{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"_type":"localeString","en":"Сonfigurator","ru":"Конфигуратор"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"_type":"localeString","en":"I use it","ru":"I use it"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"en":"Selling","ru":"Продают","_type":"localeString"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"show-more-button":{"ru":"Показать еще","_type":"localeString","en":"Show more"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"en":"manufacturer","ru":"производитель","_type":"localeString"},"short-description":{"ru":"Краткое описание","_type":"localeString","en":"Pitch"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"en":"Details","ru":"Детальнее","_type":"localeString"},"description":{"en":"Description","ru":"Описание","_type":"localeString"},"product-features":{"_type":"localeString","en":"Product features","ru":"Особенности продукта"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"solutions":{"_type":"localeString","en":" Problems that solves","ru":"Проблемы которые решает"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"testing":{"en":"Testing","ru":"Тестирование","_type":"localeString"},"compare":{"en":"Compare with competitors","ru":"Сравнить с конкурентами","_type":"localeString"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":" Characteristics"},"transaction-features":{"_type":"localeString","en":"Transaction Features","ru":"Особенности сделки"},"average-discount":{"en":"Partner average discount","ru":"Средняя скидка партнера","_type":"localeString"},"deal-protection":{"_type":"localeString","en":"Deal protection","ru":"Защита сделки"},"average-deal":{"ru":"Средний размер сделки","_type":"localeString","en":"Average deal size"},"average-time":{"_type":"localeString","en":"Average deal closing time","ru":"Средний срок закрытия сделки"},"login":{"en":"Login","ru":"Войти","_type":"localeString"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"to-know-more":{"ru":"Чтобы узнать больше","_type":"localeString","en":"To know more"},"scheme":{"ru":"Схема работы","_type":"localeString","en":" Scheme of work"},"competitive-products":{"_type":"localeString","en":" Competitive products","ru":"Конкурентные продукты"},"implementations-with-product":{"_type":"localeString","en":"Deployments with this product","ru":"Внедрения с этим продуктом"},"user-features":{"ru":"Особенности пользователей","_type":"localeString","en":"User features"},"job-roles":{"ru":"Роли заинтересованных сотрудников","_type":"localeString","en":" Roles of Interested Employees"},"organizational-features":{"ru":"Организационные особенности","_type":"localeString","en":"Organizational Features"},"calculate-price":{"_type":"localeString","en":" Calculate product price","ru":"Рассчитать цену продукта"},"selling-stories":{"_type":"localeString","en":" Selling stories","ru":"Продающие истории"},"materials":{"ru":"Материалы","_type":"localeString","en":"Materials"},"about-product":{"en":"About Product","ru":"О продукте","_type":"localeString"},"or":{"_type":"localeString","en":"or","ru":"или"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"ru":"Рассчитать ROI продукта","_type":"localeString","en":"Calculate Product ROI"},"complementary-categories":{"ru":"Схожие категории","_type":"localeString","en":"Complementary Categories"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"en":"Bonus","ru":"Бонус","_type":"localeString"},"rebate-for-poc":{"ru":"Бонус 4 POC","_type":"localeString","en":"Bonus 4 POC"},"configurator-content":{"ru":"Рассчитайте стоимость продукта","_type":"localeString","en":"Calculate price for this product here"},"configurator-link":{"_type":"localeString","en":"here","ru":"тут"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"user-popover":{"_type":"localeString","en":"user","ru":"пользователь"},"select-for-presentation":{"ru":"выбрать продукт для презентации","_type":"localeString","en":"select product for presentation"},"auth-message":{"_type":"localeString","en":"You have to register or login.","ru":"Вам нужно зарегистрироваться или войти."},"add-to-comparison":{"_type":"localeString","en":"Add to comparison","ru":"Добавить в сравнение"},"added-to-comparison":{"_type":"localeString","en":"Added to comparison","ru":"Добавлено в сравнения"},"roi-calculator-content":{"ru":"Рассчитайте ROI для данного продукта","_type":"localeString","en":"Calculate ROI for this product here"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."},"videos":{"_type":"localeString","en":"Videos","ru":"Видео"},"vendor-verified":{"ru":"Подтверждено производителем","_type":"localeString","en":"Vendor verified"},"event-schedule":{"_type":"localeString","en":"Events schedule","ru":"Расписание событий"},"scheduling-tip":{"_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event.","ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент."},"register-to-schedule":{"ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To register for the event please log in or register on the site."},"comparison-matrix":{"_type":"localeString","en":"Comparison matrix","ru":"Матрица сравнений"},"compare-with-competitive":{"_type":"localeString","en":" Compare with competitive","ru":"Сравнить с конкурентными"},"avg-deal-closing-unit":{"_type":"localeString","en":"months","ru":"месяцев"},"under-construction":{"_type":"localeString","en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке."},"product-presentation":{"ru":"Презентация продукта","_type":"localeString","en":"Product presentation"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"_type":"localeString","en":"logout","ru":"Выйти"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Calculate ROI and price","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"_type":"localeString","en":"4 vendors","ru":"поставщикам"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"title":{"en":"ROI4CIO: Product","ru":"ROI4CIO: Продукт","_type":"localeString"},"meta":[{"name":"og:type","content":"website"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Конкретный продукт","_type":"localeString","en":"Example product"}},{"name":"og:description","translations":{"en":"Description for one product","ru":"Описание для конкретного продукта","_type":"localeString"}},{"name":"title","translations":{"ru":"Продукт","_type":"localeString","en":"Product"}},{"translations":{"en":"Product description","ru":"Описание продукта","_type":"localeString"},"name":"description"},{"name":"keywords","translations":{"ru":"Ключевые слова продукта","_type":"localeString","en":"Product keywords"}}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"cisco-asa-ngfw-adaptive-security-appliance-software":{"id":1440,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cisco_ASA_NGFW__Mezhsetevye_ehkrany_novogo_pokolenija_.jpg","logo":true,"scheme":false,"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","vendorVerified":0,"rating":"2.90","implementationsCount":4,"suppliersCount":0,"supplierPartnersCount":273,"alias":"cisco-asa-ngfw-adaptive-security-appliance-software","companyTitle":"Cisco","companyTypes":["supplier","vendor"],"companyId":170,"companyAlias":"cisco","description":"<span style=\"font-weight: bold;\">Features and Capabilities</span> Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs. <span style=\"font-weight: bold;\">Among its benefits, Cisco ASA Software:</span>\r\n<ul> <li>Offers integrated IPS, VPN, and Unified Communications capabilities</li> <li>Helps organizations increase capacity and improve performance through high-performance, multi-site, multi-node clustering</li> <li>Delivers high availability for high resiliency applications</li> <li>Provides collaboration between physical and virtual devices</li> <li>Meets the unique needs of both the network and the data center</li> <li>Provides context awareness with Cisco TrustSec security group tags and identity-based firewall technology</li> <li>Facilitates dynamic routing and site-to-site VPN on a per-context basis</li> </ul>\r\nCisco ASA software also supports next-generation encryption standards, including the Suite B set of cryptographic algorithms. It also integrates with the Cisco Cloud Web Security solution to provide world-class, web-based threat protection.","shortDescription":"The Cisco ASA Family of security devices protects corporate networks and data centers of all sizes. It provides users with highly secure access to data and network resources.","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","keywords":"Cisco, Software, with, also, Security, security, appliances, network","description":"Features and Capabilities Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class","og:title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","og:description":"Features and Capabilities Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class","og:image":"https://old.b4r.io/fileadmin/user_upload/Cisco_ASA_NGFW__Mezhsetevye_ehkrany_novogo_pokolenija_.jpg"},"eventUrl":"","translationId":1440,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[{"id":153,"title":"FW Functionality","required":0,"type":"multiselect","templateId":13,"value":"SSL VPN functionality, Application control, IPv4/IPv6 support, NAT functionality, DHCP functionality, SSL traffic decryption support, Bandwidth Management, Centralized management and Administration console, Site to Site IPSec VPN support, Stateful engine support for all protocols in TCP/IP stack, URL filtering, Support for static and dynamic routing protocols, Application Intelligence for TCP/IP protocols (telnet, Ftp, etc)","options":["SSL VPN functionality","Application control","IPv4/IPv6 support","NAT functionality","2-FA authentication","DHCP functionality","SSL traffic decryption support","Bandwidth Management","Centralized management and Administration console","Site to Site IPSec VPN support","Reverse proxy functionality","DNS proxy functionality","Stateful engine support for all protocols in TCP/IP stack","URL filtering","Hardened OS & purpose built chassis hardware","Support for static and dynamic routing protocols","Application Intelligence for TCP/IP protocols (telnet, Ftp, etc)"]},{"id":151,"title":"Integration with","required":0,"type":"multiselect","templateId":13,"value":"Threat Intel, Network Policy Management tools, SIEM, AD/LDAP, AAA servers, Supports Certificates based authentication","options":["Threat Intel","Network Policy Management tools","SIEM","IAM","AD/LDAP","AAA servers","Supports Certificates based authentication"]},{"id":149,"title":"Deployment","required":0,"type":"multiselect","templateId":13,"value":"High availability, Support Routed and Transparent mode, Support for Virtualized environment","options":["High availability","Support Routed and Transparent mode","Support for Virtualized environment"]},{"id":147,"title":"Basic DLP functionality","required":0,"type":"binary","templateId":13,"value":"N/A","options":{"values":null,"defaults":null}},{"id":145,"title":"Context aware","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}},{"id":143,"title":"DDOS protection","required":0,"type":"binary","templateId":13,"value":"N/A","options":{"values":null,"defaults":null}},{"id":141,"title":"Behavioural Analysis","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}},{"id":139,"title":"APT protection - Sandboxing","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}},{"id":137,"title":"Anti-Bot","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}},{"id":135,"title":"Network Antivirus & Anti-Spyware","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}},{"id":133,"title":"IDS/IPS functionality","required":0,"type":"binary","templateId":13,"value":true,"options":{"values":null,"defaults":null}}],"concurentProducts":[{"id":1409,"logoURL":"https://old.b4r.io/fileadmin/user_upload/WatchGuard_NGFW__Next-Generation_Firewall_.jpg","logo":true,"scheme":false,"title":"WatchGuard NGFW (Next-Generation Firewall)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"watchguard-ngfw-next-generation-firewall","companyTitle":"WatchGuard","companyTypes":["vendor"],"companyId":2741,"companyAlias":"watchguard","description":"Historically, next-generation firewall (NGFW) appliances were designed to deliver a very specific set of security services – firewall, intrusion prevention, and application control. Since being originally defined, the security threats and the technology available to combat those threats have significantly evolved, creating a demand for additional network security services. As a result, other techniques and services have to be included in basic NGFW appliances such as SSL inspection, website filtering, QOS, antivirus inspection, and even sandboxing. While these additional services provide value to end users, it also confuses many people, making them wonder about the difference between an NGFW and UTM appliance. Today, companies should not be searching for an NGFW or a UTM appliance, they should be searching for the right network security appliance that meets the security, deployment, and management requirements of their unique organization. <span style=\"font-weight: bold;\">WatchGuard’s Solutions</span> Our unique approach to network security focuses on bringing best-in-class, enterprise-grade security to any organization, regardless of size or technical expertise. Ideal for SMB, midsize, and distributed enterprise organizations, our network security appliances are designed from the ground up to focus on ease of deployment, use, and ongoing management, in addition to providing the strongest security possible. Not only does WatchGuard offer the greatest collection of network security services on a single platform, we do so in a way that has proven to be the most agile, able to adapt to new and evolving threat vectors faster than any other solution on the market. We are a security company and we want the best protection for every customer, every time. As such, we strongly recommend customers adopt a full security suite. When running WatchGuard’s Total Security Suite, our Firebox network security appliances offer the strongest security against network threats. Every Firebox can be purchased as a stand-alone NGFW appliance; however, as a security company we never recommend the deployment of an NGFW without other security mechanisms in place. The best approach to security is a layered approach.","shortDescription":"WatchGuard NGFW is an enterprise-class, high-performance gateway security appliance that provides top-of-the-line firewalling, intrusion prevention, and application control.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"WatchGuard NGFW (Next-Generation Firewall)","keywords":"security, network, NGFW, services, appliance, appliances, threats, deployment","description":"Historically, next-generation firewall (NGFW) appliances were designed to deliver a very specific set of security services – firewall, intrusion prevention,","og:title":"WatchGuard NGFW (Next-Generation Firewall)","og:description":"Historically, next-generation firewall (NGFW) appliances were designed to deliver a very specific set of security services – firewall, intrusion prevention,","og:image":"https://old.b4r.io/fileadmin/user_upload/WatchGuard_NGFW__Next-Generation_Firewall_.jpg"},"eventUrl":"","translationId":1410,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1441,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png","logo":true,"scheme":false,"title":"SonicWall next-generation firewall (NGFW)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sonicwall-next-generation-firewall-ngfw","companyTitle":"SonicWall","companyTypes":["supplier","vendor"],"companyId":4104,"companyAlias":"sonicwall","description":"VIRTUAL Secure your public, private or hybrid cloud environment with virtualized versions of SonicWall next-generation firewalls and simplify administration with common management across your virtual and physical infrastructure. WIRELESS NETWORK SECURITY Build a high-speed wireless network security solution that safeguards your wireless traffic from threats and delivers wired-like network security and performance. MANAGEMENT, REPORTING & ANALYTICS Complement and extend SonicWall security products and services, and help your organization optimize security, manage growth and ease administrative burdens. SECURITY SUBSCRIPTIONS Protect your organization from advanced security threats, gain greater security control, enhance productivity and lower costs with SonicWall network security services and add-ons to our firewall hardware. WAN ACCELERATION Eliminate performance bottlenecks from data and file sharing applications and give users LAN-like application performance over your WAN by optimizing the bandwidth you already have. CAPTURE CLOUD PLATFORM The SonicWall Capture Cloud Platform combines the global security intelligence of the Capture Threat Network with the cloud-based management, reporting and analytics of the Capture Cloud Security Center and the advanced threat prevention of the multi-engine Capture ATP sandbox.","shortDescription":"SonicWall NGFW is a Comprehensive threat prevention at multi-gigabit speeds, network security, control and visibility your organization needs.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SonicWall next-generation firewall (NGFW)","keywords":"security, your, SonicWall, Capture, with, from, network, performance","description":"VIRTUAL Secure your public, private or hybrid cloud environment with virtualized versions of SonicWall next-generation firewalls and simplify administration","og:title":"SonicWall next-generation firewall (NGFW)","og:description":"VIRTUAL Secure your public, private or hybrid cloud environment with virtualized versions of SonicWall next-generation firewalls and simplify administration","og:image":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png"},"eventUrl":"","translationId":1442,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1909,"logoURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda CloudGen Firewall","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-cloudgen-firewall","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, and helps organizations transform their business.\r\n<span style=\"font-weight: bold;\">From the Next Generation Firewall to a Cloud Generation Solution</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications.\r\nBarracuda CloudGen Firewall is a family of physical appliance, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control.\r\nIn addition, Barracuda CloudGen Firewalls combine highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network.\r\nBarracuda's cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<ul><li>Protection Against Advanced Threats and Zero-Hour Attacks.</li><li>Secure SD-WAN: Reduce Costs and Ensure Application Availability.</li><li>Remote VPN Access for Off-Network Users – Anytime, Anywhere.</li><li>Secure Migration to the Public Cloud and Hybrid Environments.</li><li>Secure Connectivity for IoT Devices and Industrial Control Systems.</li></ul>\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN</span>\r\nBarracuda CloudGen Firewalls include full next-generation Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n<ul><li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li><li>VPN across multiple broadband connections and MPLS replacement</li><li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li><li>Replacing network backhauling central policy enforcement architectures with direct internet breakouts</li><li>Faster access to cloud applications like Office 365 by dynamically prioritizing them over non-critical traffic</li><li>Guaranteed user access to critical applications through granular policy controls</li><li>Increased available bandwidth with built-in traffic compression and data deduplication</li><li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li></ul>\r\n<span style=\"font-weight: bold;\">Cut MPLS Costs with Bandwidth Optimization</span>\r\nIf you have branch offices and remote locations that need to run SaaS applications or connect to your network, Barracuda can dramatically reduce your WAN costs. The traditional approach of backhauling traffic to a main office via costly MPLS leased lines can’t deliver on price and performance in the cloud era.\r\nBarracuda lets you establish direct internet breakouts for optimized cloud accessibility. Our SD-WAN maintains a fully meshed VPN using less expensive broadband connections. Use the Savings Calculator to see how much your organization to save.\r\n<span style=\"font-weight: bold;\">Why Barracuda CloudGen Firewall?</span>\r\nWhen selecting security technology, it is critical that your products are supported by people who take network security as seriously as you do. Barracuda CloudGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data.","shortDescription":"Barracuda CloudGen Firewall - Go Beyond Next-Generation Firewalls to Protect Your Network in the Cloud and On-Premises","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda CloudGen Firewall","keywords":"network, Barracuda, your, with, applications, Firewall, cloud, CloudGen","description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that","og:title":"Barracuda CloudGen Firewall","og:description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that","og:image":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1910,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1401,"logoURL":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png","logo":true,"scheme":false,"title":"Check Point Фаервол нового поколения (NGFW)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-faervol-novogo-pokolenija-ngfw","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; text-decoration-line: underline;\">Преимущества</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Контроль использования приложений</span>\r\n<ul> <li>Идентификация, разрешение, блокирование или ограничение использования приложений и функций этих приложений.</li> <li>Безопасное пользование интернетом с защитой от угроз и вредоносных программ.</li> <li>В вашем распоряжении — крупнейшая библиотека приложений с более чем 6 600 приложений.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Поддержка передового контроля над идентификацией</span>\r\n<ul> <li>Создание гранулярных политик для пользователей и групп.</li> <li>Легкая интеграция с Active Directory.</li> <li>Защита сред, в которых разрешены социальные сети и интернет-приложения.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Безопасность шлюзов в одном специальном устройстве</span>\r\n<ul> <li>Передовая защита в режиме 24/7.</li> <li>Преимущества контроля приложений и защиты от вторжений. Служба поддержки готова познакомить с дополнительными функциями безопасности.</li> <li>Глубокое понимание событий в сфере безопасности с комплексным и простым в использовании централизованным управлением.</li> <li>Более 170 тысяч покупателей, включая 100 % компаний из первой сотни компаний списка Fortune.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; text-decoration-line: underline;\">Возможности</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Контроль за идентификацией</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Чтобы безопасность была как можно более полной, нужно ограничивать доступ к важной информации и ресурсам. С Фаерволом нового поколения ваши администраторы полностью контролируют отдельных пользователей, группы пользователей, приложения, устройства и типы соединений с вашей сетью, поэтому они могут выдавать разрешение только для определенных пользователей и устройств. Фаервол — это простой и экономически эффективный способ укрепить политику безопасности, который предоставляет вам гранулярный контроль для максимальной защиты ваших шлюзов безопасности.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Интеграция с Active Directory происходит незаметно и не требует агента. Она обеспечивает полную идентификацию пользователей, которая происходит благодаря простым определениям политик для пользователей и групп непосредственно из фаервола. Идентификация пользователей может производиться одним из трех методов:</span>\r\n<ul> <li>через запрос Active Directory;</li> <li>через портал-посредник;</li> <li>через однократную установку небольшого агента.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Предотвращение вторжений</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Фаервол нового поколения содержит программный блейд IPS, который защищает вашу сеть, проверяя пакеты трафика, проходящие через ваши шлюзы безопасности. Эта многофункциональная система IPS — часть архитектуры программных блейдов, поэтому вам будет легко ее внедрить, чтобы еще больше расширить ваши возможности.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Контроль приложений</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Сотрудники сегодня используют массу приложений, и вам необходимо защитить их, независимо от того, что именно они используют. Фаервол нового поколения обладает огромным охватом приложений — 6 600 приложений и 260 000 виджетов социальных сетей. Вы можете создать политики гранулярного контроля для пользователей или групп, чтобы идентифицировать, заблокировать или ограничить использование приложений и виджетов для обмена сообщениями, общения в соцсетях, просмотра видео, IP-телефонии, игр и прочего.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Единое управление</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Наша единая система управления безопасностью упрощает сложную задачу по управлению всей вашей инфраструктурой безопасности. Вы увидите и сможете контролировать угрозы, устройства, пользователей с помощью интуитивно понятного графического интерфейса, в котором наглядно представлена вся необходимая информация. Управляйте всеми вашими шлюзами безопасности и программными блейдами из одной централизованной панели управления.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Анализ логов</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Чтобы помочь вам разобраться в данных, мы добавили SmartLog — передовой анализатор логов с быстрым поиском. Он дает вам полный контроль над миллионами логов, записанных в разное время и на разных доменах.</span>","shortDescription":"Фаервол нового поколения компании Check Point контролирует использование приложений, а также сканирует данные, чтобы остановить угрозы.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point Фаервол нового поколения (NGFW)","keywords":"приложений, пользователей, безопасности, поколения, через, нового, Фаервол, ваши","description":"Преимущества\rКонтроль использования приложений\r Идентификация, разрешение, блокирование или ограничение использования приложений и функций этих приложений.","og:title":"Check Point Фаервол нового поколения (NGFW)","og:description":"Преимущества\rКонтроль использования приложений\r Идентификация, разрешение, блокирование или ограничение использования приложений и функций этих приложений.","og:image":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png"},"eventUrl":"","translationId":2668,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1402,"logoURL":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png","logo":true,"scheme":false,"title":"Check Point Next Generation Firewall (NGFW)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-next-generation-firewall-ngfw","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"<span style=\"font-weight: bold; text-decoration-line: underline;\">Benefits</span> \r\n<span style=\"font-weight: bold;\">Detects and controls application usage</span>\r\n<ul> <li>Identify, allow, block or limit usage of applications, and features within them</li> <li>Enable safe Internet use while protecting against threats and malware</li> <li>Leverage the world's largest application library with more than 6,600 web 2.0 applications</li> </ul>\r\n<span style=\"font-weight: bold;\">Supports advanced identity awareness for stress-free policy enforcement</span>\r\n<ul> <li>Create granular policy definitions per user and group</li> <li>Integrate seamlessly with Active Directory</li> <li>Protect environments with social media and Internet applications</li> </ul>\r\n<span style=\"font-weight: bold;\">Provides proven gateway security in a single, dedicated appliance</span>\r\n<ul> <li>Rely on 24/7 advanced protection</li> <li>Reap the benefits of application control and intrusion protection (IPS), as well as extensibility support for additional security capabilities</li> <li>Get greater understanding into security events with integrated, easy-to-use centralized management</li> <li>Join more than 170,000 customers, including 100 percent of Fortune 100 companies</li> </ul>\r\n\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Features</span> \r\n<span style=\"font-weight: bold;\">Identity awareness</span> Great security involves limiting and tracking access to sensitive data and resources. With the Next Generation Firewall, your administrators get detailed visibility into the users, groups, applications, machines and connection types on your network so they can assign permissions to the right users and devices. The firewall makes it easy and cost-effective to enforce security policy, giving granular permission control over these entities; this results in superior protection across the entire security gateway. Seamless and agent-less integration with Active Directory provides complete user identification, enabling simple, application-based policy definition per user or group directly from the firewall. Users’ identification may be acquired in one of three simple methods:\r\n<ul> <li>Querying the Active Directory</li> <li>Through a captive portal</li> <li>Installing a one-time, thin client-side agent</li> </ul>\r\n<span style=\"font-weight: bold;\">Application control</span> \r\nEmployees are using more apps than ever, and you’re on the hook to protect them regardless of what they use. Check Point Next Generation Firewall has the industry’s largest application coverage, with more than 6,600 applications and 260,000 social network widgets included. You can create granular security policies based on users or groups to identify, block or limit usage of web applications and widgets like instant messaging, social networking, video streaming, VoIP, games and more. \r\n<span style=\"font-weight: bold;\">Logging and status</span> \r\nTo help you make sense out of your security event data, we included SmartLog, an advanced log analyzer that delivers split-second search results providing real-time visibility into billions of log records over multiple time periods and domains. \r\n<span style=\"font-weight: bold;\">Integrated security management</span> \r\nOur unified security management simplifies the monumental task of managing your security environment. You’ll see and control threats, devices and users with a highly intuitive graphical interface providing views, details and reports on your security health. Manage all your Check Point gateways and software blades from one comprehensive, centralized security dashboard. \r\n<span style=\"font-weight: bold;\">Intrusion prevention</span> \r\nNext Generation Firewall includes the Check Point IPS Software Blade, which secures your network by inspecting packets traversing through the gateway. It is a full-featured IPS, providing geo-protections and frequent, automated threat definition updates. Because the IPS is part of the integrated Software Blade Architecture, you’ll get all the deployment and management advantages of a unified and extensible solution.","shortDescription":"Check Point Next Generation Firewall identifies and controls applications by user and scans content to stop threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point Next Generation Firewall (NGFW)","keywords":"security, your, with, applications, more, than, management, Check","description":"Benefits \rDetects and controls application usage\r Identify, allow, block or limit usage of applications, and features within them Enable safe Internet use","og:title":"Check Point Next Generation Firewall (NGFW)","og:description":"Benefits \rDetects and controls application usage\r Identify, allow, block or limit usage of applications, and features within them Enable safe Internet use","og:image":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png"},"eventUrl":"","translationId":1402,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1403,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Fortinet.png","logo":true,"scheme":false,"title":"Fortinet NGFW","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":21,"alias":"fortinet-ngfw","companyTitle":"Fortinet","companyTypes":["vendor"],"companyId":690,"companyAlias":"fortinet","description":"<span style=\"font-weight: bold;\">Enterprise Firewall</span>\r\nOur award-winning FortiGate enterprise firewalls provide high performance, consolidated advanced security and granular visibility for broad protection across the entire digital attack surface. FortiGate enterprise firewalls reduce complexity and improve overall security posture by providing full visibility into users, devices, applications and threats on the network, with the ability to apply advanced threat protection anywhere in the network. Our purpose-built security processors (SPUs) deliver scalable performance of advanced security services, industry-leading VPN and SSL inspection throughput, and ultra low latency for protecting internal segments and mission critical environments. Our validated FortiGuard security services protect against known and unknown threats, zero-day exploits, malware, and malicious websites using FortiGuard Labs continuous threat intelligence, dynamic analysis for detection, and automated mitigation to keep your network protected from advanced cyberattacks. FortiGate enterprise firewalls deliver the lowest total cost of ownership along with supporting scalable, flexible deployments from the network edge to the core, data center, internal segments, and the cloud. FortiGates are Security Fabric enabled, providing the broad visibility, automated protection and integrated threat intelligence required to protect the valuable assets and data of organizations worldwide.\r\n\r\n<span style=\"font-weight: bold;\">FortiGate includes:</span>\r\n<ul> <li>Consolidated, validated highest efficacy advanced security services</li> <li>Real-time response based on threat intelligence to protect any point of vulnerability in the network</li> <li>Integrated audit and compliance services to improve cybersecurity</li> <li>Industry's fastest SSL inspection engine to help protect against malware hiding in encrypted traffic </li> <li>Single-pane-of-glass management to simplify deployment and enable consistent security policies with granular control and visibility</li> <li>Multiple network deployments – as a next-generation firewall, data center firewall, internal segmentation firewall, or high speed firewall and VPN</li> </ul>\r\n<span style=\"font-weight: bold;\">Products</span>\r\nFortiGate: Chassis-based NGFW\r\nFortiGate 7000, 5000 Series \r\n\r\nFortiGate: Ultra High-End NGFW\r\nFortiGate 6000 Series FortiGate 7000 Series\r\n\r\nFortiGate: High-End NGFW\r\nFortiGate 3000, 2000, and 1000 Series \r\n\r\nFortiGate: Mid-Range NGFW\r\nFortiGate 900, 800, 600, 500, 400, 300, 200, and 100 Series \r\n\r\nFortiGate: Entry-Level NGFW\r\nFortiGate 90, 80, 60, 50, 30, and Rugged Series \r\n\r\n<span style=\"font-weight: bold;\">FortiGate Enterprise Firewall Demo</span>\r\nThis full working demo lets you explore the latest FortiOS 6.0-based features of our FortiGate Enterprise Firewalls. You’ll quickly see how FortiGate delivers better visibility and accelerated security, which provides efficient operations. Be sure to check out the new Security Fabric topology views, which help to reduce complexity. <span style=\"font-style: italic;\">Source: https://www.fortinet.com/products/next-generation-firewall.html</span>","shortDescription":"Fortinet NGFW (Next-Generation Firewall) is a Threat Protection and Performance with Reduced Complexity\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fortinet NGFW","keywords":"FortiGate, security, Series, NGFW, network, visibility, advanced, threat","description":"Enterprise Firewall\rOur award-winning FortiGate enterprise firewalls provide high performance, consolidated advanced security and granular visibility for broad","og:title":"Fortinet NGFW","og:description":"Enterprise Firewall\rOur award-winning FortiGate enterprise firewalls provide high performance, consolidated advanced security and granular visibility for broad","og:image":"https://old.b4r.io/fileadmin/user_upload/Fortinet.png"},"eventUrl":"","translationId":1404,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1405,"logoURL":"https://old.b4r.io/fileadmin/user_upload/palo_alto_networks.png","logo":true,"scheme":false,"title":"Palo Alto Networks межсетевой экран нового поколения (NGFW)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":5,"alias":"palo-alto-networks-mezhsetevoi-ehkran-novogo-pokolenija-ngfw","companyTitle":"Palo Alto Networks","companyTypes":["vendor"],"companyId":2061,"companyAlias":"palo-alto-networks","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Безопасная работа приложений как необходимое условие успешного развития бизнеса</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Безопасная работа приложений, обеспечиваемая с помощью сетевых экранов Palo Alto Networks нового поколения, помогает решить проблемы безопасности бизнеса, связанные с растущим числом используемых в сети приложений. Обеспечение безопасного доступа к приложениям для отдельных пользователей или групп пользователей – локальных, мобильных и удаленных – и защита трафика от известных и неизвестных угроз позволяет усилить безопасность и одновременно поддержать рост бизнеса.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-weight: bold;\">• Классификация всех приложений, на всех портах, в любое время. </span>Средства точной классификации трафика – основной компонент любого межсетевого экрана, а результаты их работы становятся основой политики безопасности. Современные приложения легко обходят межсетевые экраны, выполняющие фильтрацию трафика на основе портов, путем динамической смены портов, использования протоколов SSL и SSH, туннелирования своего трафика через порт 80 или использования нестандартных портов.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-weight: bold;\">• Включение в политику безопасности не только IP-адресов, но также пользователей и устройств. </span>Создание и управление политиками безопасности на основе приложений и идентификации пользователей, независимо от устройства или местоположения, является более эффективным средством защиты вашей сети, чем решение, основанное исключительно на портах и IP-адресах. Интеграция с различными корпоративными каталогов пользователей позволяет идентифицировать пользователей Microsoft Windows, Mac OS X, Linux, Android или iOS, которые осуществляют доступ к приложениям. Пользователи, которые находятся в командировке или работают удаленно, защищены с помощью тех же согласованных политик безопасности, которые действуют в локальной или корпоративной сети. Сочетание возможностей мониторинга и контроля использования приложений пользователями означает, что можно обеспечить безопасное использование Oracle, BitTorrent, Gmail или любого используемого в сети приложения, независимо от того, где и какой пользователь осуществляет доступ к нему.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">•<span style=\"font-weight: bold;\"> Предотвращение всех угроз – как известных, так и неизвестных.</span> Чтобы обеспечить безопасность современной сети, необходимо найти устранить известные уязвимые места, обеспечить защиту от вредоносного и шпионского ПО, а также совершенно неизвестных и целенаправленных угроз. Этот процесс начинается с сокращения возможностей для сетевых атак путем разрешения доступа конкретным приложениям и запрета доступа всем остальным приложениям: либо с помощью неявной стратегии «запрещать все остальные», либо с помощью задаваемых в явном виде политик. Координированные меры по предотвращению угроз могут примяться ко всему разрешенному трафику, за один проход блокируя известные опасные сайты, уязвимости, вирусы, программы-шпионы и запросы злоумышленников к DNS-серверам. Активный анализ и идентификация неизвестных вредоносных программ осуществляется путем прямого запуска неопознанных файлов в виртуальной среде «песочница» и проверки на предмет более 100 видов вредоносного поведения. При обнаружении новых вредоносных программ автоматически генерируются и предоставляются сигнатуры зараженных файлов и связанного с ними вредоносного трафика. Анализ, связанный с предотвращением угроз, осуществляется с учетом контекста приложений и протоколов связи, гарантируя неизбежное выявление даже тех угроз, которые пытаются скрыться от систем безопасности в туннелях, сжатой информации или нестандартных портах.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> </span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Гибкость внедрения и управления</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Функции обеспечения безопасной работы приложений могут быть внедрены либо на основе специально созданной аппаратной платформы, либо на виртуализированном решении. При развертывании нескольких межсетевых экранов Palo Alto Networks в виде аппаратной или виртуализированной платформы можно использовать дополнительное средство централизованного управления Panorama, позволяющее централизованно осуществлять мониторинг шаблонов трафика, внедрять политики безопасности, формировать отчеты и выполнять обновления. </span>\r\n<ul> <li>Обеспечение безопасной работы приложений: комплексный подход</li> <li>Универсальный редактор политик: привычный интерфейс и набора функций позволяет быстро создавать и внедрять политики контроля приложений, пользователей и информации.</li> <li>Обеспечение работы приложений и снижение риска</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Критерии правил безопасного разрешения доступа приложениям включают приложения или функции приложений, пользователей и группы, а также контент и позволяют найти баланс между «запрещением всех приложений» и рискованной альтернативой в виде «разрешения всех приложений».</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Политики обеспечения доступа, применяемые по периметру сети, включая филиалы, мобильных и удаленных пользователей, нацелены на идентификацию всего трафика и выборочное разрешение прохождения трафика на основе идентификации пользователей с последующим сканированием трафика на наличие угроз. </span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-weight: bold;\">Примеры политик включают:</span></span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Ограничение числа используемых почтовых веб-служб и служб обмена мгновенными сообщениями всего до нескольких возможных вариантов: расшифровка тех из них, которые используют SSL, проверка трафика на предмет вторжений и загрузка неизвестных файлов на WildFire для анализа и разработки сигнатур.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Разрешение приложений и веб-сайтов, использующих потоковые мультимедиа, но с применением системы обеспечения качества обслуживания и защиты от вредоносных программ, чтобы минимизировать влияние на VoIP-приложения и защитить сеть.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Контроль использования Facebook: пользователям разрешается просматривать страницы, но все игры и подключаемые модули социальной сети становятся заблокированными, а публикации в сети Facebook разрешены только для отдела маркетинга. Сканирование всего трафика Facebook на предмет вредоносных программ и вторжений.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Контроль пользования Интернетом путем сканирования трафика и разрешения доступа к веб-сайтам, связанным с выполнением служебных обязанностей, и блокирования доступа к веб-сайтам, очевидно не связанным с работой. «обучение» доступу к сомнительным сайтам через настраиваемые страницы блокировки.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Применение согласованных правил безопасности путем использования одинаковых политик для всех пользователей (локальных, мобильных или удаленных) с помощью GlobalProtect.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Использование неявной стратегии «запрещать все остальные» или целенаправленное блокирование нежелательных приложений, например использующих прямое соединение «точка-точка» или пытающихся обойти средства защиты, а также трафика из определенных стран для сокращения потенциально опасного для бизнеса и безопасности трафика приложений.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Примеры использования правил разрешения доступа в центрах обработки данных (традиционных, виртуализированных или их комбинации) включают подтверждение приложений, поиск вредоносных приложений и защиту данных.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Изоляция хранилища номеров кредитных карт Oracle в отдельной зоне безопасности, контроль доступа групп финансового подразделения путем направления трафика через стандартные порты и его проверки на предмет уязвимостей приложений.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Разрешение доступа к центру обработки данных с использованием фиксированного набора удаленных приложений управления, например SSH, RDP, Telnet, через их стандартные порты только для группы ИТ-подразделения.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Разрешение администрирования Microsoft SharePoint только группе администраторов и разрешение доступа к документам Microsoft SharePoint всем остальным пользователям.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Защита разрешенных приложений</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Безопасная работа приложений означает разрешение доступа к определенным приложениям и применение определенных политик в целях блокировки известных уязвимостей, известного или неизвестного вредоносного и шпионского ПО, контроль передачи файлов и данных, а также пользования Интернетом.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Наиболее распространенные тактики маскировки угроз, включая переключение между портами и туннелирование, нейтрализуются путем реализации политики предупреждения угроз с использованием контекста приложений и протоколов, который генерируется декодерами в App-ID. Решения, основанные на концепции унифицированного управления защитой от угроз (UTM), напротив, используют разрозненный подход к предотвращению угроз, в рамках которого отдельные функции, межсетевые экраны, системы предотвращения вторжений, антивирусы, фильтры URL-адресов и сканеры трафика работают без обмена контекстом, что делает их более уязвимыми перед попытками обхода защиты.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Блокирование известных угроз: Системы предотвращения вторжений и сетевые антивирусы/средства защиты от шпионского ПО. Единый формат сигнатур и система потокового сканирования позволяют защитить вашу сеть от широкого спектра угроз. Система предотвращения вторжений (IPS) нейтрализует угрозы, связанные с блокированием сети и использованием уязвимостей на уровне приложений, переполнением буфера, DoS-атаками и сканированием портов.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Антивирус/средство защиты от шпионского ПО блокирует миллионы вариантов вредоносных программ, а также генерируемый вредоносными программами трафик команд и контроля, вирусы в PDF-файлах и вредоносные программы, скрытые в сжатых файлах или веб-трафике (сжатый HTTP/HTTPS). Реализуемая на основе политик безопасности расшифровка SSL для всех приложений и портов обеспечивает защиту от вредоносных программ, осуществляющих доступ через приложения, использующие защищенный протокол SSL.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Блокирование неизвестного и целенаправленного вредоносного ПО: Wildfire™. WildFire выявляет и анализирует неизвестное или целенаправленное вредоносное ПО путем прямого запуска неопознанных файлов в виртуальной облачной среде «песочница». WildFire осуществляет мониторинг на предмет более 100 видов вредоносного поведения, а результаты немедленно доводятся до сведения администратора в форме экстренных уведомлений. Предлагающаяся отдельно подписка на WildFire обеспечивает усиленную защиту, ведение журналов и формирование отчетов. Как подписчик, вы получаете защиту в течение часа после обнаружения новой вредоносной программы в любой точке мира, что позволяет эффективно блокировать распространение новых вредоносных программ, прежде чем они нанесут вам вред. Как подписчик, вы также получаете доступ к интегрированным в WildFire инструментам ведения журналов и формирования отчетности, а также программному интерфейсу для отправки образцов в облако WildFire для анализа. Мониторинг информации и угроз: Просмотр URL-адресов, угроз и перемещения файлов/данных в простом и понятном формате. Добавление и удаление фильтров для получения дополнительной информации об отдельных элементах. </span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Идентификация хостов, зараженных ботами. App-ID классифицирует все приложения на всех портах, включая весь неизвестный трафик, который зачастую может представлять собой опасность сбоев или угроз для вашей сети. Отчет о признаках ботнет-поведения анализирует неизвестный трафик, подозрительные запросы к DNS и URL-адресов, а также различное необычное поведение в сети в целях выявления устройств, которые могут быть заражены вредоносными программами. Результаты анализа отображаются в виде списка потенциально зараженных хостов, которые могут являться участниками ботнета.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Ограничение несанкционированной передачи файлов и данных. Функции фильтрации данных позволяют администраторам реализовывать политики, которые снизят риски, связанные с несанкционированной передачей файлов и данных. Операции передачи файлов контролируются путем анализа содержимого файла (в отличие от анализа только расширения файла). По результатам анализа принимается решение, следует ли разрешать передачу файла. При этом может блокироваться загрузка исполняемых файлов (которые обычно загружаются с использованием различных средств маскировки), что позволяет защитить сеть от скрытого распространения вредоносных программ. Функции фильтрации данных позволяют обнаруживать содержимое, соответствующее шаблонам конфиденциальных данных (номеров кредитных карт и социального страхования), и управлять его передачей.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">• Контроль пользования интернетом. Полностью интегрированная настраиваемая система фильтрации по URL-адресам позволяет администраторам применять точечные политики в отношении использования веб-ресурсов, дополняющие политики мониторинга трафика приложений и управления им, а также защищающие организацию от всех возможных рисков нарушения требований законодательства, несоблюдения нормативных требований и снижения производительности. Кроме того, в политику безопасности могут быть интегрированы категории URL-адресов, что позволяет точнее управлять расшифровкой SSL, качеством обслуживания или другими правилами.</span>\r\n<p style=\"background-color: #ffffff;\"><span style=\"font-weight: bold;\">Основные линейки устройств:</span></p>\r\n<p style=\"background-color: #ffffff;\">PA-5000 Series, PA-4000 Series, PA-3000 Series, PA-2000 Series, PA-500, PA-200, VM-Series, Management Platforms</p>","shortDescription":"Брандмауэры нового поколения Palo Alto Networks созданы для безопасного использования приложений и предотвращения современных угроз.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Palo Alto Networks межсетевой экран нового поколения (NGFW)","keywords":"приложений, трафика, угроз, доступа, безопасности, пользователей, сети, также","description":"Безопасная работа приложений как необходимое условие успешного развития бизнеса\rБезопасная работа приложений, обеспечиваемая с помощью сетевых экранов Palo","og:title":"Palo Alto Networks межсетевой экран нового поколения (NGFW)","og:description":"Безопасная работа приложений как необходимое условие успешного развития бизнеса\rБезопасная работа приложений, обеспечиваемая с помощью сетевых экранов Palo","og:image":"https://old.b4r.io/fileadmin/user_upload/palo_alto_networks.png"},"eventUrl":"","translationId":2670,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1406,"logoURL":"https://old.b4r.io/fileadmin/user_upload/palo_alto_networks.png","logo":true,"scheme":false,"title":"Palo Alto Networks next-generation firewall (NGFW)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":5,"alias":"palo-alto-networks-next-generation-firewall-ngfw","companyTitle":"Palo Alto Networks","companyTypes":["vendor"],"companyId":2061,"companyAlias":"palo-alto-networks","description":"Flexible deployment options and native integration with our next-generation platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud.\r\n<span style=\"font-weight: bold;\">Superior architecture, superior benefits</span>\r\nComplete visibility and precise control: Our next-generation firewalls provide complete visibility into all network traffic based on applications, users, content and devices. Automated security: Innovative features reduce manual tasks and enhance your security posture, for example, by disseminating protections from previously unknown threats globally in near-real time, correlating a series of related threat events to indicate a likely attack on your network, and using dynamic address groups in security rules to avoid updating server IP addresses frequently. Protection for your users and data everywhere: Our next-generation firewalls are natively integrated with our security platform, which prevents advanced and unknown cyberthreats no matter where the users and data are located: in your network, on your endpoints and in the cloud.\r\n<span style=\"font-weight: bold;\">Products: </span>PA-5000 Series, PA-4000 Series, PA-3000 Series, PA-2000 Series, PA-500, PA-200, VM-Series, Management Platforms\r\n<span style=\"font-weight: bold;\">Visibility and Control</span>\r\nOur next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surface area of cyber attacks across the organization.\r\n<span style=\"font-weight: bold;\">Threat Prevention</span>\r\nThe combination of Content-IDTM and WildFireTM provides protection from known and unknown threats. Content-ID limits unauthorized data transfer and detects and blocks a wide range of threats. WildFire identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment, and automatically disseminates updated protections globally in near-real time.\r\n<span style=\"font-weight: bold;\">Built-in, not Bolted-on</span>\r\nToday’s security architectures are a result of adding uncoordinated security layers one at a time, making them ineffective in dealing with modern threats. Unlike legacy firewalls that are based on this "layered security" architecture, our next-generation firewalls use a unified security design that classifies all traffic into full context before applying one set of flexible security rules in a single pass.","shortDescription":"Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Our approach identifies all network traffic based on applications, users, content","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Palo Alto Networks next-generation firewall (NGFW)","keywords":"security, your, next-generation, threats, users, Series, data, traffic","description":"Flexible deployment options and native integration with our next-generation platform extend the policy enforcement and cyberthreat prevention to everywhere","og:title":"Palo Alto Networks next-generation firewall (NGFW)","og:description":"Flexible deployment options and native integration with our next-generation platform extend the policy enforcement and cyberthreat prevention to everywhere","og:image":"https://old.b4r.io/fileadmin/user_upload/palo_alto_networks.png"},"eventUrl":"","translationId":1406,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1439,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cisco_ASA_NGFW__Mezhsetevye_ehkrany_novogo_pokolenija_.jpg","logo":true,"scheme":false,"title":"Cisco ASA NGFW (Межсетевые экраны нового поколения)","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":273,"alias":"cisco-asa-ngfw-mezhsetevye-ehkrany-novogo-pokolenija","companyTitle":"Cisco","companyTypes":["supplier","vendor"],"companyId":170,"companyAlias":"cisco","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Всесторонний мониторинг и контроль</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Мобильный доступ и облачные технологии способствуют повышению производительности, но сопряжены с дополнительными рисками. Для защиты ресурсов необходимы мониторинг пользователей, приложений, устройств и угроз в сети, а также контроль за их действиями. Межсетевые экраны Cisco ASA серии 5500-X обеспечивают необходимую прозрачность сети, превосходную защиту от угроз и вредоносного ПО повышенной сложности и высокий уровень автоматизации, позволяющие сократить расходы и упростить инфраструктуру.</span> <span style=\"font-weight: bold;\">Возможности и характеристики</span> Надежная многоуровневая защита от угроз Межсетевые экраны нового поколения Cisco ASA серии 5500-X помогают заказчикам найти баланс между эффективностью обеспечения безопасности и производительностью. Это решение, представляющее собой сочетание самого популярного в отрасли межсетевого экрана с контролем состояния соединений и полного ассортимента сервисов сетевой безопасности нового поколения, включает:\r\n<ul> <li>детализированный мониторинг и контроль;</li> <li>надежную защиту от интернет-угроз в облаке или с локальным размещением;</li> <li>лучшую в отрасли систему предотвращения вторжений (IPS) для защиты от известных угроз;</li> <li>комплексную защиту от угроз и усовершенствованного вредоносного ПО;</li> <li>самый популярный в мире межсетевой экран ASA с обеспечивающим высокий уровень безопасности решением Cisco AnyConnect для удаленного доступа.</li> </ul>\r\nCisco предлагает первый в отрасли ориентированный на предотвращение угроз межсетевой экран нового поколения, — Cisco ASA с сервисами FirePOWER, доступный на многофункциональных устройствах обеспечения безопасности Cisco ASA серии 5500-X и ASA серии 5585-X. Благодаря этому решению заказчик получает в одном устройстве проверенную временем защиту межсетевым экраном Cisco ASA в сочетании с лучшей в отрасли защитой от угроз и вредоносного ПО — Sourcefire. Защитите ваш бизнес с помощью решения для полномасштабного контроля и высокоэффективного противостояния угрозам на всем протяжении атаки. Это решение обеспечивает всесторонний мониторинг и контроль, сокращение расходов и упрощение инфраструктуры, а также защиту от вредоносного ПО и новых угроз в режиме реального времени. <span style=\"font-weight: bold;\">Широкий выбор типоразмеров и возможностей</span> Благодаря технологии MultiScale и разнообразию типоразмеров вы сможете защитить сеть любого размера. Межсетевые экраны Cisco ASA серии 5500-X нового поколения поставляются в виде:\r\n<ul> <li>отдельных устройств, предназначенных специально для предприятий малого и среднего бизнеса;</li> <li>устройств повышенной прочности, созданных для работы в расширенном температурном диапазоне на промышленных предприятиях или объектах особой важности;</li> <li>устройств среднего размера для предприятий, которые хотят повысить безопасность подключения к сети Интернет;</li> <li>высокопроизводительных устройств с высокой пропускной способностью для требовательных к ресурсам корпоративных центров обработки данных;</li> <li>высокопроизводительных блейд-серверов, интегрируемых с коммутаторами Cisco Catalyst серии 6500;</li> <li>виртуальных приложений для защиты частных и общедоступных облаков корпоративного класса.</li> </ul>\r\n<span style=\"font-weight: bold;\">Проверенная временем платформа корпоративного класса</span> Все межсетевые экраны Cisco ASA серии 5500-X нового поколения работают под управлением программного обеспечения Cisco Adaptive Security Appliance (ASA) и поддерживают функции контроля состояния соединений корпоративного класса, а также возможности межсетевых экранов нового поколения. Конфигурация программного обеспечения ASA допускает такие функциональные возможности, как:\r\n<ul> <li>интеграция с базовыми технологиями защиты сетей;</li> <li>расширенный учет идентификаторов пользователей с применением групповых меток безопасности Cisco TrustSec и межсетевого экрана, использующего идентификационную информацию;</li> <li>пропускная способность до 640 Гбит/с благодаря кластеризации до 16 устройств ASA 5585-X;</li> <li>высокая эксплуатационная готовность для приложений с повышенными требованиями к отказоустойчивости;</li> <li>надежные средства безопасности нового поколения с применением Cisco ASA с сервисами FirePOWER.</li> </ul>","shortDescription":" Аппаратные и программные варианты Cisco ASA NGFW сочетают в себе проверенный межсетевой экран с самой эффективной в отрасли системой предотвращения вторжений нового поколения","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco ASA NGFW (Межсетевые экраны нового поколения)","keywords":"Cisco, поколения, угроз, нового, серии, устройств, безопасности, экраны","description":"Всесторонний мониторинг и контроль\rМобильный доступ и облачные технологии способствуют повышению производительности, но сопряжены с дополнительными рисками.","og:title":"Cisco ASA NGFW (Межсетевые экраны нового поколения)","og:description":"Всесторонний мониторинг и контроль\rМобильный доступ и облачные технологии способствуют повышению производительности, но сопряжены с дополнительными рисками.","og:image":"https://old.b4r.io/fileadmin/user_upload/Cisco_ASA_NGFW__Mezhsetevye_ehkrany_novogo_pokolenija_.jpg"},"eventUrl":"","translationId":2674,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2240,"logoURL":"https://old.b4r.io/fileadmin/content/four-leaf-clover-152047_960_720_01.png","logo":true,"scheme":false,"title":"Kasperskiy","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":172,"alias":"kasperskiy","companyTitle":"Kaspersky Lab","companyTypes":["vendor"],"companyId":173,"companyAlias":"kaspersky-lab","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Kasperskiy","keywords":"","description":"","og:title":"Kasperskiy","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/four-leaf-clover-152047_960_720_01.png"},"eventUrl":"https://calendly.com/solomiia-rymar/test-event","translationId":2981,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":3,"title":"CRM"},{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":4,"title":"Data center","alias":"data-center","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/COD_-_Centr_obrabotki_dannykh.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1443,"logoURL":"https://old.b4r.io/fileadmin/user_upload/juniper_networks.png","logo":true,"scheme":false,"title":"Juniper Next-Generation Firewall (NGFW)","vendorVerified":0,"rating":"2.20","implementationsCount":3,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-next-generation-firewall-ngfw","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your organization’s defenses. <span style=\"font-weight: bold;\">Identifying Application Risks</span> Juniper AppSecure, an NFGW Services component, is a suite of services that provides deep application visibility and control in your network:\r\n<ul>\r\n<li>AppTrack identifies applications on the network to assess their security risk and address user behavior. Contextual information helps you gain insight into which applications are permitted and the risk they may pose.</li>\r\n<li>AppFW provides policy-based enforcement and control, blocking access to high-risk applications and enforcing user-defined policies. Reports on application bandwidth usage deliver further insight, and you can throttle any application traffic not sanctioned by the enterprise.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Protection from Network Borne Attacks</span> Juniper Intrusion Prevention System (IPS) and Sky Advanced Threat Prevention (ATP) work together to provide comprehensive threat detection and protection against known and unknown threats that use the network as an attack vector. The capabilities provide immediate protection from malicious malware. Continual monitoring for new exploits and vulnerabilities keeps protection up to date. The system immediately blocks threats on client and server systems inline before damage can take place. <span style=\"font-weight: bold;\">Safeguards Against Malware</span> Although modern cyber criminals favor today’s sophisticated, turnkey techniques, they have not abandoned the tried and true approach of tucking malware into signature-based viruses and volume-based email. Integrated with our SRX platforms, Sophos Live Protection combines cloud-based reputation intelligence with on-box horsepower to deliver lightweight and fast security. <span style=\"font-weight: bold;\">Web Browsing Defense</span> The Web is full of deception designed to get unsuspecting users to click on malicious links that might install advanced malware. Attackers regularly compromise websites by tricking users into providing their user credentials. Juniper has partnered with Forcepoint to provide URL filtering that fights such attacks. The service is constantly and globally updated in real time to provide an always-current worldwide database of malicious URLs that protect against user compromise. <span style=\"font-weight: bold;\">Avoiding Unauthorized Access and Use</span> Every user in an enterprise must be able to access certain applications to perform specific tasks. But allowing users unlimited access to corporate resources outside their sphere of responsibility can enable the proliferation of insider threats. Our User Firewall service restricts application usage on a per-user basis by tightly integrating with Microsoft Active Directory (AD) and the Lightweight Directory Access Protocol (LDAP). As a result, you gain visibility and control of application and network use segmented by user-defined roles, enabling secure access to authorized applications. <span style=\"font-weight: bold;\">Features</span> <span style=\"font-weight: bold;\">Advanced Application Visibility and Control</span> You can identify applications running on your network regardless of port, protocol, and encryption. This visibility lets you immediately block evasive applications inline at the SRX firewall. <span style=\"font-weight: bold;\">Nested Application Support</span> You can accurately identify applications embedded in common network protocols such as HTTP or HTTPS traffic. This capability also provides visibility into and granular control over applications hidden inside encrypted SSL traffic. <span style=\"font-weight: bold;\">User and Role-Based Policies</span> Tight integration with Microsoft AD and LDAP allow you to set and enforce user- and role-based security policies. Policy setting becomes simpler and more secure, because you reduce the number of policies needed to account for user location, IP address, and so on. <span style=\"font-weight: bold;\">SSL Inspection</span> Inline decryption and inspection of inbound and outbound Secure Sockets Layer (SSL) connections at the SRX firewall provide visibility and protection against threats embedded in SSL encrypted traffic. <span style=\"font-weight: bold;\">Junos OS Integration</span> Integration with Juniper’s operating system consolidates and optimizes services on SRX devices for maximum scale.","shortDescription":"Juniper Next-Generation Firewall (NGFW) Services provide an array of cyber defenses to reduce your attack surface in this challenging environment.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Next-Generation Firewall (NGFW)","keywords":"applications, with, network, that, visibility, application, user, provide","description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your","og:title":"Juniper Next-Generation Firewall (NGFW)","og:description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your","og:image":"https://old.b4r.io/fileadmin/user_upload/juniper_networks.png"},"eventUrl":"","translationId":1444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":119,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Kaspersky_Security_dlja_biznesa.png","logo":true,"scheme":false,"title":"Kaspersky Security для бизнеса","vendorVerified":0,"rating":"3.00","implementationsCount":7,"suppliersCount":0,"supplierPartnersCount":172,"alias":"kaspersky-security-dlja-biznesa","companyTitle":"Kaspersky Lab","companyTypes":["vendor"],"companyId":173,"companyAlias":"kaspersky-lab","description":"\r\n<p> </p>\r\n<p>Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор возможностей, которые позволят вам видеть, контролировать и защищать вашу IT-инфраструктуру.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Продуктовая линейка включает в себя несколько уровней с возрастающим функционалом. Уровни – Kaspersky Endpoint Security для бизнеса СТАРТОВЫЙ, СТАНДАРТНЫЙ, РАСШИРЕННЫЙ и Kaspersky Total Security для бизнеса – построены по модульному принципу и позволяют расширять возможности решения в соответствии с растущими потребностями бизнеса: от базовой защиты рабочих мест от вредоносного ПО до безопасности каждого узла сети. Кроме того, многие из представленных решений могут быть приобретены отдельно. Таким образом, компании, желающие установить дополнительную защиту лишь на определенные узлы сети, могут сделать это без лишних затрат.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Линейка Kaspersky Security для бизнеса позволяет выбрать именно то решение, которое нужно вашей организации, чтобы вы могли контролировать рабочие места (от рабочих станций до смартфонов и виртуальных машин), серверы и интернет-шлюзы и обеспечить их надежной защитой. Наши продукты также позволяют управлять безопасностью всей вашей IT-инфраструктуры удаленно.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая консоль управления: администратор может наблюдать за состоянием защиты всех физических, виртуальных и мобильных устройств, а также управлять их безопасностью с помощью единой консоли администрирования.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая платформа: все используемые в продуктах «Лаборатории Касперского» ключевые технологии, функциональные компоненты и модули разрабатываются внутри компании на собственной технологической базе.Благодаря этому растет эффективность, снижается нагрузка на систему и повышается стабильность работы приложений.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая лицензия: вы не получаете несколько отдельных решений в рамках одной покупки — вы приобретаете единое комплексное решение, которое вы можете гибко настраивать в соответствии со своими бизнес-целями.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — СТАРТОВЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Это идеальный вариант для заказчиков, которым необходима только защита от вредоносного ПО. Единая консоль управления Kaspersky Security Center с интуитивно понятным интерфейсом дополняет все наши решения для рабочих станций.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — СТАНДАРТНЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Список средств защиты в решении уровня СТАНДАРТНЫЙ включает средства обеспечения безопасности рабочих станций и файловых серверов, динамические белые списки, а также средства контроля программ, устройств и веб-ресурсов. В него также входят инструменты для защиты мобильных устройств и управления ими. Если потребности вашего бизнеса включают защиту мобильных сотрудников и применение политик IT-безопасности, то вам подойдет решение уровня СТАНДАРТНЫЙ.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — РАСШИРЕННЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>На уровне РАСШИРЕННЫЙ «Лаборатория Касперского» добавила ко всем вышеперечисленным функциям шифрование данных. Еще одна новая разработка «Лаборатории Касперского» средство системного администрирования — обеспечивает безопасность и одновременно повышает производительность IT-инфраструктуры. <span style=\"font-weight: bold;\">Такой широкий набор функций и полезных инструментов позволяет:</span></p>\r\n<p> </p>\r\n\r\n\r\n<ul>\r\n<li>создавать и хранить образы систем и осуществлять их удаленное развертывание;</li>\r\n<li>устанавливать приоритет устранения уязвимостей в аппаратном и программном обеспечении благодаря эффективному сочетанию мониторинга уязвимостей и интеллектуального управления установкой исправлений;</li>\r\n<li>контролировать использование лицензий на программное обеспечение с помощью модуля управления лицензиями;</li>\r\n<li>задавать политики доступа к данным и IT-инфраструктуре для пользователей и гостей с помощью средства контроля доступа в сеть (NAC);</li>\r\n<li>удаленно развертывать и устанавливать программы и обновления на компьютеры пользователей с помощью единой централизованной консоли администрирования.</li>\r\n</ul>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Total Security для бизнеса</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Наш флагманский продукт — Kaspersky Total Security для бизнеса — включает в себя возможности всех предыдущих уровней и дополнительно укрепляет безопасность вашей IT-инфраструктуры с помощью средств для защиты почтовых серверов, интернет-шлюзов и серверов совместной работы. Это идеальное решение для организаций с высокими требованиями к IT-безопасности, которым нужна надежная защита каждого узла сети.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p> </p>\r\n<p> </p>\r\n","shortDescription":"Kaspersky Security для бизнеса – для обеспечения безопасности корпоративной информационной сети, позволят вам видеть, контролировать и защищать вашу IT-инфраструктуру.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Kaspersky Security для бизнеса","keywords":"бизнеса, Kaspersky, Security, управления, помощью, защиты, Единая, Endpoint","description":"Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор","og:title":"Kaspersky Security для бизнеса","og:description":"Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор","og:image":"https://old.b4r.io/fileadmin/user_upload/Kaspersky_Security_dlja_biznesa.png"},"eventUrl":"","translationId":2334,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":3,"title":"CRM"},{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1399,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_NextGen_Firewall.png","logo":true,"scheme":false,"title":"Barracuda NextGen Firewall (NGFW)","vendorVerified":0,"rating":"3.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-nextgen-firewall-ngfw","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications. The Barracuda NextGen Firewall F-Series is a family of hardware, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control. In addition, the F-Series combines highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network. The F-Series cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<span style=\"font-weight: bold;\">Security for the Cloud Era</span>\r\nSecurity paradigms are shifting—and securing your network perimeter is no longer good enough. In the cloud era, workloads happen everywhere, users are increasingly mobile, and potential attack surfaces are multiplying. Barracuda NextGen Firewall F-Series is purpose-built to deal with the challenges of securing widely distributed networks.\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN..</span>\r\nBarracuda Cloud Era Firewalls include full next gen Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n\r\n<ul>\r\n<li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li>\r\n<li>VPN across multiple broadband connections and MPLs replacement</li>\r\n<li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li>\r\n<li>Replacing network backhauling central policy enforcement architectures with direct internet break outs</li>\r\n<li>Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic</li>\r\n<li>Guaranteed users' access to critical applications through granular policy controls</li>\r\n<li>Increased available bandwidth with built-in traffic compression and data deduplication</li>\r\n<li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Why Barracuda NextGen Firewall?</span> When selecting security technology, it is critical that your products are supported by people who take your data security as seriously as you do. The Barracuda NextGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data. The Barracuda NextGen Firewall is part of a comprehensive line of data protection, network firewall, and security products and services designed for organizations seeking robust yet affordable protection from ever-increasing cyber threats. <span style=\"font-style: italic;\">Source: https://www.barracuda.com/products/nextgenfirewall_f</span>","shortDescription":"Barracuda's Next Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda NextGen Firewall (NGFW)","keywords":"network, Barracuda, your, with, Firewall, NextGen, security, access","description":"Next-Generation Firewalls for the Cloud Era\rIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have","og:title":"Barracuda NextGen Firewall (NGFW)","og:description":"Next-Generation Firewalls for the Cloud Era\rIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_NextGen_Firewall.png"},"eventUrl":"","translationId":1400,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":952,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint NGFW","vendorVerified":1,"rating":"3.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-ngfw","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":" \r\nAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network expenses as much as 50%, slash downtime and reduce IT risk\r\n<span style=\"font-weight: bold;\">The Forcepoint Advantage</span>\r\nBoost business productivity and cut the cost of providing safe, reliable access to applications and data, with secure SD-WAN built right in.\r\n<span style=\"font-weight: bold;\">High Availability</span>\r\nSlash network downtime and keep your business running with uniquely efficient resilience integrated at all levels: firewalls, network and management.\r\n<span style=\"font-weight: bold;\">Unrivaled Security</span>\r\nProtect data and apps throughout your data centers, edge, SD-WANs and cloud – with VPNs, IPS, anti-evasion, encrypted inspection, anti-malware, proxies and more.\r\n<span style=\"font-weight: bold;\">Massive Scalability</span>\r\nSmoothly scale your security as your physical and virtual networks grow, without rip-and-replace upgrades or patchworks of tools.\r\n<span style=\"font-weight: bold;\">Centralized Manageability</span>\r\nDeploy firewalls, VPNs, IPS, SD-WAN fast, across many different environments – and keep them running smoothly.\r\n<span style=\"font-weight: bold;\">360° Visibility</span>\r\nGain immediate insights into what is happening across your network to accelerate incident response and streamline audit best practices.\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n<span style=\"text-decoration-line: underline;\">Forcepoint NGFW Appliances</span> All Forcepoint NGFWs are built on a common software core to provide unified operation and high performance across all forms of appliances – physical, virtual, cloud. Physical – desktop, ruggedized and rack-mounted models; customizable network interfaces; firewall throughput from 1.5-120 Gbps Virtual – available for KVM and VMware ESXi Cloud – available for Amazon Web Services (AWS), Microsoft Azure (coming soon). Find out about the certifications that the Forcepoint NGFW appliances meet.\r\n<span style=\"text-decoration-line: underline;\">NSS Labs Recommended</span> In NSS Labs’ most recent report on Next Generation Firewall (NGFW) overall security effectiveness, Forcepoint NGFW achieved the highest rating of all 11 products tested. NSS Labs latest tests prove that Forcepoint NGFW offers the leading combination of enterprise security and low cost.","shortDescription":"With Forcepoint NGFW, you can deploy and manage thousands of firewalls, IPSs, VPNs and SD-WANs – in minutes, all from a single console.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":15,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint NGFW","keywords":"Forcepoint, NGFW, your, network, security, that, data, with","description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network","og:title":"Forcepoint NGFW","og:description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":953,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":["Unaurthorized access to corporate IT systems and data","Risk or Leaks of confidential information","Malware infection via Internet, email, storage devices","Risk of attacks by hackers"],"materials":[],"useCases":[],"best_practices":[],"values":["Ensure Security and Business Continuity"],"implementations":[{"id":436,"title":"Cisco ASA NGFW for University Data Center and Disaster Recovery Sites","url":"https://old.b4r.io/vnedrenija/vnedrenie/cisco-asa-ngfw-for-university-data-center-and-disaster-recovery-sites/"},{"id":437,"title":"Cisco ASA NGFW for a sporting goods chain Security Effectiveness and Saving Costs","url":"https://old.b4r.io/vnedrenija/vnedrenie/cisco-asa-ngfw-for-a-sporting-goods-chain-security-effectiveness-and-saving-costs/"},{"id":438,"title":"Cisco ASA NGFW for Rio Summer Olympics 2016","url":"https://old.b4r.io/vnedrenija/vnedrenie/cisco-asa-ngfw-for-rio-summer-olympics-2016/"},{"id":439,"title":"Cisco ASA NGFW for National Water Company","url":"https://old.b4r.io/vnedrenija/vnedrenie/cisco-asa-ngfw-for-national-water-company/"}],"presenterCodeLng":"","productImplementations":[{"id":436,"title":"Cisco ASA NGFW for University Data Center and Disaster Recovery Sites","description":"When Victoria University of Wellington experiences an earthquake, it needs consistent security policies and simplified operations to protect data and maintain uptime. The university’s Information Technology Services team used Cisco firewall geo-clustering technology to build safeguards and security into its network and technology environment.\r\n<span style=\"font-weight: bold; \">Challenges</span>\r\n\r\n<ul><li>Link campus data center with mirrored disaster recovery site</li><li>Help ensure high availability of data centers in earthquake-prone region</li><li>Streamline operations, security policies, reduce IT costs to support academic community</li><li>University campus lobby</li></ul>\r\n<span style=\"font-weight: bold; \">Solutions</span>\r\n<ul><li>Cisco next-generation firewalls with geo-clustering paired with refreshed Cisco data center</li><li>Two business professionals talk on a park bench</li></ul>\r\n<span style=\"font-weight: bold;\">Products and Services</span>\r\n<span style=\"text-decoration-line: underline;\">Security</span>\r\n• Cisco ASA 5585-S40 Next Generation Firewalls\r\n<span style=\"text-decoration-line: underline;\">Data Center</span>\r\n• Cisco Nexus® 7000 9-Slot Switch\r\n• Cisco Nexus 5510 Switch\r\n• Cisco Nexus 5548UP Switch\r\n• Cisco Catalyst® 3750 Switch\r\n• Cisco Catalyst 2960 Series Switches\r\n<span style=\"text-decoration-line: underline;\">Routers</span>\r\n• Cisco ASR 9010 Router\r\n• Cisco ASR 9006 Router\r\n• Cisco ASR 1002 Router\r\n<span style=\"text-decoration-line: underline;\">Network Management</span>\r\n• Cisco 5508 Wireless Controllers\r\n<span style=\"font-weight: bold; \">Results</span>\r\n\r\n<ul><li>Helped enable consolidation of multisite data center policies that are easy to set up and use</li><li>Facilitated data center redundancy to ensure high availability in earthquake-prone area</li><li>Lowered cost of ownership by 20%</li></ul>\r\n<span style=\"font-style: italic; \">"With the geo-clustered configuration, the team was able to manage hundreds of applications all in-house, and easily share security policies." - Simon Warren, Senior Networking Engineer, Victoria University of Wellington</span>\r\n\r\n","alias":"cisco-asa-ngfw-for-university-data-center-and-disaster-recovery-sites","roi":0,"seo":{"title":"Cisco ASA NGFW for University Data Center and Disaster Recovery Sites","keywords":"Cisco, data, Switch, policies, security, center, with, University","description":"When Victoria University of Wellington experiences an earthquake, it needs consistent security policies and simplified operations to protect data and maintain","og:title":"Cisco ASA NGFW for University Data Center and Disaster Recovery Sites","og:description":"When Victoria University of Wellington experiences an earthquake, it needs consistent security policies and simplified operations to protect data and maintain"},"deal_info":"","user":{"id":4202,"title":"Victoria University","logoURL":"https://old.b4r.io/uploads/roi/company/Victoria_University.png","alias":"victoria-university","address":"","roles":[],"description":"Victoria University is one of New Zealand’s oldest and most prestigious tertiary institutions with a proud tradition of academic excellence. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.victoria.ac.nz/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Victoria University","keywords":"Victoria, University, excellence, academic, tradition, proud, with, institutions","description":"Victoria University is one of New Zealand’s oldest and most prestigious tertiary institutions with a proud tradition of academic excellence. ","og:title":"Victoria University","og:description":"Victoria University is one of New Zealand’s oldest and most prestigious tertiary institutions with a proud tradition of academic excellence. ","og:image":"https://old.b4r.io/uploads/roi/company/Victoria_University.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.b4r.io/uploads/roi/company/cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells networking equipment worldwide. It is the largest networking company in the world. The stock was added to the Dow Jones Industrial Average on June 8, 2009, and is also included in the S&P 500 Index, the Russell 1000 Index, NASDAQ-100 Index and the Russell 1000 Growth Stock Index.","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":18,"vendorPartnersCount":0,"supplierPartnersCount":273,"b4r":0,"categories":{},"companyUrl":"www.cisco.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells","og:title":"Cisco","og:description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells","og:image":"https://old.b4r.io/uploads/roi/company/cisco_logo.png"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.cisco.com/c/en/us/about/case-studies-customer-success-stories/victoria-university.html?dtid=osscdc000283","title":"-"}},"comments":[],"referencesCount":0},{"id":437,"title":"Cisco ASA NGFW for a sporting goods chain Security Effectiveness and Saving Costs","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Since it’s founding in 1902, Scheels has grown from three acres of potatoes to a sporting goods chain with 26 locations in 11 states, including the largest allsports store in the world. It’s an unlikely trajectory but one that was propelled by a commitment to customer service that began with the retailer’s founder, Frederick A. Scheel, and remains a cornerstone for success.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Just as SCHEELS sporting goods experts are dedicated to ensuring customers get the most from their shopping experience, SCHEELS IT experts Josh Diemert and Perry Stockwell are dedicated to helping the company get the most from its infrastructure and resources while protecting the company from cyber threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">For years, SCHEELS relied on a vendormanaged security solution that had become costly, difcult to manage, and used aging infrastructure. Set to open two more stores by 2020, the company realized that it needed to ensure that its infrastructure could scale and keep pace with both the dynamic threat landscape and its growing business.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic; \">“Our vendor-managed solution was difcult to work with and expensive,” explains Josh Diemert, Lead Systems Administrator, SCHEELS. “Every time we wanted to make a change to a policy it could take up to a day and it wasn’t always done correctly.” But the prospect of moving away from an outsourced model had to be carefully considered. “Our IT team runs lean – we needed a way to bring security in-house without adding a whole lot of work for our staf,” adds Diemert.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">At the same time, the company was considering a structural redesign that would eliminate the need to backhaul trafc to the corporate ofce, which would improve service quality to its stores and reduce bandwidth costs. Making this change would also require that the team have greater visibility and control over Internet access at each store to manage security in-house.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">SCHEELS has nearly 80 Cisco ASA with FirePOWER Services models deployed, the vast majority being the ASA 5506-X. In addition to the stateful frewall, the team uses FirePOWER Services including Advanced Malware Protection (AMP) for Networks, URL fltering, Application Visibility and Control (AVC), and NextGeneration IPS to deliver more integrated and efective security. The team centrally manages all the stores through the FireSIGHT® Management Center. Perry Stockwell, SCHEELS’ systems administrator, relies on the intelligence provided through this single pane of glass, including the events log, URL filtering, indicators of compromise (IoC), and prioritization fags, to strengthen the retailer’s security posture.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic; \">“The FireSIGHT® Management Center allows us to see what’s happening and make changes quickly. For example we can push out a policy change in under an hour, when previously it would have taken at least eight hours working through a third party,” Stockwell explains. “And the system will do a lot for us automatically – blocking malicious links without us having to do anything, preventing infected guest machines from connecting, and restricting user access according to policies.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Stockwell points out that one of the biggest security concerns for retailers right now is ransomware. In the battle against threats that use email as an attack vector, Stockwell believes that employee education on safe habits to ensure they know how to recognize and not click on potential malware is an important part of any security program. Still, mistakes will happen and threats are increasingly sophisticated so multilayered protection is also necessary to help defeat advanced malware. For example, Cisco AMP for Networks has allowed the team to catch malware that the anti-virus solution has missed.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Stockwell elaborates, “The extra layer of malware protection at the network with AMP for Networks has helped us detect malware that was attempting to call out to a command and control server, and block it before it was successful.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">As SCHEELS continues to expand with a new store in Colorado and another in Texas, the team is confdent in its ability to keep pace. “With our previous vendor, getting devices into a store was a very lengthy process and could take over a month,” notes Stockwell. “Given how quickly this initial rollout went, we feel we have the process down and a template we can use to get a store up and running in a matter of hours.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic; \">“We are always looking to improve security everywhere,” concludes Diemert.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic; \">“Moving to Cisco saved us money and is allowing us to apply resources to additional areas – increasing our endpoint protection with AMP for Endpoints is our next area of focus.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">Products and Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco ASA 5506-X with FirePOWER Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco ASA 5516-X with FirePOWER Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco ASA 5525-X with FirePOWER Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• FireSIGHT Management Center</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco FirePOWER Services in use:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">- Cisco Advanced Malware Protection (AMP) for Networks</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">- URL fltering</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">- Application Visibility and Control (AVC)</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">- Next-Generation IPS</span>\r\n\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); font-weight: bold;\">With Cisco ASA with FirePOWER Services, SCHEELS can:</span>\r\n<ul><li>Cut response time from hours to minutes.</li><li>Detect and stop threats that evade the anti-virus solution.</li><li>Deploy devices at new stores in couple of hours vs. more than a month.</li></ul>","alias":"cisco-asa-ngfw-for-a-sporting-goods-chain-security-effectiveness-and-saving-costs","roi":0,"seo":{"title":"Cisco ASA NGFW for a sporting goods chain Security Effectiveness and Saving Costs","keywords":"that, with, Cisco, security, Services, FirePOWER, from, SCHEELS","description":"Since it’s founding in 1902, Scheels has grown from three acres of potatoes to a sporting goods chain with 26 locations in 11 states, including the largest","og:title":"Cisco ASA NGFW for a sporting goods chain Security Effectiveness and Saving Costs","og:description":"Since it’s founding in 1902, Scheels has grown from three acres of potatoes to a sporting goods chain with 26 locations in 11 states, including the largest"},"deal_info":"","user":{"id":4204,"title":"SCHEELS","logoURL":"https://old.b4r.io/uploads/roi/company/SCHEELS.png","alias":"scheels","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">SCHEELS' first All Sports Superstore opened in Grand Forks, ND in 1989. SCHEELS' Reno/Sparks, Nevada location opened in 2008 and is the World's Largest All Sports Store. Today, SCHEELS is a 27-store operation with stores in 12 states including North Dakota, Illinois, Iowa, Minnesota, South Dakota, Montana, Wisconsin, Nebraska, Nevada, Utah, Kansas, and Colorado. Providing SCHEELS' customers with first-class customer service and the world's largest selection of sports, sportswear and footwear are the priorities throughout the organization.</span>\r\n","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.scheels.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SCHEELS","keywords":"SCHEELS, Nevada, Dakota, with, Sports, opened, sportswear, customers","description":"SCHEELS' first All Sports Superstore opened in Grand Forks, ND in 1989. SCHEELS' Reno/Sparks, Nevada location opened in 2008 and is the World's Largest All","og:title":"SCHEELS","og:description":"SCHEELS' first All Sports Superstore opened in Grand Forks, ND in 1989. SCHEELS' Reno/Sparks, Nevada location opened in 2008 and is the World's Largest All","og:image":"https://old.b4r.io/uploads/roi/company/SCHEELS.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.b4r.io/uploads/roi/company/cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells networking equipment worldwide. It is the largest networking company in the world. The stock was added to the Dow Jones Industrial Average on June 8, 2009, and is also included in the S&P 500 Index, the Russell 1000 Index, NASDAQ-100 Index and the Russell 1000 Growth Stock Index.","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":18,"vendorPartnersCount":0,"supplierPartnersCount":273,"b4r":0,"categories":{},"companyUrl":"www.cisco.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells","og:title":"Cisco","og:description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells","og:image":"https://old.b4r.io/uploads/roi/company/cisco_logo.png"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.cisco.com/c/dam/en/us/products/collateral/security/firewalls/scheels-case-study.pdf","title":"-"}},"comments":[],"referencesCount":0},{"id":438,"title":"Cisco ASA NGFW for Rio Summer Olympics 2016","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">All roads to the Olympics start with a dream. For the over 15,000 Olympic and Paralympic athletes from 205 countries who congregated in Rio de Janeiro in 2016, it’s the dream of competing at the highest level possible. It’s also about standing on the podium wearing a gold medal while their country’s flag rises and the national anthem plays. For Cisco, as a proud supporter of the 2016 Olympic and Paralympic Games in Rio, it also starts with a dream: that when we securely connect everything,</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">anything is possible.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Supporting a global event of this size is a monumental task that demands a network like no other. The Rio 2016 Games required connectivity, bandwidth, security, and support for:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 37 competition venues</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• More than 100 support venues</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 15,000 athletes</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 70,000 volunteers</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 9 million ticketholders</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 25,000 media personnel</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 123 network broadcasters from around the world</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">All this while delivering 170,000 hours of video content and providing infrastructure for 5 billion TV viewers – up from 4 billion viewers for the London Olympics in 2012.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">In short, if this network were competing in the Olympics, it would break world records.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">However, simply providing the infrastructure wasn’t enough. Cisco also had to provide effective security.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“The challenge we faced at Rio 2016 was making memorable Games, and one crucial aspect was to provide uninterrupted connectivity to our athletes, guests, media, and critical systems, all while keeping everything secure,” said Marcelo</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">Souza, Technology Systems General Manager of the Rio 2016 Organizing Committee for the Olympic Games. “We needed a vendor that could handle the traffic demands in a complex environment and deliver the security needed for such a monumental event.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Comparisons don’t come easy when we talk about a world stage event such as the Olympic Games. Securely connecting the Games required 60 tons of equipment and more than 60,000 hours of work. As the official networking and enterprise server supporter and supplier, Cisco deployed over 5,000 access points (a 400 percent increase from the London 2012 Games) and over 113,000 local area network (LAN) ports. Cisco also supplied 440 Cisco Unified Computing System™ (Cisco UCS®) servers, 480 vehicle routers, and 177 security devices. IIn addition, the Cisco network protected core activities such as accreditation, volunteers, sports entries and qualifications, and workforce management.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The network connected 183,044 unique devices of which 168,158 were wireless (92 percent of all devices). Cisco Identity Services Engine (ISE) and Cisco TrustSec technology were used to identify devices and segment accordingly. Any unrecognized device would connect to the guest network. Network traffic was extremely heavy – 2.144 petabytes of traffic over the course of the Games. To put that into perspective, it’s equivalent to 950,000 hours of HD video, which would take more than 110 years of nonstop streaming to watch.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">As a highly visible target for sophisticated threats from around the world, the Rio 2016 Games demanded a security architecture that is fundamentally integrated into the network. Cisco Talos, an industry-leading threat intelligence organization, reviewed the sheer number of threats mitigated on the network. During the first two weeks of the Games, there were 674 times the number of Trojans detected on the network compared to a typical large retail corporate environment during the same time.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“The network had to handle a substantially larger number of BYOD (Bring Your Own Device) technology than you would commonly see in a corporate environment. A larger percentage of these devices were infected with Trojans and various other malware families. This goes to show how important it is to have proper checks in place for corporate devices from both an external and internal network perspective,” said JJ Cummings of Cisco Talos.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">As the first line of defense, Cisco Umbrella (formerly OpenDNS) was deployed to prevent access to malicious sites. Umbrella found and blocked hundreds of Olympic-related fake domains. Over the course of the Rio 2016 Games, it protected on average 22 million DNS requests and blocked 23,000 suspicious sites daily.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">At the network edge, Cisco Firepower Next- Generation Firewall and NextGeneration Intrusion Prevention System appliances prevented close to 7 million security events during the Games. On the network, millions of devices were monitored for anomalous activity through Cisco Stealthwatch, and potentially vulnerable endpoints were identified and automatically segmented away from the rest of the network using Cisco ISE and Cisco TrustSec technology.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“The result was an amazing experience for everyone in Rio. Cisco provided us with the connectivity and security that allowed Rio 2016 to connect with the world,” remarked Souza.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">In a span of just 40 days, Cisco successfully secured and connected key networks that made the Olympic and Paralympic Games a resounding success. From London to Rio, to Tokyo and beyond, there has never been a better time to build an Olympic legacy.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Products and Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco ASA 5500-X with FirePOWER Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco FirePOWER Services in use:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco Advanced Malware Protection (AMP) for Networks</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• URL filtering</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Application Visibility and Control (AVC)</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Next-Generation IPS</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco FirePOWER Next-Generation Intrusion Prevention System</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Security Manager</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Identity Services Engine</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco TrustSec Technology</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Secure Access Control System</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Stealthwatch</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Umbrella</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Prime Network Registrar</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">At the Rio 2016 Olympic Games, Cisco:</span>\r\n<ul><li>Blocked an average of 23,000 suspicious sites daily using Cisco Umbrella</li><li>Delivered a secure network that handled over 2.144 PB of traffic</li><li>Provided secure access for attendees, staff, media, and athletes across 37 competition venues</li></ul>\r\n","alias":"cisco-asa-ngfw-for-rio-summer-olympics-2016","roi":0,"seo":{"title":"Cisco ASA NGFW for Rio Summer Olympics 2016","keywords":"Cisco, network, Games, 2016, that, from, were, Olympic","description":"All roads to the Olympics start with a dream. For the over 15,000 Olympic and Paralympic athletes from 205 countries who congregated in Rio de Janeiro in 2016,","og:title":"Cisco ASA NGFW for Rio Summer Olympics 2016","og:description":"All roads to the Olympics start with a dream. For the over 15,000 Olympic and Paralympic athletes from 205 countries who congregated in Rio de Janeiro in 2016,"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":13,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.b4r.io/uploads/roi/company/cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells networking equipment worldwide. It is the largest networking company in the world. The stock was added to the Dow Jones Industrial Average on June 8, 2009, and is also included in the S&P 500 Index, the Russell 1000 Index, NASDAQ-100 Index and the Russell 1000 Growth Stock Index.","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":18,"vendorPartnersCount":0,"supplierPartnersCount":273,"b4r":0,"categories":{},"companyUrl":"www.cisco.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells","og:title":"Cisco","og:description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells","og:image":"https://old.b4r.io/uploads/roi/company/cisco_logo.png"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.cisco.com/c/dam/en/us/products/collateral/security/rio-case-study.pdf","title":"-"}},"comments":[],"referencesCount":0},{"id":439,"title":"Cisco ASA NGFW for National Water Company","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Challenges</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Needed to protect nation’s critical infrastructure</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Lacked centralized visibility across its more than 100 locations</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Needed to deliver secure, reliable services to millions of customers </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Network Solution</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Next-generation firewall technology</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Advanced network visibility and security analytics</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Industry-leading email security with malware protection</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Results</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Dramatically reduced network blind spots</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Accelerated incident detection and response</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Enhanced IT and security team efficiency, saving time and costs </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Product List</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Security</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco ASA 5525-X and 5545-X with FirePOWER™ Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco Stealthwatch</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco Email Security Appliance C380 with AMP</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco Content Security Management Appliance M380</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco FireSIGHT® Management Center </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Challenges</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The National Water Company (NWC) of Saudi Arabia is a government-owned utility provider established to deliver exceptional water and wastewater treatment services in accordance with global best practices. NWC specializes in providing high-quality drinking water to the citizens of Saudi Arabia, as well as ensuring the presence of water and wastewater connections in all households, and preserving natural water resources and the environment. NWC prides itself on providing services that are innovative, efficient, reliable, and environmentally and financially sustainable. The water utility operates across four major cities in Saudi Arabia, and has between 7000 and 8000 employees, as well as an equal number of contractors. To be a world class water utility, NWC knew that a strong, secure network would be critical for its success. The company also plays an important role in ensuring that Saudi Arabia’s critical infrastructure is protected from every angle.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Network Solution</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">NWC’s first exposure to Cisco® Security was with the Cisco Adaptive Security Appliance (ASA), which NWC inherited at each of its 100-plus branch offices from the Saudi Arabian government when the company was formed in 2010. NWC also uses a full suite of Cisco routers and switches at both its branch offices and headquarters. </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Today, that infrastructure is being used to support and help enable a comprehensive security platform that protects more than 15,000 devices. It includes Cisco NextGeneration Firewalls, Advanced Malware Protection (AMP), the Cisco Email Security Appliance, and the Cisco Stealthwatch™ solution for network visibility and security analytics. NWC’s initial implementation of the Cisco ASA has evolved into NextGeneration Firewall protection complete with FirePOWER™ Services for multilayered threat defense across all of its branch networks.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Using the Cisco ASA 5525-X and 5545-X with FirePOWER Services, NWC is able to combine advanced, threat-focused firewall technology with value-added features, including malware protection, URL filtering, next-generation intrusion prevention, and application visibility and control, all from a single appliance. This eliminates the cost and complexity of buying and managing multiple solutions, and helps reduce blind spots caused by disjointed, piecemeal security solutions.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Extended Network Visibility</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">To build on the perimeter security provided by the Adaptive Security Appliance, NWC turned to Cisco Stealthwatch to obtain much-needed visibility across the extended network – including at the network core and edge, and in the data center, branch, and cloud. NWC selected Stealthwatch for its ability to collect flow data and provide insight into all network traffic across each of its locations.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">In addition to its ability to scale and collect massive volumes of data, NWC also embraced Stealthwatch for its quick analysis of network traffic, and because it can automatically prioritize potential issues for its IT staff.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“When we were evaluating NetFlow analysis solutions, there was no one competitor to Stealthwatch that was comprehensive, fast, and efficient,” says NWC’s Senior IT Manager Hakem S. Al Sagri. “We would have had to purchase three or four different solutions to get all of the features and performance of Stealthwatch. It gives us a very good indication of what’s going on in the network.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Some of the specific features that led NWC to select Stealthwatch include its indepth traffic monitoring and mapping, and the ability to detect both known and unknown threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Advanced Email Security</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">NWC rounds out its security platform with the Cisco Email Security Appliance for protection against email-based attacks, including spam, viruses, and phishing. NWC appreciates the Email Security Appliance, one of the top products in the industry, for its value-added Advanced Malware Protection solution. NWC also likes the ability to control all of its email appliances (including in the branches) through a single management console, instead of having to go to multiple boxes.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Results</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Cisco Stealthwatch</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">With Cisco Security, NWC operates a safer environment for supporting its thousands of employees and better serving its customers. In addition to providing early warnings for a wide range of attacks such as malware and DDoS attempts, Stealthwatch has also helped NWC with concerns over network and application slowdowns. </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">In the past, NWC would spend days investigating network and security issues, and it would be difficult to determine which team was responsible. Now, the IT teams can quickly determine the cause of the issue and remediate it within just minutes. “Without Stealthwatch, you’re blind,” says Al Sagri. “You don’t have a view of what’s going on in your network, and you don’t know what’s happening. Stealthwatch makes you see things better and makes you more proactive in isolating incidents.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">It gives the security operations center (SOC) team more insight so that, before anything even happens, they know what’s going on.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Next-Generation Firewalls</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“The beauty of the Cisco Next-Generation Firewall is the Layer 7 visibility,” says NWC Network and Security Manager Majed A. Alodaib. He explains that NWC’s IT team can easily see into the application layer and set and manage policies for various programs, saving the team both time and operational costs.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Al Sagri adds that the Next-Generation Firewall “simply makes life easier.” He says the Cisco FireSIGHT® Management Center makes the technology simple and easy to manage.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Email Security with AMP</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Regarding the Cisco Email Security Appliance, Alodaib says he appreciates the ability to create very specific, granular email policies with it, and pointed out that this is not possible with competitive products. NWC also finds that many malicious emails are blocked each month based on the AMP add-on feature, another valuable capability that was not available with NWC’s previous email security solution.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“The security stakes are high for National Water Company,” said Mohammad Alabsi, Cisco Enterprise Country Manager. “They cannot afford to suffer from major incidents. Cisco gives them a comprehensive, integrated solution for effectively detecting and stopping a wide range of attacks before they lead to large-scale issues.” </span>\r\n","alias":"cisco-asa-ngfw-for-national-water-company","roi":0,"seo":{"title":"Cisco ASA NGFW for National Water Company","keywords":"Cisco, with, Security, that, security, network, Stealthwatch, Appliance","description":"Business Challenges\r• Needed to protect nation’s critical infrastructure\r• Lacked centralized visibility across its more than 100 locations\r• Needed to deliver","og:title":"Cisco ASA NGFW for National Water Company","og:description":"Business Challenges\r• Needed to protect nation’s critical infrastructure\r• Lacked centralized visibility across its more than 100 locations\r• Needed to deliver"},"deal_info":"","user":{"id":4203,"title":"National Water Company (NWC)","logoURL":"https://old.b4r.io/uploads/roi/company/National_Water_Company__NWC_.png","alias":"national-water-company-nwc","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The National Water Company (NWC), a Saudi joint stock company fully owned by the government (namely the Public Investment Fund), was established to provide water and wastewater treatment services in accordance with the latest international standards. This is achieved by the concerted efforts of national cadres in partnership with carefully selected international operators through foreign PPP.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">NWC specializes in providing the highest quality drinking water, ensuring the presence of water and wastewater connections in all households, preserving natural water resources and the environment, using the Treated Sewage Effluent (TSE) with maximum efficiency, and training qualified Saudi employees in accordance with the latest international standards.</span>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.nwc.com.sa/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"National Water Company (NWC)","keywords":"water, with, international, wastewater, accordance, latest, standards, National","description":"The National Water Company (NWC), a Saudi joint stock company fully owned by the government (namely the Public Investment Fund), was established to provide","og:title":"National Water Company (NWC)","og:description":"The National Water Company (NWC), a Saudi joint stock company fully owned by the government (namely the Public Investment Fund), was established to provide","og:image":"https://old.b4r.io/uploads/roi/company/National_Water_Company__NWC_.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.b4r.io/uploads/roi/company/cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells networking equipment worldwide. It is the largest networking company in the world. The stock was added to the Dow Jones Industrial Average on June 8, 2009, and is also included in the S&P 500 Index, the Russell 1000 Index, NASDAQ-100 Index and the Russell 1000 Growth Stock Index.","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":18,"vendorPartnersCount":0,"supplierPartnersCount":273,"b4r":0,"categories":{},"companyUrl":"www.cisco.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells","og:title":"Cisco","og:description":"Cisco Systems, Inc. is an American multinational corporation technology company headquartered in San Jose, California, that designs, manufactures and sells","og:image":"https://old.b4r.io/uploads/roi/company/cisco_logo.png"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.cisco.com/c/dam/en/us/products/collateral/security/stealthwatch/case-study-c36-738712.pdf","title":"-"}},"comments":[],"referencesCount":0}]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"13":{"id":13,"title":"NG Firewall"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}