customer’s network. And granular policy controls enable superior accuracy and unequaled control to match each organization’s specific protection requirements.\r\nDEEP THREAT INTELLIGENCE\r\nTo protect against today’s well resourced cyber-criminals, it is vital to have an advanced warning system that is aware of and protects against constantly evolving web-based attacks. Imperva ThreatRadar updates SecureSphere WAF with real-time threat intelligence crowd-sourced from around the world and curated by Imperva Application Defense Center. ThreatRadar provides better protection, improves WAF accuracy, and makes the security team more efficient by proactively filtering traffic from known bad sources so the security team can focus on what is really important. The following ThreatRadar intelligence feeds are available: Reputation Services: Filters traffic based upon latest, real-time reputation of source Community Defense: Adds unique threat intelligence crowd-sourced from Imperva users Bot Protection: Detects botnet clients and application DDoS attacks Account Takeover Protection: Protects website user accounts from attack and takeover Fraud Prevention: Simplifies deployment of best-in-class partner fraud prevention solutions VIRTUAL PATCHING SecureSphere WAF can perform “virtual patching” for your web applications via vulnerability scanner integration. Instead of leaving a web application exposed to attack for weeks or months while code is modified after discovering a vulnerability, virtual patching actively protects web applications from attacks to reduce the window of exposure, and decreases the costs of emergency fix cycles until you are able to patch them.\r\nCUSTOMIZABLE REPORTS FOR COMPLIANCE AND FORENSICS\r\nSecureSphere WAF rich graphical reporting capabilities enable customers to easily understand security status and meet regulatory compliance. SecureSphere WAF provides both pre-defined and fully-customizable reports. This enables you to quickly assess your security status and streamline demonstration of compliance with PCI, SOX, HIPAA and FISMA and other compliance standards.\r\nMONITORING FOR IN-DEPTH ANALYSIS OF ATTACKS\r\nAlerts can be easily searched, sorted, and directly linked to corresponding security rules. SecureSphere WAF monitoring and reporting framework provides instant visibility into security, compliance, and content delivery concerns. A real-time dashboard provides a high-level view of system status and security events.\r\n ","shortDescription":"Imperva SecureSphere Web Application Firewall (WAF) analyzes all user access to your business-critical web applications and protects your applications and data from cyber attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Imperva SecureSphere Web Application Firewall","keywords":"SecureSphere, attacks, from, applications, such, security, your, with","description":"Imperva SecureSphere Web Application Firewall (WAF) analyzes all user access to your business-critical web applications and protects your applications and data","og:title":"Imperva SecureSphere Web Application Firewall","og:description":"Imperva SecureSphere Web Application Firewall (WAF) analyzes all user access to your business-critical web applications and protects your applications and data"},"eventUrl":"","translationId":155,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":252,"title":"Increase Customer Base"},{"id":253,"title":"Expand Sales Geography"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=213","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"mcafee-epolicy-orchestrator-mcafee-epo-dlja-aiboks-bank":{"id":76,"title":"McAfee ePolicy Orchestrator (McAfee ePO) для Айбокс Банк","description":"Как показывает опыт последних лет, использование лишь одного антивируса на всех рабочих станциях корпоративной сети, как единственной средства для информационной защиты, уже не является достаточной и эффективной мерой для обеспечения высокого уровня информационной безопасности. На сегодняшний день, наиболее эффективным способом является комплексный подход к защите конечных точек. В связи с ежедневным повышением риска утери данных на рабочих станциях и серверах, офицеры информационной безопасности Айбокс Банка (АгроКомбанка) принялись за поиск решения для комплексной защиты рабочих станций.\r\nПродукты компании McAfee ежегодно признаются мировыми экспертами как одни из лучших решений на рынке. А линейка продуктов для защиты конечных точек по предоставлению непрерывной, обновляемой и мощной защиты от самых разных угроз - McAfee Endpoint Protection Suite и McAfee Total Protection for Data постоянно является лидером мировых рейтингов продуктов для защиты рабочих станций и серверов.\r\nСпециалистами компании ISSP была изучена сетевая инфраструктура банка и предложен вариант внедрения решений от компании McAfee. Универсальный инструмент McAfee ePolicy Orchestrator (McAfee ePO) – это масштабируемый под любую сетевую инфраструктуру механизм «все-в-одном» для централизованного управления, контроля и отчетности. еРО разработан для среды уровня «Энтерпрайз» благодаря чему за короткое время, были развернуты все продукты для комплексной защиты конечных точек: анти-вирус, анти-спам, межсетевой экран на рабочих станциях, продукт для безопасной работы в интернете, контроль портов, шифрования дисков, шифрование файлов и папок, шифрование съемных носителей.\r\nПо результатам проекта инфраструктура Айбокс Банка (АгроКомбанка) получила защищенные рабочие станции посредством установки продуктов для защиты конечных точек с возможностью управления ими с единой консоли еРО. Это позволяет удобно и централизовано вести постоянный контроль над всеми компьютерами в сети организации.","alias":"mcafee-epolicy-orchestrator-mcafee-epo-dlja-aiboks-bank","roi":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO) для Айбокс Банк","keywords":"McAfee, защиты, рабочих, точек, конечных, компании, является, Айбокс","description":"Как показывает опыт последних лет, использование лишь одного антивируса на всех рабочих станциях корпоративной сети, как единственной средства для","og:title":"McAfee ePolicy Orchestrator (McAfee ePO) для Айбокс Банк","og:description":"Как показывает опыт последних лет, использование лишь одного антивируса на всех рабочих станциях корпоративной сети, как единственной средства для"},"deal_info":"","user":{"id":2900,"title":"Ibox Bank","logoURL":"https://old.b4r.io/uploads/roi/company/Aiboks_Bank.png","alias":"aiboks-bank","address":"","roles":[],"description":"Ibox Bank operates in the Ukrainian market for over 20 years. During this time it has repeatedly been recognized as one of the most stable banks in Ukraine according to many experts, rating agencies in the banking industry.\r\n\r\nIn particular, in 2013 Ibox Bank was recognized the \"Most reliable and stable bank of the year\" at the First International Competition \"Trusted Bank\". In addition, the \"Bankir\" Magazine recognized the Ibox Bank as the \"Most customer-oriented bank\" in 2013.\r\n\r\nFor 20 years we have been entrusted the savings from more than 1,000 domestic investors. Also, the Ibox Bank became the bank of choice among 4000 thousands of successful companies, including 100 foreign ones.\r\n\r\nIbox Bank is a traditional universal bank that provides all kinds of services to individuals and legal entities of any type of ownership, with an emphasis on comfort and prompt service.\r\n\r\nIbox Bank obtains income through prudent investment in stable Ukrainian companies with an impeccable reputation and high profitability level, including the agricultural sector of Ukraine.\r\n\r\nOver the past 10 years Ibox Bank assets increased by 800%, confirming the right choice of Bank's strategy and demonstrating its continued successful development.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.iboxbank.online/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Ibox Bank","keywords":"Bank, Ibox, bank, recognized, stable, years, Ukraine, companies","description":"Ibox Bank operates in the Ukrainian market for over 20 years. During this time it has repeatedly been recognized as one of the most stable banks in Ukraine","og:title":"Ibox Bank","og:description":"Ibox Bank operates in the Ukrainian market for over 20 years. During this time it has repeatedly been recognized as one of the most stable banks in Ukraine","og:image":"https://old.b4r.io/uploads/roi/company/Aiboks_Bank.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":429,"logo":false,"scheme":false,"title":"McAfee ePolicy Orchestrator (McAfee ePO)","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"mcafee-epolicy-orchestrator-mcafee-epo","companyTypes":[],"description":"A single console for all your security management\r\nMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.\r\n\r\nGet a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks. \r\nSimplify security operations with streamlined workflows for proven efficiencies.\r\nFlexible security management options allow you to select either a traditional premises-based or a cloud-based management version of McAfee ePO.\r\nLeverage your existing third-party IT infrastructure from a single security management console with our extensible architecture.\r\n\r\nQuick deployment for maximum efficiency\r\n\r\nDeploy quickly and easily\r\nEnsure broad-based security and risk management solutions work together to reduce security gaps and complexity. Single agent deployment and customizable policy enforcement secure your environment quickly.\r\n\r\nGain efficiencies\r\nStreamline security and compliance workflows with automations and a personalized workspace. McAfee ePO offers an enterprise-class security management architecture that scales for organizations of all sizes, significantly reducing the number of servers to deploy.\r\n\r\nFuture-proof your security infrastructure\r\nProtect your organization from today’s—and tomorrow’s—threats. Real-time threat intelligence from McAfee Labs proactively guards your infrastructure. The open platform facilitates rapid adoption of security innovations as new threat categories emerge.","shortDescription":"McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO)","keywords":"security, your, management, McAfee, with, from, infrastructure, threat","description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security","og:title":"McAfee ePolicy Orchestrator (McAfee ePO)","og:description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security"},"eventUrl":"","translationId":430,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":5,"title":"Enhance Staff Productivity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"}]}},"categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=94","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"mcafee-epolicy-orchestrator-mcafee-epo-dlja-banka":{"id":69,"title":"McAfee ePolicy Orchestrator (McAfee ePO) для банка","description":"Проект по миграции сервера управления программным обеспечением McAfee, используется в банке на новую версию McAfee ePolicy Orchestrator 4.6 начался после окончания действия поддержки поставщиком старой версии Эро 4.5. В рамках этого проекта специалисты банка также решили реализовать некоторые изменения архитектуры работы решения с целью улучшения его производительности, а именно перенос базы данных на отдельный сервер.\r\nУчитывая, что ОАО «Альфа-Банк» - имеет большую инфраструктуру, а миграция требует углубленных знаний и работы с программным обеспечением (ПО) McAfee к проекту были привлечены специалисты компании-интегратора ООО «Информейшн Системс Секьюрити Партнерс» (ISSP).\r\nВ рамках проекта были проведены следующие этапы:\r\nДетальное исследование, анализ архитектуры и инфраструктуры заказчика\r\nОбщее определение плана процесса миграции и плана резервного копирования и восстановления ПО McAfee;\r\nПроверка выбранной модели реализации в тестовой среде;\r\nРаботы по переходу программного обеспечения.\r\nПо окончании основной части проекта для специалистов банка компания ISSP провела двухдневное обучение по администрированию обновленной системы.\r\nВ результате проекта банк получил программное обеспечение, поддерживается современными производителями ПО, а также обогатился новыми и усовершенствованными функциями управления защитой рабочих станций и серверов. В целом ОАО «Альфа-Банк» оптимизировал использование своих ресурсов, которые необходимы для обеспечения защиты конечных точек инфраструктуры банка.","alias":"mcafee-epolicy-orchestrator-mcafee-epo-dlja-banka","roi":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO) для банка","keywords":"McAfee, банка, проекта, также, архитектуры, специалисты, инфраструктуры, рамках","description":"Проект по миграции сервера управления программным обеспечением McAfee, используется в банке на новую версию McAfee ePolicy Orchestrator 4.6 начался после","og:title":"McAfee ePolicy Orchestrator (McAfee ePO) для банка","og:description":"Проект по миграции сервера управления программным обеспечением McAfee, используется в банке на новую версию McAfee ePolicy Orchestrator 4.6 начался после"},"deal_info":"","user":{"id":342,"title":"Alfa-Bank Ukraine","logoURL":"https://old.b4r.io/uploads/roi/company/alfabank.png","alias":"alfa-bank-ukraina","address":"","roles":[],"description":"Alfa-Bank Ukraine - a major Ukrainian commercial bank with international capital, which is a private investment holding company ABH Holdings SA (ABHH)with headquarters in Luxembourg. The holding compa","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://alfabank.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Alfa-Bank Ukraine","keywords":"Alfa-Bank, with, holding, Ukraine, company, Holdings, headquarters, compa","description":"Alfa-Bank Ukraine - a major Ukrainian commercial bank with international capital, which is a private investment holding company ABH Holdings SA (ABHH)with","og:title":"Alfa-Bank Ukraine","og:description":"Alfa-Bank Ukraine - a major Ukrainian commercial bank with international capital, which is a private investment holding company ABH Holdings SA (ABHH)with","og:image":"https://old.b4r.io/uploads/roi/company/alfabank.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":429,"logo":false,"scheme":false,"title":"McAfee ePolicy Orchestrator (McAfee ePO)","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"mcafee-epolicy-orchestrator-mcafee-epo","companyTypes":[],"description":"A single console for all your security management\r\nMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.\r\n\r\nGet a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks. \r\nSimplify security operations with streamlined workflows for proven efficiencies.\r\nFlexible security management options allow you to select either a traditional premises-based or a cloud-based management version of McAfee ePO.\r\nLeverage your existing third-party IT infrastructure from a single security management console with our extensible architecture.\r\n\r\nQuick deployment for maximum efficiency\r\n\r\nDeploy quickly and easily\r\nEnsure broad-based security and risk management solutions work together to reduce security gaps and complexity. Single agent deployment and customizable policy enforcement secure your environment quickly.\r\n\r\nGain efficiencies\r\nStreamline security and compliance workflows with automations and a personalized workspace. McAfee ePO offers an enterprise-class security management architecture that scales for organizations of all sizes, significantly reducing the number of servers to deploy.\r\n\r\nFuture-proof your security infrastructure\r\nProtect your organization from today’s—and tomorrow’s—threats. Real-time threat intelligence from McAfee Labs proactively guards your infrastructure. The open platform facilitates rapid adoption of security innovations as new threat categories emerge.","shortDescription":"McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO)","keywords":"security, your, management, McAfee, with, from, infrastructure, threat","description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security","og:title":"McAfee ePolicy Orchestrator (McAfee ePO)","og:description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security"},"eventUrl":"","translationId":430,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.issp.ua/resource_descr.php?l=ru&id=204","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"mcafee-web-gateway-dlja-prokredit-bank":{"id":71,"title":"McAfee Web Gateway для ПроКредит Банк","description":"После того, как Microsoft прекратила развитие своего продукта Forefront TMG, многим пользователям этого решения пришлось начать процедуру поиска замены. Среди таких клиентов оказался и ПроКредит Банк. Перед банком встала задача интеграции нового прокси-сервера. И уже летом 2013 года специалистами ПроКредит Банка были проведены сравнительные тестирования лидирующих решений этого рынка с частичным привлечением компании ISSP - специализированного экспертного интегратора систем информационной безопасности. Результатом тестирования стал выбор в пользу McAfee Web Gateway.\r\nДля предоставления услуг внедрения и настройки работы McAfee Content Security Suite (модуля McAfee Web Gateway) также была задействована компания ISSP, которая прекрасно проявила себя во время тестирования, продемонстрировав высокие компетенции и богатый опыт работы с продуктами McAfee.\r\nВнедрение шлюза по обеспечению защиты Интернет-доступа состояло из этапа миграции существующих настроек прокси-сервера с Microsoft ISA на McAfee Web Gateway и этапа настройки новых функций.\r\nКомпания ISSP совместно со специалистами департамента информационных технологий Банка по согласованной схеме установили и настроили базовые фильтры - аутентификацию, доступ сотрудников Банка к важным ресурсам, фильтрацию типов данных, а также проверили корректности выполненных изменений.\r\nДополнительно было настроено сервер отчетности и интегрувано прокси-сервер с системой резервного копирования конфигурационных данных. Специалистам обеих компаний удалось провести интеграцию McAfee Web Gateway таким образом, чтобы минимизировать изменения в существующей инфраструктуре Банка.\r\nВ результате выполнения этой части проекта, ПроКредит Банк не просто изменил систему для предоставления интернет-доступа, а получил решение высокого класса для фильтрации веб 2.0 и как результат - безопасный доступ к сети Интернет от лидера сегмента рынка - компании Intel Security (McAfee). Кроме того, с автоматической проверкой категории сайтов, отпала необходимость тратить инженерные ресурсы на ручную проверку классов веб-ресурсов, оптимизировала работу IT департамента.","alias":"mcafee-web-gateway-dlja-prokredit-bank","roi":0,"seo":{"title":"McAfee Web Gateway для ПроКредит Банк","keywords":"McAfee, Gateway, Банка, ПроКредит, ISSP, Банк, тестирования, рынка","description":"После того, как Microsoft прекратила развитие своего продукта Forefront TMG, многим пользователям этого решения пришлось начать процедуру поиска замены. Среди","og:title":"McAfee Web Gateway для ПроКредит Банк","og:description":"После того, как Microsoft прекратила развитие своего продукта Forefront TMG, многим пользователям этого решения пришлось начать процедуру поиска замены. Среди"},"deal_info":"","user":{"id":540,"title":"ProCredit Bank","logoURL":"https://old.b4r.io/uploads/roi/company/ProCredit_Bank.png","alias":"prokredit-bank","address":"","roles":[],"description":"ProCredit Bank is a development-oriented commercial bank. We offer excellent customer service to small and medium enterprises and to private individuals who would like to save.\r\n\r\nProCredit Bank is pa","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.procreditbank.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ProCredit Bank","keywords":"ProCredit, Bank, enterprises, private, medium, individuals, would, save","description":"ProCredit Bank is a development-oriented commercial bank. We offer excellent customer service to small and medium enterprises and to private individuals who","og:title":"ProCredit Bank","og:description":"ProCredit Bank is a development-oriented commercial bank. We offer excellent customer service to small and medium enterprises and to private individuals who","og:image":"https://old.b4r.io/uploads/roi/company/ProCredit_Bank.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":431,"logo":false,"scheme":false,"title":"McAfee Web Gateway","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"mcafee-web-gateway","companyTypes":[],"description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost of remediation and minimize the chance of data loss in an attack. Sharing web threat information can make other security tools more intelligent. None of this should disrupt the productivity of a large workforce.\r\n\r\nGateway technology for the world’s most demanding IT environments\r\n\r\nBest-in-class threat prevention\r\nProtect against highly sophisticated malware and targeted attacks that evade URL filtering and antivirus signatures. This secure web gateway provides industry-leading, proactive detection of zero-day malware with full coverage of web traffic, including SSL.\r\n\r\nThreat information sharing\r\nMcAfee Web Gateway is integrated with the Security Connected platform to enable more effective threat detection, reduce incident response times, and improve operational efficiency. Learn about key integration points, McAfee Advanced Threat Defense and McAfee Threat Intelligence Exchange.\r\n\r\nPowerful rules-based policy engine\r\nTake action on any element of the web request-response cycle, allowing limitless flexibility and web security crafted for your organization.","shortDescription":"McAfee Web Gateway delivers high-performance web security through an on-premises appliance that can be deployed both as dedicated hardware and a virtual machine. McAfee Web Gateway is part of the McAfee Web Protection solution alongside McAfee Web Gateway Cloud Service, available together to provide optimal protection for users everywhere.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Web Gateway","keywords":"McAfee, threat, Threat, Gateway, malware, security, more, information","description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost","og:title":"McAfee Web Gateway","og:description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost"},"eventUrl":"","translationId":432,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"}]}},"categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=en&id=209","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"triton-ap-data-dlja-torgovoi-roznichnoi-seti":{"id":73,"title":"TRITON AP-DATA для торговой розничной сети","description":"ООО «Фудмережа», являясь оператором розничных сетей «Велика Кишеня», «ВК Селект», «ВК Експрес» и «Велмарт», располагает большим количеством коммерческой и торговой информацией, персональными данными о своих клиентах, и осознает всю ответственность, связанную с обеспечением достойного уровня безопасности таких активов.\r\nРешение о необходимости внедрения системы предотвращения утечки информации было принято с целью обезопасить компанию от рисков, связанных с торговыми операциями, потерей репутации, поведением пользователей.\r\nДля работы над проектом была привлечена компания-интегратор систем информационной безопасности ISSP, обладающая весомым опытом работы с продуктами Websense. Во время тестирования решение Websense AP-DATA легко интегрировалось в инфраструктуру компании, и сразу же позволяло наблюдать преимущества своего использования в организации.\r\nВнедрение системы прошло легко и без осложнений, никак не повлияв на непрерывность ведения бизнеса компании. Все этапы проекта: анализ инфраструктуры организации, согласование архитектуры, подготовка технической документации, внедрение системы предотвращения утечек информации и переход в промышленную эксплуатацию, - были завершены в установленные сроки.\r\n «Мы первые на рынке розничной торговли Украины внедрили решение Websense AP-DATA и после полуторалетнего использования системы можем с уверенностью отметить, что удовлетворены её работой. Использование системы дает нам возможность видеть полную картину того, как используется информация в организации, и основываясь на этом настраивать правильные политики к чувствительным данным», - Москалюк Андрей Антонович, начальник отдела информационной безопасности ООО «Фудмережа».","alias":"triton-ap-data-dlja-torgovoi-roznichnoi-seti","roi":0,"seo":{"title":"TRITON AP-DATA для торговой розничной сети","keywords":"системы, Websense, AP-DATA, безопасности, организации, предотвращения, информации, решение","description":"ООО «Фудмережа», являясь оператором розничных сетей «Велика Кишеня», «ВК Селект», «ВК Експрес» и «Велмарт», располагает большим количеством коммерческой и","og:title":"TRITON AP-DATA для торговой розничной сети","og:description":"ООО «Фудмережа», являясь оператором розничных сетей «Велика Кишеня», «ВК Селект», «ВК Експрес» и «Велмарт», располагает большим количеством коммерческой и"},"deal_info":"","user":{"id":462,"title":"Kviza-Trade","logoURL":"https://old.b4r.io/uploads/roi/company/Kviza-Treid____Velika_Kishenja___.png","alias":"kviza-treid","address":"Железнодорожное шоссе, 57, г. Киев, 01103","roles":[],"description":"Квиза-Трейд («Велика Кишеня») — одна из крупнейших сетей розничной торговли Украины с четырнадцатилетней историей успешной работы. \r\nНа сегодняшний день в 16 городах Украины открыт 51 магазин сети — 40 супермаркетов «Велика Кишеня», 1 магазин премиум-формата «ВК SELECT» и 9 «магазинов у дома» «ВК Експрес».\r\nШесть лет подряд «Велика Кишеня» становится лучшей сетью розничной торговли по результатам фестиваля-конкурса «Выбор года». Доверие покупателей, выбирающих «Велику Кишеню», — это самая большая награда для нас и огромный стимул развиваться дальше.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://kishenya.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Kviza-Trade","keywords":"Кишеня, Велика, Квиза-Трейд, магазин, Украины, торговли, розничной, результатам","description":"Квиза-Трейд («Велика Кишеня») — одна из крупнейших сетей розничной торговли Украины с четырнадцатилетней историей успешной работы. \rНа сегодняшний день в 16","og:title":"Kviza-Trade","og:description":"Квиза-Трейд («Велика Кишеня») — одна из крупнейших сетей розничной торговли Украины с четырнадцатилетней историей успешной работы. \rНа сегодняшний день в 16","og:image":"https://old.b4r.io/uploads/roi/company/Kviza-Treid____Velika_Kishenja___.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":39,"logo":false,"scheme":false,"title":"TRITON AP-DATA","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"triton-ap-data","companyTypes":[],"description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\r\n<ul><li>Предотвращение потери данных</li><li>Безопасность бизнес-процесса</li><li>Управление приложений и угроз</li></ul>\r\nData Discover - обнаружение конфиденциальной информации, хранимой в сети<br />\r\n<ul><li>Обнаружение мест хранения конфиденциальных данных</li><li>Измерение и уменьшение риска потери данных</li><li>Поддержка e-discovery для разрешаемого контроля</li></ul>\r\nData Monitor - средство аудита и мониторинга сетевых каналов передачи данных на предмет утечек конфиденциальной информации<br />\r\n<ul><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li><li>Data Protect - обнаружение и блокировка утечек конфиденциальной информации на уровне всех сетевых каналов</li><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li></ul>\r\n\r\n\r\n\r\n\r\nData Endpoint - обнаружение и предотвращение утечки конфиденциальной информации через конечные компьютеры и сменные носители\r\n<ul><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li></ul>","shortDescription":"TRITON AP-DATA - решение от утечки конфиденциальной информации (DLP)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"TRITON AP-DATA","keywords":"конфиденциальной, потери, информации, риска, уменьшение, блокировка, утечки, данных","description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\rПредотвращение потери данныхБезопасность","og:title":"TRITON AP-DATA","og:description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\rПредотвращение потери данныхБезопасность"},"eventUrl":"","translationId":2323,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":10,"title":"Ensure Compliance"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"}]}},"categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=207","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"websense-wsg-dlja-lukoil":{"id":1,"title":"Websense WSG для Lukoil","description":"Специалисты компании ISSP совместно с специалистами ЛТС Украина провели глубокий анализ технических требований к системе и определили продукт, выполняющий все поставленные задачи – Websense Web Security Gateway (WSG). Внедрение системы Websense WSG предусматривалось в режиме повышенной доступности – “Load Balancing”. Многомодульный характер Websense Web Security Gateway и мульти-вариантность методов развертывания решения позволили обеспечить высокий уровень отказоустойчивости и распределения нагрузки в активном режиме. Благодаря поддержке различных режимов работы, специалистам ISSP и ЛТС Украина удалось внедрить решение в сложную отказоустойчивую инфраструктуру Лукойл Украина, в процессе была проведена интеграция со многими элементами инфраструктуры и синхронизация резервных модулей для отказоустойчивости. Первые несколько месяцев после развертывания система проходила период адаптации – политики ограничения действий пользователей при работе с сетью Интернет постепенно подстраивались согласно регламенту использования интернет ресурсов для пользователей и их групп. Гибкость контроля, доступная администраторам значительно возросла – теперь внутреннюю сеть и Интернет разделяет не просто кеширующий прокси, но и одно из лучших в классе решений по веб-безопасности.","alias":"websense-wsg-dlja-lukoil","roi":50,"seo":{"title":"Websense WSG для Lukoil","keywords":"Websense, Украина, Security, Интернет, пользователей, отказоустойчивости, развертывания, Gateway","description":"Специалисты компании ISSP совместно с специалистами ЛТС Украина провели глубокий анализ технических требований к системе и определили продукт, выполняющий все","og:title":"Websense WSG для Lukoil","og:description":"Специалисты компании ISSP совместно с специалистами ЛТС Украина провели глубокий анализ технических требований к системе и определили продукт, выполняющий все"},"deal_info":"http://roi-redesign.my-dev.org/","user":{"id":837,"title":"LUKOIL","logoURL":"https://old.b4r.io/uploads/roi/company/LUKOIL.png","alias":"lukoil","address":"","roles":[],"description":"LUKOIL is one of the largest oil & gas vertical integrated companies in the world accounting for over 2% of crude production and circa 1% of proved hydrocarbon reserves globally. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.lukoil.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"LUKOIL","keywords":"LUKOIL, production, crude, circa, over, reserves, hydrocarbon, proved","description":"LUKOIL is one of the largest oil & gas vertical integrated companies in the world accounting for over 2% of crude production and circa 1% of proved hydrocarbon","og:title":"LUKOIL","og:description":"LUKOIL is one of the largest oil & gas vertical integrated companies in the world accounting for over 2% of crude production and circa 1% of proved hydrocarbon","og:image":"https://old.b4r.io/uploads/roi/company/LUKOIL.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":1525,"logo":false,"scheme":false,"title":"Websense Web Security Gateway (WSG)","vendorVerified":0,"rating":"3.30","implementationsCount":2,"suppliersCount":0,"alias":"websense-web-security-gateway-wsg","companyTypes":[],"description":"<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web 2.0. </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Решение выполняет функции сканирующего прокси-сервера для анализа web- и SSL-трафика на наличие современных угроз безопасности. Кроме того, решение включает в себя службы web-репутации и </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">полный набор URL-категорий безопасности: бот-сети, шпионские программы, фишинг и мошенничество, перехватчики клавиатуры, вредоносные web-сайты, потенциально нежелательные программы.</span>\r\n<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \"></span> ","shortDescription":"Программа анализирует web-трафик в реальном времени, защищая работу c интернет-ресурсами и с современными порталами Web 2.0. Решение выполняет функции сканирующего прокси-сервера","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Websense Web Security Gateway (WSG)","keywords":"программы, безопасности, себя, включает, решение, Кроме, того, web-репутации","description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web","og:title":"Websense Web Security Gateway (WSG)","og:description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web"},"eventUrl":"","translationId":2728,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"2012-01-18","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":282,"title":"Unaurthorized access to corporate IT systems and data"}]}},"categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=81","title":"Media"}},"comments":[],"referencesCount":0}},"aliases":{"1":["hp-arcsight-esm-dlja-banka","hp-arcsight-esm-dlja-pishcheproma","imperva-web-application-firewall-dlja-1-1-media","mcafee-epolicy-orchestrator-mcafee-epo-dlja-aiboks-bank","mcafee-epolicy-orchestrator-mcafee-epo-dlja-banka","mcafee-web-gateway-dlja-prokredit-bank","triton-ap-data-dlja-torgovoi-roznichnoi-seti","websense-wsg-dlja-lukoil"]},"links":{"first":"http://b4r_be/api/implementations?page=1","last":"http://b4r_be/api/implementations?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://b4r_be/api/implementations","per_page":20,"to":8,"total":8},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}