{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"en":"Offer a reference bonus","ru":"Предложить бонус за референс","_type":"localeString"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Сonfigurator"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"show-more-button":{"en":"Show more","ru":"Показать еще","_type":"localeString"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"_type":"localeString","en":"deployment","ru":"внедрение"},"manufacturer-popover":{"ru":"производитель","_type":"localeString","en":"manufacturer"},"short-description":{"_type":"localeString","en":"Pitch","ru":"Краткое описание"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"en":"Details","ru":"Детальнее","_type":"localeString"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"product-features":{"ru":"Особенности продукта","_type":"localeString","en":"Product features"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"solutions":{"ru":"Проблемы которые решает","_type":"localeString","en":" Problems that solves"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"en":"Comparison matrix","ru":"Матрица сравнения","_type":"localeString"},"testing":{"_type":"localeString","en":"Testing","ru":"Тестирование"},"compare":{"_type":"localeString","en":"Compare with competitors","ru":"Сравнить с конкурентами"},"characteristics":{"_type":"localeString","en":" Characteristics","ru":"Характеристики"},"transaction-features":{"ru":"Особенности сделки","_type":"localeString","en":"Transaction Features"},"average-discount":{"en":"Partner average discount","ru":"Средняя скидка партнера","_type":"localeString"},"deal-protection":{"ru":"Защита сделки","_type":"localeString","en":"Deal protection"},"average-deal":{"ru":"Средний размер сделки","_type":"localeString","en":"Average deal size"},"average-time":{"ru":"Средний срок закрытия сделки","_type":"localeString","en":"Average deal closing time"},"login":{"_type":"localeString","en":"Login","ru":"Войти"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"to-know-more":{"ru":"Чтобы узнать больше","_type":"localeString","en":"To know more"},"scheme":{"_type":"localeString","en":" Scheme of work","ru":"Схема работы"},"competitive-products":{"_type":"localeString","en":" Competitive products","ru":"Конкурентные продукты"},"implementations-with-product":{"ru":"Внедрения с этим продуктом","_type":"localeString","en":"Deployments with this product"},"user-features":{"ru":"Особенности пользователей","_type":"localeString","en":"User features"},"job-roles":{"ru":"Роли заинтересованных сотрудников","_type":"localeString","en":" Roles of Interested Employees"},"organizational-features":{"en":"Organizational Features","ru":"Организационные особенности","_type":"localeString"},"calculate-price":{"ru":"Рассчитать цену продукта","_type":"localeString","en":" Calculate product price"},"selling-stories":{"ru":"Продающие истории","_type":"localeString","en":" Selling stories"},"materials":{"en":"Materials","ru":"Материалы","_type":"localeString"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"ru":"или","_type":"localeString","en":"or"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"ru":"Рассчитать ROI продукта","_type":"localeString","en":"Calculate Product ROI"},"complementary-categories":{"ru":"Схожие категории","_type":"localeString","en":"Complementary Categories"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"configurator-content":{"ru":"Рассчитайте стоимость продукта","_type":"localeString","en":"Calculate price for this product here"},"configurator-link":{"en":"here","ru":"тут","_type":"localeString"},"vendor-popover":{"_type":"localeString","en":"vendor","ru":"производитель"},"user-popover":{"en":"user","ru":"пользователь","_type":"localeString"},"select-for-presentation":{"ru":"выбрать продукт для презентации","_type":"localeString","en":"select product for presentation"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You have to register or login."},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"en":"Added to comparison","ru":"Добавлено в сравнения","_type":"localeString"},"roi-calculator-content":{"ru":"Рассчитайте ROI для данного продукта","_type":"localeString","en":"Calculate ROI for this product here"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"videos":{"ru":"Видео","_type":"localeString","en":"Videos"},"vendor-verified":{"ru":"Подтверждено производителем","_type":"localeString","en":"Vendor verified"},"event-schedule":{"en":"Events schedule","ru":"Расписание событий","_type":"localeString"},"scheduling-tip":{"ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event."},"register-to-schedule":{"ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To register for the event please log in or register on the site."},"comparison-matrix":{"ru":"Матрица сравнений","_type":"localeString","en":"Comparison matrix"},"compare-with-competitive":{"_type":"localeString","en":" Compare with competitive","ru":"Сравнить с конкурентными"},"avg-deal-closing-unit":{"_type":"localeString","en":"months","ru":"месяцев"},"under-construction":{"ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString","en":"Current feature is still developing to become even more useful for you."},"product-presentation":{"ru":"Презентация продукта","_type":"localeString","en":"Product presentation"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"logout"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"en":"Calculate ROI and price","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"translatable_meta":[{"translations":{"ru":"Конкретный продукт","_type":"localeString","en":"Example product"},"name":"og:title"},{"name":"og:description","translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"}},{"translations":{"en":"Product","ru":"Продукт","_type":"localeString"},"name":"title"},{"translations":{"en":"Product description","ru":"Описание продукта","_type":"localeString"},"name":"description"},{"name":"keywords","translations":{"en":"Product keywords","ru":"Ключевые слова продукта","_type":"localeString"}}],"title":{"_type":"localeString","en":"ROI4CIO: Product","ru":"ROI4CIO: Продукт"},"meta":[{"name":"og:type","content":"website"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"barracuda-sentinel":{"id":1908,"logoURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda Sentinel","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-sentinel","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise</span> <span style=\"font-weight: bold;\">Stop Targeted Attacks Before They Reach Your Users</span> Business Email Compromise (BEC) has cost businesses $12B since 2013 plus untold additional losses from lost productivity and damage to reputation. Email impersonation attacks have tricked individuals into sending wire transfers and sensitive customer and employee information to attackers who are impersonating their CEO, boss, or trusted colleague. Barracuda Sentinel uses artificial intelligence and deep integration with Office 365 to stop these attacks before they reach your mail server, as well as detecting threats already sitting in your inbox. <span style=\"font-weight: bold; text-decoration-line: underline;\">Benefits of Barracuda Sentinel</span> <span style=\"font-weight: bold;\">Stop Email Impersonation Attacks</span> Traditional email filters sit in front of your mail server, so they don't see threats already in your inbox. Sentinel works from inside O365 and uses artificial intelligence to detect signs of spear phishing and account takeover. <span style=\"font-weight: bold;\">Protect Your Business from Account Takeover</span> Account takeover is a major new threat to business data. Sentinel detects account takeover attempts and blocks email attacks launched from compromised accounts. <span style=\"font-weight: bold;\">Protect Your Reputation and Stop Domain Fraud</span> Don't let hackers impersonate your domain to launch email attacks. Sentinel protects your brand and reputation through simplified DMARC reporting and analysis. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Identify and Secure Your Highest-Risk Individuals</span> Sentinel uses machine learning to automatically identify the people within your organization who are most likely to be targeted. <span style=\"font-weight: bold;\">Part of a Complete Email Protection Platform</span> With the Total Email Protection edition, Sentinel is combined with Barracuda Essentials and PhishLine for a complete email security, archiving, and data protection solution. <span style=\"font-weight: bold;\">Sentinel Detects Threats that Email Security Gateways Can't</span> Sentinel detects threats that traditional email security systems can't. It integrates directly with Microsoft Office 365 APIs to detect attacks coming from both internal and external sources, including threats that may already be in your inbox. It uses artificial intelligence to detect signs of malicious intent and deception within every email with virtually no I.T. administration required. <span style=\"font-weight: bold;\">Protect Your Business Against Account Takeover</span> Corporate Account Takeover presents a significant new threat to business. Hackers gain access to corporate email accounts through stolen credentials and use them to launch subsequent targeted attacks, internally and against external targets. Account takeover or attacks that originate from these accounts are almost impossible to detect since they don’t leverage impersonation techniques—they come from a legitimate account and appear to be from a trusted source. In fact, traditional email security solutions don’t even observe internal traffic and have no way of stopping an attack originating internally. Barracuda Sentinel detects both account takeover attempts and attacks launched from compromised accounts. By analyzing both historical and inbound data Sentinel is able to identify behavioral, content, and link-forwarding anomalies within your organization, and to flag and quarantine fraudulent emails. It is also able to prevent attempts to compromise employee credentials by automatically blocking targeted phishing emails that try to harvest employee passwords. <span style=\"font-weight: bold;\">Features</span> <span style=\"font-weight: bold;\">Stop Targeted Attacks with AI</span>\r\n<ul>\r\n<li>Prevent Spear Phishing</li>\r\n<li>Prevent BEC and CEO Fraud</li>\r\n<li>Detect Employee Impersonation</li>\r\n<li>Stop Zero-Day Phishing</li>\r\n<li>Detect Web Impersonation</li>\r\n<li>Stop Inbound Spoofing</li>\r\n<li>Continuous Learning</li>\r\n<li>Exportable Reports</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Stop Account Takeover with AI</span>\r\n<ul>\r\n<li>Alerting for Account Takeover</li>\r\n<li>Prevent Account Takeover Infiltration</li>\r\n<li>Detect Compromised Emails</li>\r\n<li>Delete Emails Sent Internally</li>\r\n<li>Notify External Recipients</li>\r\n<li>Lock Attackers Out of Accounts</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Domain Fraud Prevention</span>\r\n<ul>\r\n<li>Prevent Third Party Domain Spoofing</li>\r\n<li>Automated DMARC Reporting</li>\r\n<li>DMARC Aggregation and Visualization</li>\r\n<li>DKIM/SPF Configuration and Troubleshooting</li>\r\n<li>Better Email Deliverability</li>\r\n<li>Spoofed Email Reports</li>\r\n<li>Detect Misconfigured Legitimate Senders</li>\r\n<li>Protects Customer Brands</li>\r\n<li>Exportable Reports</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Flexible API-based Deployment</span>\r\n<ul>\r\n<li>Lightweight Architecture</li>\r\n<li>Instant Setup</li>\r\n<li>Works with Any Gateway</li>\r\n<li>Historical Assessment</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Phishing Simulations</span>\r\n<ul>\r\n<li>Test Employee Security Awareness</li>\r\n<li>80 Real-World Templates</li>\r\n<li>Simulate Impersonation and BEC</li>\r\n<li>AI Determines Employee Risk</li>\r\n</ul>\r\n","shortDescription":"Barracuda Sentinel is A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Sentinel","keywords":"Sentinel, from, Account, Email, your, email, attacks, Stop","description":"A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise Stop Targeted Attacks Before They Reach Your Users Business Email","og:title":"Barracuda Sentinel","og:description":"A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise Stop Targeted Attacks Before They Reach Your Users Business Email","og:image":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1911,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[{"id":2088,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Mimecast-Logo.jpg","logo":true,"scheme":false,"title":"Mimecast Email Security","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"mimecast-email-security","companyTitle":"Mimecast","companyTypes":["vendor"],"companyId":4535,"companyAlias":"mimecast","description":"<p>Mimecast secure employee communication and reduces risk with targeted threat protection, data leak prevention and enforced security controls.The Mimecast solution helps organizations to prevent email-ransomware as well as protect systems from the data loss.Protects against social‐engineering attacks that attempt to extract money or data from your unsuspecting users.According to Mimecast’s 2018 State of Email Security Report, 90% of global organizations have seen the volume of phishing attacks increase or stay the same over the past 12 months.</p>\r\n<p><span style=\"font-weight: bold;\">Smart Email Security with Mimecast</span></p>\r\n<p><span style=\"font-weight: bold;\">URL Protection</span></p>\r\n<p>URL Protect service provides multistep detection and blocking of malicious URLs, including pre-click URL discovery, on-click inline employee education and post-click resolution and blocking of dangerous files types.</p>\r\n<p><span style=\"font-weight: bold;\">Impersonation Protection</span></p>\r\n<p>Mimecast helps to defend email impersonation through Real-time scanning of all inbound emails to detect header anomalies, domain similarity, sender spoofing and clearly marked alerts on delivered emails.</p>\r\n<p><span style=\"font-weight: bold;\">Internal Email Protection</span></p>\r\n<p>Internal Email Protect scans attachments and URLs for malware and malicious links, as well as content inspection enabled by Data Leak Prevention and it can automatically delete infected emails and attachments from employees’ inboxes.</p>\r\n<p><span style=\"font-weight: bold;\">Ransomware Protection</span></p>\r\n<p>Unlike vendors of standalone security or backup products, Mimecast tackles ransomware with a layered cyber resilience solution; bringing together protection, continuity, archiving, and recovery capabilities for your email from a single cloud solution.</p>\r\n<p><span style=\"font-weight: bold;\">Email Archiving & Continuity</span></p>\r\n<p>Mimecast ensures continuity when primary email systems are offline. Customizable thresholds let administrators monitor inbound and outbound email. Anytime, anywhere access to archive data improves employee productivity and workflow efficiency.</p>\r\n<p><span style=\"font-weight: bold;\">Attachment Protect</span></p>\r\n<p>Attachment Protect service provides multiple layers of defense against potentially malicious email attachments, balancing speed of delivery with detection efficacy.The ability to convert Office and PDF files to a safe file format for immediate delivery to employees.</p>","shortDescription":"Mimecast secure employee communication and reduces risk with targeted threat protection, data leak prevention and enforced security controls.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Mimecast Email Security","keywords":"Mimecast, Email, email, data, Protection, from, Protect, with","description":"Mimecast secure employee communication and reduces risk with targeted threat protection, data leak prevention and enforced security controls.The Mimecast","og:title":"Mimecast Email Security","og:description":"Mimecast secure employee communication and reduces risk with targeted threat protection, data leak prevention and enforced security controls.The Mimecast","og:image":"https://old.b4r.io/fileadmin/user_upload/Mimecast-Logo.jpg"},"eventUrl":"","translationId":2089,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2096,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Retarus_logo.png","logo":true,"scheme":false,"title":"RETARUS E-Mail Security","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"retarus-e-mail-security","companyTitle":"Retarus","companyTypes":["vendor"],"companyId":4538,"companyAlias":"retarus","description":"<p>Retarus Email Security останавливает вредоносные программы, такие как вирусы, спам, фишинговые электронные письма, вымогатели и другие цифровые угрозы. Службы безопасности электронной почты Retarus Cloud могут быть настроены в соответствии с требованиями безопасности вашего бизнеса.</p>\r\n<p>Вам нужна расширенная защита с помощью Retarus Advanced Threat Protection? Это защита от современных угроз, социальной инженерии и фишинговых атак, которые нарушают традиционные механизмы безопасности. Чтобы успешно защищать эти умные атаки, компаниям нужна как минимум умная защита. Retarus Advanced Threat Protection включает четыре антивирусных сканера, включая сканирование с отложенной доставкой, изолированную программную среду, защиту от мошенничества CxO.</p>\r\n<p>С запатентованной технологией Retarus Patient Zero Detection от Retarus теперь возможно обнаруживать вредоносные программы в уже доставленных письмах и предупреждать получателя, как только шаблоны станут доступны.</p>\r\n<p>Инновационный дизайн Retarus Queueless Design анализирует входящие электронные письма без буферизации - электронные письма доставляются без задержек благодаря минимальной пропускной способности. Для максимальной безопасности антивирусные сканеры Retarus и методы фильтрации постоянно обновляются и постоянно оптимизируются.</p>","shortDescription":"Retarus Email Security - ПО против вредоносных программ, таких как вирусы, спам, фишинговые электронные письма, вымогатели и другие цифровые угрозы.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"RETARUS E-Mail Security","keywords":"Retarus, безопасности, письма, электронные, защита, Threat, Protection, Security","description":"Retarus Email Security останавливает вредоносные программы, такие как вирусы, спам, фишинговые электронные письма, вымогатели и другие цифровые угрозы. Службы","og:title":"RETARUS E-Mail Security","og:description":"Retarus Email Security останавливает вредоносные программы, такие как вирусы, спам, фишинговые электронные письма, вымогатели и другие цифровые угрозы. Службы","og:image":"https://old.b4r.io/fileadmin/user_upload/Retarus_logo.png"},"eventUrl":"","translationId":2907,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2097,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Retarus_logo.png","logo":true,"scheme":false,"title":"Retaurus E-Mail Security","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"retaurus-e-mail-security","companyTitle":"Retarus","companyTypes":["vendor"],"companyId":4538,"companyAlias":"retarus","description":"<p>Retarus Email Security stops malware such as viruses, spam, phishing emails, ransomware and other digital threats. Retarus Cloud Email Security Services can be customized to meet the security needs of your business.</p>\r\n<p>Do you need extended protection with Retarus Advanced Threat Protection? Protect against advanced threats and social engineering and phishing attacks that disrupt traditional security mechanisms. To defend these smart attacks successfully, companies need at least as smart protection. Retarus Advanced Threat Protection includes four virus scanners including Deferred Delivery Scan, Sandboxing, Time-of-Click Protection and CxO Fraud Protection.</p>\r\n<p>Brand new malicious programs can not be stopped even by the best virus filters at first because the patterns are not yet known at the beginning. With Retarus' patent-pending Patient Zero Detection technology, it is now possible to detect malware in emails that have already been delivered and alert the recipient as soon as the patterns are available. Analysts strongly recommend the use of so-called post-delivery protection mechanisms.</p>\r\n<p>The innovative Retarus Queueless Design analyzes incoming e-mails without buffering - e-mails arrive without delays thanks to minimal throughput times. For maximum security, Retarus virus scanners and filter methods are constantly updated and continuously optimized.</p>","shortDescription":"Retarus E-Mail Security is a cloud-based enterprise messaging platform delivers seamless and secure email, fax, SMS and EDI services for businesses.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Retaurus E-Mail Security","keywords":"Retarus, Protection, virus, protection, security, Security, malware, Threat","description":"Retarus Email Security stops malware such as viruses, spam, phishing emails, ransomware and other digital threats. Retarus Cloud Email Security Services can be","og:title":"Retaurus E-Mail Security","og:description":"Retarus Email Security stops malware such as viruses, spam, phishing emails, ransomware and other digital threats. Retarus Cloud Email Security Services can be","og:image":"https://old.b4r.io/fileadmin/user_upload/Retarus_logo.png"},"eventUrl":"","translationId":2097,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2102,"logoURL":"https://old.b4r.io/fileadmin/user_upload/watchguard_xcs.jpg","logo":true,"scheme":false,"title":"The WatchGuard XCS","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"the-watchguard-xcs","companyTitle":"WatchGuard","companyTypes":["vendor"],"companyId":2741,"companyAlias":"watchguard","description":"<p>Since 1996, WatchGuard Technologies has provided more than 600,000 security appliances to hundreds of thousands of customers worldwide. Our Extensible Content Security (XCS and XCSv) solutions offer the industry’s best defense-in-depth for email, web, and data loss prevention. With four physical appliances and four virtual editions to choose from, XCS and XCSv meet the essaging security requirements of businesses of all sizes, including solutions to protect the world’s most demanding email and web networks. XCS products are backed by LiveSecurity Service, a highvalue support and maintenance program. The WatchGuard commitment to performance and value gives our customers enterprisegrade protection in a cost-effective, extensible solution.<br /><span style=\"font-weight: bold;\">Eliminate Spam and Email-borne Threats</span><br />The dangers carried by spam have never been greater. Highly sophisticated email scams are luring users to web sites where malicious code awaits. Data is stolen, malware propagated and networks infected with spyware and botnets.<br />WatchGuard XCS utilizes breakthrough innovations in email security to stop today’s spam threats. An “in the cloud” reputation lookup service blocks up to 98% of spam at the connection level, then the powerful anti-spam engine conducts a rigorous analysis of messages and attachments on the remaining email. The result is industry-leading spam protection, with huge savings in email processing overhead.<br /><span style=\"font-weight: bold;\">Extend Protection to Web Traffic</span><br />Adding a Web Security subscription to your XCS appliance will extend that same powerful protection to all your web traffic as well. The cloud-based web reputation service determines the risk level of each web page to stop threats at the perimeter. URL filtering analyzes and blocks access to web sites based on predefined policies to reduce risks, prevent legal liabilities from inappropriate web surfing, and protect bandwidth.<br /><span style=\"font-weight: bold;\">Stop the Loss of Sensitive Data</span><br />Confidential information can leave the network, accidentally or maliciously, in many ways. Email is the primary threat vector for data loss, yet web communications over popmail services such as Hotmail and Gmail, business collaboration tools, and social networking sites like LinkedIn and Facebook have become just as common egress points for sensitive data. The data loss prevention (DLP) capabilities of WatchGuard XCS enable tight control over all outbound traffic no matter what the communication tool to keep sensitive, regulated, and classified information from exiting the network without authorization.<br /><span style=\"font-weight: bold;\">Encrypt Emails for Privacy and Compliance</span><br />Given the volume of sensitive data that must pass between business networks, the decision isn’t if you should encrypt confidential email messages, but how. WatchGuard XCS SecureMail provides policy-driven, transparent encryption that is easy to deploy and manage. Messages can be opened by any browser and on any mobile device, Keys are issued dynamically, minimizing the risk of key corruption or unauthorized data recovery. And because it’s a fully integrated subscription, it beats the high cost and administrative burden of stand-alone encryption products.<br /><span style=\"font-weight: bold;\">Effectively Define Your Relationship with the Internet</span><br />XCS solutions are rich in tools that support policy creation, management, and enforcement. The XCS DLP Wizard guides administrators through DLP configuration controls quickly and simply. Built-in compliance dictionaries streamline policy-creation to meet a wide range of regulatory mandates. Granular controls provide enhanced visibility into data leaving the network. All email and web security can be managed across protocols from one centralized management console, using one set of corporate acceptable use and compliance policies for maximum efficiency and protection.</p>","shortDescription":"WatchGuard XCS is designed to meet the demanding email and web-based content security needs of large enterprises.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"The WatchGuard XCS","keywords":"email, data, WatchGuard, protection, from, spam, security, that","description":"Since 1996, WatchGuard Technologies has provided more than 600,000 security appliances to hundreds of thousands of customers worldwide. Our Extensible Content","og:title":"The WatchGuard XCS","og:description":"Since 1996, WatchGuard Technologies has provided more than 600,000 security appliances to hundreds of thousands of customers worldwide. Our Extensible Content","og:image":"https://old.b4r.io/fileadmin/user_upload/watchguard_xcs.jpg"},"eventUrl":"","translationId":2103,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2104,"logoURL":"https://old.b4r.io/fileadmin/user_upload/cellopoint__logo_.png","logo":true,"scheme":false,"title":"CelloPoint Secure Email Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cellopoint-secure-email-gateway","companyTitle":"Cellopoint","companyTypes":["vendor"],"companyId":4539,"companyAlias":"cellopoint","description":"<p>Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by CelloLabs which has the capability to filter out all email threats. In addition, Cellopoint Security Gateway eliminates 99% unwanted message and provides a high-class defending capability—not only from known threats, but from those certain to evolve in the future.</p>\r\n<p><span style=\"font-weight: bold;\">Benefits:</span></p>\r\n<ul>\r\n<li>Protects against spam, viruses, spyware, and other malware</li>\r\n<li>Affordable protection is simple and reliable</li>\r\n<li>Reduces administrative overhead</li>\r\n<li>Intuitive Management GUI</li>\r\n</ul>\r\n<p><strong>Tier One: Anti-spam Protection</strong></p>\r\n<p>Anti-spam methods eliminate more than 99% of spam with a range of anti-spam technologies including:</p>\r\n<ul>\r\n<li>Denial of Service (DoS) Protection</li>\r\n<li>SMTP Rate Limit</li>\r\n<li>Bounce Back Protection</li>\r\n<li>Directory Harvest Attack (DHA) Prevention</li>\r\n<li>Sender IP Reputation Analysis</li>\r\n<li>SMTP Transaction Check</li>\r\n<li>Virus, Phishing and Spyware Scanning</li>\r\n<li>Intelligent Content Analysis (ICA)</li>\r\n<li>Heuristics Rule</li>\r\n<li>Bayesian Analysis</li>\r\n<li>Violation Check</li>\r\n</ul>\r\n<p><strong>Tier Two: Anti-Virus Filtering</strong></p>\r\n<p>A combination of multiple anti-virus engines offers an extensive real time scanning and virus definition updates. Catch a variety of known virus and phishing patterns, spyware, trojans, worms and malware threats. Easy to deploy in your existing email infrastructure.</p>\r\n<p><strong>Tier Three: Anti-APT-URL Protection</strong></p>\r\n<p>To protect against the phishing targeted attacks and malicious URL links, Cellopoint SEG will scan and block as follow:</p>\r\n<p><span style=\"font-style: italic;\">Static Black/Whitelist Database</span></p>\r\n<p>Over 2 million latest global URL black/whitelist database for quick comparison and quarantine.</p>\r\n<p><span style=\"font-style: italic;\">Dynamic URL ToC (Time of Click) Scanning</span></p>\r\n<p>To protect against the unknown, suspicious or malicious URL links, Cellopoint SEG will rewrite the links to go through CelloCloud for realtime examination. The URLs will be examined at the time when the users click them. If a link is unsafe, the users will be warned not to visit the site or informed that the site has been blocked by Cellopoint SEG.</p>\r\n<p><strong>Tier Four: Anti-APT-File Protection</strong></p>\r\n<p>To protect against the unknown, new advanced malware emails and attachment fi les, Cellopoint SEG will scan and block as follow:</p>\r\n<p><span style=\"font-style: italic;\">Dynamic Sandbox Scanning</span></p>\r\n<p>Suspicious email attachements will be sent as encrypted packages to the powerful cloud computing CelloCloud to do dynamic sandbox scanning.</p>\r\n<p><span style=\"font-style: italic;\">Full-system emulation</span></p>\r\n<p>Malware as Office and PDF files is captured and induced into a simulated operating system like Windows, Android, Mac OSX.</p>\r\n<p><span style=\"font-style: italic;\">Correlation Analysis and Threat Scores</span></p>\r\n<p>Threat Level Analysis that commands SEG to either block or release certain mails.</p>\r\n<p><span style=\"font-style: italic;\">Professional Summary Report</span></p>\r\n<p>Analysis report overview shows malicious file name, threats reputation scores, classifi cation, network activity and registry summary.</p>\r\n<p><span style=\"font-weight: bold;\">High-performance, Easy Deployment</span></p>\r\n<p>Cellopoint SEG is designed to meet the unique needs of any size of business. It offers all of the performance, flexibility, scalability, customization and end-user control features needed in deployments.</p>","shortDescription":"Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CelloPoint Secure Email Gateway","keywords":"Cellopoint, Analysis, will, Protection, threats, Tier, against, malware","description":"Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by","og:title":"CelloPoint Secure Email Gateway","og:description":"Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by","og:image":"https://old.b4r.io/fileadmin/user_upload/cellopoint__logo_.png"},"eventUrl":"","translationId":2105,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2106,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Clearswift_logo.png","logo":true,"scheme":false,"title":"Clearswift SECURE Email Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"clearswift-secure-email-gateway","companyTitle":"Clearswift","companyTypes":["vendor"],"companyId":4540,"companyAlias":"clearswift","description":"<p>The SECURE Email Gateway is available with our unique, award winning, Adaptive Redaction technology and is a core component of our Adaptive Data Loss Prevention (A-DLP) solution which enables secure collaboration by automatically removing the sensitive data and/or malicious content that breaks policy allowing the rest of the communication to continue.</p>\r\n<p><span style=\"font-weight: bold;\">Flexible deployment options – now available in the Cloud</span></p>\r\n<p>You decide how you want to buy and deploy the Clearswift SECURE Email Gateway, either as a pre-installed hardware appliance, as a software image that can be loaded on a choice of hardware platforms, or alternatively virtualized in a VMWare / HyperV environment. It is also available to be deployed in the Cloud including Amazon Web Services providing you with ultimate flexibility to suit your organization’s needs.</p>\r\n<p><span style=\"font-weight: bold;\">Encryption for maximum email security</span></p>\r\n<p>With TLS as standard, and cost options to provide either S/MIME, PGP and password protected files or Web portal-based encryption, the Email Gateway offers a variety of options to cater for customer requirements. Whichever you choose, the Gateway allows sensitive data to be delivered securely, in seconds, using the optimal format for the recipient.</p>\r\n<p><span style=\"font-weight: bold;\">World-class inbound threat protection</span></p>\r\n<p>The Clearswift SECURE Email Gateway comes with a choice of AV engines from Sophos or Kaspersky utilizing Cloud-based lookups and heuristics to supplement traditional signature downloads delivering superior virus protection.</p>","shortDescription":"Clearswift SECURE Email Gateway offers an unprecedented level of cyber-attack protection and outbound data loss prevention for secure email collaboration.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Clearswift SECURE Email Gateway","keywords":"Gateway, Email, SECURE, Clearswift, options, available, with, data","description":"The SECURE Email Gateway is available with our unique, award winning, Adaptive Redaction technology and is a core component of our Adaptive Data Loss","og:title":"Clearswift SECURE Email Gateway","og:description":"The SECURE Email Gateway is available with our unique, award winning, Adaptive Redaction technology and is a core component of our Adaptive Data Loss","og:image":"https://old.b4r.io/fileadmin/user_upload/Clearswift_logo.png"},"eventUrl":"","translationId":2107,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2108,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Trustwave.jpg","logo":true,"scheme":false,"title":"Trustwave Secure Email Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"trustwave-secure-email-gateway","companyTitle":"Trustwave","companyTypes":["supplier","vendor"],"companyId":4293,"companyAlias":"trustwave","description":"<p>Trustwave Secure Email Gateway, previously known as MailMarshal SEG, is a fast, easy-to-use email content security solution that ensures a safe and productive working environment by enforcing your Acceptable Use Policy and protecting against spam, viruses, and other undesirable content.</p>\r\n<p>Trustwave SEG has been delivering unmatched email security for seventeen years. As if stopping crypto viruses was not enough SEG has a superior depth of features, outstanding user interfaces, has a fault tolerant architecture that scales into the 100,000’s of users, top flight technical support that is inside Australia and provides fast access to all levels of relevant diagnostic logging. For anyone wanting to take back control of email security Trustwave SEG is Australia’s best solution.</p>\r\n<ul>\r\n<li>Flexible deployment options: on-premise, private or public cloud</li>\r\n<li>Protection against blended crypto threats that use multiple vulnerabilities and methods</li>\r\n<li>Multi-layering of anti-spam engine, because there is no single magic bullet</li>\r\n<li>Best in class management, easiest to use and maximum product and interface maturity</li>\r\n<li>Powerful DLP protection to achieve regulatory compliance and protect your intellectual property</li>\r\n</ul>","shortDescription":"Trustwave Secure Email Gateway features a layered security approach to dramatically reduce spam and protect your network.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Trustwave Secure Email Gateway","keywords":"Trustwave, that, email, security, your, Email, crypto, viruses","description":"Trustwave Secure Email Gateway, previously known as MailMarshal SEG, is a fast, easy-to-use email content security solution that ensures a safe and productive","og:title":"Trustwave Secure Email Gateway","og:description":"Trustwave Secure Email Gateway, previously known as MailMarshal SEG, is a fast, easy-to-use email content security solution that ensures a safe and productive","og:image":"https://old.b4r.io/fileadmin/user_upload/Trustwave.jpg"},"eventUrl":"","translationId":2109,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2110,"logoURL":"https://old.b4r.io/fileadmin/user_upload/f-secure-logo.jpg","logo":true,"scheme":false,"title":"F-Secure Messaging Security Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"f-secure-messaging-security-gateway","companyTitle":"F-Secure","companyTypes":["vendor"],"companyId":4541,"companyAlias":"f-secure","description":"<p>F-Secure Messaging Security Gateway delivers the industry’s most effective security for corporate messaging infrastructures. It is the most accurate antispam solution* along with capabilities for email firewall, antivirus, and secure messaging. Depending on company traffic type Messaging Security Gateway can remove as much as 99.5% of spam.</p>\r\n<p><span style=\"font-weight: bold;\">Key features:</span></p>\r\n<ul>\r\n<li>Secures your network against spam, phishing, viruses, virus outbreaks, denial-of-service attacks, directory harvest attacks right at the gateway.</li>\r\n<li>Machine learning technology provides highly effective spam protection and outstanding end-user quarantines, safe lists and block lists.</li>\r\n<li>Outstanding virus protection with automatic updates of virus signatures and rules.</li>\r\n<li>High-performance and scalable solution proven in the most demanding email infrastructures.</li>\r\n</ul>","shortDescription":"F-Secure Messaging Security Gateway protects your company's confidential data. Users can easily send encrypted e-mails, and the system can automatically block or encrypt a message.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F-Secure Messaging Security Gateway","keywords":"virus, spam, Messaging, Security, most, Gateway, with, email","description":"F-Secure Messaging Security Gateway delivers the industry’s most effective security for corporate messaging infrastructures. It is the most accurate","og:title":"F-Secure Messaging Security Gateway","og:description":"F-Secure Messaging Security Gateway delivers the industry’s most effective security for corporate messaging infrastructures. It is the most accurate","og:image":"https://old.b4r.io/fileadmin/user_upload/f-secure-logo.jpg"},"eventUrl":"","translationId":2111,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2112,"logoURL":"https://old.b4r.io/fileadmin/user_upload/sendio__logo_.png","logo":true,"scheme":false,"title":"Sendio Email Security Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sendio-email-security-gateway","companyTitle":"Sendio","companyTypes":["vendor"],"companyId":4542,"companyAlias":"sendio","description":"<p>If dealing with spam has become a full-time job then it’s time to reclaim your inbox with Sendio’s Email Security Gateway. Relying on a system of malware flters and reputation scoring technologies over content fltering, Sendio allows you to eliminate the spam from your inbox without the headache of false positives and lost mail. If you’re looking for a safe, secure and spotless inbox, we can help. With our exclusive Server Recon technology and a suite of best-of-breed security tools, our Email Security Gateway will make sure that you’re getting the email that’s important to you, and nothing else.</p>\r\n<p><span style=\"font-weight: bold;\">Server Recon</span></p>\r\n<p>Our “SMTP-layer Challenge Response Technology” is not a form of content fltering. Instead, our Server Recon technology is a real time representation of a server’s response. Server Recon develops a reputation score on the fly and will re-score the server every 30 days to make sure the score is up to date.</p>\r\n<p><span style=\"font-weight: bold;\">IP Reputation</span></p>\r\n<p>IP Reputation flters are a better way of understanding an email than content checks as there are more important criteria when checking for spam than whether an email “looks like spam.” When coupled with our Server Recon technology, our IP reputation check provides a powerful flter that stops the vast majority of SPAM in its tracks.</p>\r\n<p><span style=\"font-weight: bold;\">Anti-Virus Protection</span></p>\r\n<p>Sendio utilizes multiple AV technologies to inspect email for malicious content. Defnitionbased and Pattern Matching AV engines block known threats and zero-day threats.</p>\r\n<p><span style=\"font-weight: bold;\">Hardened Linux OS Kernel</span></p>\r\n<p>Our Appliance, whether virtual or physical, is based on a hardened Linux operating system that has been stripped down to remove functionality not required in a security product, and locked down to ensure that the OS isn’t vulnerable to security threats.</p>\r\n<p><span style=\"font-weight: bold;\">TLS Encryption</span></p>\r\n<p>Our encryption is server-to-server, which means that every message you send is safe from the moment it leaves our server to moment it’s delivered to the recipient’s email server.</p>\r\n<p><span style=\"font-weight: bold;\">Email Spooling</span></p>\r\n<p>If your servers go down, emails will often be hard-bounced and never resent. We spool your emails for up to 28 days, double the time our competitors do, to make sure your emails are there when you come back online. Whether you’re experiencing a server emergency or routine maintenance, we’ll make sure you get every message you need.</p>\r\n<p><span style=\"font-weight: bold;\">Continuity</span></p>\r\n<p>Continuity is your actual ability to view the spooled email. We’ll make sure that you have access to your emails for one month after they’re sent. The time these emails are held for can also be modifed or even done away with completely for our customers with compliancy issues.</p>\r\n<p><span style=\"font-weight: bold;\">Anti-Spoofng</span></p>\r\n<p>Utilizing SPF and DKIM, Sendio verifes the host server against expectedIP range and validates domain name identity.</p>\r\n<p><span style=\"text-decoration: underline;\"><span style=\"font-weight: bold;\">User Benefts:</span></span></p>\r\n<p><span style=\"font-weight: bold;\">Remove Spam and Malicious Messages.</span> Virtually eliminates the bulk messages, spam mail and threat of email-borne malware without our multiple tiers of security. Our Email Security Gateway will keep you safe and eliminate the hundreds of spam messages that flood your inbox every day.</p>\r\n<p><span style=\"font-weight: bold;\">Zero Impact.</span> Our Email Security Gateway represents a zero impact challenge response system. Meaning that you get the security of a challenge response system with no impact to either you or the sender. Because this system is machine to machine, it’s completely invisible to both parties.</p>\r\n<p><span style=\"font-weight: bold;\">Disaster Recovery.</span> Your email is always safe, even if your server goes down, giving you peace of mind and, more importantly, email continuity.</p>\r\n<p><span style=\"font-weight: bold;\">Minimized Content Filtering Eliminates False Positives.</span> By not relying heavily on content fltering, we have eliminated the possibility of false positives. Our exclusive, multi-tiered security solution combines several different flters together, giving you the power of a content fltered spam solution without the worry of false positives.</p>\r\n<p><span style=\"font-weight: bold;\">Fully Upgradable.</span> Choose to add Opt-Inbox, Sendio’s flagship solution at any time. Upgrade in just a few minutes and you’ll have the most comprehensive and accurate messaging security and productivity solution available today.</p>\r\n<p>For many companies, the nearly 200 spam received every day can cost countless employee hours. Too many email users are wasting hours every day, sifting through mountains of spam and junk mail just to make sure that real conversations aren’t lost. Unfortunately content flters can cause important emails to go unnoticed, and no flter at all can open your business up to phishing attempts, malware and email-borne viruses.</p>\r\n<p>At Sendio, our Email Security Gateway uses a powerful combination of minimal content fltering, IP reputation and our proprietary Server Recon technology to ensure that your inbox isn’t flled up with junk and malicious mail. By not relying heavily on content fltering, we have eliminated the possibility of false positives. Meaning that we’ll block the spam and malicious mail, without ever losing an important email of yours.</p>","shortDescription":"Sendio Email Security Gateway’s behavioral system eliminates spam at the head of the security stack, greatly reducing the strain on network resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Sendio Email Security Gateway","keywords":"that, your, email, spam, content, Email, with, security","description":"If dealing with spam has become a full-time job then it’s time to reclaim your inbox with Sendio’s Email Security Gateway. Relying on a system of","og:title":"Sendio Email Security Gateway","og:description":"If dealing with spam has become a full-time job then it’s time to reclaim your inbox with Sendio’s Email Security Gateway. Relying on a system of","og:image":"https://old.b4r.io/fileadmin/user_upload/sendio__logo_.png"},"eventUrl":"","translationId":2113,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2114,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Votiro__logo_.jpg","logo":true,"scheme":false,"title":"Votiro Secure Email Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"votiro-secure-email-gateway","companyTitle":"Votiro","companyTypes":["vendor"],"companyId":4543,"companyAlias":"votiro","description":"The Votiro Secure Email Gateway supplies organizations with future ready protection by removing threats from all files attached to email messages coming into the network. In use at defense and government agencies, banks, pharmaceutical companies, health care organizations, and other institutions worldwide, Votiro’s Secure Email Gateway offers the quality of a mature, proven technology.\r\nVotiro’s Secure Email Gateway powered by patented Advanced Content Disarm and Reconstruction technology sanitizes all incoming email attachments in near real time, protecting organizations against known, undisclosed and zero-day exploits. It provides comprehensive protection against phishing and spear-phishing attacks, and harnesses multiple antivirus engines and anti-malware solutions to detect known threats.\r\nVotiro’s Secure Email Gateway saves customers the effort and expense of maintaining and carrying out endpoint installations, and rewards them with a return on their cybersecurity investment. It can be easily deployed and takes practically no time to set up. It works automatically, eliminating the human factor from the security equation.","shortDescription":"Votiro Secure Email Gateway helps to keep your customers’ credit card information, passwords, and other sensitive data safe by removing threats from all files attached to email messages.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Votiro Secure Email Gateway","keywords":"Email, Secure, Gateway, Votiro’s, organizations, time, Votiro, technology","description":"The Votiro Secure Email Gateway supplies organizations with future ready protection by removing threats from all files attached to email messages coming into","og:title":"Votiro Secure Email Gateway","og:description":"The Votiro Secure Email Gateway supplies organizations with future ready protection by removing threats from all files attached to email messages coming into","og:image":"https://old.b4r.io/fileadmin/user_upload/Votiro__logo_.jpg"},"eventUrl":"","translationId":2115,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2116,"logoURL":"https://old.b4r.io/fileadmin/user_upload/micro_focus.png","logo":true,"scheme":false,"title":"Micro Focus Secure Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"micro-focus-secure-gateway1","companyTitle":"Micro Focus","companyTypes":["supplier","vendor"],"companyId":4386,"companyAlias":"micro-focus","description":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus Secure Gateway that scans the actual composition of images and videos to ensure accuracy. Its sophisticated probability engine scans incoming and outgoing images, reliably distinguishes between pornographic and non-pornographic content, and stops the inappropriate content from entering or leaving your messaging system.\r\n<span style=\"font-weight: bold;\">The Problem</span>\r\nInappropriate email communications, including pornography and other explicit content, continue to be a major problem in many organizations. This content is often found in unsolicited spam, but it is more commonly generated from employee communications, both inside and outside of the workplace. If these messages go unchecked, organizations could face a number of devastating consequences that can cost time and money:\r\n<ul> <li>Sexual harassment lawsuits</li> <li>Criminal charges</li> <li>A hostile work environment</li> <li>Reputation damage</li> </ul>\r\n<span style=\"font-weight: bold;\">The Micro Focus Solution</span>\r\nOrganizations must address this inappropriate behavior through corporate policies and through the use of technology. Secure Gateway gives you the ability to monitor and block pornographic images, which addresses the primary issue of inappropriate communications.\r\nSecure Gateway screens images before they pass through your email system and takes action when offensive material is detected. It uses sophisticated analytical processes consisting of multiple detection methods to reliably distinguish between pornographic and non-pornographic content, without having to rely on a signature database of pre-categorized content. These processes ensure that pornography is prevented from entering or leaving your messaging system.\r\n<span style=\"font-weight: bold;\">CONFIGURE IMAGE ANALYSIS AUDITING</span>\r\nFollow these instructions to set Secure Gateway into an audit mode. In audit mode, you will locate the images that are passing through your email system. You can use audit mode without interfering with the mail flow.\r\n<span style=\"font-weight: bold;\">PREREQUISITES</span>\r\nTo use Secure Gateway, you must have the following items:\r\n<ul> <li>A pre-installed Micro Focus Secure Gateway server that is configured and actively scanning email</li> <li>An Secure Gateway license key. Either a full license or trial key will work. (Contact your Micro Focus representative for your evaluation key)</li> </ul>","shortDescription":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Micro Focus Secure Gateway","keywords":"Gateway, Secure, your, images, content, Focus, Micro, that","description":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus","og:title":"Micro Focus Secure Gateway","og:description":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus","og:image":"https://old.b4r.io/fileadmin/user_upload/micro_focus.png"},"eventUrl":"","translationId":2117,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2118,"logoURL":"https://old.b4r.io/fileadmin/user_upload/moduscloud.png","logo":true,"scheme":false,"title":"Vircom modusCloud","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"vircom-moduscloud","companyTitle":"Vircom","companyTypes":["vendor"],"companyId":4544,"companyAlias":"vircom","description":"<p>modusCloud is a cloud-based email security solution that helps managed service providers (MSP), IT resellers and consultants to protect business email accounts from spam, targeted phishing and more. Key features include context indexing, outbound email encryption and Office 365 email integration.</p>\r\n<p>modusCloud provides businesses with real-time threat protection through spam filtering and phishing detection, a multi-layer anti-virus solution and email archiving. The solution also provides users with time-of-click URL defense on inbound links and malware analysis from a configurable single-user interface.</p>\r\n<p>modusCloud allows administrators to segment users into groups and manage global controls across their deployment. It also includes tools that helps administrators to monitor and regulate inbound and outbound SMTP traffic from a single login. Additionally, the solution features email quarantine tools, automates provisioning and provides multi-level management capabilities.</p>\r\n<p>Services are offered on an annual subscription basis that includes support via phone, email and an online knowledge base.</p>","shortDescription":"modusCloud is powerful cloud email security that drives value for IT admins and Partners.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Vircom modusCloud","keywords":"email, solution, modusCloud, from, that, provides, spam, outbound","description":"modusCloud is a cloud-based email security solution that helps managed service providers (MSP), IT resellers and consultants to protect business email accounts","og:title":"Vircom modusCloud","og:description":"modusCloud is a cloud-based email security solution that helps managed service providers (MSP), IT resellers and consultants to protect business email accounts","og:image":"https://old.b4r.io/fileadmin/user_upload/moduscloud.png"},"eventUrl":"","translationId":2119,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2120,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Vircom__logo_.png","logo":true,"scheme":false,"title":"Vircom modusGate","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"vircom-modusgate","companyTitle":"Vircom","companyTypes":["vendor"],"companyId":4544,"companyAlias":"vircom","description":"<p><strong>Vircom’s modusGate</strong> is a powerful anti-spam email filtering gateway which harnesses more than two decades of industry experience and powerful service offerings. It offers unparalleled value by providing reliable MTA capabilities, incorporating a state-of-the-art artificial intelligence (AI) engine and a real-time cloud-based service that effectively identifies email borne threats through reputation and advanced statistical models.</p>\r\n<p><strong>Benefits:</strong></p>\r\n<ul>\r\n<li>VBSpam+ verified which provides 99.93% spam catch rate with a 0% false positive rate.</li>\r\n<li>Extremely granular control with specific permissions and settings for users/domains.</li>\r\n<li>Multi-level administration for true peace of mind.</li>\r\n<li>Delegate full quarantine management to your end-users using either Outlook, Web or mobile devices.</li>\r\n<li>modusGate automatically manages all user account and alias management through standard-based lookups (SMTP, LDAP, MS Active Directory).</li>\r\n<li>Dual anti-virus layer that includes two of the most recognized and strongest brands in the industry, Avira and Bitdefender that ensure zero-day defense against phishing and malware threats.</li>\r\n</ul>","shortDescription":"modusGate is an on-premise multi-layer anti-spam email filtering gateway harnessing 2 decades of security and network experience.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Vircom modusGate","keywords":"that, modusGate, rate, with, industry, threats, through, management","description":"Vircom’s modusGate is a powerful anti-spam email filtering gateway which harnesses more than two decades of industry experience and powerful service","og:title":"Vircom modusGate","og:description":"Vircom’s modusGate is a powerful anti-spam email filtering gateway which harnesses more than two decades of industry experience and powerful service","og:image":"https://old.b4r.io/fileadmin/user_upload/Vircom__logo_.png"},"eventUrl":"","translationId":2121,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2122,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Vircom__logo_.png","logo":true,"scheme":false,"title":"Vircom Office 365 Email Security","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"vircom-office-365-email-security","companyTitle":"Vircom","companyTypes":["vendor"],"companyId":4544,"companyAlias":"vircom","description":"<p>With Vircom’s Office 365 Email Security, protect yourself against advanced threats, upgrade spam protection, ensure email continuity, archiving compliance and great customer service. Our cloud email security products provide businesses with complete email security, including machine learning anti-spam, URL defense, malicious attachment defense, secure encryption, email archiving solutions, targeted phishing protection, anti-ransomware and leading a leading email continuity solution.</p>\r\n<p><span style=\"font-weight: bold;\">Features:</span></p>\r\n<ul>\r\n<li>Cloud Email Security</li>\r\n<li>Spam Protection</li>\r\n<li>Targeted Phishing Protection</li>\r\n<li>Email Archiving Solution</li>\r\n<li>Secure Email Encryption</li>\r\n<li>Advanced Threat Protection</li>\r\n<li>URL Defense</li>\r\n<li>O365 Spam Filter</li>\r\n<li>Email Archive</li>\r\n</ul>","shortDescription":"With Vircom’s Office 365 Email Security, protect yourself against advanced threats, upgrade spam protection, ensure email continuity, archiving compliance and great customer service.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Vircom Office 365 Email Security","keywords":"Email, email, Protection, Security, Spam, continuity, security, defense","description":"With Vircom’s Office 365 Email Security, protect yourself against advanced threats, upgrade spam protection, ensure email continuity, archiving","og:title":"Vircom Office 365 Email Security","og:description":"With Vircom’s Office 365 Email Security, protect yourself against advanced threats, upgrade spam protection, ensure email continuity, archiving","og:image":"https://old.b4r.io/fileadmin/user_upload/Vircom__logo_.png"},"eventUrl":"","translationId":2123,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":349,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Proofpoint_Email_Protection.png","logo":true,"scheme":false,"title":"Proofpoint Email Protection","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"proofpoint-email-protection","companyTitle":"Proofpoint","companyTypes":["vendor"],"companyId":2817,"companyAlias":"proofpoint","description":"<p><span style=\"font-weight: bold;\">Protection against BUSINESS EMAIL COMPROMISE (BEC)</span></p>\r\n<p>Dynamically classify impostor email (BEC) other threats that don't involve malware. These low volume, hard-to-detect threats have cost businesses more than $2.3 billion and cannot be detected by solutions that detect only malware. We detect and classify impostor email through a combination of authentication (DMARC), pre-defined rules, and dynamic classification. Our technology actively assesses the reputation of the sender for accurate protection without additional administration overhead.</p>\r\n<p>We analyze:</p>\r\n<ul>\r\n<li>Sender-recipient relationship</li>\r\n<li>Domain reputation</li>\r\n<li>Email headers and envelope attributes</li>\r\n<li>Email content</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Granular filtering and control</span></p>\r\n<p>Email Protection can control all aspects of inbound and outbound email. Our policy engine gives you complete flexibility. Custom rules support global, group and user-level controls to meet the needs of even the most complex enterprise. Individual quarantines enable you to separate email types to allow your people to access their email digest and quarantine while keeping malicious emails away. Quarantines include:</p>\r\n<ul>\r\n<li>Spam</li>\r\n<li>Impostor</li>\r\n<li>Bulk</li>\r\n<li>Phishing</li>\r\n<li>Malware</li>\r\n<li>Adult</li>\r\n<li>Low Priority</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Detailed visibility</span></p>\r\n<p>Email Protection gives you a wealth of data and search tools. Our advanced message tracing features a high-performance search engine to help you quickly pinpoint hard-to-find log data based on dozens of search criteria. With more than 60 real-time reports for detailed visibility into mail flow and trends, Email Protection provides the data that can help address issues and trends as they emerge. <span style=\"font-weight: bold;\">Give your people self-service control over their email preferences such as:</span></p>\r\n<ul>\r\n<li>Quarantines</li>\r\n<li>Safe and block lists</li>\r\n<li>Bulk mail delivery</li>\r\n</ul>\r\n<p>These services are also easy to brand, providing familiarity for users who access these tools. And with support for numerous languages, you can deploy them globally. More than 90% of targeted attacks start with email, and these security threats are always evolving. Proofpoint Email Protection provides multiple layers of security to stop malware and non-malware threats, such as email fraud. It can control all aspects of inbound and outbound email to detect and block threats, and prevent confidential information from getting into the wrong hands.</p>\r\n<p><span style=\"font-weight: bold;\">Features and Benefits</span></p>\r\n<ul>\r\n<li>Advanced Email Filtering, Control and Visibility. Email Protection allows you to set up robust policies as a first step in routing email to users. You can create detailed firewall rules based on your needs. Even set up policies for anti-virus. We also leverage user bulk mail actions to improve accuracy of future detection and classification. With a wealth of data and search tools, you can ensure your organization's email is protected.</li>\r\n<li>Impostor Email Threat Protection. Imposter attacks are hard to detect. Our Stateful Composite Scoring Service (SCSS) is a machine learning approach that searches specifically for these email threats. It uses what’s known about your unique environment, along with data from all Proofpoint customers, to more effectively detect and block email fraud. </li>\r\n<li>Internal Mail Defense. As organization move to cloud-based email services, compromised accounts are on the rise. Internal Mail Defense can automatically scan all internal email traffic, providing a multilayered approach to looking for such things as spam, malware or phishing attacks being sent via compromised accounts. It removes these emails and provides reporting to shows which accounts have been compromised.</li>\r\n<li>Email Continuity. Email downtime can be a significant hit to worker productivity. Enterprise Continuity ensures email is always available, even if your company email is down. It provides full access to users—via Outlook integration, a web portal or native mobile support. And it automatically activates in an outage, with fully automated recovery. </li>\r\n</ul>","shortDescription":"Proofpoint Email Protection stops malware and non-malware threats such as impostor email (also known as business email compromise, or BEC). ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Proofpoint Email Protection","keywords":"email, Email, Protection, data, search, that, control, rules","description":"Protection against BUSINESS EMAIL COMPROMISE (BEC)\rDynamically classify impostor email (BEC) other threats that don't involve malware. These low volume,","og:title":"Proofpoint Email Protection","og:description":"Protection against BUSINESS EMAIL COMPROMISE (BEC)\rDynamically classify impostor email (BEC) other threats that don't involve malware. These low volume,","og:image":"https://old.b4r.io/fileadmin/user_upload/Proofpoint_Email_Protection.png"},"eventUrl":"","translationId":350,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1747,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png","logo":true,"scheme":false,"title":"SonicWall Email Security","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sonicwall-email-security","companyTitle":"SonicWall","companyTypes":["supplier","vendor"],"companyId":4104,"companyAlias":"sonicwall","description":"SonicWall Email Security appliances are ideal for organizations that need a dedicated on-premises solution. The hardened Linux-based appliance defends against advanced email-borne threats such as ransomware, zero-day threats, spear phishing and business email compromise. Our multi-layered solution provides comprehensive inbound and outbound protection, and is available in a range of hardware appliance options that scales up to 10,000 users per appliance.\r\n<strong>GET COMPREHENSIVE INBOUND AND OUTBOUND PROTECTION</strong>\r\nSonicWall Email Security appliances deliver a multi-layered protection against advanced email-borne threats from a hardened Linux based system. Stop advanced threats before they reach your inbox Protect against email fraud and targeted phishing attacks Get up-to-date security with real-time threat intelligence Enable email data loss prevention & compliance Ease management and reporting.\r\n<strong>ADVANCED THREAT PROTECTION</strong>\r\nProtect against emerging zero-day attacks and ransomware with the Capture Advanced Threat Protection service. Our cloud-based sandboxing technology scans a broad range of email attachment types and performs dynamic URL analysis to detect advanced threats, analyze them in a multi-engine sandbox and block threats before they reach your inbox.\r\n<strong>PROTECT AGAINST SOPHISTICATED PHISHING ATTACKS</strong>\r\nSonicWall's anti-phishing technology uses a combination of methodologies such as machine learning, heuristics, reputation and content analysis to stop sophisticated phishing attacks. The solution also includes powerful email authentication standards - SPF, DKIM and DMARC - to stop spoofing attacks, business email compromise and email fraud.\r\n<strong>STAY UPDATED WITH REAL-TIME THREAT INTELLIGENCE</strong>\r\nReceive real-time threat intelligence from SonicWall Capture Labs and ensure delivery of good email. Capture Labs collects and analyzes information from industry threat lists, performs rigorous testing and evaluation of millions of emails every day, and establishes reputation scores for senders and content, identifying new threats as they occur.\r\n<strong>BLOCK MALWARE WITH MULTI-AV SCANNING</strong>\r\nEnsure your anti-spyware and anti-virus is up to date, with SonicWall cloud anti-virus and anti-virus signatures from industry partners. SonicWall uses predictive and responsive technologies to protect organizations from virus infections before signature updates are available.\r\n<strong>ENFORCE STRONG DATA LOSS PREVENTION AND COMPLIANCE</strong>\r\nComply with regulatory mandates using advanced compliance scanning, management and, optionally, email encryption, to prevent confidential data leaks and regulatory violations. The SonicWall Email Compliance and Encryption subscription services provide integrated, policy-enforced and on-demand email encryption. With this service, policies may be configured to scan outbound email content and attachments for sensitive data.\r\n<strong>EASY-TO-USE SECURITY</strong>\r\nAchieve simple email management with a customizable, at-a-glance dashboard. Multi-tenancy support allows large enterprise and managed service provider deployments with multiple departments or customers to establish organizational units with one or multiple domains. The deployment may be centrally managed, but still allows a given organizational unit to have its own users, sub-administrators, policy rules, junk boxes and more.","shortDescription":"SonicWall Email Security is a Secure E-mail Gateway ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SonicWall Email Security","keywords":"email, SonicWall, threats, with, advanced, from, against, attacks","description":"SonicWall Email Security appliances are ideal for organizations that need a dedicated on-premises solution. The hardened Linux-based appliance defends against","og:title":"SonicWall Email Security","og:description":"SonicWall Email Security appliances are ideal for organizations that need a dedicated on-premises solution. The hardened Linux-based appliance defends against","og:image":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png"},"eventUrl":"","translationId":1748,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1749,"logoURL":"https://old.b4r.io/fileadmin/user_upload/The_Email_Laundry.png","logo":true,"scheme":false,"title":"The Email Laundry Full Stack Email Security","vendorVerified":0,"rating":"1.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"the-email-laundry-full-stack-email-security","companyTitle":"The Email Laundry","companyTypes":["supplier","vendor"],"companyId":4391,"companyAlias":"the-email-laundry","description":"<span style=\"font-weight: bold;\">Impersonation Detection</span>\r\nTo protect users from Impersonation type email attacks like CEO Fraud or Business Email Compromise The Email Laundry provides a range of methods to customers on its Full Stack Email security service to counter these attacks.\r\n<ul>\r\n<li>Friendly Name filters to protect against social engineering impersonation attacks on mobile and desktop devices.</li>\r\n<li>Protection against social engineering attacks like whaling, CEO fraud, business email compromise or W-2 fraud.</li>\r\n<li>Instant action from The Email Laundry Threat Intelligence Network and Security Analyst teams</li>\r\n<li>Protects against Newly Registered and Newly Observed Domains to catch the first email from a newly registered domain.</li>\r\n<li>Protects against Display name spoofing and attacks targeting phones</li>\r\n<li>Protects against “looks like” and “sounds like” versions of domain names</li>\r\n</ul>\r\nThreat IntelligenceUsing our unique combination of in-house developed tools like real-time blacklists, AS rankings, passive DNS, and more; stop ransomware, phishing, and other dangerous attacks before they reach your company.\r\n<span style=\"font-weight: bold;\">Connection Filtering</span>\r\nOur service uses a variety of tests and checks to rate each connection and identify if it seems authentic such as IP reputations, if the domain exists in DNS, domain SPF, and other custom filters.\r\n<span style=\"font-weight: bold;\">Content Filtering</span>\r\nEmails are scanned for suspicious content and attachment types such as .pdf, .exe, .js, etc, that are often linked with malicious attacks. Content that appears to be dangerous or spam will be scored and either be quarantined or discarded, depending on its risk.\r\n<span style=\"font-weight: bold;\">Multi-layered Encryption</span>\r\nTo ensure complete protection, we use multiple layers of encryption to secure our clients, including opportunistic TLS encryption. We also offer PDF encryption and secure portal encryption as additional services for users who require them.\r\n<span style=\"font-weight: bold;\">Security Policies</span>\r\nWe supply default cyber security policies, DLP policies, and other important corporate security policies, as well as allow companies to add and edit security policies specific to their company and/or users.\r\n<span style=\"font-weight: bold;\">Shared Security Feeds</span>\r\nThese feeds help us to identify what potential harms are being sent at that moment and allow us to adjust our systems to better protect our clients from reported malicious email attacks.","shortDescription":"The Email Laundry Full Stack Email Security: Shield Your Business From Targeted Email Attacks\r\nStart your free trial today and say goodbye to ransomware, viruses, phishing, and more.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"The Email Laundry Full Stack Email Security","keywords":"attacks, Email, like, against, from, email, policies, encryption","description":"Impersonation Detection\rTo protect users from Impersonation type email attacks like CEO Fraud or Business Email Compromise The Email Laundry provides a range","og:title":"The Email Laundry Full Stack Email Security","og:description":"Impersonation Detection\rTo protect users from Impersonation type email attacks like CEO Fraud or Business Email Compromise The Email Laundry provides a range","og:image":"https://old.b4r.io/fileadmin/user_upload/The_Email_Laundry.png"},"eventUrl":"","translationId":1750,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1277,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Allot_Communications.png","logo":true,"scheme":false,"title":"Allot Communications Secure Service Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"allot-communications-secure-service-gateway","companyTitle":"Allot Communications","companyTypes":["supplier","vendor"],"companyId":4095,"companyAlias":"allot-communications","description":"<span style=\"font-weight: bold;\">Protect network uptime and efficiency</span>\r\nAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of the world’s largest network operators. Flexible redundancy configurations plus passive bypass with automatic port failover maximize uptime and availability.\r\n\r\n<span style=\"font-weight: bold;\">Automate operations and lower TCO</span>\r\nAllot Secure Service Gateway integrates multiple functions in an Intel-based platform that protects your investment and lets you scale from 2 to 22 ports of 1GE/10GE network connectivity in a single appliance.\r\n\r\n<span style=\"font-weight: bold;\">Get the visibility you need to control application performance</span>\r\nAllot provides live traffic monitoring and usage reporting according to traffic policies that are mapped to your complex data center and cloud applications, giving you full visibility and control of application performance, web access, user quality of experience, shadow IT and web threats.\r\n\r\n<span style=\"font-weight: bold;\">Protect users from Internet threats and enforce acceptable use</span>\r\nAllot helps you embrace and maximize the business value of cloud (web) applications by detecting and blocking malware, phishing and other web threats before they harm application performance and user productivity. Allot Secure Service Gateway also detects and surgically filters DDoS and bot traffic before it affects your network.\r\n\r\n<span style=\"font-weight: bold;\">With Allot Secure Service Gateway you can:</span>\r\n<ul><li>See how well your mission-critical applications are performing and supporting user productivity</li><li>Control application performance and improve Quality of Experience according to business priorities</li><li>Keep malicious or unauthorized user/application traffic off your network</li><li>Neutralize threats and ensure ongoing performance of business applications</li><li>Enforce Acceptable Use Policy for shadow IT, BYOD, resource usage</li><li>Troubleshoot and resolve network issues in real time</li><li>Simplify and automate your operations</li><li>Reduce opex and TCO</li></ul>","shortDescription":"Allot Communications Secure Service Gateway is a Smart Way to Protect Users and Control Application Performance\r\nYour business relies on employees and customers being able to connect and work productively with mission-critical applications at all times and from any location. The performance and efficiency of your network can be easily compromised by the ever-increasing demand for LAN, WAN and Internet bandwidth driven by cloud, mobile and video applications. Moreover, the growing use of BYOD and shadow IT have opened complex attack vectors for web threats to infect user devices, get into your network, and harm business productivity and viability. Allot Secure Service Gateway combines the functionality of Allot Service Gateway with our powerful web security and DDoS protection systems, to offer a single, scalable solution that lowers the cost of supporting your evolving requirements for application and user visibility, performance, and security.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Allot Communications Secure Service Gateway","keywords":"Allot, your, performance, Service, Secure, application, Gateway, network","description":"Protect network uptime and efficiency\rAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of","og:title":"Allot Communications Secure Service Gateway","og:description":"Protect network uptime and efficiency\rAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of","og:image":"https://old.b4r.io/fileadmin/user_upload/Allot_Communications.png"},"eventUrl":"","translationId":1278,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"},{"id":325,"title":"Performance Management Software","alias":"performance-management-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/performance-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":303,"logoURL":"https://old.b4r.io/fileadmin/user_upload/UserGate_Proxy___Firewall.png","logo":true,"scheme":false,"title":"UserGate Proxy & Firewall","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"usergate-proxy-firewall","companyTitle":"Entensys","companyTypes":["vendor"],"companyId":2811,"companyAlias":"entensys","description":"Control Internet Access. Protect from Advanced Threats.\r\nUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe.\r\n\r\nNetwork Firewall, IDPS, and Router\r\nEnforce uninterrupted connectivity, network access controls, and regulate Internet traffic.\r\nKeep viruses, worms, Trojans, and spyware from infesting your network.\r\nGuarantee the bandwidth levels required to serve business-critical applications.\r\nMonitoring User Internet Activity\r\n\r\nControl access to websites and enforce any reasonable corporate policy.\r\nLink the headquarters to remote users and branch offices through a Secure VPN connection\r\nProduct Overview\r\nUserGate Proxy & Firewall is an all-in-one gateway security solution combining a network firewall, router, gateway antivirus, intrusion detection and prevention (IDPS), VPN server, web filtering, reporting and statistics and other important functions. It allows you to manage network traffic, optimize bandwidth, and provide Internet access control.\r\n\r\nHow does it work?\r\nUserGate Proxy & Firewall can be installed on any Windows-based machine and works as a web security gateway. It provides Internet access sharing, web security, and traffic management. UserGate works basing on user account and applicable policies. The product lets administrators control traffic flow and trace web pages visited by employees. Numerous policies can be used to grant or restrict access to specific website categories, control downloads or application use, set traffic quotas, and keep detailed statistics.\r\n","shortDescription":"UserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"UserGate Proxy & Firewall","keywords":"access, Internet, Firewall, UserGate, traffic, network, Proxy, security","description":"Control Internet Access. Protect from Advanced Threats.\rUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous","og:title":"UserGate Proxy & Firewall","og:description":"Control Internet Access. Protect from Advanced Threats.\rUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous","og:image":"https://old.b4r.io/fileadmin/user_upload/UserGate_Proxy___Firewall.png"},"eventUrl":"","translationId":304,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2098,"logoURL":"https://old.b4r.io/fileadmin/user_upload/FireEye_Email_Security.png","logo":true,"scheme":false,"title":"FireEye Email Security","vendorVerified":0,"rating":"1.40","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":0,"alias":"fireeye-email-security","companyTitle":"FireEye","companyTypes":["supplier"],"companyId":2739,"companyAlias":"fireeye","description":"<p>FireEye Email Security delivers dynamic defense to detect attacks from the very first time they’re seen and blocks the most dangerous cyber threats including malware-laden attachments and URLs, credential phishing sites and business email compromise attacks. Email-borne cyber attacks are targeted, automated and hidden amongst millions of messages, easily morphing before signatures can be created.</p>\r\n<p>Leveraging FireEye’s extensive threat intelligence from frontline investigations and millions of sensors, FireEye Email Security prioritizes critical alerts and enables endpoint and network incident mitigation and remediation. FireEye Email Security works seamlessly with the FireEye security operations platform – FireEye Helix – providing visibility across the entire infrastructure.</p>\r\n<p><span style=\"font-weight: bold;\">Flexible deployment options</span></p>\r\n<p><span style=\"font-weight: bold;\">FireEye Email Security - Server Edition</span> is an on-premises appliance that protects against advanced email attacks. Real-time updates from the entire FireEye ecosystem combined with attribution of alerts to known threat actors provide context for prioritizing and acting on critical alerts and blocking spear-phishing emails.</p>\r\n<p>With nothing to install, <span style=\"font-weight: bold;\">FireEye Email Security - Cloud Edition</span> is ideal if you’re migrating email to the cloud. It integrates seamlessly with cloud-based email systems such as Office 365 with Exchange Online Protection to stop targeted, advanced attacks faster and more accurately than Exchange Online Protection alone.</p>\r\n<p><span style=\"font-weight: bold;\">Full stack email security solution</span></p>\r\n<p><span style=\"font-weight: bold;\">FireEye MVX engine</span></p>\r\n<p>Rapidly detects and blocks unknown malicious attacks.</p>\r\n<p><span style=\"font-weight: bold;\">Advanced URL defense</span></p>\r\n<p>Inspects URLs for links to credential-phishing sites and rewrites URLs.</p>\r\n<p><span style=\"font-weight: bold;\">Impersonation detection</span></p>\r\n<p>Stops difficult to detect malware-less attacks.</p>\r\n<p><span style=\"font-weight: bold;\">Retroactive analysis and alerting</span></p>\r\n<p>Detects and alerts on URLs that go live after email delivery</p>","shortDescription":"FireEye Email Security blocks the most dangerous cyber threats including malware-laden attachments and URLs, credential phishing sites and business email compromise attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FireEye Email Security","keywords":"FireEye, attacks, Email, email, Security, alerts, with, URLs","description":"FireEye Email Security delivers dynamic defense to detect attacks from the very first time they’re seen and blocks the most dangerous cyber threats","og:title":"FireEye Email Security","og:description":"FireEye Email Security delivers dynamic defense to detect attacks from the very first time they’re seen and blocks the most dangerous cyber threats","og:image":"https://old.b4r.io/fileadmin/user_upload/FireEye_Email_Security.png"},"eventUrl":"","translationId":2099,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":["Malware infection via Internet, email, storage devices","Risk of data loss or damage","Risk of lost access to data and IT systems","Non-compliant with IT security requirements","High costs"],"materials":[],"useCases":[],"best_practices":[],"values":["Reduce Costs","Ensure Security and Business Continuity","Manage Risks","Generate Business Reports"],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}