{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"en":"Offer a reference bonus","ru":"Предложить бонус за референс","_type":"localeString"},"configurator":{"en":"Сonfigurator","ru":"Конфигуратор","_type":"localeString"},"i-sell-it":{"_type":"localeString","en":"I sell it","ru":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"selling":{"_type":"localeString","en":"Selling","ru":"Продают"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"show-more-button":{"_type":"localeString","en":"Show more","ru":"Показать еще"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"ru":"производитель","_type":"localeString","en":"manufacturer"},"short-description":{"en":"Pitch","ru":"Краткое описание","_type":"localeString"},"i-use-it-popover":{"ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier."},"details":{"_type":"localeString","en":"Details","ru":"Детальнее"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"product-features":{"ru":"Особенности продукта","_type":"localeString","en":"Product features"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"solutions":{"en":" Problems that solves","ru":"Проблемы которые решает","_type":"localeString"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"en":"Comparison matrix","ru":"Матрица сравнения","_type":"localeString"},"testing":{"_type":"localeString","en":"Testing","ru":"Тестирование"},"compare":{"en":"Compare with competitors","ru":"Сравнить с конкурентами","_type":"localeString"},"characteristics":{"_type":"localeString","en":" Characteristics","ru":"Характеристики"},"transaction-features":{"ru":"Особенности сделки","_type":"localeString","en":"Transaction Features"},"average-discount":{"en":"Partner average discount","ru":"Средняя скидка партнера","_type":"localeString"},"deal-protection":{"ru":"Защита сделки","_type":"localeString","en":"Deal protection"},"average-deal":{"ru":"Средний размер сделки","_type":"localeString","en":"Average deal size"},"average-time":{"ru":"Средний срок закрытия сделки","_type":"localeString","en":"Average deal closing time"},"login":{"ru":"Войти","_type":"localeString","en":"Login"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"to-know-more":{"ru":"Чтобы узнать больше","_type":"localeString","en":"To know more"},"scheme":{"ru":"Схема работы","_type":"localeString","en":" Scheme of work"},"competitive-products":{"en":" Competitive products","ru":"Конкурентные продукты","_type":"localeString"},"implementations-with-product":{"_type":"localeString","en":"Deployments with this product","ru":"Внедрения с этим продуктом"},"user-features":{"ru":"Особенности пользователей","_type":"localeString","en":"User features"},"job-roles":{"ru":"Роли заинтересованных сотрудников","_type":"localeString","en":" Roles of Interested Employees"},"organizational-features":{"_type":"localeString","en":"Organizational Features","ru":"Организационные особенности"},"calculate-price":{"ru":"Рассчитать цену продукта","_type":"localeString","en":" Calculate product price"},"selling-stories":{"ru":"Продающие истории","_type":"localeString","en":" Selling stories"},"materials":{"ru":"Материалы","_type":"localeString","en":"Materials"},"about-product":{"en":"About Product","ru":"О продукте","_type":"localeString"},"or":{"ru":"или","_type":"localeString","en":"or"},"program-sends-data":{"en":"Program Sends Data","_type":"localeString"},"calculate-roi":{"_type":"localeString","en":"Calculate Product ROI","ru":"Рассчитать ROI продукта"},"complementary-categories":{"ru":"Схожие категории","_type":"localeString","en":"Complementary Categories"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"en":"Bonus","ru":"Бонус","_type":"localeString"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"configurator-content":{"_type":"localeString","en":"Calculate price for this product here","ru":"Рассчитайте стоимость продукта"},"configurator-link":{"_type":"localeString","en":"here","ru":"тут"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"user-popover":{"en":"user","ru":"пользователь","_type":"localeString"},"select-for-presentation":{"_type":"localeString","en":"select product for presentation","ru":"выбрать продукт для презентации"},"auth-message":{"en":"You have to register or login.","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString"},"add-to-comparison":{"en":"Add to comparison","ru":"Добавить в сравнение","_type":"localeString"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"ru":"Рассчитайте ROI для данного продукта","_type":"localeString","en":"Calculate ROI for this product here"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"videos":{"en":"Videos","ru":"Видео","_type":"localeString"},"vendor-verified":{"en":"Vendor verified","ru":"Подтверждено производителем","_type":"localeString"},"event-schedule":{"ru":"Расписание событий","_type":"localeString","en":"Events schedule"},"scheduling-tip":{"ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event."},"register-to-schedule":{"ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To register for the event please log in or register on the site."},"comparison-matrix":{"ru":"Матрица сравнений","_type":"localeString","en":"Comparison matrix"},"compare-with-competitive":{"en":" Compare with competitive","ru":"Сравнить с конкурентными","_type":"localeString"},"avg-deal-closing-unit":{"en":"months","ru":"месяцев","_type":"localeString"},"under-construction":{"_type":"localeString","en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке."},"product-presentation":{"_type":"localeString","en":"Product presentation","ru":"Презентация продукта"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"en":"See Details","ru":"Детали","_type":"localeString"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"_type":"localeString","en":"4 vendors","ru":"поставщикам"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"meta":[{"name":"og:type","content":"website"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Конкретный продукт","_type":"localeString","en":"Example product"}},{"name":"og:description","translations":{"_type":"localeString","en":"Description for one product","ru":"Описание для конкретного продукта"}},{"name":"title","translations":{"ru":"Продукт","_type":"localeString","en":"Product"}},{"name":"description","translations":{"en":"Product description","ru":"Описание продукта","_type":"localeString"}},{"name":"keywords","translations":{"en":"Product keywords","ru":"Ключевые слова продукта","_type":"localeString"}}],"title":{"ru":"ROI4CIO: Продукт","_type":"localeString","en":"ROI4CIO: Product"}}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"barracuda-waf-as-a-service":{"id":1582,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_WAF-as-a-Service.png","logo":true,"scheme":false,"title":"Barracuda WAF-as-a-Service","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-waf-as-a-service","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"Complete application security does not have to be complicated. Web applications are connected directly to your business and customer data. Attackers know this and have become increasingly clever with their attempts to bring down or compromise websites and apps. These attacks can be prevented, but organizations often struggle to implement a robust web application security posture due to several challenges:\r\n<ul>\r\n<li>Application security is complicated to deploy and manage without specialized resources.</li>\r\n<li>Continuous updates to applications can lead to new vulnerabilities.</li>\r\n<li>Legacy applications were developed without secure coding practices.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Why Barracuda WAF-as-a-Service?</span>\r\n<ul>\r\n<li>Built on a proven security platform. Enterprise-proven technology that provides comprehensive protection from all OWASP recognized security risks, DDoS attacks, and even the most advanced zero-day threats. Proactive bot defense ensures always-on protection from automated attacks, web scraping, and brute force attacks.</li>\r\n<li>Simplified application security for everyone. Remove the complexity of setting up and configuring your application security solution. Barracuda WAF-as-a-Service delivers protection for your web apps in minutes thanks to a simple 5-step setup wizard, and numerous pre-built security policy templates.</li>\r\n<li>Complete control. Unlimited rulesets. For more advanced users, Barracuda WAF-as-a-Service offers a level of control traditionally reserved only for on-premises and public cloud solutions. Fine-tune specific policies for each component of every application's security profile.</li>\r\n<li>Automated vulnerability discovery and remediation. Barracuda Vulnerability Remediation Service is built-in and provides automatic vulnerability detection and remediation which can be scheduled, ensuring ongoing protection without any administrative overhead.</li>\r\n<li>Granular visibility with detailed logs and reports. Gain rich insight into all web traffic events and users. Detailed compliance reports help you easily understand your security status at any given time by having complete visibility into all HTTP/S traffic.</li>\r\n<li>Unmetered DDoS protection included. DDoS attacks disrupt the service availability of your web apps which can have a significant impact on your business. Barracuda WAF-as-a-Service defends against the full spectrum of L3-L7 DDoS attacks ensuring the availability of your web apps.</li>\r\n</ul>\r\n","shortDescription":"Barracuda WAF-as-a-Service - Protect every web app, hosted anywhere, in minutes.","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda WAF-as-a-Service","keywords":"security, your, Barracuda, attacks, protection, WAF-as-a-Service, application, DDoS","description":"Complete application security does not have to be complicated. Web applications are connected directly to your business and customer data. Attackers know this","og:title":"Barracuda WAF-as-a-Service","og:description":"Complete application security does not have to be complicated. Web applications are connected directly to your business and customer data. Attackers know this","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_WAF-as-a-Service.png"},"eventUrl":"","translationId":1583,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[{"id":1287,"logoURL":"https://old.b4r.io/fileadmin/user_upload/BeyondTrust.png","logo":true,"scheme":false,"title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"beyondtrust-powerbroker-endpoint-protection-platform","companyTitle":"BeyondTrust","companyTypes":["supplier","vendor"],"companyId":4098,"companyAlias":"beyondtrust","description":"<span style=\"font-weight: bold;\">Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment</span>\r\nTargeted attacks can easily bypass antivirus solutions and other individual lines of defense, necessitating multi-layered endpoint protection. The PowerBroker Endpoint Protection Platform eliminates the need to implement and manage multiple point products by combining system and application firewalls, intrusion prevention, anti-malware, antivirus, and local vulnerability assessment capabilities. PowerBroker Endpoint Protection secures systems from entire classes of attack, without constant rule or signature updates.\r\n<ul><li>Protect critical endpoints with an all-in-one firewall, IPS, anti-malware, antivirus solution</li><li>Conduct local vulnerability assessments of air-gapped and otherwise disconnected systems</li><li>Protect web servers and web applications against exploits, zero-days, and unauthorized access (optional)</li><li>Reduce system management costs with a “no-touch” solution that eliminates the need for constant updates</li><li>Rely on updates from the renowned BeyondTrust Security Research Team</li></ul>","shortDescription":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM - Unified Firewall, IPS, Anti-Malware and Anti-Virus\r\nIntegrated multi-layered endpoint protection in a single, lightweight client that replaces multiple security agents, protecting against Advanced Persistent Threats (APTs), known exploits, zero-days, and all other attack vectors.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","keywords":"antivirus, need, Protection, PowerBroker, Endpoint, eliminates, BeyondTrust, updates","description":"Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment\rTargeted attacks can easily bypass antivirus solutions and other individual","og:title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","og:description":"Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment\rTargeted attacks can easily bypass antivirus solutions and other individual","og:image":"https://old.b4r.io/fileadmin/user_upload/BeyondTrust.png"},"eventUrl":"","translationId":1288,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1291,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Panda_Security.png","logo":true,"scheme":false,"title":"Panda Endpoint Protection","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"panda-endpoint-protection","companyTitle":"Panda Security","companyTypes":["supplier","vendor"],"companyId":4100,"companyAlias":"panda-security","description":"<span style=\"font-weight: 700; \">Contextual Intelligence</span>\r\nThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter known and unknown threats.\r\nIt analyzes, categorizes and correlates all the data obtained about cyber-threats in order to initiate prevention, detection, response and remediation routines.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Next-Generation Endpoint Security</span>\r\nAdvanced cyber-security to counter malware, with prevention, detection and remediation capabilities.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Endpoint Detection and Response</span>\r\nMonitoring, collecting and categorization of 100% of the active processes on all the organization’s endpoints\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Malware Intelligence Platform</span>\r\nThe correlation of data on cyber-threats configures a security intelligence system able to uncover patterns of malicious behavior.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Advanced threats are gone</span>\r\nThe Platform connects contextual intelligence with defensive operations to pre-empt malicious behavior and data leaks.\r\nThis way, protection systems can be activated before threats are executed.\r\nComplete advanced protection for endpoints and servers to eradicate the malware.\r\n","shortDescription":"Panda Endpoint Protection is the intelligent cyber-security platform designed to eradicate advanced threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Panda Endpoint Protection","keywords":"malicious, behavior, threats, Endpoint, intelligence, data, protection, malware","description":"Contextual Intelligence\rThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter","og:title":"Panda Endpoint Protection","og:description":"Contextual Intelligence\rThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter","og:image":"https://old.b4r.io/fileadmin/user_upload/Panda_Security.png"},"eventUrl":"","translationId":1292,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1299,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png","logo":true,"scheme":false,"title":"SonicWall Capture Advanced Threat Protection","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sonicwall-capture-advanced-threat-protection","companyTitle":"SonicWall","companyTypes":["supplier","vendor"],"companyId":4104,"companyAlias":"sonicwall","description":"SONICWALL CAPTURE ADVANCED THREAT PROTECTION\r\nSonicWall Capture Advanced Threat Protection service is a cloud-based network sandbox that analyzes suspicious code to help discover and stop newly developed malware.\r\n\r\n<ul><li>Multi-engine cloud sandbox that includes virtualization, hypervisor level analysis and full-system emulation</li><li>High security effectiveness at diagnosing new threats</li><li>Automated breach prevention enabled by blocking files until a security verdict is determined</li><li>Near real-time signature deployment protects organizations from follow-on attacks</li><li>Email and app notifications with robust reporting from the sandbox environment</li></ul>\r\n\r\nMULTI-ENGINE ADVANCED THREAT ANALYSIS\r\nCapture executes suspicious code and analyzes behavior simultaneously in multiple engines. This provides you with comprehensive visibility into malicious activity, while resisting evasion tactics and maximizing zero-day threat detection.\r\n\r\nBROAD FILE TYPE ANALYSIS\r\nAnalyze a broad range of operating systems and file types, including executable programs, DLL, PDF, MS Office documents, archives, JAR and APK.\r\n\r\nBLOCK UNTIL VERDICT\r\nTo prevent potentially malicious files from entering the network, files sent to the cloud for analysis can be held at the gateway until a verdict is determined.\r\n\r\nRAPID DEPLOYMENT OF REMEDIATION SIGNATURES\r\nWhen a file is identified as malicious, a hash is immediately created within Capture and later a signature is sent to firewalls to prevent follow-on attacks.\r\n\r\nREPORTING AND ALERTS\r\nCapture Advanced Threat Protection offers an at-a-glance dashboard with reports that detail the analysis results for files sent to the service, including session information, OS information, OS activity and network activity.","shortDescription":"SonicWall Capture Advanced Threat Protection service is a cloud-based multi-engine sandbox designed to discover and stop unknown, zero-day attacks such as ransomware at the gateway with automated remediation.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SonicWall Capture Advanced Threat Protection","keywords":"Capture, files, from, that, analysis, malicious, sandbox, activity","description":"SONICWALL CAPTURE ADVANCED THREAT PROTECTION\rSonicWall Capture Advanced Threat Protection service is a cloud-based network sandbox that analyzes suspicious","og:title":"SonicWall Capture Advanced Threat Protection","og:description":"SONICWALL CAPTURE ADVANCED THREAT PROTECTION\rSonicWall Capture Advanced Threat Protection service is a cloud-based network sandbox that analyzes suspicious","og:image":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png"},"eventUrl":"","translationId":1300,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1301,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cybowall.png","logo":true,"scheme":false,"title":"Cybonet Cybowall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cybonet-cybowall","companyTitle":"Cybonet","companyTypes":["supplier","vendor"],"companyId":2085,"companyAlias":"cybonet","description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all endpoints. Cybowall protects your network in real time; detecting and reacting to threats as they arise. Cybowall combines multiple cybersecurity tools and capabilities in one solution - securing networks of all sizes and providing unified defense against a continuously evolving threat landscape. \r\n<span style=\"font-weight: bold;\">Solution Benefits</span>\r\n\r\n<ul><li>Stop Endpoint Tampering and Malware - Leverage network and endpoint detection of Advanced Persistent Threats </li><li>Map Network Assets - Increase visibility with a map of all endpoints connected to your network to gain insight into your environment</li><li>Identify Vulnerabilities - Stay informed of vulnerabilities for patch deployment prioritization</li><li>Detect Lateral Movement - Trap attackers that have already breached perimeter defenses</li><li>Detect Active Breaches - Discover network breaches quickly to reduce damaging effects</li><li>Meet Compliance Requirements - Adhere to compliance standards; GDPR, ISO, PCI-DSS, HIPAA etc.</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Breach Detection</span>\r\n\r\n<ul><li>Intrusion Detection - Breach detection capabilities without network interference.</li><li>Network Traps - Insight into lateral movement between endpoints and detects threats by serving as a trip wire for active attacks.</li><li>Network Forensics - Discover and analyze the source of security attacks and incidents.</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Network Visibility</span>\r\nAsset Mapping - Dynamic asset map of all endpoints, including port profiles and activities.\r\nWMI - Leverage WMI and continuous endpoint scanning for full network visibility.\r\nSIEM - Log management, event management, event correlation and reporting to help identify policy violations and enable response procedures.\r\n\r\n<span style=\"font-weight: bold;\">Vulnerability Management</span>\r\n\r\n<ul><li>Vulnerability Assessment - Monitor business assets and identify vulnerable systems inside the network, including risk level, for patch deployment prioritization.</li><li>Default Passwords - Pinpoint and change default passwords to reduce risks.</li><li>Malware Hunter - Identify malicious files and where they reside in the network.</li></ul>\r\n</p>\r\n","shortDescription":"Cybowall combines multiple cybersecurity tools and capabilities in one solution - securing networks of all sizes and providing unified defense against a continuously evolving threat landscape","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cybonet Cybowall","keywords":"network, your, endpoints, Network, Cybowall, threats, endpoint, Leverage","description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all","og:title":"Cybonet Cybowall","og:description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all","og:image":"https://old.b4r.io/fileadmin/user_upload/Cybowall.png"},"eventUrl":"","translationId":1302,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1602,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Akamai_Technologies.png","logo":true,"scheme":false,"title":"Akamai Kona Web Application Firewall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"akamai-kona-web-application-firewall","companyTitle":"Akamai Technologies","companyTypes":["supplier","vendor"],"companyId":4283,"companyAlias":"akamai-technologies","description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application attacks. Globally-distributed across the Akamai Intelligent Platform™, Kona WAF can easily scale to defend against massive application attacks. Deployed at the edge of your network rather than in a data center, Kona WAF can identify and mitigate suspicious traffic without affecting performance or availability of the origin server. Security rules for Kona WAF are continuously refined by Akamai’s Threat Intelligence Team to protect against known attacks and respond to emerging threats. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">With Kona WAF you can: </span>\r\n<ul>\r\n<li>Reduce the risk of downtime, data theft and security breaches with a WAF that can scale to protect against the largest DoS and DDoS attacks.</li>\r\n<li>Ensure high performance even during attacks thanks to Akamai’s globally architecture.</li>\r\n<li>Defending against new and emerging threats with help from Akamai’s Threat Intelligence Team.</li>\r\n<li>Minimize costs of cloud security by avoiding the need for expensive dedicated hardware.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Key capabilities of Kona WAF</span>\r\n<ul>\r\n<li>Kona WAF provides comprehensive capabilities to protect against application-layer attacks. </li>\r\n<li>Adaptive rate controls automatically protect against application-layer DDoS and other volumetric attacks by monitoring and controlling the rate of requests against applications.</li>\r\n<li>Application-layer controls offer pre-defined, configurable WAF rules that govern Request Limit Violations, Protocol Violations, HTTP Policy Violations and more.</li>\r\n<li>Network-layer controls automatically deflect network-layer DDoS attacks at the network edge and define and enforce IP whitelists and blacklists to restrict requests from certain IP addresses or geographical regions.</li>\r\n<li>Security monitor provides real-time visibility into security events and enables administrators to drill down into attack alerts.</li>\r\n<li>Logging features enable you to integrate WAF and event logs with security information and event management to increase your threat posture awareness.</li>\r\n</ul>\r\n","shortDescription":"Kona Web Application Firewall from Akamai provides an highly scalable application firewall that defends against emerging threats to web security while keeping application performance high.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Akamai Kona Web Application Firewall","keywords":"attacks, against, Kona, with, security, Akamais, protect, controls","description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application","og:title":"Akamai Kona Web Application Firewall","og:description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application","og:image":"https://old.b4r.io/fileadmin/user_upload/Akamai_Technologies.png"},"eventUrl":"","translationId":1603,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1608,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cloudflare.png","logo":true,"scheme":false,"title":"Cloudflare web application firewall WAF","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cloudflare-web-application-firewall-waf","companyTitle":"Cloudflare","companyTypes":["supplier","vendor"],"companyId":4284,"companyAlias":"cloudflare","description":"Cloudflare’s enterprise-class web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site scripting, and cross-site forgery requests with no changes to your existing infrastructure.\r\nCloudflare sees roughly 2.9 million requests every second and our WAF is continually identifying and blocking new potential threats.\r\n<span style=\"font-weight: bold;\">Automatic WAF Updates</span>\r\nCloudflare security engineers constantly monitor the Internet for new vulnerabilities. When we find threats that apply to a large portion of our users, we automatically apply WAF rules to protect their Internet properties. Let us take care of tracking state-of-the-art hacking techniques so you can focus on creating useful features instead of protecting them from would-be attackers.\r\nOn-premise firewalls quickly become outdated and require professional service hours to regularly update rules to protect against new threats. Cloudflare’s WAF helps you stay ahead of threats by automatically updating when new security vulnerabilities are released. Rules created by Cloudflare in response to new threats are responsible for mitigating the vast majority of threats on our network. While traditional OWASP rules and customer specific rules are important, they are not enough without Cloudflare's automatic WAF updates.\r\n<span style=\"font-weight: bold;\">Collective Intelligence</span>\r\nCloudflare sees roughly 2.9 million requests every second, and our WAF is continually identifying and blocking new potential threats. If you’re using a web application firewall that doesn’t leverage the collective intelligence of other web properties, you need to supply all your own WAF rules from scratch, which means you need to monitor the entire Internet security landscape on your own.\r\n<span style=\"font-weight: bold;\">Intelligent WAF</span>\r\nWhen one customer requests a new custom WAF rule, we analyze whether it applies to all 7 million domains on our network. If it does, we automatically apply that rule to everybody on our network. The more web properties on our network, the stronger our WAF gets, and the safer the Cloudflare community becomes.\r\n<span style=\"font-weight: bold;\">Multi-Cloud Holistic Security Framework</span>\r\nCloudflare offers a single source of control for the security of websites, applications, and APIs, hosted across multiple cloud environments. Multi-cloud security provides visibility into security events, while allowing for consistent security controls, across all clouds in which Internet assets are deployed. Any attack traffic seen by Cloudflare is recorded and analyzed. Cloudflare’s network then shields Internet assets across all cloud providers.\r\n<span style=\"font-weight: bold;\">PCI Compliance</span>\r\nUtilizing Cloudflare’s WAF helps you cost effectively fulfill PCI compliance. If you’re a merchant who handles consumer credit card information, PCI DSS 2.0 and 3.0 Requirement 6.6 allows for two options to meet this requirement:\r\n<span style=\"font-weight: bold;\">Deploy a WAF in front of your website</span>\r\nOr, conduct application vulnerability security reviews of all of your in-scope web applications\r\n<span style=\"font-weight: bold;\">OWASP, Application-Specific, and Custom Rules</span>\r\nCloudflare’s WAF protects your web properties from the OWASP top 10 vulnerabilities by default. These OWASP rules are supplemented by 148 built-in WAF rules that you can apply with the click of a button. Business and Enterprise customers can also request custom WAF rules to filter out specific attack traffic.\r\n<span style=\"font-weight: bold;\">OWASP Top 10 Vulnerabilities</span>\r\n<ul><li>Injection</li><li>Broken Authentication and Session Management</li><li>Sensitive Data Exposure</li><li>XML External Entities (XXE)</li><li>Broken Access Control</li><li>Security Misconfiguration</li><li>Cross-Site Scripting (XSS)</li><li>Insecure Deserialization</li><li>Using Components with Known Vulnerabilities</li><li>Insufficient Logging & Monitoring</li></ul>\r\n<span style=\"font-weight: bold;\">Protecting Against Zero-Day Vulnerabilities</span>\r\nCloudflare security engineers have dealt with a lot of zero-day vulnerabilities over the years. Read our developer blog to learn how every website on our network benefits from their virtual patches.\r\n<span style=\"font-weight: bold;\">A Look at the New WP Brute Force Amplification Attack</span>\r\nA vulnerability in the XML remote procedure protocol allowed potentially thousands of brute force password attempts in a single HTTP request.\r\n<span style=\"font-weight: bold;\">The Joomla Unserialize Vulnerability</span>\r\nThe Joomla Unserialize Vulnerability allowed remote code execution via a poorly sanitized User-Agent and X-Forwarded-For headers.\r\n<span style=\"font-weight: bold;\">Protection Against Critical Windows Vulnerability (CVE-2015-1635)</span>\r\nCloudflare WAF protected users from a critical bug that allowed unpriviledeged users to hang a Windows web server.\r\n<span style=\"font-weight: bold;\">Threat Blocking & Privacy Features</span>\r\n<ul><li>Collective intelligence to identify new threats</li><li>Reputation-based threat protection</li><li>Comment spam protection</li><li>Block or challenge visitors by IP address</li><li>Block or challenge visitors by AS number</li><li>Block or challenge visitors by country code</li><li>User agent blocking</li><li>Zone lockdown</li><li>Security level configuration</li></ul>","shortDescription":"Cloudflare’s web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site scripting.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cloudflare web application firewall WAF","keywords":"Cloudflare, security, rules, your, threats, network, from, Internet","description":"Cloudflare’s enterprise-class web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site","og:title":"Cloudflare web application firewall WAF","og:description":"Cloudflare’s enterprise-class web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site","og:image":"https://old.b4r.io/fileadmin/user_upload/Cloudflare.png"},"eventUrl":"","translationId":1609,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1610,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Radware.jpg","logo":true,"scheme":false,"title":"Radware AppWall - Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"radware-appwall-web-application-firewall-waf","companyTitle":"radware","companyTypes":["vendor"],"companyId":2746,"companyAlias":"radware","description":"AppWall is an ICSA Labs certified and PCI compliant WAF that combines positive and negative security models to provide complete protection against web application attacks, web application attacks behind CDNs, API manipulations, advanced HTTP attacks (slowloris, dynamic floods), brute force attacks on login pages and more.\r\nA core and integrated part of Radware's Attack Mitigation Solution – a complete application and network security suite. AppWall is a web application firewall (WAF) that provides patent-protected technology to create and maintain security policies in real-time for widest security coverage with the lowest false positives and minimal operational effort. Radware’s Web application security technology features a variety of deployment modes – as a stand-alone or integrated on an ADC, on-premise and in the cloud, inline or out-of-band.\r\nWhat Makes AppWall a Better Web Application Firewall (WAF)?\r\n<span style=\"font-weight: bold;\">Protection from Zero-Day Web Attacks </span>\r\nUsing both negative (signature based) and positive security models - AppWall is a web application firewall (WAF) that features not only the lowest false positives and minimal operational effort, but also robust protection against known and unknown (Zero-day) threats.\r\n<span style=\"font-weight: bold;\">Reduced TCO with Lowest False Positives</span>\r\nUnique Auto Policy Generation technology designed to secure a web application as automatically as possible with little or limited user interaction. AppWall is a web application firewall (WAF) that analyzes the protected Web application and derives the potential threats in it. It then generates individual, granular protection rules and sets a policy in blocking mode - thus eliminating the need for human intervention and saving on maintenance and labor resources.\r\n<span style=\"font-weight: bold;\">Continuous Security Delivery</span>\r\nFirst web application firewall (WAF) to provide a real-time security patching solution for Web applications in continuous application deployment environments via a tight integration with Dynamic Application Security Testing (DAST) solutions.\r\n<span style=\"font-weight: bold;\">Device Fingerprinting for Bot Protection</span>\r\nAppWall is an IP agnostic web-application security solution. It disregards IP source address context to protect from dynamic IP attacks. The power of the fingerprint is in the consolidated information extracted from dozens of browser attributes collected on the client side, facilitating accurate bot classification.\r\n<span style=\"font-weight: bold;\">Unique Out-of-Path Deployment with Full Mitigation</span>\r\nAppWall is the only web application firewall (WAF) that can be deployed out-of-path while still providing full mitigation. As part of Radware's integrated Attack Mitigation Solution, AppWall can communicate attack footprint and blocking policies to Radware’s perimeter attack-mitigation device, DefensePro, so the attack is blocked at the perimeter and the rest of the network is protected.\r\n<span style=\"font-weight: bold;\">Full Coverage of OWASP Top-10 Out-of-the-box</span>\r\nIncluding injections, cross-site scripting (XSS), cross-site request forgery (CSRF), broken authentication and session management and security misconfiguration.\r\n<span style=\"font-weight: bold;\">Data Leak Prevention</span>\r\nIdentifying and blocking sensitive information transmission such as credit card numbers (CCN) and social security numbers (SSN).\r\n<span style=\"font-weight: bold;\">Integrated Application Security & Application Delivery</span>\r\nAppWall is an integral part of Radware's Application Delivery Controller (ADC) solution suite, which allows customers to augment their web application security protection with local and global traffic redirection, application acceleration, bandwidth management, and other application-aware services, while benefitting from a single hardware platform.\r\n<span style=\"font-weight: bold;\">Easy Migration From Test Environments to Production</span>\r\nAn AppWall VA can be deployed with the application in the production environment or – if deployed in a lab – policy is easily migrated to the AppWall appliance in production. This approach simplifies the integration and shortens the deployment time of new applications and services in the virtualized and cloud data centers.\r\n<span style=\"font-weight: bold;\">ICSA Labs Certified WAF</span>\r\nRecognized for both the appliance and VM versions, ICSA Labs certifies AppWall for its depth and breadth of vulnerability protection, effectiveness, ease of implementation and low operation overhead.\r\n<span style=\"font-weight: bold;\">Comprehensive PCI Compliance Solution</span>\r\nAppWall enables organizations to fully comply with PCI DSS section 6.6 requirements and includes the most advanced security graphical reports to convey visibility into the application security and detected attacks.","shortDescription":"AppWall - Radware’s Web Application Firewall (WAF), ensures fast, reliable and secure delivery of mission-critical Web applications for corporate networks and in the cloud.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Radware AppWall - Web Application Firewall (WAF)","keywords":"application, AppWall, security, with, Application, attacks, protection, that","description":"AppWall is an ICSA Labs certified and PCI compliant WAF that combines positive and negative security models to provide complete protection against web","og:title":"Radware AppWall - Web Application Firewall (WAF)","og:description":"AppWall is an ICSA Labs certified and PCI compliant WAF that combines positive and negative security models to provide complete protection against web","og:image":"https://old.b4r.io/fileadmin/user_upload/Radware.jpg"},"eventUrl":"","translationId":1611,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1615,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Instart_Logic.jpg","logo":true,"scheme":false,"title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"instart-logic-visionary-web-application-firewall-and-ddos","companyTitle":"Instart Logic","companyTypes":["supplier","vendor"],"companyId":4285,"companyAlias":"instart-logic","description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of attacks including OWASP Top 10 vulnerabilities:\r\n<ul><li>Cross-Site Scripting</li><li>SQL injection</li><li>Slow HTTP DoS</li><li>Cross-Site Request Forgery</li></ul>\r\nInstart Logic also offers comprehensive distributed denial of service (DDOS) attack protection using our globally distributed platform to absorb and mitigate attacks. As an internet-scale service provider, our global-ready infrastructure ensures a best-in-class protection for your online presence.","shortDescription":"Instart Logic’s globally distributed carrier-grade security applications use artificial intelligence and machine learning to protect cloud, web and mobile applications from the threat","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","keywords":"attacks, Instart, distributed, DDOS, Visionary, Logic, service, protection","description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of","og:title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","og:description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of","og:image":"https://old.b4r.io/fileadmin/user_upload/Instart_Logic.jpg"},"eventUrl":"","translationId":1616,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1618,"logoURL":"https://old.b4r.io/fileadmin/user_upload/NSFOCUS.jpeg","logo":true,"scheme":false,"title":"NSFOCUS Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nsfocus-web-application-firewall-waf","companyTitle":"NSFOCUS","companyTypes":["supplier","vendor"],"companyId":4287,"companyAlias":"nsfocus","description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web application layer. It also includes up to 1 Gbps of DDoS protection from other volumetric and application layer attacks, including TCP flood and HTTP/S GET/ POST floods. Additionally, if deployed in conjunction with a higher capacity NSFOCUS ADS Series Anti-DDoS appliance, the WAF can direct flows in real-time to the ADS to keep your servers running under the most extreme conditions.\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Features and Benefits</span>\r\n<span style=\"font-weight: bold;\">Prevent Theft of Critical Data</span>\r\nData breaches are extremely complex and surprisingly frequent. The NSFOCUS WAF offers powerful protection against web attacks with a complete set of signatures for web vulnerabilities and the ability to detect unauthorized file uploads. WAF enforces access control policy from layer 4 through layer 7, to prevent access to data without proper authorization. In the later phases of an attack, WAF provides outbound data leakage detection, including illegal file download detection, web shell prevention, and filtering of sensitive information (such as credit card numbers and social security numbers).\r\n<span style=\"font-weight: bold;\">Ensure Website Availability</span>\r\nThe NSFOCUS WAF offers a built-in anti-DDoS module to protect against TCP flood attacks, HTTP/S GET/POST flood attacks and slow rate attacks up to 1Gbps. The WAF employs access rate thresholding, IP reputation and algorithm-based protection mechanisms. Coupled with the NSFOCUS ADS anti-DDoS product line, higher rate DDoS attacks can be thwarted.\r\n<span style=\"font-weight: bold;\">Close the PCI DSS Compliance Gap</span>\r\nThe NSFOCUS WAF provides reports for PCI audits as well as suggestions for policy tuning and configuration in order to help ensure compliance with PCI DSS. Protections like the cookie security feature within the WAF protects against cookie tampering and cookie poisoning in compliance with section 6.5.10 in the new PCI 3.2 standard.\r\n","shortDescription":"The WAF serves as an essential part of any defense-in-depth security architecture by providing advanced inspection and specialized security for the web application layer. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"NSFOCUS Web Application Firewall (WAF)","keywords":"attacks, NSFOCUS, with, security, layer, access, against, rate","description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web","og:title":"NSFOCUS Web Application Firewall (WAF)","og:description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web","og:image":"https://old.b4r.io/fileadmin/user_upload/NSFOCUS.jpeg"},"eventUrl":"","translationId":1619,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1622,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Airlock.png","logo":true,"scheme":false,"title":"Airlock Web Application Firewall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"airlock-web-application-firewall","companyTitle":"Ergon Informatik AG","companyTypes":["supplier","vendor"],"companyId":4288,"companyAlias":"ergon-informatik-ag","description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance, security for online banking or protection for eCommerce: Airlock WAF will upgrade security for your internet applications – a permanent solution with a host of well thought-out functionalities.\r\nThanks to Airlock WAF, businesses can exploit the potential of the internet without jeopardizing the security and availability of their web applications and services. Each access is systematically monitored and filtered at every level. Used in conjunction with an authentication solution such as Airlock Login or IAM, Airlock WAF can force upstream user authentication and authorization. This allows a uniform, central single sign-on infrastructure. All important information is also made available via monitoring and reporting functions. Airlock WAF is the only web application security solution on the market that provides superlative end-to-end protection for complex web environments.\r\n<span style=\"font-weight: bold;\">Airlock WAF - The main features</span>\r\n<ul><li>Secure Reverse Proxy</li><li>Central Checkpoint</li><li>Filtering</li><li>API Security</li><li>Dynamic Whitelisting</li><li>Central Security Hub</li><li>High Availability and Performance</li></ul>\r\n<span style=\"font-weight: bold;\">Airlock WAF is also available as a hardware appliance</span>\r\nWith the Airlock WAF hardware appliance, setup and going live will be even easier than today. Of course, hardware appliances can be connected to build a failover cluster with active session synchronization.","shortDescription":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications, whether your objective is PCI DSS compliance, security for online banking or protection ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Airlock Web Application Firewall","keywords":"Airlock, security, with, solution, applications, hardware, will, also","description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance,","og:title":"Airlock Web Application Firewall","og:description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance,","og:image":"https://old.b4r.io/fileadmin/user_upload/Airlock.png"},"eventUrl":"","translationId":1623,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1624,"logoURL":"https://old.b4r.io/fileadmin/user_upload/VenusTech.jpeg","logo":true,"scheme":false,"title":"Venusense Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"venusense-web-application-firewall-waf","companyTitle":"VenusTech","companyTypes":["supplier","vendor"],"companyId":4289,"companyAlias":"venustech","description":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. It mainly provides HTTP/HTTPS traffic analysis for Web servers, prevents attacks aimed at Web application vulnerabilities, optimizes Web application accesses to improve the availability, performance, and security of Web/network protocol based applications and ensure the quick, secure, and reliable delivery of Web service applications.\r\n<span style=\"font-weight: bold;\">Features:</span>\r\n● Web attack prevention\r\n-SQL injection attack prevention (based on the advanced patented algorithm)\r\n-XSS attack prevention (based on the advanced patented algorithm)\r\n-Malicious Web scanning prevention (supports virtual patching)\r\n-Application layer DoS attack prevention\r\n-HTTPS SSL3.0/TLS1.0/TLS1.1/TLS1.2.\r\n● Unauthorized Web access prevention\r\n-CSRF attack prevention (supports self-learning)\r\n-Cookie tamper prevention (supports self-learning)\r\n-Website hotlink prevention\r\n● Malicious Web code prevention\r\n-Webpage embedded Trojan prevention (based on the patented advanced algorithm)\r\n-WebShell prevention\r\n● Web application compliance\r\n-URL-based access control\r\n-HTTP protocol compliance (supports machine self-learning)\r\n-Sensitive information leakage prevention\r\n-File upload and download control\r\n-Web form keyword filtering\r\n● Web application delivery\r\n-Webpage defacement prevention\r\n-URL-based traffic control\r\n-Web application acceleration\r\n-Server load balancing\r\nValue: Venusense WAF uses a set of HTTP session policies that can protect security from common Web attacks such as SQL injection and XSS. Users can customize policies in order to recognize and block more attacks and mitigate Web security problems that cannot be resolved by using traditional security devices such as firewalls and UTMs. Venusense WAF does well in Web security protection and application delivery, provides the professional Web attack prevention capability, and brings an integrated Web security solution that is easy to deploy and manage. 4Advantages:\r\n● Leading Web security delivery and security protection capabilities in the industry: Integrates Web attack prevention, malicious Web code prevention, unauthorized Web access prevention, Web application compliance, and Web application delivery acceleration to build an excellent Web security delivery platform.\r\n● Complete and effective Web attack detection: Integrates VXID detection, event signature detection, customized event signature detection, and self-learning modeling detection to prevent known Web attacks such as SQL injection attacks, XSS attacks, and CSRF attacks and protect against special attacks and unknown attacks by using detection measures such as customized event signature and self-learning modeling.\r\n● Quick response to Web attack events: Has a built-in Web prevention event library, provides periodical upgrade and immediate upgrade once upon emergent Web events, quickly responds to latest, emergent, or hotspot Web attack events. With a large number of vulnerability discoverers and analysts, Venustech's ADLab has independently discovered the most CVE vulnerabilities in China.\r\nDeployment:\r\n● Bridge mode\r\nIn bridge mode, users do not need to change the original network topology and configurations, to protect the Web server.\r\n● Proxy mode\r\nIn proxy mode, the actual IP address of the Web server can be hidden to access users, to protect the Web server.\r\n● One-arm mode\r\nThe one-arm mode is similar to one-arm routing, in which WAF is physically deployed in bypass mode and logically deployed in path mode. In one-arm mode, attacks from the network application layer can be blocked. When WAF becomes unavailable, service traffic will not be blocked. In this mode, only one network interface is used to filter internal network traffic. Users do not need to change the physical network structure and IP settings, so configuration can be completed quickly.\r\n● BYPASS\r\nAs a serial access security device, WAF provides the software BYPASS function and hardware BYPASS function in bridge deployment mode to ensure smooth service links.\r\nCertifications and Honors: ● EAL3 Plus Certificate (Megabit, Gigabit, Ten-Gigabit)\r\n● CVE Certificate\r\n● Web Application Firewall Certificate issued by OWASP China\r\n● IPv6 Ready Logo Phase 2 Gold Accreditation Certificate","shortDescription":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Venusense Web Application Firewall (WAF)","keywords":"prevention, security, mode, application, attacks, attack, delivery, detection","description":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. It mainly","og:title":"Venusense Web Application Firewall (WAF)","og:description":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. It mainly","og:image":"https://old.b4r.io/fileadmin/user_upload/VenusTech.jpeg"},"eventUrl":"","translationId":1625,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1626,"logoURL":"https://old.b4r.io/fileadmin/user_upload/WAPPLES.jpg","logo":true,"scheme":false,"title":"WAPPLES Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"wapples-web-application-firewall-waf","companyTitle":"Penta Security Systems","companyTypes":["supplier","vendor"],"companyId":4290,"companyAlias":"penta-security-systems","description":"Market share leader for three consecutive years, WAPPLES is the Web Application Firewall (WAF) of choice for customers in the Asia Pacific.\r\nBesides blocking basic web attacks, WAPPLES is deployed to effectively guard against sensitive data leakage, block malicious web access and prevent website defacement in this era of intensified attacks.\r\nPowered by an intelligent detection engine, WAPPLES is capable of combating the newest threats, including attacks often utilized in Advanced Persistent Threats (APT) launched by malicious agents to obtain data assets of governments and enterprises or for terrorism or political gains.\r\nWhile traditional WAFs depend on high-maintenance signature updates for low-accuracy pattern-matching, WAPPLES uses a logic-based detection engine called COCEP™ (Contents Classification and Evaluation Processing).\r\nUtilizing 28 pre-configured detection rules, modified and even unknown attacks are categorized and blocked heuristically and semantically. This proprietary technology allows WAPPLES to deliver superior security with industry-leading accuracy and low false positive rates under various network environments. Maintaining high stability and performance, WAPPLES’ ease of deployment and low operational workload was recognized by Gartner as what made the WAF a popular choice for surveyed clients.\r\n<span style=\"font-weight: bold;\">WAF comparison</span>\r\nThrough the analysis of an attack’s characteristics, WAPPLES is able to identify attacks that utilize new patterns of exploit that often bypass typical WAFs utilizing signature-based detection engines.\r\n1st and 2nd generation WAFs that operate on blacklists and whitelists lag behind due to their reliance on signature updates to detect the latest threats. In comparison, the sophistication of security that WAPPLES can provide greatly surpasses that of signature-based WAFs.\r\n<span style=\"font-weight: bold;\">WAPPLES Product Family and Related Services</span>\r\n<ul><li>WAPPLES (Appliance-type WAF product)</li><li>WAPPLES SA (Virtual WAF optimized for cloud environment)</li><li>Cloudbric (Cloud-based web security service)</li><li>Cloudbric Business Edition (Web security delivered from Cloudbric or Partner infrastructure)</li></ul>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Features</span>\r\n<span style=\"font-weight: bold;\">High-Accuracy Web Attack Defense</span>\r\n<ul><li>Logic-analysis based COCEP™ engine protects websites against OWASP Top 10 risks</li><li>Extremely low false positive rates through heuristic and semantic traffic analysis</li><li>Utilizes 28 detection rules that can be fine-tuned to create robust custom security policies</li><li>Defense from known, zero-day, and HTTP DDoS attacks</li><li>Validity testing (Luhn: ISO/IEC7812) prevents leakage of sensitive data</li><li>High Performance and Stability</li></ul>\r\n<span style=\"font-weight: bold;\">Optimized core provides enhanced performance</span>\r\n<ul><li>High processing power with in-memory computing capability</li><li>Stable performance even with strict security policy settings enabled</li><li>Increased bandwidth through bonding technology</li><li>Easy to Install & Configure</li></ul>\r\n<span style=\"font-weight: bold;\">Minimal changes to existing systems</span>\r\n<ul><li>Quick setup with preconfigured security policies</li><li>Statistics visualized on centralized dashboard</li><li>Intuitive and easy-to-use GUI management console</li><li>Increases efficiency in web security management</li></ul>\r\n<span style=\"font-weight: bold;\">Supports Various Environments</span>\r\n<ul><li>Can be deployed in Reverse proxy, Inline, or High Availability (HA) configuration modes</li><li>Support for EtherChannel and Multi-Segment</li><li>Integration with SIEM (Micro Focus ArcSight, Splunk)</li></ul>\r\n<span style=\"font-weight: bold;\">Implementation</span>\r\nWhen a customer chooses to deploy WAPPLES, a thorough analysis of the customer environment will be conducted prior to installation. This is important for optimizing policy settings tailored to specific operational and business needs to achieve an optimal configuration. Post-installation, detection logs are also monitored over a period of time and analyzed to further fine-tune the security policies and complete the implementation process.\r\n<ul><li>Pre-inspection</li><li>WAPPLES installation</li><li>WAPPLES configuration</li><li>Operation testing and demonstration</li><li>Detection log analysis</li><li>Analysis report</li><li>Policy modification</li></ul>","shortDescription":"WAPPLES WAF is deployed to effectively guard against sensitive data leakage, blocking basic web attacks, block malicious web access and prevent website defacement in this era of intensified attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"WAPPLES Web Application Firewall (WAF)","keywords":"WAPPLES, security, detection, that, with, attacks, WAFs, performance","description":"Market share leader for three consecutive years, WAPPLES is the Web Application Firewall (WAF) of choice for customers in the Asia Pacific.\rBesides blocking","og:title":"WAPPLES Web Application Firewall (WAF)","og:description":"Market share leader for three consecutive years, WAPPLES is the Web Application Firewall (WAF) of choice for customers in the Asia Pacific.\rBesides blocking","og:image":"https://old.b4r.io/fileadmin/user_upload/WAPPLES.jpg"},"eventUrl":"","translationId":1627,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1628,"logoURL":"https://old.b4r.io/fileadmin/user_upload/DenyAll.png","logo":true,"scheme":false,"title":"DenyAll Web Application Firewall (LTS)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"denyall-web-application-firewall-lts","companyTitle":"DenyAll, a Rohde & Schwarz Cybersecurity company","companyTypes":["supplier","vendor"],"companyId":4291,"companyAlias":"denyall-kompanija-rohde-schwarz-cybersecurity","description":"DenyAll Web Application Firewall provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently passing benign traffic through. This all-in-one solution protects and manages multiple security solutions - Web Application Firewall, Web Services Firewall and Web Access Management - in a single management console (centralized administration station, monitoring, reverse proxy, etc.). The platform also provides cache, acceleration and optimization of your web traffic.\r\n<span style=\"font-weight: bold;\">Highlights</span>\r\n<ul><li>Web Application Firewall (WAF): to protect the web applications vital to every business against external threats and to assure continuous service.</li><li>Web Services Firewall (WSF): to protect the infrastructure, information networks and application servers against attacks while preventing denial of service and anticipating traffic overload.</li><li>Web Access Management (WAM): to simplify Web access authentication while maintaining a high level of security, without agent deployment on the application server.</li></ul>","shortDescription":"DenyAll Web Application Firewall (WAF) provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently passing benign traffic through.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DenyAll Web Application Firewall (LTS)","keywords":"Firewall, Application, security, while, traffic, service, application, DenyAll","description":"DenyAll Web Application Firewall provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently","og:title":"DenyAll Web Application Firewall (LTS)","og:description":"DenyAll Web Application Firewall provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently","og:image":"https://old.b4r.io/fileadmin/user_upload/DenyAll.png"},"eventUrl":"","translationId":1629,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1634,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Trustwave.png","logo":true,"scheme":false,"title":"TrustWave Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"trustwave-web-application-firewall-waf","companyTitle":"Trustwave","companyTypes":["supplier","vendor"],"companyId":4293,"companyAlias":"trustwave","description":"The Trustwave WAF integrates with Trustwave application scanning solution, App Scanner to provide customized protection for any application via virtual patching and is backed by the expertise of our elite SpiderLabs Research team, who deliver ongoing application vulnerability and emerging threat information.\r\nAttackers use a wide range or techniques to attack web applications: site scraping, malicious bots, zero-day, targeted attacks and more. The Trustwave WAF protects against these and others, including the OWASP Top 10 by offering a comprehensive set of capabilities, including positive and negative security, virtual patching, inspection of outgoing traffic, and more. The Trustwave WAF is fueled by the SpiderLabs Research team, who provide rules and threat intelligence that identify the latest web application attacks and threats.\r\n<span style=\"font-weight: bold;\">Features</span>\r\n<ul><li>Continuous Protection. Delivers continuous protection With a combination of positive and negative security, perpetual tuning and dynamic virtual patching.</li><li>Ease of Use. Centralized management dashboards and an intuitive UI let you prioritize and respond faster and more effectively to threats.</li><li>Multiple Deployment Options. Implement Trustwave WAF how you need it - inline or out-of-line and as a cloud service in Amazon Web Services or Microsoft Azure or as a physical or virtual appliance.</li><li>Real-Time Threat Detection. Identify abnormal behavior, improve threat blocking and prevent outbound data leaks with bi-directional traffic analysis and behavioral profiling.</li><li>Simplified Customization. Pre-define rules and customize scenarios to focus on the specific requirements of your applications and your business.</li><li>Improved Performance. Take advantage of features outside of security to improve performance by load balancing traffic or identifying issues and trends in the web application environment.</li><li>Built-in Threat Intelligence. The elite SpiderLabs team delivers ongoing application vulnerability and emerging threat information to the Trustwave WAF.</li><li>Built-In Compliance Reporting. Includes pre-built best practice controls and reports for compliance mandates including the PCI DSS.</li><li>Built-in Integration. Integration with Trustwave App Scanner provides customized protection for any application via virtual patching.</li></ul>","shortDescription":"The Trustwave Web Application Firewall (WAF) helps you protect your valuable web applications and data by continuously monitoring traffic and enforcing policies to identify and block threats. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"TrustWave Web Application Firewall (WAF)","keywords":"Trustwave, application, virtual, patching, threat, SpiderLabs, team, protection","description":"The Trustwave WAF integrates with Trustwave application scanning solution, App Scanner to provide customized protection for any application via virtual","og:title":"TrustWave Web Application Firewall (WAF)","og:description":"The Trustwave WAF integrates with Trustwave application scanning solution, App Scanner to provide customized protection for any application via virtual","og:image":"https://old.b4r.io/fileadmin/user_upload/Trustwave.png"},"eventUrl":"","translationId":1635,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1166,"logoURL":"https://old.b4r.io/fileadmin/user_upload/NetSparker.png","logo":true,"scheme":false,"title":"Netsparker Desktop","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"netsparker-desktop","companyTitle":"NetSparker","companyTypes":["supplier","vendor"],"companyId":4064,"companyAlias":"netsparker","description":"<span style=\"font-weight: bold;\">Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws.</span>\r\nNetsparker automatically exploits the identified vulnerabilities in a read-only and safe way, and also produces a proof of exploitation. Therefore you can immediately see the impact of the vulnerability and do not have to manually verify it.\r\n<span style=\"font-weight: bold;\">Netsparker's dead accurate scanning technology finds more vulnerabilities.</span>\r\nNetsparker’s unique vulnerability scanning technology has better coverage and finds more vulnerabilities than any other scanner, as proven when tested in head to head independent comparison tests.\r\n<span style=\"font-weight: bold;\">Netsparker Desktop allows you to automate more.</span>\r\nThe primary goal of a web application security scanner is to eliminate the repetitive drudgery of web security testing, leaving you free to use your skills in areas where you make a real difference. Netsparker Desktop boasts an arsenal of automated security testing weapons that get straight to the point, providing users with the precise information.","shortDescription":"Netsparker Desktop is available as a Windows application and is an easy-to-use web application security scanner that uses the advanced Proof-Based vulnerability scanning technology and has built-in penetration testing and reporting tools.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Netsparker Desktop","keywords":"Netsparker, more, security, Desktop, vulnerabilities, finds, vulnerability, technology","description":"Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws.\rNetsparker automatically exploits the","og:title":"Netsparker Desktop","og:description":"Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws.\rNetsparker automatically exploits the","og:image":"https://old.b4r.io/fileadmin/user_upload/NetSparker.png"},"eventUrl":"","translationId":1167,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":79,"title":"VM - Vulnerability management","alias":"vm-vulnerability-management","description":"Система управления уязвимостями выполняет проактивное сканирование IT-инфраструктуры на наличие неверных конфигураций, слабых мест, вредоносных компонентов и предоставляет рекомендации по устранению существующих рисков.\r\n \r\nТакая система анализирует все компоненты инфраструктуры, включая сети, операционные системы, базы данных и web-приложения. По итогам проверки приложение осуществляет приоритезацию обнаруженных угроз и генерирует руководства, как снизить каждую из них. \r\n ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/VM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1168,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Netsparker_Cloud.png","logo":true,"scheme":false,"title":"Netsparker Cloud","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"netsparker-cloud","companyTitle":"NetSparker","companyTypes":["supplier","vendor"],"companyId":4064,"companyAlias":"netsparker","description":"<span style=\"font-weight: bold;\">Affordable And Maintenance Free Web Application Security Solution</span>\r\nEmbrace the benefits of the cloud! With Netsparker Cloud you do not need to buy, license, install and support any hardware or software. Simply pay a yearly fee and launch as many web application security scans as you want from anywhere using the web based dashboard.\r\n<span style=\"font-weight: bold;\">Scalable & always Available: Scan as many websites as you want, when you want</span>\r\nLaunch as many web application vulnerability scans as you want within just a few minutes, boost your productivity and stay a step ahead of the bad guys. A new vulnerability such as Heartbleed or Shellshock is being exploited in the wild? Do you need to scan 500, or 1000 web applications in just a few hours? You have new web applications that you need to add to your extensive web vulnerability scanning program? Login to Netsparker Cloud and launch the web security scans.","shortDescription":"Netsparker Cloud is a scalable multi-user online web application security scanning solution with built-in workflow tools. It has built-in enterprise workflow tools and is specifically designed to help enterprises scan and manage the security of 100s and 1000s of websites.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Netsparker Cloud","keywords":"want, Netsparker, vulnerability, need, scans, many, Cloud, launch","description":"Affordable And Maintenance Free Web Application Security Solution\rEmbrace the benefits of the cloud! With Netsparker Cloud you do not need to buy, license,","og:title":"Netsparker Cloud","og:description":"Affordable And Maintenance Free Web Application Security Solution\rEmbrace the benefits of the cloud! With Netsparker Cloud you do not need to buy, license,","og:image":"https://old.b4r.io/fileadmin/user_upload/Netsparker_Cloud.png"},"eventUrl":"","translationId":1169,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":79,"title":"VM - Vulnerability management","alias":"vm-vulnerability-management","description":"Система управления уязвимостями выполняет проактивное сканирование IT-инфраструктуры на наличие неверных конфигураций, слабых мест, вредоносных компонентов и предоставляет рекомендации по устранению существующих рисков.\r\n \r\nТакая система анализирует все компоненты инфраструктуры, включая сети, операционные системы, базы данных и web-приложения. По итогам проверки приложение осуществляет приоритезацию обнаруженных угроз и генерирует руководства, как снизить каждую из них. \r\n ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/VM.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1170,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SKYBOX_HORIZON.png","logo":true,"scheme":false,"title":"SKYBOX HORIZON","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"skybox-horizon","companyTitle":"SkyBox","companyTypes":["supplier","vendor"],"companyId":4065,"companyAlias":"skybox","description":"Get unprecedented visibility of the attack surface, including indicators of exposure (IOEs). Horizon’s security visualization and mapping capabilities are rooted in Skybox intelligence and analysis of all the layers that make up the attack surface — including assets, hybrid network topology, weaknesses and threats.\r\nHorizon makes it easier for operational teams to understand and discuss security risks and cyberthreats — and plan how to address them. Horizon tracks risk levels over time, so status and progress can easily be communicated with security stakeholders — including the C-suite and the board.","shortDescription":"Horizon provides unprecedented visibility of the attack surface, including indicators of exposure, giving the insight needed to build a security management program ready to take on cyberthreats. Cutting-edge attack surface visualization solution powered by indicators of exposure","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SKYBOX HORIZON","keywords":"including, security, surface, attack, Horizon, them, risks, address","description":"Get unprecedented visibility of the attack surface, including indicators of exposure (IOEs). Horizon’s security visualization and mapping capabilities are","og:title":"SKYBOX HORIZON","og:description":"Get unprecedented visibility of the attack surface, including indicators of exposure (IOEs). Horizon’s security visualization and mapping capabilities are","og:image":"https://old.b4r.io/fileadmin/user_upload/SKYBOX_HORIZON.png"},"eventUrl":"","translationId":1171,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"ITSM (IT Service Management, управление ИТ-услугами) — подход к управлению и организации ИТ-услуг, направленный на удовлетворение потребностей бизнеса. Управление ИТ-услугами реализуется поставщиками ИТ-услуг путём использования оптимального сочетания людей, процессов и информационных технологий. Для содействия реализации подхода к управлению ИТ-услугами используется серия документов ITIL.\r\n\r\nВ отличие от более традиционного технологического подхода, ITSM рекомендует сосредоточиться на клиенте и его потребностях, на услугах, предоставляемых пользователю информационными технологиями, а не на самих технологиях. При этом процессная организация предоставления услуг и наличие заранее оговоренных в соглашениях об уровне услуг параметров эффективности (KPI) позволяет ИТ-отделам предоставлять качественные услуги, измерять и улучшать их качество.\r\n\r\nВажным моментом при изложении принципов ITSM является системность. При изложении каждого составного элемента ITSM (управление инцидентами, управление конфигурациями, управление безопасностью и т. д.) в обязательном порядке прослеживается его взаимосвязь и координация с остальными элементами (службами, процессами) и при этом даются необходимые практические рекомендации.\r\n\r\nITIL не является конкретным алгоритмом или руководством к действию, но она описывает передовой опыт (best practices) и предлагает рекомендации по организации процессного подхода и управления качеством предоставления услуг. Это позволяет оторваться от особенностей данного конкретного предприятия в данной конкретной отрасли. Вместе с тем, несмотря на определённую абстрактность, ITIL всячески нацелено на практическое использование. В каждом разделе библиотеки приводятся ключевые факторы успеха внедрения того или иного процесса, практические рекомендации при этом превалируют над чисто теоретическими рассуждениями.\r\nИсточник: https://ru.wikipedia.org/wiki/ITSM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ITSM.png"},{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1172,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SKYBOX_FIREWALL_ASSURANCE.png","logo":true,"scheme":false,"title":"SKYBOX FIREWALL ASSURANCE","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"skybox-firewall-assurance","companyTitle":"SkyBox","companyTypes":["supplier","vendor"],"companyId":4065,"companyAlias":"skybox","description":"Firewall Assurance brings all firewalls into one normalized view, continuously monitoring policy compliance, optimizing firewall rulesets and finding attack vectors that others miss.\r\nCOMPLETE MULTI-VENDOR FIREWALL MANAGEMENT\r\nContinuously monitor all firewalls and network devices. Skybox covers the most comprehensive list of firewall vendors, complex rulesets, even virtual and cloud-based firewalls.\r\nWith proven scalability in 1,500+ firewall deployments, Firewall Assurance keeps rules optimized and ensures changes don’t introduce new risk.","shortDescription":"Skybox Firewall Assurance\r\nFirewall management software for a clean, optimized and compliant firewall state","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SKYBOX FIREWALL ASSURANCE","keywords":"firewalls, firewall, rulesets, FIREWALL, Firewall, Assurance, cloud-based, With","description":"Firewall Assurance brings all firewalls into one normalized view, continuously monitoring policy compliance, optimizing firewall rulesets and finding attack","og:title":"SKYBOX FIREWALL ASSURANCE","og:description":"Firewall Assurance brings all firewalls into one normalized view, continuously monitoring policy compliance, optimizing firewall rulesets and finding attack","og:image":"https://old.b4r.io/fileadmin/user_upload/SKYBOX_FIREWALL_ASSURANCE.png"},"eventUrl":"","translationId":1173,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1179,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Threat_Intelligence.png","logo":true,"scheme":false,"title":"Group-IB Threat Intelligence (Киберразведка по подписке)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"group-ib-threat-intelligence-kiberrazvedka-po-podpiske","companyTitle":"Group-IB","companyTypes":["supplier","vendor"],"companyId":4067,"companyAlias":"group-ib","description":"Оперативные уведомления об атаках и угрозах для вас, ваших клиентов и партнеров Прямой доступ к скомпрометированным данным и идентификаторам Отслеживание, разбор и прогнозирование хакерской активности в интересных вам отраслях\r\nНаглядный веб-интерфейс – не требует установки Поддержка STIX/TAXII при предоставлении данных об угрозах, API для Enterprise Security Персональный аналитик и круглосуточная поддержка\r\nДанные для проактивной защиты от киберугроз\r\nЗанимаясь расследованием киберпреступлений и изучением угроз более 14 лет, Group-IB создала собственную высокотехнологичную систему слежения за инфраструктурой и взаимодействиями киберпреступников, управляемую опытными аналитиками, практикующими криминалистами и специалистами по реагированию на инциденты.\r\n\r\nОбрабатывая и анализируя данные из сотен источников, мы предоставляем персонализированную, проверенную и значимую информацию, необходимую для подготовки к атакам и отражению актуальных угроз.\r\nДанные для проактивной защиты от киберугроз\r\nТактические индикаторы\r\nСократите время реакции на инциденты до минимума с мгновенными уведомлениями о критических угрозах, прямым доступом к скомпрометированным данным и целому спектру технических индикаторов для настройки средств защиты.\r\nВАШИ ВОЗМОЖНОСТИ\r\nОперативно блокируйте скомпрометированные учетные записи, банковские карты, узнавайте о заражениях мобильных телефонов\r\nНаходите вредоносные объекты, не детектируемые антивирусами, изучайте их происхождение и назначение\r\nВыявляйте зараженных пользователей корпоративной сети, связывающихся с серверами управления ботнетами \r\nБлокируйте вредоносные ресурсы на сетевом оборудовании\r\nПредотвращайте распространение фишинговых писем по корпоративной почте\r\nПресекайте использование вашего бренда в преступных целях\r\n\r\nОперативные данные\r\nПолучайте персонализированные данные с закрытых хакерских площадок, узнавая о предстоящих атаках на этапе их подготовки.\r\n\r\nПогрузитесь в детализированный контекст угроз, отслеживайте появление новых инструментов и методов атак, которые могут быть использованы против вас.\r\nВАШИ ВОЗМОЖНОСТИ\r\nОперативно узнавайте о появлении вредоносных программ, нацеленных на вас и ваших клиентов\r\nУзнавайте об утечках, продажах баз данных, поиске инсайдеров в вашей компании и обсуждениях ее уязвимостей\r\nПредотвращайте продажу закрытых данных третьим лицам\r\nСледите за атаками и всплесками активности, устанавливая взаимосвязи с вашими инцидентами\r\nКорректируйте карту угроз и план реагирования, базируясь на актуальной информации\r\n\r\nСтратегическая информация\r\nСледите за постоянно меняющейся средой киберугроз, изучайте риски, характерные для компаний вашей отрасли, оцениваете эффективность и корректируйте вашу стратегию инвестиций в обеспечение информационной безопасности.\r\nВАШИ ВОЗМОЖНОСТИ\r\nМаксимизируйте ROI от инвестиций в системы безопасности, Incident Response команды и аналитиков\r\nПриоритизируйте угрозы и выбирайте решения для защиты на основании экспертных прогнозов\r\nИзучайте тактику и инструменты преступных групп, атакующих компании вашей отрасли\r\nСобирайте дополнительные сведения об угрозах с помощью персонального аналитика\r\nКак работает Threat Intelligence?\r\nThreat Intelligence — сочетание высокотехнологичной инфраструктуры мониторинга киберугроз с экспертизой опытных аналитиков, вирусологов, криминалистов, специалистов отдела расследований и Центра реагирования (CERT) Group-IB.\r\nКиберразведка для проактивной защиты от киберугроз\r\nРазведка и сбор данных\r\nМы создали высокотехнологичную инфраструктуру для мониторинга хакерской активности, слежения за ботсетями и извлечения данных, необходимых для предотвращения инцидентов. 90% данных поступает в систему из закрытых источников, абсолютное большинство из них – уникально. Мы мониторим закрытые площадки, следим за изменениями бот-сетей, извлекая конфигурационные файлы вредоносных программ и информацию об украденных идентификаторах.\r\nИСТОЧНИКИ ДАННЫХ\r\n<ul><li>Распределенная сеть мониторинга и HoneyNet ловушек</li><li>Аналитика бот-сетей</li><li>Закрытые и публичные хакерские площадки, онлайн-конференции</li><li>Приватные группы в соцсетях</li><li>Трекеры сетевых атак</li><li>Данные сенсоров Threat Detection System</li><li>Результаты криминалистических экспертиз Лаборатории Group-IB</li><li>Мониторинг и исследование вредоносных программ</li><li>База обращений в Центр реагирования CERT‑GIB</li><li>Результаты поведенческого анализа вредоносных файлов с помощью машинного интеллекта</li><li>Контакты с регисторами доменных имен и хостинг-провайдерами по всему миру</li><li>Обмен данными с Europol, Interpol и объединениями по противодействию киберугрозам</li><li>Целевые исследования Group-IB</li></ul>\r\nАналитика\r\n13 лет отслеживая развитие киберпреступной среды, мы накопили практический опыт и базу знаний, которые позволяют нам видеть в разрозненных потоках данных скрытые связи и угрозы, которые оставляют без внимания наши конкуренты.\r\nНАПРАВЛЕНИЯ АНАЛИЗА\r\n<ul><li>Проверка данных и сбор дополнительных сведений</li><li>Реконструкция сценариев атак</li><li>Исследования вредоносных программ</li><li>Установление взаимосвязей между преступными группами</li><li>Отслеживание трендов, формирование прогнозов</li><li>Разработка рекомендаций по реагированию</li></ul>\r\nПредоставление данных\r\nДанные в системе Threat Intelligence сгруппированы по подпискам, что дает возможность получать именно те сведения, которые вам необходимы.\r\n\r\n<span style=\"font-weight: bold;\">Уведомления об отраслевых и целевых угрозах</span>\r\nПостоянно участвуя в расследованиях и реагировании на инциденты, мы узнаем о новых угрозах из первых рук. Кроме того, мы имеем доступ к сотням закрытых хакерских сообществ, что позволяет нам следить за их активностью и доставлять эти знания нашим заказчикам.\r\n\r\nК сведениям об угрозах относятся:\r\n<ul><li>сведения о новых вредоносных программе или сервисах для хакерского сообщества,</li><li>изменения в тактике проведения атак,</li><li>утечки и продажи корпоративных данных,</li><li>объявления о поиске инсайдеров в разных компаниях или исполнителей атак,</li><li>обсуждение уязвимостей.</li></ul>\r\nЭксклюзивные разведданные Threat Intelligence позволяют спрогнозировать неочевидные риски, узнать о предстоящих атаках на этапе их подготовки, адаптировать план реагирования и минимизировать ущерб, если украденные данные уже попали в сеть.\r\n\r\nПри необходимости ваш персональный аналитик может собрать дополнительную информацию об актуальных угрозах и проверить достоверность данных.\r\n\r\n<span style=\"font-weight: bold;\">Уведомления о целевых вредоносных программах</span>\r\nЕжедневно мы исследуем сотни вредоносных файлов и участвуем в расследованиях инцидентов, застрагивающих компании самых разных отраслей. Это позволяет нам обнаруживать и извлекать подробные данные о вредоносных программах, нацеленных на вас и ваших клиентов.\r\n\r\nЕсли мы видим, что вредоносная программа имеет файл настроек, затрагивающих ваши системы, IP‑адреса, домены или телефоны, вы немедленно узнаете об этом.\r\n\r\nДаже если программа не имеет соответствующих настроек, но в результате реагирования на инцидент мы узнали, что она может быть использована для атаки на вас, вы также получите подробные сведения об этой программе, включая:\r\n<ul><li>хеш-сумму вредоносного файла,</li><li>полное описание функциональных возможностей вредоносной программы,</li><li>копию файла настроек или веб-инжектов,</li><li>адреса серверов управления (C&C) и обновлений.</li></ul>\r\n<span style=\"font-weight: bold;\">Данные о фишинговых сайтах, использующих ваш бренд</span>\r\nПреступники используют доверие клиентов к вашему бренду, выманивая с его помощью личные данные и вовлекая пользователей в мошеннические схемы. Мы узнаем о появлении потенциально опасного для вашей репутации сайтов на этапе регистрации доменов, и выявляем всю инфраструктуру их продвижения – e-mail рассылки, контекстную рекламу, инструменты SEO-оптимизации.\r\n\r\nКорреляция используемых злоумышленников инструментов с базой системы киберразведки Threat Intelligence помогает становить владельца площадки, выявить взаимосвязи между разными площадками и извлечь другие данные, необходимые для реагирования и расследования.\r\n\r\nЭто позволяет нам адресно уведомлять владельцев площадок о нарушении ваших прав и оперативно блокировать ресурсы по вашему запросу, полностью закрывая преступникам доступ к их инфраструктуре.\r\n\r\n<span style=\"font-weight: bold;\">Уведомления о компрометации учетных записей, банковских карт, ключей ЭЦП</span>\r\nМы исследуем сетевые инфраструктуры бот-сетей и применяем специальные технические меры для оперативного извлечения скомпрометированных идентификаторов ваших клиентов и сотрудников:\r\n<ul><li>учетные записи, ассоциированные с корпоративными доменами и диапазонами IP: e-mail аккаунты, доступы к intranet-ресурсам и т.д.</li><li>номера банковских карт,</li><li>копии ключей электронной цифровой подписи.</li></ul>\r\nМы также предоставляем сведениях о счетах, картах и телефонах, на которые преступники переводят похищаемые денежные средства.\r\n\r\nВы получите широкий спектр дополнительных сведений, помогающих понять стратегию и тактику компрометации данных:\r\n<ul><li>дата детектирования скомпрометированной учетной записи,</li><li>источник получения данных (серверы, адреса для управления бот-сетью),</li><li>информация о расположении и IP зараженного пользователя,</li><li>название и подробное описание вредоносной программы, использованной злоумышленниками,</li><li>название преступной группы и тактика ее действий,</li><li>фото-отчеты осмотров панелей управления бот‑сетями.</li></ul>\r\n<span style=\"font-weight: bold;\">Уведомления о заражении мобильных устройств</span>\r\nПопулярность финансовых приложений для мобильных телефонов и планшетов на фоне слабой защищенности таких устройств делают их самой привлекательной мишенью для хакеров. Каждый месяц появляется несколько новых вредоносных программ под мобильные операционные системы, а функционал известных вирусов усложняется. Заражение телефона может дать доступ не только к финансам владельца, но и к его почте, звонкам, сообщениям, а также данным о его передвижениях.\r\n\r\nМы предоставляем регулярно обновляемые списки зараженных мобильных устройств ваших клиентов и сотрудников, идентифицируемых по IMEI. Оперативные уведомления о заражениях позволят не только предотвратить хищения, но и выявить попытки шпионажа за руководством компании.\r\n\r\nСообщите нам обезличенный список корпоративных устройств, и если одно из них будет найдено в мобильной бот-сети, мы установим факт слежки немедленно.\r\n\r\n<span style=\"font-weight: bold;\">Сведения об атаках</span>\r\nЧерез нашу систему ловушек и сетевые сенсоры ежедневно проходят тысячи атак на компании из разных отраслей. В режиме реального времени мы предоставляем доступ к данным о следующих атаках:\r\n<ul><li>списки целей DDoS-атак,</li><li>cписки сайтов с размещенным фишинговым контентом,</li><li>списки взломанных сайтов, распространяющих вредоносные программы,</li><li>списки сайтов, подвергшихся deface-атакам.</li><li>Для распространения вредоносных программ хакеры часто используют метод Driveby, который заключается в заражении пользователей легитимных сайтов, ни посетители, ни администраторы которого не догадываются об активности преступников. Благодаря своевременному получению данных о взломанных сайтах возможно полностью предотвратить такие атаки.</li></ul>\r\nИнформация об атакованных ресурсах делятся по странам и отраслям, чтобы вы могли анализировать данные по тем секторам, к которым относится ваша компания, ее партнеры или клиенты.\r\n\r\n<span style=\"font-weight: bold;\">Сведения о хактивистских группировках и их активности, включая данные:</span>\r\n<ul><li>о начале новой операции,</li><li>о результатах успешных атак в рамках отдельной операции или независимо от нее,</li><li>о тактике и инструментах каждой атаки,</li><li>о связях между разными группами.</li><li>Информация позволит взвешенно оценить риски быть атакованными в рамках определенной операции, смоделировать возможный инцидент и подготовиться к нему.</li><li>Подозрительные IP-адреса</li></ul>","shortDescription":"Узнавайте об угрозах, утечках, взломах и хакерской активности до того, как они смогут вам навредить","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Group-IB Threat Intelligence (Киберразведка по подписке)","keywords":"данных, вредоносных, данные, угрозах, Threat, реагирования, клиентов, Intelligence","description":"Оперативные уведомления об атаках и угрозах для вас, ваших клиентов и партнеров Прямой доступ к скомпрометированным данным и идентификаторам Отслеживание,","og:title":"Group-IB Threat Intelligence (Киберразведка по подписке)","og:description":"Оперативные уведомления об атаках и угрозах для вас, ваших клиентов и партнеров Прямой доступ к скомпрометированным данным и идентификаторам Отслеживание,","og:image":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Threat_Intelligence.png"},"eventUrl":"","translationId":2654,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1180,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Threat_Intelligence.png","logo":true,"scheme":false,"title":"Group-IB Threat Intelligence","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"group-ib-threat-intelligence","companyTitle":"Group-IB","companyTypes":["supplier","vendor"],"companyId":4067,"companyAlias":"group-ib","description":"<ul><li>Prompt attack and threat notifications for your company, clients and partners</li><li>Direct access to compromised data and TTPs of malicious activity</li><li>Detections, analysis and forecasts of hacking activity in the areas of your interest</li><li>Convenient web interface for data search and analysis – no installation required</li><li>STIX/TAXII ready, official OASIS Cyber Threat Intelligence (CTI) Technical Committee Member</li><li>24x7 Personal cyber intelligence analyst support: tailored reports, malware analysis and much more</li></ul>\r\nWe give you vital intelligence about upcoming threats and actual cyber security risks\r\nIt takes a few minutes to infect a computer, while incident detection and remediation activities may last months. Even if you feel confident in your systems' safety, vulnerabilities of your clients, employees, or partners may become your problem – this potential threat has become a reality for financial institutions, payment systems and telecommunications operators. Security breach in a company of your industry may be a warning sign of future attacks on your business, while insiders will help criminals bypass your defensive barriers.\r\nBe prepared to any attack scenario with Intelligence cyber analytics: receive the most specific and detailed information for prompt response and the most recent data for threat prevention.\r\n<span style=\"font-weight: bold; \">Strategic planning with cyber intelligence</span>\r\nKeep up with the constantly changing threat landscape, learn about threats targeting your business area, evaluate and improve your IT security investment strategy\r\n<ul><li>Evaluate risks, analyze statistics and assess potential damages</li><li>Prioritize threats based on expert forecasts</li><li>Learn attack tactics and cybercrime strategy</li><li>Know your enemy</li></ul>\r\n<span style=\"font-weight: bold;\">Taking control on upcoming cyber threats</span>\r\nPrepare for cyber attacks with comprehensive information on malware threatening your company and clients, attack targets and methods, cyber espionage tools, news and notifications on potential threats from private hacker resources.\r\n\r\n<ul><li>Adapt your security tools and response plans</li><li>Learn about data leaks and identify insiders</li><li>Prevent confidential data from being sold to third parties</li><li>Monitor hacking attacks and activity peaks correlating with your incidents</li><li>Apply IoCs to you layered cyber security infrastructure</li></ul>\r\nMinimize the time you spend on incident response with instant notifications to critical threats, direct access to compromised data and a variety of technical indicators used to bolster your security.\r\n\r\n<ul><li>Protect your clients, employees, and partners against fraud and personal data theft</li><li>Receive attack confirmation, learn about the attack source and mechanisms used</li><li>Prevent leakage and industrial espionage</li><li>Effectively stop targeted attacks</li><li>Prevent illegal use of your brand</li></ul>\r\n<span style=\"font-weight: bold;\">Intelligence and data collection</span>\r\nGroup-IB specialists daily analyze thousands of compromised credentials, bank card numbers, messages and postings of “black hats” on deep web hacking forums, information on hundreds of attacks. We analyze the most recent malware, attack mechanisms and participate in incident investigations collecting the most recent and detailed information about cybercriminals, their strategies and tools.\r\nTHREE PILLARS OF COMPETENCEWHAT’S SPECIAL\r\n\r\n<ul><li>More than 10 patented technologies, automation and special tactics, algorithms and machine learning are helping us to collect raw data on cyber threats.</li><li>Best analysts are making intelligence out of threat data, enriching them with context, revealing kill chains and TTPs (tactics, technics and procedures) of cyber criminals.</li><li>Building links between incidents, IoCs and cyber criminals activities all over the world with the help of CERTs, Europol, Interpol and other international cyber crime fighters.</li></ul>\r\n<span style=\"font-weight: bold;\">Analytics</span>\r\nGroup-IB leverages its 14 years of unique expertise in cybercrime investigations to discover hidden connections buried within disparate data. We closely cooperate with best experts in cyber security around the world, which helps us to solve the most complicated global cases. Information analysis enables us to understand motives of criminals and create hacker profiles to forecast their future activity.\r\n<ul><li>Deep knowledge of Russian-speaking and international cybercriminal markets</li><li>Adjustable amount of hours of remote analysts</li><li>Ability to request assistance from special team of Group-IB security experts responsible for handling high-profile investigations</li></ul>","shortDescription":"Must have cyber intelligence \r\nservice to mitigate cyber threats\r\nLearn about threats, leaks, attacks, and hacking activity before they can harm your business\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Group-IB Threat Intelligence","keywords":"your, cyber, data, with, attack, threats, security, about","description":"Prompt attack and threat notifications for your company, clients and partnersDirect access to compromised data and TTPs of malicious activityDetections,","og:title":"Group-IB Threat Intelligence","og:description":"Prompt attack and threat notifications for your company, clients and partnersDirect access to compromised data and TTPs of malicious activityDetections,","og:image":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Threat_Intelligence.png"},"eventUrl":"","translationId":1180,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":["No IT security guidelines","Risk or Leaks of confidential information","Risk of attacks by hackers","Risk of data loss or damage","Risk of lost access to data and IT systems"],"materials":[],"useCases":[],"best_practices":[],"values":["Reduce Costs","Ensure Security and Business Continuity"],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}