{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"en":"Сonfigurator","ru":"Конфигуратор","_type":"localeString"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"show-more-button":{"en":"Show more","ru":"Показать еще","_type":"localeString"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"en":"deployment","ru":"внедрение","_type":"localeString"},"manufacturer-popover":{"ru":"производитель","_type":"localeString","en":"manufacturer"},"short-description":{"ru":"Краткое описание","_type":"localeString","en":"Pitch"},"i-use-it-popover":{"ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"product-features":{"_type":"localeString","en":"Product features","ru":"Особенности продукта"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"solutions":{"_type":"localeString","en":" Problems that solves","ru":"Проблемы которые решает"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"testing":{"_type":"localeString","en":"Testing","ru":"Тестирование"},"compare":{"ru":"Сравнить с конкурентами","_type":"localeString","en":"Compare with competitors"},"characteristics":{"_type":"localeString","en":" Characteristics","ru":"Характеристики"},"transaction-features":{"en":"Transaction Features","ru":"Особенности сделки","_type":"localeString"},"average-discount":{"en":"Partner average discount","ru":"Средняя скидка партнера","_type":"localeString"},"deal-protection":{"_type":"localeString","en":"Deal protection","ru":"Защита сделки"},"average-deal":{"_type":"localeString","en":"Average deal size","ru":"Средний размер сделки"},"average-time":{"_type":"localeString","en":"Average deal closing time","ru":"Средний срок закрытия сделки"},"login":{"en":"Login","ru":"Войти","_type":"localeString"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"to-know-more":{"_type":"localeString","en":"To know more","ru":"Чтобы узнать больше"},"scheme":{"ru":"Схема работы","_type":"localeString","en":" Scheme of work"},"competitive-products":{"_type":"localeString","en":" Competitive products","ru":"Конкурентные продукты"},"implementations-with-product":{"ru":"Внедрения с этим продуктом","_type":"localeString","en":"Deployments with this product"},"user-features":{"ru":"Особенности пользователей","_type":"localeString","en":"User features"},"job-roles":{"_type":"localeString","en":" Roles of Interested Employees","ru":"Роли заинтересованных сотрудников"},"organizational-features":{"_type":"localeString","en":"Organizational Features","ru":"Организационные особенности"},"calculate-price":{"ru":"Рассчитать цену продукта","_type":"localeString","en":" Calculate product price"},"selling-stories":{"en":" Selling stories","ru":"Продающие истории","_type":"localeString"},"materials":{"ru":"Материалы","_type":"localeString","en":"Materials"},"about-product":{"en":"About Product","ru":"О продукте","_type":"localeString"},"or":{"en":"or","ru":"или","_type":"localeString"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"_type":"localeString","en":"Calculate Product ROI","ru":"Рассчитать ROI продукта"},"complementary-categories":{"_type":"localeString","en":"Complementary Categories","ru":"Схожие категории"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"rebate-for-poc":{"ru":"Бонус 4 POC","_type":"localeString","en":"Bonus 4 POC"},"configurator-content":{"ru":"Рассчитайте стоимость продукта","_type":"localeString","en":"Calculate price for this product here"},"configurator-link":{"en":"here","ru":"тут","_type":"localeString"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"_type":"localeString","en":"select product for presentation","ru":"выбрать продукт для презентации"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You have to register or login."},"add-to-comparison":{"en":"Add to comparison","ru":"Добавить в сравнение","_type":"localeString"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"ru":"Рассчитайте ROI для данного продукта","_type":"localeString","en":"Calculate ROI for this product here"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"videos":{"ru":"Видео","_type":"localeString","en":"Videos"},"vendor-verified":{"ru":"Подтверждено производителем","_type":"localeString","en":"Vendor verified"},"event-schedule":{"ru":"Расписание событий","_type":"localeString","en":"Events schedule"},"scheduling-tip":{"_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event.","ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент."},"register-to-schedule":{"ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To register for the event please log in or register on the site."},"comparison-matrix":{"ru":"Матрица сравнений","_type":"localeString","en":"Comparison matrix"},"compare-with-competitive":{"ru":"Сравнить с конкурентными","_type":"localeString","en":" Compare with competitive"},"avg-deal-closing-unit":{"_type":"localeString","en":"months","ru":"месяцев"},"under-construction":{"_type":"localeString","en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке."},"product-presentation":{"en":"Product presentation","ru":"Презентация продукта","_type":"localeString"},"go-to-comparison-table":{"_type":"localeString","en":" Go to comparison table","ru":"Перейти к таблице сравнения"},"see-product-details":{"en":"See Details","ru":"Детали","_type":"localeString"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"ru":"Выйти","_type":"localeString","en":"logout"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"title":{"en":"ROI4CIO: Product","ru":"ROI4CIO: Продукт","_type":"localeString"},"meta":[{"name":"og:type","content":"website"},{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"}],"translatable_meta":[{"name":"og:title","translations":{"_type":"localeString","en":"Example product","ru":"Конкретный продукт"}},{"name":"og:description","translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"}},{"name":"title","translations":{"en":"Product","ru":"Продукт","_type":"localeString"}},{"name":"description","translations":{"en":"Product description","ru":"Описание продукта","_type":"localeString"}},{"name":"keywords","translations":{"_type":"localeString","en":"Product keywords","ru":"Ключевые слова продукта"}}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"barracuda-nextgen-firewall-ngfw":{"id":1399,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_NextGen_Firewall.png","logo":true,"schemeURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_NG_Firewall_scheme.png","scheme":true,"title":"Barracuda NextGen Firewall (NGFW)","vendorVerified":0,"rating":"3.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-nextgen-firewall-ngfw","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications. The Barracuda NextGen Firewall F-Series is a family of hardware, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control. In addition, the F-Series combines highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network. The F-Series cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<span style=\"font-weight: bold;\">Security for the Cloud Era</span>\r\nSecurity paradigms are shifting—and securing your network perimeter is no longer good enough. In the cloud era, workloads happen everywhere, users are increasingly mobile, and potential attack surfaces are multiplying. Barracuda NextGen Firewall F-Series is purpose-built to deal with the challenges of securing widely distributed networks.\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN..</span>\r\nBarracuda Cloud Era Firewalls include full next gen Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n\r\n<ul>\r\n<li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li>\r\n<li>VPN across multiple broadband connections and MPLs replacement</li>\r\n<li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li>\r\n<li>Replacing network backhauling central policy enforcement architectures with direct internet break outs</li>\r\n<li>Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic</li>\r\n<li>Guaranteed users' access to critical applications through granular policy controls</li>\r\n<li>Increased available bandwidth with built-in traffic compression and data deduplication</li>\r\n<li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Why Barracuda NextGen Firewall?</span> When selecting security technology, it is critical that your products are supported by people who take your data security as seriously as you do. The Barracuda NextGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data. The Barracuda NextGen Firewall is part of a comprehensive line of data protection, network firewall, and security products and services designed for organizations seeking robust yet affordable protection from ever-increasing cyber threats. <span style=\"font-style: italic;\">Source: https://www.barracuda.com/products/nextgenfirewall_f</span>","shortDescription":"Barracuda's Next Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations.","type":"Software","isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda NextGen Firewall (NGFW)","keywords":"network, Barracuda, your, with, Firewall, NextGen, security, access","description":"Next-Generation Firewalls for the Cloud Era\rIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have","og:title":"Barracuda NextGen Firewall (NGFW)","og:description":"Next-Generation Firewalls for the Cloud Era\rIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_NextGen_Firewall.png"},"eventUrl":"","translationId":1400,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[{"id":153,"title":"FW Functionality","required":0,"type":"multiselect","templateId":13,"value":"SSL VPN functionality, Application control, IPv4/IPv6 support, NAT functionality, 2-FA authentication, DHCP functionality, SSL traffic decryption support, Bandwidth Management, Centralized management and Administration console, Site to Site IPSec VPN support, Reverse proxy functionality, DNS proxy functionality, Stateful engine support for all protocols in TCP/IP stack, URL filtering, Hardened OS & purpose built chassis hardware, Support for static and dynamic routing protocols","options":["SSL VPN functionality","Application control","IPv4/IPv6 support","NAT functionality","2-FA authentication","DHCP functionality","SSL traffic decryption support","Bandwidth Management","Centralized management and Administration console","Site to Site IPSec VPN support","Reverse proxy functionality","DNS proxy functionality","Stateful engine support for all protocols in TCP/IP stack","URL filtering","Hardened OS & purpose built chassis hardware","Support for static and dynamic routing protocols","Application Intelligence for TCP/IP protocols (telnet, Ftp, etc)"]},{"id":151,"title":"Integration with","required":0,"type":"multiselect","templateId":13,"value":"Threat Intel, Network Policy Management tools, SIEM, AD/LDAP, AAA servers, Supports Certificates based authentication","options":["Threat Intel","Network Policy Management tools","SIEM","IAM","AD/LDAP","AAA servers","Supports Certificates based authentication"]},{"id":149,"title":"Deployment","required":0,"type":"multiselect","templateId":13,"value":"High availability, Support Routed and Transparent mode, Support for Virtualized environment","options":["High availability","Support Routed and Transparent mode","Support for Virtualized environment"]},{"id":147,"title":"Basic DLP functionality","required":0,"type":"binary","templateId":13,"value":"N/A","options":{"values":null,"defaults":null}},{"id":145,"title":"Context aware","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}},{"id":143,"title":"DDOS protection","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}},{"id":141,"title":"Behavioural Analysis","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}},{"id":139,"title":"APT protection - Sandboxing","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}},{"id":137,"title":"Anti-Bot","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}},{"id":135,"title":"Network Antivirus & Anti-Spyware","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}},{"id":133,"title":"IDS/IPS functionality","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}}],"concurentProducts":[{"id":1409,"logoURL":"https://old.b4r.io/fileadmin/user_upload/WatchGuard_NGFW__Next-Generation_Firewall_.jpg","logo":true,"scheme":false,"title":"WatchGuard NGFW (Next-Generation Firewall)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"watchguard-ngfw-next-generation-firewall","companyTitle":"WatchGuard","companyTypes":["vendor"],"companyId":2741,"companyAlias":"watchguard","description":"Historically, next-generation firewall (NGFW) appliances were designed to deliver a very specific set of security services – firewall, intrusion prevention, and application control. Since being originally defined, the security threats and the technology available to combat those threats have significantly evolved, creating a demand for additional network security services. As a result, other techniques and services have to be included in basic NGFW appliances such as SSL inspection, website filtering, QOS, antivirus inspection, and even sandboxing. While these additional services provide value to end users, it also confuses many people, making them wonder about the difference between an NGFW and UTM appliance. Today, companies should not be searching for an NGFW or a UTM appliance, they should be searching for the right network security appliance that meets the security, deployment, and management requirements of their unique organization. <span style=\"font-weight: bold;\">WatchGuard’s Solutions</span> Our unique approach to network security focuses on bringing best-in-class, enterprise-grade security to any organization, regardless of size or technical expertise. Ideal for SMB, midsize, and distributed enterprise organizations, our network security appliances are designed from the ground up to focus on ease of deployment, use, and ongoing management, in addition to providing the strongest security possible. Not only does WatchGuard offer the greatest collection of network security services on a single platform, we do so in a way that has proven to be the most agile, able to adapt to new and evolving threat vectors faster than any other solution on the market. We are a security company and we want the best protection for every customer, every time. As such, we strongly recommend customers adopt a full security suite. When running WatchGuard’s Total Security Suite, our Firebox network security appliances offer the strongest security against network threats. Every Firebox can be purchased as a stand-alone NGFW appliance; however, as a security company we never recommend the deployment of an NGFW without other security mechanisms in place. The best approach to security is a layered approach.","shortDescription":"WatchGuard NGFW is an enterprise-class, high-performance gateway security appliance that provides top-of-the-line firewalling, intrusion prevention, and application control.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"WatchGuard NGFW (Next-Generation Firewall)","keywords":"security, network, NGFW, services, appliance, appliances, threats, deployment","description":"Historically, next-generation firewall (NGFW) appliances were designed to deliver a very specific set of security services – firewall, intrusion prevention,","og:title":"WatchGuard NGFW (Next-Generation Firewall)","og:description":"Historically, next-generation firewall (NGFW) appliances were designed to deliver a very specific set of security services – firewall, intrusion prevention,","og:image":"https://old.b4r.io/fileadmin/user_upload/WatchGuard_NGFW__Next-Generation_Firewall_.jpg"},"eventUrl":"","translationId":1410,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1441,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png","logo":true,"scheme":false,"title":"SonicWall next-generation firewall (NGFW)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sonicwall-next-generation-firewall-ngfw","companyTitle":"SonicWall","companyTypes":["supplier","vendor"],"companyId":4104,"companyAlias":"sonicwall","description":"VIRTUAL Secure your public, private or hybrid cloud environment with virtualized versions of SonicWall next-generation firewalls and simplify administration with common management across your virtual and physical infrastructure. WIRELESS NETWORK SECURITY Build a high-speed wireless network security solution that safeguards your wireless traffic from threats and delivers wired-like network security and performance. MANAGEMENT, REPORTING & ANALYTICS Complement and extend SonicWall security products and services, and help your organization optimize security, manage growth and ease administrative burdens. SECURITY SUBSCRIPTIONS Protect your organization from advanced security threats, gain greater security control, enhance productivity and lower costs with SonicWall network security services and add-ons to our firewall hardware. WAN ACCELERATION Eliminate performance bottlenecks from data and file sharing applications and give users LAN-like application performance over your WAN by optimizing the bandwidth you already have. CAPTURE CLOUD PLATFORM The SonicWall Capture Cloud Platform combines the global security intelligence of the Capture Threat Network with the cloud-based management, reporting and analytics of the Capture Cloud Security Center and the advanced threat prevention of the multi-engine Capture ATP sandbox.","shortDescription":"SonicWall NGFW is a Comprehensive threat prevention at multi-gigabit speeds, network security, control and visibility your organization needs.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SonicWall next-generation firewall (NGFW)","keywords":"security, your, SonicWall, Capture, with, from, network, performance","description":"VIRTUAL Secure your public, private or hybrid cloud environment with virtualized versions of SonicWall next-generation firewalls and simplify administration","og:title":"SonicWall next-generation firewall (NGFW)","og:description":"VIRTUAL Secure your public, private or hybrid cloud environment with virtualized versions of SonicWall next-generation firewalls and simplify administration","og:image":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png"},"eventUrl":"","translationId":1442,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1909,"logoURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda CloudGen Firewall","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-cloudgen-firewall","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, and helps organizations transform their business.\r\n<span style=\"font-weight: bold;\">From the Next Generation Firewall to a Cloud Generation Solution</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications.\r\nBarracuda CloudGen Firewall is a family of physical appliance, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control.\r\nIn addition, Barracuda CloudGen Firewalls combine highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network.\r\nBarracuda's cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<ul><li>Protection Against Advanced Threats and Zero-Hour Attacks.</li><li>Secure SD-WAN: Reduce Costs and Ensure Application Availability.</li><li>Remote VPN Access for Off-Network Users – Anytime, Anywhere.</li><li>Secure Migration to the Public Cloud and Hybrid Environments.</li><li>Secure Connectivity for IoT Devices and Industrial Control Systems.</li></ul>\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN</span>\r\nBarracuda CloudGen Firewalls include full next-generation Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n<ul><li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li><li>VPN across multiple broadband connections and MPLS replacement</li><li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li><li>Replacing network backhauling central policy enforcement architectures with direct internet breakouts</li><li>Faster access to cloud applications like Office 365 by dynamically prioritizing them over non-critical traffic</li><li>Guaranteed user access to critical applications through granular policy controls</li><li>Increased available bandwidth with built-in traffic compression and data deduplication</li><li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li></ul>\r\n<span style=\"font-weight: bold;\">Cut MPLS Costs with Bandwidth Optimization</span>\r\nIf you have branch offices and remote locations that need to run SaaS applications or connect to your network, Barracuda can dramatically reduce your WAN costs. The traditional approach of backhauling traffic to a main office via costly MPLS leased lines can’t deliver on price and performance in the cloud era.\r\nBarracuda lets you establish direct internet breakouts for optimized cloud accessibility. Our SD-WAN maintains a fully meshed VPN using less expensive broadband connections. Use the Savings Calculator to see how much your organization to save.\r\n<span style=\"font-weight: bold;\">Why Barracuda CloudGen Firewall?</span>\r\nWhen selecting security technology, it is critical that your products are supported by people who take network security as seriously as you do. Barracuda CloudGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data.","shortDescription":"Barracuda CloudGen Firewall - Go Beyond Next-Generation Firewalls to Protect Your Network in the Cloud and On-Premises","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda CloudGen Firewall","keywords":"network, Barracuda, your, with, applications, Firewall, cloud, CloudGen","description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that","og:title":"Barracuda CloudGen Firewall","og:description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that","og:image":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1910,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1401,"logoURL":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png","logo":true,"scheme":false,"title":"Check Point Фаервол нового поколения (NGFW)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-faervol-novogo-pokolenija-ngfw","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; text-decoration-line: underline;\">Преимущества</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Контроль использования приложений</span>\r\n<ul> <li>Идентификация, разрешение, блокирование или ограничение использования приложений и функций этих приложений.</li> <li>Безопасное пользование интернетом с защитой от угроз и вредоносных программ.</li> <li>В вашем распоряжении — крупнейшая библиотека приложений с более чем 6 600 приложений.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Поддержка передового контроля над идентификацией</span>\r\n<ul> <li>Создание гранулярных политик для пользователей и групп.</li> <li>Легкая интеграция с Active Directory.</li> <li>Защита сред, в которых разрешены социальные сети и интернет-приложения.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Безопасность шлюзов в одном специальном устройстве</span>\r\n<ul> <li>Передовая защита в режиме 24/7.</li> <li>Преимущества контроля приложений и защиты от вторжений. Служба поддержки готова познакомить с дополнительными функциями безопасности.</li> <li>Глубокое понимание событий в сфере безопасности с комплексным и простым в использовании централизованным управлением.</li> <li>Более 170 тысяч покупателей, включая 100 % компаний из первой сотни компаний списка Fortune.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; text-decoration-line: underline;\">Возможности</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Контроль за идентификацией</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Чтобы безопасность была как можно более полной, нужно ограничивать доступ к важной информации и ресурсам. С Фаерволом нового поколения ваши администраторы полностью контролируют отдельных пользователей, группы пользователей, приложения, устройства и типы соединений с вашей сетью, поэтому они могут выдавать разрешение только для определенных пользователей и устройств. Фаервол — это простой и экономически эффективный способ укрепить политику безопасности, который предоставляет вам гранулярный контроль для максимальной защиты ваших шлюзов безопасности.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Интеграция с Active Directory происходит незаметно и не требует агента. Она обеспечивает полную идентификацию пользователей, которая происходит благодаря простым определениям политик для пользователей и групп непосредственно из фаервола. Идентификация пользователей может производиться одним из трех методов:</span>\r\n<ul> <li>через запрос Active Directory;</li> <li>через портал-посредник;</li> <li>через однократную установку небольшого агента.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Предотвращение вторжений</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Фаервол нового поколения содержит программный блейд IPS, который защищает вашу сеть, проверяя пакеты трафика, проходящие через ваши шлюзы безопасности. Эта многофункциональная система IPS — часть архитектуры программных блейдов, поэтому вам будет легко ее внедрить, чтобы еще больше расширить ваши возможности.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Контроль приложений</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Сотрудники сегодня используют массу приложений, и вам необходимо защитить их, независимо от того, что именно они используют. Фаервол нового поколения обладает огромным охватом приложений — 6 600 приложений и 260 000 виджетов социальных сетей. Вы можете создать политики гранулярного контроля для пользователей или групп, чтобы идентифицировать, заблокировать или ограничить использование приложений и виджетов для обмена сообщениями, общения в соцсетях, просмотра видео, IP-телефонии, игр и прочего.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Единое управление</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Наша единая система управления безопасностью упрощает сложную задачу по управлению всей вашей инфраструктурой безопасности. Вы увидите и сможете контролировать угрозы, устройства, пользователей с помощью интуитивно понятного графического интерфейса, в котором наглядно представлена вся необходимая информация. Управляйте всеми вашими шлюзами безопасности и программными блейдами из одной централизованной панели управления.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Анализ логов</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Чтобы помочь вам разобраться в данных, мы добавили SmartLog — передовой анализатор логов с быстрым поиском. Он дает вам полный контроль над миллионами логов, записанных в разное время и на разных доменах.</span>","shortDescription":"Фаервол нового поколения компании Check Point контролирует использование приложений, а также сканирует данные, чтобы остановить угрозы.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point Фаервол нового поколения (NGFW)","keywords":"приложений, пользователей, безопасности, поколения, через, нового, Фаервол, ваши","description":"Преимущества\rКонтроль использования приложений\r Идентификация, разрешение, блокирование или ограничение использования приложений и функций этих приложений.","og:title":"Check Point Фаервол нового поколения (NGFW)","og:description":"Преимущества\rКонтроль использования приложений\r Идентификация, разрешение, блокирование или ограничение использования приложений и функций этих приложений.","og:image":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png"},"eventUrl":"","translationId":2668,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1402,"logoURL":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png","logo":true,"scheme":false,"title":"Check Point Next Generation Firewall (NGFW)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-next-generation-firewall-ngfw","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"<span style=\"font-weight: bold; text-decoration-line: underline;\">Benefits</span> \r\n<span style=\"font-weight: bold;\">Detects and controls application usage</span>\r\n<ul> <li>Identify, allow, block or limit usage of applications, and features within them</li> <li>Enable safe Internet use while protecting against threats and malware</li> <li>Leverage the world's largest application library with more than 6,600 web 2.0 applications</li> </ul>\r\n<span style=\"font-weight: bold;\">Supports advanced identity awareness for stress-free policy enforcement</span>\r\n<ul> <li>Create granular policy definitions per user and group</li> <li>Integrate seamlessly with Active Directory</li> <li>Protect environments with social media and Internet applications</li> </ul>\r\n<span style=\"font-weight: bold;\">Provides proven gateway security in a single, dedicated appliance</span>\r\n<ul> <li>Rely on 24/7 advanced protection</li> <li>Reap the benefits of application control and intrusion protection (IPS), as well as extensibility support for additional security capabilities</li> <li>Get greater understanding into security events with integrated, easy-to-use centralized management</li> <li>Join more than 170,000 customers, including 100 percent of Fortune 100 companies</li> </ul>\r\n\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Features</span> \r\n<span style=\"font-weight: bold;\">Identity awareness</span> Great security involves limiting and tracking access to sensitive data and resources. With the Next Generation Firewall, your administrators get detailed visibility into the users, groups, applications, machines and connection types on your network so they can assign permissions to the right users and devices. The firewall makes it easy and cost-effective to enforce security policy, giving granular permission control over these entities; this results in superior protection across the entire security gateway. Seamless and agent-less integration with Active Directory provides complete user identification, enabling simple, application-based policy definition per user or group directly from the firewall. Users’ identification may be acquired in one of three simple methods:\r\n<ul> <li>Querying the Active Directory</li> <li>Through a captive portal</li> <li>Installing a one-time, thin client-side agent</li> </ul>\r\n<span style=\"font-weight: bold;\">Application control</span> \r\nEmployees are using more apps than ever, and you’re on the hook to protect them regardless of what they use. Check Point Next Generation Firewall has the industry’s largest application coverage, with more than 6,600 applications and 260,000 social network widgets included. You can create granular security policies based on users or groups to identify, block or limit usage of web applications and widgets like instant messaging, social networking, video streaming, VoIP, games and more. \r\n<span style=\"font-weight: bold;\">Logging and status</span> \r\nTo help you make sense out of your security event data, we included SmartLog, an advanced log analyzer that delivers split-second search results providing real-time visibility into billions of log records over multiple time periods and domains. \r\n<span style=\"font-weight: bold;\">Integrated security management</span> \r\nOur unified security management simplifies the monumental task of managing your security environment. You’ll see and control threats, devices and users with a highly intuitive graphical interface providing views, details and reports on your security health. Manage all your Check Point gateways and software blades from one comprehensive, centralized security dashboard. \r\n<span style=\"font-weight: bold;\">Intrusion prevention</span> \r\nNext Generation Firewall includes the Check Point IPS Software Blade, which secures your network by inspecting packets traversing through the gateway. It is a full-featured IPS, providing geo-protections and frequent, automated threat definition updates. Because the IPS is part of the integrated Software Blade Architecture, you’ll get all the deployment and management advantages of a unified and extensible solution.","shortDescription":"Check Point Next Generation Firewall identifies and controls applications by user and scans content to stop threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point Next Generation Firewall (NGFW)","keywords":"security, your, with, applications, more, than, management, Check","description":"Benefits \rDetects and controls application usage\r Identify, allow, block or limit usage of applications, and features within them Enable safe Internet use","og:title":"Check Point Next Generation Firewall (NGFW)","og:description":"Benefits \rDetects and controls application usage\r Identify, allow, block or limit usage of applications, and features within them Enable safe Internet use","og:image":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png"},"eventUrl":"","translationId":1402,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1403,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Fortinet.png","logo":true,"scheme":false,"title":"Fortinet NGFW","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":21,"alias":"fortinet-ngfw","companyTitle":"Fortinet","companyTypes":["vendor"],"companyId":690,"companyAlias":"fortinet","description":"<span style=\"font-weight: bold;\">Enterprise Firewall</span>\r\nOur award-winning FortiGate enterprise firewalls provide high performance, consolidated advanced security and granular visibility for broad protection across the entire digital attack surface. FortiGate enterprise firewalls reduce complexity and improve overall security posture by providing full visibility into users, devices, applications and threats on the network, with the ability to apply advanced threat protection anywhere in the network. Our purpose-built security processors (SPUs) deliver scalable performance of advanced security services, industry-leading VPN and SSL inspection throughput, and ultra low latency for protecting internal segments and mission critical environments. Our validated FortiGuard security services protect against known and unknown threats, zero-day exploits, malware, and malicious websites using FortiGuard Labs continuous threat intelligence, dynamic analysis for detection, and automated mitigation to keep your network protected from advanced cyberattacks. FortiGate enterprise firewalls deliver the lowest total cost of ownership along with supporting scalable, flexible deployments from the network edge to the core, data center, internal segments, and the cloud. FortiGates are Security Fabric enabled, providing the broad visibility, automated protection and integrated threat intelligence required to protect the valuable assets and data of organizations worldwide.\r\n\r\n<span style=\"font-weight: bold;\">FortiGate includes:</span>\r\n<ul> <li>Consolidated, validated highest efficacy advanced security services</li> <li>Real-time response based on threat intelligence to protect any point of vulnerability in the network</li> <li>Integrated audit and compliance services to improve cybersecurity</li> <li>Industry's fastest SSL inspection engine to help protect against malware hiding in encrypted traffic </li> <li>Single-pane-of-glass management to simplify deployment and enable consistent security policies with granular control and visibility</li> <li>Multiple network deployments – as a next-generation firewall, data center firewall, internal segmentation firewall, or high speed firewall and VPN</li> </ul>\r\n<span style=\"font-weight: bold;\">Products</span>\r\nFortiGate: Chassis-based NGFW\r\nFortiGate 7000, 5000 Series \r\n\r\nFortiGate: Ultra High-End NGFW\r\nFortiGate 6000 Series FortiGate 7000 Series\r\n\r\nFortiGate: High-End NGFW\r\nFortiGate 3000, 2000, and 1000 Series \r\n\r\nFortiGate: Mid-Range NGFW\r\nFortiGate 900, 800, 600, 500, 400, 300, 200, and 100 Series \r\n\r\nFortiGate: Entry-Level NGFW\r\nFortiGate 90, 80, 60, 50, 30, and Rugged Series \r\n\r\n<span style=\"font-weight: bold;\">FortiGate Enterprise Firewall Demo</span>\r\nThis full working demo lets you explore the latest FortiOS 6.0-based features of our FortiGate Enterprise Firewalls. You’ll quickly see how FortiGate delivers better visibility and accelerated security, which provides efficient operations. Be sure to check out the new Security Fabric topology views, which help to reduce complexity. <span style=\"font-style: italic;\">Source: https://www.fortinet.com/products/next-generation-firewall.html</span>","shortDescription":"Fortinet NGFW (Next-Generation Firewall) is a Threat Protection and Performance with Reduced Complexity\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fortinet NGFW","keywords":"FortiGate, security, Series, NGFW, network, visibility, advanced, threat","description":"Enterprise Firewall\rOur award-winning FortiGate enterprise firewalls provide high performance, consolidated advanced security and granular visibility for broad","og:title":"Fortinet NGFW","og:description":"Enterprise Firewall\rOur award-winning FortiGate enterprise firewalls provide high performance, consolidated advanced security and granular visibility for broad","og:image":"https://old.b4r.io/fileadmin/user_upload/Fortinet.png"},"eventUrl":"","translationId":1404,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1405,"logoURL":"https://old.b4r.io/fileadmin/user_upload/palo_alto_networks.png","logo":true,"scheme":false,"title":"Palo Alto Networks межсетевой экран нового поколения (NGFW)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":5,"alias":"palo-alto-networks-mezhsetevoi-ehkran-novogo-pokolenija-ngfw","companyTitle":"Palo Alto Networks","companyTypes":["vendor"],"companyId":2061,"companyAlias":"palo-alto-networks","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Безопасная работа приложений как необходимое условие успешного развития бизнеса</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Безопасная работа приложений, обеспечиваемая с помощью сетевых экранов Palo Alto Networks нового поколения, помогает решить проблемы безопасности бизнеса, связанные с растущим числом используемых в сети приложений. Обеспечение безопасного доступа к приложениям для отдельных пользователей или групп пользователей – локальных, мобильных и удаленных – и защита трафика от известных и неизвестных угроз позволяет усилить безопасность и одновременно поддержать рост бизнеса.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-weight: bold;\">• Классификация всех приложений, на всех портах, в любое время. </span>Средства точной классификации трафика – основной компонент любого межсетевого экрана, а результаты их работы становятся основой политики безопасности. Современные приложения легко обходят межсетевые экраны, выполняющие фильтрацию трафика на основе портов, путем динамической смены портов, использования протоколов SSL и SSH, туннелирования своего трафика через порт 80 или использования нестандартных портов.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-weight: bold;\">• Включение в политику безопасности не только IP-адресов, но также пользователей и устройств. </span>Создание и управление политиками безопасности на основе приложений и идентификации пользователей, независимо от устройства или местоположения, является более эффективным средством защиты вашей сети, чем решение, основанное исключительно на портах и IP-адресах. Интеграция с различными корпоративными каталогов пользователей позволяет идентифицировать пользователей Microsoft Windows, Mac OS X, Linux, Android или iOS, которые осуществляют доступ к приложениям. Пользователи, которые находятся в командировке или работают удаленно, защищены с помощью тех же согласованных политик безопасности, которые действуют в локальной или корпоративной сети. Сочетание возможностей мониторинга и контроля использования приложений пользователями означает, что можно обеспечить безопасное использование Oracle, BitTorrent, Gmail или любого используемого в сети приложения, независимо от того, где и какой пользователь осуществляет доступ к нему.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">•<span style=\"font-weight: bold;\"> Предотвращение всех угроз – как известных, так и неизвестных.</span> Чтобы обеспечить безопасность современной сети, необходимо найти устранить известные уязвимые места, обеспечить защиту от вредоносного и шпионского ПО, а также совершенно неизвестных и целенаправленных угроз. Этот процесс начинается с сокращения возможностей для сетевых атак путем разрешения доступа конкретным приложениям и запрета доступа всем остальным приложениям: либо с помощью неявной стратегии «запрещать все остальные», либо с помощью задаваемых в явном виде политик. Координированные меры по предотвращению угроз могут примяться ко всему разрешенному трафику, за один проход блокируя известные опасные сайты, уязвимости, вирусы, программы-шпионы и запросы злоумышленников к DNS-серверам. Активный анализ и идентификация неизвестных вредоносных программ осуществляется путем прямого запуска неопознанных файлов в виртуальной среде «песочница» и проверки на предмет более 100 видов вредоносного поведения. При обнаружении новых вредоносных программ автоматически генерируются и предоставляются сигнатуры зараженных файлов и связанного с ними вредоносного трафика. Анализ, связанный с предотвращением угроз, осуществляется с учетом контекста приложений и протоколов связи, гарантируя неизбежное выявление даже тех угроз, которые пытаются скрыться от систем безопасности в туннелях, сжатой информации или нестандартных портах.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> </span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Гибкость внедрения и управления</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Функции обеспечения безопасной работы приложений могут быть внедрены либо на основе специально созданной аппаратной платформы, либо на виртуализированном решении. При развертывании нескольких межсетевых экранов Palo Alto Networks в виде аппаратной или виртуализированной платформы можно использовать дополнительное средство централизованного управления Panorama, позволяющее централизованно осуществлять мониторинг шаблонов трафика, внедрять политики безопасности, формировать отчеты и выполнять обновления. </span>\r\n<ul> <li>Обеспечение безопасной работы приложений: комплексный подход</li> <li>Универсальный редактор политик: привычный интерфейс и набора функций позволяет быстро создавать и внедрять политики контроля приложений, пользователей и информации.</li> <li>Обеспечение работы приложений и снижение риска</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Критерии правил безопасного разрешения доступа приложениям включают приложения или функции приложений, пользователей и группы, а также контент и позволяют найти баланс между «запрещением всех приложений» и рискованной альтернативой в виде «разрешения всех приложений».</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Политики обеспечения доступа, применяемые по периметру сети, включая филиалы, мобильных и удаленных пользователей, нацелены на идентификацию всего трафика и выборочное разрешение прохождения трафика на основе идентификации пользователей с последующим сканированием трафика на наличие угроз. </span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-weight: bold;\">Примеры политик включают:</span></span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Ограничение числа используемых почтовых веб-служб и служб обмена мгновенными сообщениями всего до нескольких возможных вариантов: расшифровка тех из них, которые используют SSL, проверка трафика на предмет вторжений и загрузка неизвестных файлов на WildFire для анализа и разработки сигнатур.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Разрешение приложений и веб-сайтов, использующих потоковые мультимедиа, но с применением системы обеспечения качества обслуживания и защиты от вредоносных программ, чтобы минимизировать влияние на VoIP-приложения и защитить сеть.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Контроль использования Facebook: пользователям разрешается просматривать страницы, но все игры и подключаемые модули социальной сети становятся заблокированными, а публикации в сети Facebook разрешены только для отдела маркетинга. Сканирование всего трафика Facebook на предмет вредоносных программ и вторжений.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Контроль пользования Интернетом путем сканирования трафика и разрешения доступа к веб-сайтам, связанным с выполнением служебных обязанностей, и блокирования доступа к веб-сайтам, очевидно не связанным с работой. «обучение» доступу к сомнительным сайтам через настраиваемые страницы блокировки.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Применение согласованных правил безопасности путем использования одинаковых политик для всех пользователей (локальных, мобильных или удаленных) с помощью GlobalProtect.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Использование неявной стратегии «запрещать все остальные» или целенаправленное блокирование нежелательных приложений, например использующих прямое соединение «точка-точка» или пытающихся обойти средства защиты, а также трафика из определенных стран для сокращения потенциально опасного для бизнеса и безопасности трафика приложений.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Примеры использования правил разрешения доступа в центрах обработки данных (традиционных, виртуализированных или их комбинации) включают подтверждение приложений, поиск вредоносных приложений и защиту данных.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Изоляция хранилища номеров кредитных карт Oracle в отдельной зоне безопасности, контроль доступа групп финансового подразделения путем направления трафика через стандартные порты и его проверки на предмет уязвимостей приложений.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Разрешение доступа к центру обработки данных с использованием фиксированного набора удаленных приложений управления, например SSH, RDP, Telnet, через их стандартные порты только для группы ИТ-подразделения.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Разрешение администрирования Microsoft SharePoint только группе администраторов и разрешение доступа к документам Microsoft SharePoint всем остальным пользователям.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Защита разрешенных приложений</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Безопасная работа приложений означает разрешение доступа к определенным приложениям и применение определенных политик в целях блокировки известных уязвимостей, известного или неизвестного вредоносного и шпионского ПО, контроль передачи файлов и данных, а также пользования Интернетом.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Наиболее распространенные тактики маскировки угроз, включая переключение между портами и туннелирование, нейтрализуются путем реализации политики предупреждения угроз с использованием контекста приложений и протоколов, который генерируется декодерами в App-ID. Решения, основанные на концепции унифицированного управления защитой от угроз (UTM), напротив, используют разрозненный подход к предотвращению угроз, в рамках которого отдельные функции, межсетевые экраны, системы предотвращения вторжений, антивирусы, фильтры URL-адресов и сканеры трафика работают без обмена контекстом, что делает их более уязвимыми перед попытками обхода защиты.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Блокирование известных угроз: Системы предотвращения вторжений и сетевые антивирусы/средства защиты от шпионского ПО. Единый формат сигнатур и система потокового сканирования позволяют защитить вашу сеть от широкого спектра угроз. Система предотвращения вторжений (IPS) нейтрализует угрозы, связанные с блокированием сети и использованием уязвимостей на уровне приложений, переполнением буфера, DoS-атаками и сканированием портов.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Антивирус/средство защиты от шпионского ПО блокирует миллионы вариантов вредоносных программ, а также генерируемый вредоносными программами трафик команд и контроля, вирусы в PDF-файлах и вредоносные программы, скрытые в сжатых файлах или веб-трафике (сжатый HTTP/HTTPS). Реализуемая на основе политик безопасности расшифровка SSL для всех приложений и портов обеспечивает защиту от вредоносных программ, осуществляющих доступ через приложения, использующие защищенный протокол SSL.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Блокирование неизвестного и целенаправленного вредоносного ПО: Wildfire™. WildFire выявляет и анализирует неизвестное или целенаправленное вредоносное ПО путем прямого запуска неопознанных файлов в виртуальной облачной среде «песочница». WildFire осуществляет мониторинг на предмет более 100 видов вредоносного поведения, а результаты немедленно доводятся до сведения администратора в форме экстренных уведомлений. Предлагающаяся отдельно подписка на WildFire обеспечивает усиленную защиту, ведение журналов и формирование отчетов. Как подписчик, вы получаете защиту в течение часа после обнаружения новой вредоносной программы в любой точке мира, что позволяет эффективно блокировать распространение новых вредоносных программ, прежде чем они нанесут вам вред. Как подписчик, вы также получаете доступ к интегрированным в WildFire инструментам ведения журналов и формирования отчетности, а также программному интерфейсу для отправки образцов в облако WildFire для анализа. Мониторинг информации и угроз: Просмотр URL-адресов, угроз и перемещения файлов/данных в простом и понятном формате. Добавление и удаление фильтров для получения дополнительной информации об отдельных элементах. </span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Идентификация хостов, зараженных ботами. App-ID классифицирует все приложения на всех портах, включая весь неизвестный трафик, который зачастую может представлять собой опасность сбоев или угроз для вашей сети. Отчет о признаках ботнет-поведения анализирует неизвестный трафик, подозрительные запросы к DNS и URL-адресов, а также различное необычное поведение в сети в целях выявления устройств, которые могут быть заражены вредоносными программами. Результаты анализа отображаются в виде списка потенциально зараженных хостов, которые могут являться участниками ботнета.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Ограничение несанкционированной передачи файлов и данных. Функции фильтрации данных позволяют администраторам реализовывать политики, которые снизят риски, связанные с несанкционированной передачей файлов и данных. Операции передачи файлов контролируются путем анализа содержимого файла (в отличие от анализа только расширения файла). По результатам анализа принимается решение, следует ли разрешать передачу файла. При этом может блокироваться загрузка исполняемых файлов (которые обычно загружаются с использованием различных средств маскировки), что позволяет защитить сеть от скрытого распространения вредоносных программ. Функции фильтрации данных позволяют обнаруживать содержимое, соответствующее шаблонам конфиденциальных данных (номеров кредитных карт и социального страхования), и управлять его передачей.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Контроль пользования интернетом. Полностью интегрированная настраиваемая система фильтрации по URL-адресам позволяет администраторам применять точечные политики в отношении использования веб-ресурсов, дополняющие политики мониторинга трафика приложений и управления им, а также защищающие организацию от всех возможных рисков нарушения требований законодательства, несоблюдения нормативных требований и снижения производительности. Кроме того, в политику безопасности могут быть интегрированы категории URL-адресов, что позволяет точнее управлять расшифровкой SSL, качеством обслуживания или другими правилами.</span>\r\n<p style=\"background-color: #ffffff;\"><span style=\"font-weight: bold;\">Основные линейки устройств:</span></p>\r\n<p style=\"background-color: #ffffff;\">PA-5000 Series, PA-4000 Series, PA-3000 Series, PA-2000 Series, PA-500, PA-200, VM-Series, Management Platforms</p>","shortDescription":"Брандмауэры нового поколения Palo Alto Networks созданы для безопасного использования приложений и предотвращения современных угроз.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Palo Alto Networks межсетевой экран нового поколения (NGFW)","keywords":"приложений, трафика, угроз, доступа, безопасности, пользователей, сети, также","description":"Безопасная работа приложений как необходимое условие успешного развития бизнеса\rБезопасная работа приложений, обеспечиваемая с помощью сетевых экранов Palo","og:title":"Palo Alto Networks межсетевой экран нового поколения (NGFW)","og:description":"Безопасная работа приложений как необходимое условие успешного развития бизнеса\rБезопасная работа приложений, обеспечиваемая с помощью сетевых экранов Palo","og:image":"https://old.b4r.io/fileadmin/user_upload/palo_alto_networks.png"},"eventUrl":"","translationId":2670,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1406,"logoURL":"https://old.b4r.io/fileadmin/user_upload/palo_alto_networks.png","logo":true,"scheme":false,"title":"Palo Alto Networks next-generation firewall (NGFW)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":5,"alias":"palo-alto-networks-next-generation-firewall-ngfw","companyTitle":"Palo Alto Networks","companyTypes":["vendor"],"companyId":2061,"companyAlias":"palo-alto-networks","description":"Flexible deployment options and native integration with our next-generation platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud.\r\n<span style=\"font-weight: bold;\">Superior architecture, superior benefits</span>\r\nComplete visibility and precise control: Our next-generation firewalls provide complete visibility into all network traffic based on applications, users, content and devices. Automated security: Innovative features reduce manual tasks and enhance your security posture, for example, by disseminating protections from previously unknown threats globally in near-real time, correlating a series of related threat events to indicate a likely attack on your network, and using dynamic address groups in security rules to avoid updating server IP addresses frequently. Protection for your users and data everywhere: Our next-generation firewalls are natively integrated with our security platform, which prevents advanced and unknown cyberthreats no matter where the users and data are located: in your network, on your endpoints and in the cloud.\r\n<span style=\"font-weight: bold;\">Products: </span>PA-5000 Series, PA-4000 Series, PA-3000 Series, PA-2000 Series, PA-500, PA-200, VM-Series, Management Platforms\r\n<span style=\"font-weight: bold;\">Visibility and Control</span>\r\nOur next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surface area of cyber attacks across the organization.\r\n<span style=\"font-weight: bold;\">Threat Prevention</span>\r\nThe combination of Content-IDTM and WildFireTM provides protection from known and unknown threats. Content-ID limits unauthorized data transfer and detects and blocks a wide range of threats. WildFire identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment, and automatically disseminates updated protections globally in near-real time.\r\n<span style=\"font-weight: bold;\">Built-in, not Bolted-on</span>\r\nToday’s security architectures are a result of adding uncoordinated security layers one at a time, making them ineffective in dealing with modern threats. Unlike legacy firewalls that are based on this "layered security" architecture, our next-generation firewalls use a unified security design that classifies all traffic into full context before applying one set of flexible security rules in a single pass.","shortDescription":"Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Our approach identifies all network traffic based on applications, users, content","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Palo Alto Networks next-generation firewall (NGFW)","keywords":"security, your, next-generation, threats, users, Series, data, traffic","description":"Flexible deployment options and native integration with our next-generation platform extend the policy enforcement and cyberthreat prevention to everywhere","og:title":"Palo Alto Networks next-generation firewall (NGFW)","og:description":"Flexible deployment options and native integration with our next-generation platform extend the policy enforcement and cyberthreat prevention to everywhere","og:image":"https://old.b4r.io/fileadmin/user_upload/palo_alto_networks.png"},"eventUrl":"","translationId":1406,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1439,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cisco_ASA_NGFW__Mezhsetevye_ehkrany_novogo_pokolenija_.jpg","logo":true,"scheme":false,"title":"Cisco ASA NGFW (Межсетевые экраны нового поколения)","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":273,"alias":"cisco-asa-ngfw-mezhsetevye-ehkrany-novogo-pokolenija","companyTitle":"Cisco","companyTypes":["supplier","vendor"],"companyId":170,"companyAlias":"cisco","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Всесторонний мониторинг и контроль</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Мобильный доступ и облачные технологии способствуют повышению производительности, но сопряжены с дополнительными рисками. Для защиты ресурсов необходимы мониторинг пользователей, приложений, устройств и угроз в сети, а также контроль за их действиями. Межсетевые экраны Cisco ASA серии 5500-X обеспечивают необходимую прозрачность сети, превосходную защиту от угроз и вредоносного ПО повышенной сложности и высокий уровень автоматизации, позволяющие сократить расходы и упростить инфраструктуру.</span> <span style=\"font-weight: bold;\">Возможности и характеристики</span> Надежная многоуровневая защита от угроз Межсетевые экраны нового поколения Cisco ASA серии 5500-X помогают заказчикам найти баланс между эффективностью обеспечения безопасности и производительностью. Это решение, представляющее собой сочетание самого популярного в отрасли межсетевого экрана с контролем состояния соединений и полного ассортимента сервисов сетевой безопасности нового поколения, включает:\r\n<ul> <li>детализированный мониторинг и контроль;</li> <li>надежную защиту от интернет-угроз в облаке или с локальным размещением;</li> <li>лучшую в отрасли систему предотвращения вторжений (IPS) для защиты от известных угроз;</li> <li>комплексную защиту от угроз и усовершенствованного вредоносного ПО;</li> <li>самый популярный в мире межсетевой экран ASA с обеспечивающим высокий уровень безопасности решением Cisco AnyConnect для удаленного доступа.</li> </ul>\r\nCisco предлагает первый в отрасли ориентированный на предотвращение угроз межсетевой экран нового поколения, — Cisco ASA с сервисами FirePOWER, доступный на многофункциональных устройствах обеспечения безопасности Cisco ASA серии 5500-X и ASA серии 5585-X. Благодаря этому решению заказчик получает в одном устройстве проверенную временем защиту межсетевым экраном Cisco ASA в сочетании с лучшей в отрасли защитой от угроз и вредоносного ПО — Sourcefire. Защитите ваш бизнес с помощью решения для полномасштабного контроля и высокоэффективного противостояния угрозам на всем протяжении атаки. Это решение обеспечивает всесторонний мониторинг и контроль, сокращение расходов и упрощение инфраструктуры, а также защиту от вредоносного ПО и новых угроз в режиме реального времени. <span style=\"font-weight: bold;\">Широкий выбор типоразмеров и возможностей</span> Благодаря технологии MultiScale и разнообразию типоразмеров вы сможете защитить сеть любого размера. Межсетевые экраны Cisco ASA серии 5500-X нового поколения поставляются в виде:\r\n<ul> <li>отдельных устройств, предназначенных специально для предприятий малого и среднего бизнеса;</li> <li>устройств повышенной прочности, созданных для работы в расширенном температурном диапазоне на промышленных предприятиях или объектах особой важности;</li> <li>устройств среднего размера для предприятий, которые хотят повысить безопасность подключения к сети Интернет;</li> <li>высокопроизводительных устройств с высокой пропускной способностью для требовательных к ресурсам корпоративных центров обработки данных;</li> <li>высокопроизводительных блейд-серверов, интегрируемых с коммутаторами Cisco Catalyst серии 6500;</li> <li>виртуальных приложений для защиты частных и общедоступных облаков корпоративного класса.</li> </ul>\r\n<span style=\"font-weight: bold;\">Проверенная временем платформа корпоративного класса</span> Все межсетевые экраны Cisco ASA серии 5500-X нового поколения работают под управлением программного обеспечения Cisco Adaptive Security Appliance (ASA) и поддерживают функции контроля состояния соединений корпоративного класса, а также возможности межсетевых экранов нового поколения. Конфигурация программного обеспечения ASA допускает такие функциональные возможности, как:\r\n<ul> <li>интеграция с базовыми технологиями защиты сетей;</li> <li>расширенный учет идентификаторов пользователей с применением групповых меток безопасности Cisco TrustSec и межсетевого экрана, использующего идентификационную информацию;</li> <li>пропускная способность до 640 Гбит/с благодаря кластеризации до 16 устройств ASA 5585-X;</li> <li>высокая эксплуатационная готовность для приложений с повышенными требованиями к отказоустойчивости;</li> <li>надежные средства безопасности нового поколения с применением Cisco ASA с сервисами FirePOWER.</li> </ul>","shortDescription":" Аппаратные и программные варианты Cisco ASA NGFW сочетают в себе проверенный межсетевой экран с самой эффективной в отрасли системой предотвращения вторжений нового поколения","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco ASA NGFW (Межсетевые экраны нового поколения)","keywords":"Cisco, поколения, угроз, нового, серии, устройств, безопасности, экраны","description":"Всесторонний мониторинг и контроль\rМобильный доступ и облачные технологии способствуют повышению производительности, но сопряжены с дополнительными рисками.","og:title":"Cisco ASA NGFW (Межсетевые экраны нового поколения)","og:description":"Всесторонний мониторинг и контроль\rМобильный доступ и облачные технологии способствуют повышению производительности, но сопряжены с дополнительными рисками.","og:image":"https://old.b4r.io/fileadmin/user_upload/Cisco_ASA_NGFW__Mezhsetevye_ehkrany_novogo_pokolenija_.jpg"},"eventUrl":"","translationId":2674,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2240,"logoURL":"https://old.b4r.io/fileadmin/content/four-leaf-clover-152047_960_720_01.png","logo":true,"scheme":false,"title":"Kasperskiy","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":172,"alias":"kasperskiy","companyTitle":"Kaspersky Lab","companyTypes":["vendor"],"companyId":173,"companyAlias":"kaspersky-lab","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Kasperskiy","keywords":"","description":"","og:title":"Kasperskiy","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/four-leaf-clover-152047_960_720_01.png"},"eventUrl":"https://calendly.com/solomiia-rymar/test-event","translationId":2981,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":3,"title":"CRM"},{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":4,"title":"Data center","alias":"data-center","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/COD_-_Centr_obrabotki_dannykh.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1443,"logoURL":"https://old.b4r.io/fileadmin/user_upload/juniper_networks.png","logo":true,"scheme":false,"title":"Juniper Next-Generation Firewall (NGFW)","vendorVerified":0,"rating":"2.20","implementationsCount":3,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-next-generation-firewall-ngfw","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your organization’s defenses. <span style=\"font-weight: bold;\">Identifying Application Risks</span> Juniper AppSecure, an NFGW Services component, is a suite of services that provides deep application visibility and control in your network:\r\n<ul>\r\n<li>AppTrack identifies applications on the network to assess their security risk and address user behavior. Contextual information helps you gain insight into which applications are permitted and the risk they may pose.</li>\r\n<li>AppFW provides policy-based enforcement and control, blocking access to high-risk applications and enforcing user-defined policies. Reports on application bandwidth usage deliver further insight, and you can throttle any application traffic not sanctioned by the enterprise.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Protection from Network Borne Attacks</span> Juniper Intrusion Prevention System (IPS) and Sky Advanced Threat Prevention (ATP) work together to provide comprehensive threat detection and protection against known and unknown threats that use the network as an attack vector. The capabilities provide immediate protection from malicious malware. Continual monitoring for new exploits and vulnerabilities keeps protection up to date. The system immediately blocks threats on client and server systems inline before damage can take place. <span style=\"font-weight: bold;\">Safeguards Against Malware</span> Although modern cyber criminals favor today’s sophisticated, turnkey techniques, they have not abandoned the tried and true approach of tucking malware into signature-based viruses and volume-based email. Integrated with our SRX platforms, Sophos Live Protection combines cloud-based reputation intelligence with on-box horsepower to deliver lightweight and fast security. <span style=\"font-weight: bold;\">Web Browsing Defense</span> The Web is full of deception designed to get unsuspecting users to click on malicious links that might install advanced malware. Attackers regularly compromise websites by tricking users into providing their user credentials. Juniper has partnered with Forcepoint to provide URL filtering that fights such attacks. The service is constantly and globally updated in real time to provide an always-current worldwide database of malicious URLs that protect against user compromise. <span style=\"font-weight: bold;\">Avoiding Unauthorized Access and Use</span> Every user in an enterprise must be able to access certain applications to perform specific tasks. But allowing users unlimited access to corporate resources outside their sphere of responsibility can enable the proliferation of insider threats. Our User Firewall service restricts application usage on a per-user basis by tightly integrating with Microsoft Active Directory (AD) and the Lightweight Directory Access Protocol (LDAP). As a result, you gain visibility and control of application and network use segmented by user-defined roles, enabling secure access to authorized applications. <span style=\"font-weight: bold;\">Features</span> <span style=\"font-weight: bold;\">Advanced Application Visibility and Control</span> You can identify applications running on your network regardless of port, protocol, and encryption. This visibility lets you immediately block evasive applications inline at the SRX firewall. <span style=\"font-weight: bold;\">Nested Application Support</span> You can accurately identify applications embedded in common network protocols such as HTTP or HTTPS traffic. This capability also provides visibility into and granular control over applications hidden inside encrypted SSL traffic. <span style=\"font-weight: bold;\">User and Role-Based Policies</span> Tight integration with Microsoft AD and LDAP allow you to set and enforce user- and role-based security policies. Policy setting becomes simpler and more secure, because you reduce the number of policies needed to account for user location, IP address, and so on. <span style=\"font-weight: bold;\">SSL Inspection</span> Inline decryption and inspection of inbound and outbound Secure Sockets Layer (SSL) connections at the SRX firewall provide visibility and protection against threats embedded in SSL encrypted traffic. <span style=\"font-weight: bold;\">Junos OS Integration</span> Integration with Juniper’s operating system consolidates and optimizes services on SRX devices for maximum scale.","shortDescription":"Juniper Next-Generation Firewall (NGFW) Services provide an array of cyber defenses to reduce your attack surface in this challenging environment.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Next-Generation Firewall (NGFW)","keywords":"applications, with, network, that, visibility, application, user, provide","description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your","og:title":"Juniper Next-Generation Firewall (NGFW)","og:description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your","og:image":"https://old.b4r.io/fileadmin/user_upload/juniper_networks.png"},"eventUrl":"","translationId":1444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1440,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cisco_ASA_NGFW__Mezhsetevye_ehkrany_novogo_pokolenija_.jpg","logo":true,"scheme":false,"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","vendorVerified":0,"rating":"2.90","implementationsCount":4,"suppliersCount":0,"supplierPartnersCount":273,"alias":"cisco-asa-ngfw-adaptive-security-appliance-software","companyTitle":"Cisco","companyTypes":["supplier","vendor"],"companyId":170,"companyAlias":"cisco","description":"<span style=\"font-weight: bold;\">Features and Capabilities</span> Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs. <span style=\"font-weight: bold;\">Among its benefits, Cisco ASA Software:</span>\r\n<ul> <li>Offers integrated IPS, VPN, and Unified Communications capabilities</li> <li>Helps organizations increase capacity and improve performance through high-performance, multi-site, multi-node clustering</li> <li>Delivers high availability for high resiliency applications</li> <li>Provides collaboration between physical and virtual devices</li> <li>Meets the unique needs of both the network and the data center</li> <li>Provides context awareness with Cisco TrustSec security group tags and identity-based firewall technology</li> <li>Facilitates dynamic routing and site-to-site VPN on a per-context basis</li> </ul>\r\nCisco ASA software also supports next-generation encryption standards, including the Suite B set of cryptographic algorithms. It also integrates with the Cisco Cloud Web Security solution to provide world-class, web-based threat protection.","shortDescription":"The Cisco ASA Family of security devices protects corporate networks and data centers of all sizes. It provides users with highly secure access to data and network resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","keywords":"Cisco, Software, with, also, Security, security, appliances, network","description":"Features and Capabilities Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class","og:title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","og:description":"Features and Capabilities Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class","og:image":"https://old.b4r.io/fileadmin/user_upload/Cisco_ASA_NGFW__Mezhsetevye_ehkrany_novogo_pokolenija_.jpg"},"eventUrl":"","translationId":1440,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":119,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Kaspersky_Security_dlja_biznesa.png","logo":true,"scheme":false,"title":"Kaspersky Security для бизнеса","vendorVerified":0,"rating":"3.00","implementationsCount":7,"suppliersCount":0,"supplierPartnersCount":172,"alias":"kaspersky-security-dlja-biznesa","companyTitle":"Kaspersky Lab","companyTypes":["vendor"],"companyId":173,"companyAlias":"kaspersky-lab","description":"\r\n<p> </p>\r\n<p>Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор возможностей, которые позволят вам видеть, контролировать и защищать вашу IT-инфраструктуру.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Продуктовая линейка включает в себя несколько уровней с возрастающим функционалом. Уровни – Kaspersky Endpoint Security для бизнеса СТАРТОВЫЙ, СТАНДАРТНЫЙ, РАСШИРЕННЫЙ и Kaspersky Total Security для бизнеса – построены по модульному принципу и позволяют расширять возможности решения в соответствии с растущими потребностями бизнеса: от базовой защиты рабочих мест от вредоносного ПО до безопасности каждого узла сети. Кроме того, многие из представленных решений могут быть приобретены отдельно. Таким образом, компании, желающие установить дополнительную защиту лишь на определенные узлы сети, могут сделать это без лишних затрат.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Линейка Kaspersky Security для бизнеса позволяет выбрать именно то решение, которое нужно вашей организации, чтобы вы могли контролировать рабочие места (от рабочих станций до смартфонов и виртуальных машин), серверы и интернет-шлюзы и обеспечить их надежной защитой. Наши продукты также позволяют управлять безопасностью всей вашей IT-инфраструктуры удаленно.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая консоль управления: администратор может наблюдать за состоянием защиты всех физических, виртуальных и мобильных устройств, а также управлять их безопасностью с помощью единой консоли администрирования.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая платформа: все используемые в продуктах «Лаборатории Касперского» ключевые технологии, функциональные компоненты и модули разрабатываются внутри компании на собственной технологической базе.Благодаря этому растет эффективность, снижается нагрузка на систему и повышается стабильность работы приложений.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая лицензия: вы не получаете несколько отдельных решений в рамках одной покупки — вы приобретаете единое комплексное решение, которое вы можете гибко настраивать в соответствии со своими бизнес-целями.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — СТАРТОВЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Это идеальный вариант для заказчиков, которым необходима только защита от вредоносного ПО. Единая консоль управления Kaspersky Security Center с интуитивно понятным интерфейсом дополняет все наши решения для рабочих станций.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — СТАНДАРТНЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Список средств защиты в решении уровня СТАНДАРТНЫЙ включает средства обеспечения безопасности рабочих станций и файловых серверов, динамические белые списки, а также средства контроля программ, устройств и веб-ресурсов. В него также входят инструменты для защиты мобильных устройств и управления ими. Если потребности вашего бизнеса включают защиту мобильных сотрудников и применение политик IT-безопасности, то вам подойдет решение уровня СТАНДАРТНЫЙ.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — РАСШИРЕННЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>На уровне РАСШИРЕННЫЙ «Лаборатория Касперского» добавила ко всем вышеперечисленным функциям шифрование данных. Еще одна новая разработка «Лаборатории Касперского» средство системного администрирования — обеспечивает безопасность и одновременно повышает производительность IT-инфраструктуры. <span style=\"font-weight: bold;\">Такой широкий набор функций и полезных инструментов позволяет:</span></p>\r\n<p> </p>\r\n\r\n\r\n<ul>\r\n<li>создавать и хранить образы систем и осуществлять их удаленное развертывание;</li>\r\n<li>устанавливать приоритет устранения уязвимостей в аппаратном и программном обеспечении благодаря эффективному сочетанию мониторинга уязвимостей и интеллектуального управления установкой исправлений;</li>\r\n<li>контролировать использование лицензий на программное обеспечение с помощью модуля управления лицензиями;</li>\r\n<li>задавать политики доступа к данным и IT-инфраструктуре для пользователей и гостей с помощью средства контроля доступа в сеть (NAC);</li>\r\n<li>удаленно развертывать и устанавливать программы и обновления на компьютеры пользователей с помощью единой централизованной консоли администрирования.</li>\r\n</ul>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Total Security для бизнеса</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Наш флагманский продукт — Kaspersky Total Security для бизнеса — включает в себя возможности всех предыдущих уровней и дополнительно укрепляет безопасность вашей IT-инфраструктуры с помощью средств для защиты почтовых серверов, интернет-шлюзов и серверов совместной работы. Это идеальное решение для организаций с высокими требованиями к IT-безопасности, которым нужна надежная защита каждого узла сети.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p> </p>\r\n<p> </p>\r\n","shortDescription":"Kaspersky Security для бизнеса – для обеспечения безопасности корпоративной информационной сети, позволят вам видеть, контролировать и защищать вашу IT-инфраструктуру.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Kaspersky Security для бизнеса","keywords":"бизнеса, Kaspersky, Security, управления, помощью, защиты, Единая, Endpoint","description":"Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор","og:title":"Kaspersky Security для бизнеса","og:description":"Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор","og:image":"https://old.b4r.io/fileadmin/user_upload/Kaspersky_Security_dlja_biznesa.png"},"eventUrl":"","translationId":2334,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":3,"title":"CRM"},{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":952,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint NGFW","vendorVerified":1,"rating":"3.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-ngfw","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":" \r\nAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network expenses as much as 50%, slash downtime and reduce IT risk\r\n<span style=\"font-weight: bold;\">The Forcepoint Advantage</span>\r\nBoost business productivity and cut the cost of providing safe, reliable access to applications and data, with secure SD-WAN built right in.\r\n<span style=\"font-weight: bold;\">High Availability</span>\r\nSlash network downtime and keep your business running with uniquely efficient resilience integrated at all levels: firewalls, network and management.\r\n<span style=\"font-weight: bold;\">Unrivaled Security</span>\r\nProtect data and apps throughout your data centers, edge, SD-WANs and cloud – with VPNs, IPS, anti-evasion, encrypted inspection, anti-malware, proxies and more.\r\n<span style=\"font-weight: bold;\">Massive Scalability</span>\r\nSmoothly scale your security as your physical and virtual networks grow, without rip-and-replace upgrades or patchworks of tools.\r\n<span style=\"font-weight: bold;\">Centralized Manageability</span>\r\nDeploy firewalls, VPNs, IPS, SD-WAN fast, across many different environments – and keep them running smoothly.\r\n<span style=\"font-weight: bold;\">360° Visibility</span>\r\nGain immediate insights into what is happening across your network to accelerate incident response and streamline audit best practices.\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n<span style=\"text-decoration-line: underline;\">Forcepoint NGFW Appliances</span> All Forcepoint NGFWs are built on a common software core to provide unified operation and high performance across all forms of appliances – physical, virtual, cloud. Physical – desktop, ruggedized and rack-mounted models; customizable network interfaces; firewall throughput from 1.5-120 Gbps Virtual – available for KVM and VMware ESXi Cloud – available for Amazon Web Services (AWS), Microsoft Azure (coming soon). Find out about the certifications that the Forcepoint NGFW appliances meet.\r\n<span style=\"text-decoration-line: underline;\">NSS Labs Recommended</span> In NSS Labs’ most recent report on Next Generation Firewall (NGFW) overall security effectiveness, Forcepoint NGFW achieved the highest rating of all 11 products tested. NSS Labs latest tests prove that Forcepoint NGFW offers the leading combination of enterprise security and low cost.","shortDescription":"With Forcepoint NGFW, you can deploy and manage thousands of firewalls, IPSs, VPNs and SD-WANs – in minutes, all from a single console.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":15,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint NGFW","keywords":"Forcepoint, NGFW, your, network, security, that, data, with","description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network","og:title":"Forcepoint NGFW","og:description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":953,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":["Internet access is available for employees"],"complementaryCategories":[],"solutions":["Unaurthorized access to corporate IT systems and data","No control over data access","Risk or Leaks of confidential information","Malware infection via Internet, email, storage devices","Non-compliant with IT security requirements"],"materials":[],"useCases":[],"best_practices":[],"values":["Ensure Security and Business Continuity"],"implementations":[{"id":432,"title":"Barracuda NGFW For Dutch Insurance Provider","url":"https://old.b4r.io/vnedrenija/vnedrenie/barracuda-ngfw-for-dutch-insurance-provider/"},{"id":433,"title":"Barracuda NGFW on AWS for software provider","url":"https://old.b4r.io/vnedrenija/vnedrenie/barracuda-ngfw-on-aws-for-software-provider/"}],"presenterCodeLng":"","productImplementations":[{"id":432,"title":"Barracuda NGFW For Dutch Insurance Provider","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Aevitae is a leading Dutch insurance provider company that protects hundreds of thousands of individuals through corporate and direct insurance plans. With a relatively small staff, they provide best-inclass insurance to a quarter-million customers across the Netherlands and processed over six million digital claims in 2016. On top of being the Netherlands’ leading insurance provider, they are also a technology pioneer, which they leverage as a key competitive advantage.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Profile</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Leading Dutch insurance provider company</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Provides corporate and direct insurance plans</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">200 employees</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250,000 customers</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">800,000 paper claims, and over six million digital claims processed per year.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Challenges</span>\r\n<ul><li>Aging on-premises infrastructure</li><li>Seamless data security and visibility in a hybrid environment</li><li>Heightened security due to sensitive market (Insurance)</li></ul>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Solution</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Barracuda NextGen Firewall F-Series and Web Application Firewall deployed on Microsoft Azure cloud platform and on-premises</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Results</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">End-to-end visibility and security across a hybrid environment</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Ease of use and management</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Scalable and flexible platform that suits their dynamic business</span>","alias":"barracuda-ngfw-for-dutch-insurance-provider","roi":0,"seo":{"title":"Barracuda NGFW For Dutch Insurance Provider","keywords":"insurance, Dutch, claims, they, security, provider, Barracuda, platform","description":"Aevitae is a leading Dutch insurance provider company that protects hundreds of thousands of individuals through corporate and direct insurance plans. With a","og:title":"Barracuda NGFW For Dutch Insurance Provider","og:description":"Aevitae is a leading Dutch insurance provider company that protects hundreds of thousands of individuals through corporate and direct insurance plans. With a"},"deal_info":"","user":{"id":4192,"title":"Aevitae B.V.","logoURL":"https://old.b4r.io/uploads/roi/company/Aevitae_B.V..png","alias":"aevitae-bv","address":"","roles":[],"description":"Aevitae B.V. provides health insurance and employee benefits solutions. The Company offers outdoors, liability, residential home, accident, legal aid, and car insurance. Aevitae operates in the Netherlands. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www3.aevitae.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Aevitae B.V.","keywords":"Aevitae, insurance, residential, operates, legal, accident, home, offers","description":"Aevitae B.V. provides health insurance and employee benefits solutions. The Company offers outdoors, liability, residential home, accident, legal aid, and car","og:title":"Aevitae B.V.","og:description":"Aevitae B.V. provides health insurance and employee benefits solutions. The Company offers outdoors, liability, residential home, accident, legal aid, and car","og:image":"https://old.b4r.io/uploads/roi/company/Aevitae_B.V..png"},"eventUrl":""},"supplier":{"id":183,"title":"Barracuda Networks","logoURL":"https://old.b4r.io/uploads/roi/company/barracuda_logo.png","alias":"barracuda-networks","address":"","roles":[],"description":"<span style=\"background-color: rgb(255, 255, 255); \">Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's security products include products for protection against email, web surfing, web hackers and instant messaging threats such as spam, spyware, trojans, and viruses. The company's networking and storage products include web filtering, load balancing, application delivery controllers, message archiving, NG firewalls, backup services and data protection.</span> ","companyTypes":[],"products":{},"vendoredProductsCount":11,"suppliedProductsCount":11,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":2,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":1,"categories":{},"companyUrl":"www.barracuda.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Barracuda Networks","keywords":"products, company, Barracuda, include, protection, services, storage, security","description":"Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's","og:title":"Barracuda Networks","og:description":"Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's","og:image":"https://old.b4r.io/uploads/roi/company/barracuda_logo.png"},"eventUrl":""},"vendors":[{"id":183,"title":"Barracuda Networks","logoURL":"https://old.b4r.io/uploads/roi/company/barracuda_logo.png","alias":"barracuda-networks","address":"","roles":[],"description":"<span style=\"background-color: rgb(255, 255, 255); \">Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's security products include products for protection against email, web surfing, web hackers and instant messaging threats such as spam, spyware, trojans, and viruses. The company's networking and storage products include web filtering, load balancing, application delivery controllers, message archiving, NG firewalls, backup services and data protection.</span> ","companyTypes":[],"products":{},"vendoredProductsCount":11,"suppliedProductsCount":11,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":2,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":1,"categories":{},"companyUrl":"www.barracuda.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Barracuda Networks","keywords":"products, company, Barracuda, include, protection, services, storage, security","description":"Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's","og:title":"Barracuda Networks","og:description":"Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's","og:image":"https://old.b4r.io/uploads/roi/company/barracuda_logo.png"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.barracuda.com/resources/Barracuda_NextGen_Firewall_F_Azure_CS_Aevitae_US#top","title":"-"}},"comments":[],"referencesCount":0},{"id":433,"title":"Barracuda NGFW on AWS for software provider","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation drives new business growth, safely migrates its health club management application to AWS, protects customer data, and provisions firewalls in 15 minutes instead of several hours by using Barracuda NextGen Firewalls on the AWS Cloud. The organization provides cloud-based enterprise resource planning (ERP) software for health and athletic clubs throughout the United States. Club Automation migrated its applications to AWS and uses Barracuda firewalls provisioned through the AWS Marketplace.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">About Club Automation</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation a leading cloudbased software provider with a mission of contributing to a healthier and more active world by empowering more-efficient health and fitness club management. Based in Chicago, the company offers a software-as-a-service (SaaS) solution that enables health and fitness clubs to run their facilities effortlessly.</span>\r\n\r\n<span style=\"font-weight: bold; \">The Challenge </span>\r\nNot long ago, Club Automation was a small upstart company in the health club software industry with a big goal: to revolutionize the entire industry with a SaaS enterprise resource planning (ERP) solution that manages all parts of a health club’s business. The company is now experiencing explosive business growth. <span style=\"font-weight: bold; font-style: italic; \">“We came into the club ERP space as an underdog, but we’ve grown extremely fast,” says Max Longin, a founding partner at the company. “About 70 percent of our total revenue as a company has come in the past year.” Even so, Longin considers this a period of “controlled growth.” “We have not really been marketing ourselves—our new customers have been coming to us through word of mouth. Our concern has been that if our systems are not ready to scale to support more growth, we could compromise performance and our customers’ experience.”</span>\r\nTo address that concern, Club Automation sought to move its SaaS application to a new cloud technology provider.<span style=\"font-weight: bold; font-style: italic; \"> “We needed more agility and scalability than we had with our previous hybrid-cloud solution, which included a secure but legacy private-cloud environment,” Longin confirms. “We had to scale ahead of required capacity, which was costly and required a lot of planning. We wanted to be more agile, so we could quickly roll out new apps and features for our customers.”</span>\r\nAs Club Automation considered new cloud technologies, it also needed to ensure strong security for its application workloads. <span style=\"font-weight: bold; font-style: italic; \">“We operate in a cardholder environment, and our solution needs to be PCI compliant and highly secure,” Longin says. “We can’t allow access to our backend systems by anyone other than our developers. We had to eliminate attack surface areas within a cloud environment, and we needed the security to enable our business to move our workloads to the cloud safely.”</span>\r\n<span style=\"font-weight: bold; \">Why Amazon Web Services </span>\r\nClub Automation decided to move its SaaS application to the Amazon Web Services (AWS) cloud, in part because AWS addressed the company’s security and performance challenges. “Previously, we were not set up to support geographic growth, because we only had a few dispersed data centers and we had challenges deploying security quickly and getting solid performance in all areas of the United States,” Longin says. “We looked at Microsoft Azure, but it wasn’t the right solution for our needs,” says Longin. “AWS fit like a glove, and it offers the best services for our business.” Club Automation runs its web servers on Amazon Elastic Compute Cloud (Amazon EC2) instances and runs background jobs on AWS Elastic Beanstalk, a service for deploying and scaling web applications. The company is also using Amazon Aurora, a hosted relational database service, to store and manage customer membership and financial data.\r\nTo safely migrate its SaaS application workloads to AWS, Club Automation chose to work with Barracuda Networks, an AWS Partner Network (APN) Advanced Technology Partner with an AWS Security Competency certification. Barracuda provides firewalls engineered for AWS to help customers deploy a comprehensive security architecture and increase protection against cyberattacks and advanced threats. “I had a previous business relationship with Barracuda and was impressed with the stability of the solutions,” Longin says. Club Automation deployed Barracuda NextGen Firewalls to help secure the company’s AWS environment. The firewalls are installed on an Amazon EC2 instance in the Club Automation Amazon Virtual Private Cloud (Amazon VPC). Each firewall sits in a public subnet, protecting against unauthorized access to the private subnets where the cardholder data environment is located.\r\nClub Automation was able to easily purchase and deploy the Barracuda firewalls through the AWS Marketplace, an online store where customers can find software and services from AWS partners so they can build solutions and run their businesses.\r\n\r\n<span style=\"font-weight: bold;\">The Benefits</span>\r\n By moving its SaaS application to the AWS Cloud, Club Automation has been able to keep up with its rapid rate of growth. “AWS makes it very easy for us to scale and innovate,” says Longin. “We needed the right platform to enable growth, and we have that. Instead of having to carefully control growth because of platform limitations, we can scale on demand to support an increasing number of clubs with our application. We no longer have any restrictions on how large or fast we grow.” The company now has the agility to respond quickly to customer needs and can deploy its solutions 30–40 percent faster. Longin says, “We have to innovate by giving clubs the features they’re looking for. For example, we’re currently rolling out a new mobile app, branded by each club, and we could not have done that without using AWS and Barracuda.”\r\nClub Automation is taking advantage of Barracuda firewalls to help secure its growing number of AWS services. “We are using the Barracuda NextGen Firewalls, provisioned through the AWS Marketplace, to effectively guard our application against web-based attacks and application layer attacks,” says Longin. “The Barracuda solution plugs in seamlessly to our AWS environment, and it is doing its job of minimizing the attack surface area and helping our customers keep club member cardholder data protected.”\r\nClub Automation has also decreased the amount of time the configuration process took with its previous firewall solution. Barracuda offerings on the AWS Marketplace support AWS CloudFormation templates, which allow developers and administrators to deploy applications within a stack of AWS-related resources. <span style=\"font-weight: bold; font-style: italic;\">“The Barracuda firewall is a self-service, cloud-based solution that takes less than 15 minutes to get up and running, as opposed to the hours and sometimes days the previous solution took,” Longin says. “Provisioning new users is much simpler and faster. Instead of opening a support ticket and waiting for it to be addressed, we can just go into AWS and provision new users ourselves. This is a key benefit for us as we keep growing.”</span>\r\nRelying on Barracuda, Club Automation enabled its IT team to securely move its SaaS workloads to AWS. <span style=\"font-weight: bold; font-style: italic;\">“We had considered using a cloud solution a few years ago, but cloud offerings were not what they are today, and security solutions like Barracuda’s were not available,” says Longin. “Our move to AWS would not have been possible without Barracuda firewalls,” remarks Longin. “Using Barracuda helped us safely transition more of our workloads to AWS, and we expect our full production environment to be all-in on AWS by the end of the year.”</span>\r\nIn addition, Club Automation benefited from the ease of deployment from the AWS Marketplace.<span style=\"font-weight: bold; font-style: italic;\"> “It couldn’t have been more simple,” says Longin. “All we had to do was find the solution and then quickly configure and deploy it through the AWS Marketplace. In the software industry, it’s rare when something works as expected, but the AWS Marketplace did just that.” In the near future, Club Automation expects to use the marketplace for the upcoming Barracuda metered billing service. “With metered billing, we will be able to consume Barracuda services in the same way we consume AWS services, which will be very cost-effective for us,” </span>Longin says.\r\nPreviously, Club Automation had been holding back on expansion and had only grown through word of mouth, because it was concerned that its IT staff could not support rapid expansion. Now, using AWS, the company is poised for major growth.<span style=\"font-weight: bold; font-style: italic;\"> “We are ready and able to grow,” says Longin. “We have started hiring inside sales representatives and creating marketing plans, because we have a platform that enables scalability and expansion while also allowing us to maintain our high standards of customer service. To keep growing fast, we need agility and innovation. That’s what fueled our transition to AWS and Barracuda, and it will continue fueling our growth in this industry.”</span>","alias":"barracuda-ngfw-on-aws-for-software-provider","roi":0,"seo":{"title":"Barracuda NGFW on AWS for software provider","keywords":"Barracuda, Automation, Club, Longin, says, solution, with, that","description":"Club Automation drives new business growth, safely migrates its health club management application to AWS, protects customer data, and provisions firewalls in","og:title":"Barracuda NGFW on AWS for software provider","og:description":"Club Automation drives new business growth, safely migrates its health club management application to AWS, protects customer data, and provisions firewalls in"},"deal_info":"","user":{"id":4196,"title":"Club Automation","logoURL":"https://old.b4r.io/uploads/roi/company/Club_Automation.png","alias":"club-automation","address":"","roles":[],"description":"Club Automation is the leading cloud-based club management software provider for the health and athletic club industry.\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation's mission is to contribute to a healthier and more active world by empowering health and fitness clubs to run their facilities effortlessly.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"> </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">We started with our own club - now it's your turn</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation started after club owner Jeff VanDixhorn wanted something to manage all parts of his business - from front desk to back end. He partnered with developer Max Longin and together they built a web-based solution that totally transformed the way his clubs operated. They soon realized that their solution can do much more than just help his own facilities - it can revolutionize the entire industry!</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Today, Club Automation is a leading cloud-based software provider that helps the health and athletic industry to manage their clubs more efficiently. </span>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.clubautomation.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Club Automation","keywords":"Club, Automation, club, that, their, more, clubs, industry","description":"Club Automation is the leading cloud-based club management software provider for the health and athletic club industry.\rClub Automation's mission is to","og:title":"Club Automation","og:description":"Club Automation is the leading cloud-based club management software provider for the health and athletic club industry.\rClub Automation's mission is to","og:image":"https://old.b4r.io/uploads/roi/company/Club_Automation.png"},"eventUrl":""},"supplier":{"id":183,"title":"Barracuda Networks","logoURL":"https://old.b4r.io/uploads/roi/company/barracuda_logo.png","alias":"barracuda-networks","address":"","roles":[],"description":"<span style=\"background-color: rgb(255, 255, 255); \">Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's security products include products for protection against email, web surfing, web hackers and instant messaging threats such as spam, spyware, trojans, and viruses. The company's networking and storage products include web filtering, load balancing, application delivery controllers, message archiving, NG firewalls, backup services and data protection.</span> ","companyTypes":[],"products":{},"vendoredProductsCount":11,"suppliedProductsCount":11,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":2,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":1,"categories":{},"companyUrl":"www.barracuda.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Barracuda Networks","keywords":"products, company, Barracuda, include, protection, services, storage, security","description":"Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's","og:title":"Barracuda Networks","og:description":"Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's","og:image":"https://old.b4r.io/uploads/roi/company/barracuda_logo.png"},"eventUrl":""},"vendors":[{"id":183,"title":"Barracuda Networks","logoURL":"https://old.b4r.io/uploads/roi/company/barracuda_logo.png","alias":"barracuda-networks","address":"","roles":[],"description":"<span style=\"background-color: rgb(255, 255, 255); \">Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's security products include products for protection against email, web surfing, web hackers and instant messaging threats such as spam, spyware, trojans, and viruses. The company's networking and storage products include web filtering, load balancing, application delivery controllers, message archiving, NG firewalls, backup services and data protection.</span> ","companyTypes":[],"products":{},"vendoredProductsCount":11,"suppliedProductsCount":11,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":2,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":1,"categories":{},"companyUrl":"www.barracuda.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Barracuda Networks","keywords":"products, company, Barracuda, include, protection, services, storage, security","description":"Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's","og:title":"Barracuda Networks","og:description":"Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's","og:image":"https://old.b4r.io/uploads/roi/company/barracuda_logo.png"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.barracuda.com/resources/Barracuda_Next_Gen_Firewall_AWS_CS_Club_Automation_US#top","title":"-"}},"comments":[],"referencesCount":0}]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"13":{"id":13,"title":"NG Firewall"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}