{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Сonfigurator"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"_type":"localeString","en":"I use it","ru":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"_type":"localeString","en":"Using","ru":"Используют"},"show-more-button":{"ru":"Показать еще","_type":"localeString","en":"Show more"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"ru":"производитель","_type":"localeString","en":"manufacturer"},"short-description":{"en":"Pitch","ru":"Краткое описание","_type":"localeString"},"i-use-it-popover":{"en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString"},"details":{"en":"Details","ru":"Детальнее","_type":"localeString"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"product-features":{"en":"Product features","ru":"Особенности продукта","_type":"localeString"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"solutions":{"ru":"Проблемы которые решает","_type":"localeString","en":" Problems that solves"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"testing":{"en":"Testing","ru":"Тестирование","_type":"localeString"},"compare":{"_type":"localeString","en":"Compare with competitors","ru":"Сравнить с конкурентами"},"characteristics":{"en":" Characteristics","ru":"Характеристики","_type":"localeString"},"transaction-features":{"_type":"localeString","en":"Transaction Features","ru":"Особенности сделки"},"average-discount":{"en":"Partner average discount","ru":"Средняя скидка партнера","_type":"localeString"},"deal-protection":{"ru":"Защита сделки","_type":"localeString","en":"Deal protection"},"average-deal":{"ru":"Средний размер сделки","_type":"localeString","en":"Average deal size"},"average-time":{"ru":"Средний срок закрытия сделки","_type":"localeString","en":"Average deal closing time"},"login":{"en":"Login","ru":"Войти","_type":"localeString"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"to-know-more":{"ru":"Чтобы узнать больше","_type":"localeString","en":"To know more"},"scheme":{"en":" Scheme of work","ru":"Схема работы","_type":"localeString"},"competitive-products":{"en":" Competitive products","ru":"Конкурентные продукты","_type":"localeString"},"implementations-with-product":{"ru":"Внедрения с этим продуктом","_type":"localeString","en":"Deployments with this product"},"user-features":{"en":"User features","ru":"Особенности пользователей","_type":"localeString"},"job-roles":{"_type":"localeString","en":" Roles of Interested Employees","ru":"Роли заинтересованных сотрудников"},"organizational-features":{"en":"Organizational Features","ru":"Организационные особенности","_type":"localeString"},"calculate-price":{"en":" Calculate product price","ru":"Рассчитать цену продукта","_type":"localeString"},"selling-stories":{"ru":"Продающие истории","_type":"localeString","en":" Selling stories"},"materials":{"en":"Materials","ru":"Материалы","_type":"localeString"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"ru":"или","_type":"localeString","en":"or"},"program-sends-data":{"en":"Program Sends Data","_type":"localeString"},"calculate-roi":{"ru":"Рассчитать ROI продукта","_type":"localeString","en":"Calculate Product ROI"},"complementary-categories":{"ru":"Схожие категории","_type":"localeString","en":"Complementary Categories"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"_type":"localeString","en":"Bonus","ru":"Бонус"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"configurator-content":{"ru":"Рассчитайте стоимость продукта","_type":"localeString","en":"Calculate price for this product here"},"configurator-link":{"ru":"тут","_type":"localeString","en":"here"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"_type":"localeString","en":"select product for presentation","ru":"выбрать продукт для презентации"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You have to register or login."},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"_type":"localeString","en":"Calculate ROI for this product here","ru":"Рассчитайте ROI для данного продукта"},"not-yet-converted":{"en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString"},"videos":{"ru":"Видео","_type":"localeString","en":"Videos"},"vendor-verified":{"en":"Vendor verified","ru":"Подтверждено производителем","_type":"localeString"},"event-schedule":{"ru":"Расписание событий","_type":"localeString","en":"Events schedule"},"scheduling-tip":{"en":"Please, сhoose a convenient date and time and register for the event.","ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString"},"register-to-schedule":{"en":"To register for the event please log in or register on the site.","ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString"},"comparison-matrix":{"_type":"localeString","en":"Comparison matrix","ru":"Матрица сравнений"},"compare-with-competitive":{"_type":"localeString","en":" Compare with competitive","ru":"Сравнить с конкурентными"},"avg-deal-closing-unit":{"ru":"месяцев","_type":"localeString","en":"months"},"under-construction":{"ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString","en":"Current feature is still developing to become even more useful for you."},"product-presentation":{"ru":"Презентация продукта","_type":"localeString","en":"Product presentation"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"_type":"localeString","en":"logout","ru":"Выйти"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"_type":"localeString","en":"Requests","de":"References","ru":"Мои запросы"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"en":"My Profile","ru":"Мои Данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"translatable_meta":[{"name":"og:title","translations":{"_type":"localeString","en":"Example product","ru":"Конкретный продукт"}},{"name":"og:description","translations":{"_type":"localeString","en":"Description for one product","ru":"Описание для конкретного продукта"}},{"translations":{"ru":"Продукт","_type":"localeString","en":"Product"},"name":"title"},{"name":"description","translations":{"ru":"Описание продукта","_type":"localeString","en":"Product description"}},{"name":"keywords","translations":{"_type":"localeString","en":"Product keywords","ru":"Ключевые слова продукта"}}],"title":{"ru":"ROI4CIO: Продукт","_type":"localeString","en":"ROI4CIO: Product"},"meta":[{"name":"og:type","content":"website"},{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"flowmon-ddos-protection-for-business-critical-systems":{"id":1188,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Flowmon_Networks.png","logo":true,"scheme":false,"title":"Flowmon DDOS PROTECTION FOR BUSINESS CRITICAL SYSTEMS","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"flowmon-ddos-protection-for-business-critical-systems","companyTitle":"Flowmon Networks","companyTypes":["supplier","vendor"],"companyId":4068,"companyAlias":"flowmon-networks","description":"Unavailability of a critical customer application or a crash of the internal system as consequence of a DDoS attack can cause financial loss, reputation damage or security risks. Are you ready for DDoS?\r\nFlowmon DDoS Defender is a scalable anti-DDoS solution. It leverages statistics from routers or dedicated network probes with an advanced network traffic analysis for real-time detection of volumetric attacks led against HTTP/HTTPS applications and systems. It provides the state of the art detection of DDoS, deep understanding of attack characteristics and a full-range of methods for successful attack mitigation.\r\nWITH FLOWMON DDOS DEFENDER BUSINESSES BENEFIT FROM:\r\nAdvanced mitigation capabilities. Utilize different methods of traffic diversion (PBR, BGP, RTBH, Flowspec) and advanced script triggering. Mitigate DDoS by using BGP Flowspec which quickly distributes filtering or traffic redirection policies.\r\nArtificial intelligence. The Defender observes and learns the traffic characteristics while requiring minimum intervention from the user. Define segments, rules, utilize dynamic baselining and intelligent adaptive thresholds to protect your services.\r\nAutomatic detection. Fast detection of DDoS is the key for mitigation. DDoS defender identifies the attack within a single minute, immediately alarms the respective administrator (e-mail, syslog, SNMP, SMS) and dramatically reduces time to carry out remedial action.\r\nQuick time-to-value. In a matter of minutes you will have up and running an active anti-DDos protection. Without any infrastructure or topology changes or any additional investments in the network\r\nComprehensive reporting and immediate alerting. Utilize dynamic baselining of traffic volumes and characteristics, independent configurations for different customers, services, network segments ond other features.\r\nUniversal deployment. Robust and versatile architecture allows the protection of any environment with the collection of flow statistics. It is capable of protecting even 100G networks. The Defender can be also easily deployed with Scrubbing centres or with a specialized out-of-band mitigation solution to eliminate an attack\r\nDDOS PROTECTION FOR INTERNET SERVICE PROVIDERS\r\nProtection of high-speed networks and an effective mitigation of DDoS attacks is one of the key challenges for internet service providers and backbone operators today. Flowmon DDoS Defender is capable of protecting even 100G networks and it is fully prepared for multi-tenant environments. Therefore it is an ideal solution for ISPs to provide their customers with DDoS protection as a service (MSSP).","shortDescription":"Due to their destructive nature and ability to affect networks with ease DDoS attacks have become especially worrisome to any business running web applications. Flowmon DDoS Defender puts advanced artificial intelligence between your critical systems and criminals. Without any changes in infrastructure, in a matter of minutes, network and security engineers will have up-and-running active DDoS protection.","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Flowmon DDOS PROTECTION FOR BUSINESS CRITICAL SYSTEMS","keywords":"DDoS, mitigation, traffic, with, attack, detection, network, Defender","description":"Unavailability of a critical customer application or a crash of the internal system as consequence of a DDoS attack can cause financial loss, reputation damage","og:title":"Flowmon DDOS PROTECTION FOR BUSINESS CRITICAL SYSTEMS","og:description":"Unavailability of a critical customer application or a crash of the internal system as consequence of a DDoS attack can cause financial loss, reputation damage","og:image":"https://old.b4r.io/fileadmin/user_upload/Flowmon_Networks.png"},"eventUrl":"","translationId":1189,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"}],"characteristics":[],"concurentProducts":[{"id":1615,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Instart_Logic.jpg","logo":true,"scheme":false,"title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"instart-logic-visionary-web-application-firewall-and-ddos","companyTitle":"Instart Logic","companyTypes":["supplier","vendor"],"companyId":4285,"companyAlias":"instart-logic","description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of attacks including OWASP Top 10 vulnerabilities:\r\n<ul><li>Cross-Site Scripting</li><li>SQL injection</li><li>Slow HTTP DoS</li><li>Cross-Site Request Forgery</li></ul>\r\nInstart Logic also offers comprehensive distributed denial of service (DDOS) attack protection using our globally distributed platform to absorb and mitigate attacks. As an internet-scale service provider, our global-ready infrastructure ensures a best-in-class protection for your online presence.","shortDescription":"Instart Logic’s globally distributed carrier-grade security applications use artificial intelligence and machine learning to protect cloud, web and mobile applications from the threat","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","keywords":"attacks, Instart, distributed, DDOS, Visionary, Logic, service, protection","description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of","og:title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","og:description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of","og:image":"https://old.b4r.io/fileadmin/user_upload/Instart_Logic.jpg"},"eventUrl":"","translationId":1616,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1618,"logoURL":"https://old.b4r.io/fileadmin/user_upload/NSFOCUS.jpeg","logo":true,"scheme":false,"title":"NSFOCUS Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nsfocus-web-application-firewall-waf","companyTitle":"NSFOCUS","companyTypes":["supplier","vendor"],"companyId":4287,"companyAlias":"nsfocus","description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web application layer. It also includes up to 1 Gbps of DDoS protection from other volumetric and application layer attacks, including TCP flood and HTTP/S GET/ POST floods. Additionally, if deployed in conjunction with a higher capacity NSFOCUS ADS Series Anti-DDoS appliance, the WAF can direct flows in real-time to the ADS to keep your servers running under the most extreme conditions.\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Features and Benefits</span>\r\n<span style=\"font-weight: bold;\">Prevent Theft of Critical Data</span>\r\nData breaches are extremely complex and surprisingly frequent. The NSFOCUS WAF offers powerful protection against web attacks with a complete set of signatures for web vulnerabilities and the ability to detect unauthorized file uploads. WAF enforces access control policy from layer 4 through layer 7, to prevent access to data without proper authorization. In the later phases of an attack, WAF provides outbound data leakage detection, including illegal file download detection, web shell prevention, and filtering of sensitive information (such as credit card numbers and social security numbers).\r\n<span style=\"font-weight: bold;\">Ensure Website Availability</span>\r\nThe NSFOCUS WAF offers a built-in anti-DDoS module to protect against TCP flood attacks, HTTP/S GET/POST flood attacks and slow rate attacks up to 1Gbps. The WAF employs access rate thresholding, IP reputation and algorithm-based protection mechanisms. Coupled with the NSFOCUS ADS anti-DDoS product line, higher rate DDoS attacks can be thwarted.\r\n<span style=\"font-weight: bold;\">Close the PCI DSS Compliance Gap</span>\r\nThe NSFOCUS WAF provides reports for PCI audits as well as suggestions for policy tuning and configuration in order to help ensure compliance with PCI DSS. Protections like the cookie security feature within the WAF protects against cookie tampering and cookie poisoning in compliance with section 6.5.10 in the new PCI 3.2 standard.\r\n","shortDescription":"The WAF serves as an essential part of any defense-in-depth security architecture by providing advanced inspection and specialized security for the web application layer. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"NSFOCUS Web Application Firewall (WAF)","keywords":"attacks, NSFOCUS, with, security, layer, access, against, rate","description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web","og:title":"NSFOCUS Web Application Firewall (WAF)","og:description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web","og:image":"https://old.b4r.io/fileadmin/user_upload/NSFOCUS.jpeg"},"eventUrl":"","translationId":1619,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1273,"logoURL":"https://old.b4r.io/fileadmin/user_upload/A10_THUNDER_R_TPS1.jpg","logo":true,"scheme":false,"title":"A10 THUNDER®TPS","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"a10-thunderrtps","companyTitle":"A10","companyTypes":["supplier","vendor"],"companyId":4094,"companyAlias":"a10","description":"<span style=\"font-weight: bold;\">SURGICAL MULTI-VECTOR DDOS PROTECTION</span>\r\nMitigate volumetric, protocol, resource, application and IoT-based DDoS attacks while protecting legitimate users.\r\n\r\n<span style=\"font-weight: bold;\">POWERFUL & EFFICIENT</span>\r\nLower TCO with industry-best 300 Gbps at 440 Mpps. FPGA-based acceleration mitigates without burdening CPUs.\r\n\r\n<span style=\"font-weight: bold;\">AUTOMATED THREAT MITIGATION</span>\r\nRespond faster and minimize manual changes with automated mitigation and escalation based on 28 behavioral indicators.\r\n\r\n<span style=\"font-weight: bold;\">PRECISE DETECTION</span>\r\nSwiftly detect attacks with in-line or flow-based methods, or integrate third party detection with open APIs.\r\n\r\n<span style=\"font-weight: bold;\">HYBRID DDOS PROTECTION</span>\r\nOn-premise protection integrates with Verisign’s cloud-based DDoS Protection Services.\r\n\r\n<span style=\"font-weight: bold;\">FLEXIBLE MANAGEMENT</span>\r\nUse 100 percent API coverage for SecOps, on-box GUI, CLI, or to manage multiple TPS devices via aGalaxy.\r\n\r\n<span style=\"font-weight: bold;\">THREAT INTELLIGENCE SERVICE</span>\r\nLeverage more than three dozen intelligence sources to block malicious traffic. Included with A10 support.\r\n\r\n<span style=\"font-weight: bold;\">24-7 ATTACK SUPPORT</span>\r\nSpin up 24-7 DDoS attack support from the A10 DDoS Security Incident Response Team (DSIRT). Included with A10 support.\r\n\r\n<span style=\"font-weight: bold;\">REACTIVE MODE</span>\r\nLarger networks benefit from on-demand mitigation, which is triggered manually or via flow-based analytical systems. Thunder TPS fits any network configuration with integrated BGP and other routing protocols support.\r\n\r\n<span style=\"font-weight: bold;\">PROACTIVE MODE</span>\r\nProactive mode provides continuous, comprehensive detection and faster mitigation. Deployable in asymmetric or symmetric configurations, this mode is most useful for real-time environments where the user experience is critical.\r\n\r\n<span style=\"font-weight: bold;\">OUT-OF-BAND (TAP) MODE</span>\r\nThe out-of-band mode is used when packet-based DDoS detection and monitoring is required.\r\n","shortDescription":"A10 THUNDER®TPS - DDOS DETECTION & MITIGATION\r\nThe world’s highest-performance DDoS protection solution, the A10 Thunder TPS™ (Threat Protection System) detects and mitigates megabit to terabit DDoS attacks at the network edge.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"A10 THUNDER®TPS","keywords":"with, DDoS, support, mode, detection, MODE, mitigation, 24-7","description":"SURGICAL MULTI-VECTOR DDOS PROTECTION\rMitigate volumetric, protocol, resource, application and IoT-based DDoS attacks while protecting legitimate users.\r","og:title":"A10 THUNDER®TPS","og:description":"SURGICAL MULTI-VECTOR DDOS PROTECTION\rMitigate volumetric, protocol, resource, application and IoT-based DDoS attacks while protecting legitimate users.\r","og:image":"https://old.b4r.io/fileadmin/user_upload/A10_THUNDER_R_TPS1.jpg"},"eventUrl":"","translationId":1274,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1277,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Allot_Communications.png","logo":true,"scheme":false,"title":"Allot Communications Secure Service Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"allot-communications-secure-service-gateway","companyTitle":"Allot Communications","companyTypes":["supplier","vendor"],"companyId":4095,"companyAlias":"allot-communications","description":"<span style=\"font-weight: bold;\">Protect network uptime and efficiency</span>\r\nAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of the world’s largest network operators. Flexible redundancy configurations plus passive bypass with automatic port failover maximize uptime and availability.\r\n\r\n<span style=\"font-weight: bold;\">Automate operations and lower TCO</span>\r\nAllot Secure Service Gateway integrates multiple functions in an Intel-based platform that protects your investment and lets you scale from 2 to 22 ports of 1GE/10GE network connectivity in a single appliance.\r\n\r\n<span style=\"font-weight: bold;\">Get the visibility you need to control application performance</span>\r\nAllot provides live traffic monitoring and usage reporting according to traffic policies that are mapped to your complex data center and cloud applications, giving you full visibility and control of application performance, web access, user quality of experience, shadow IT and web threats.\r\n\r\n<span style=\"font-weight: bold;\">Protect users from Internet threats and enforce acceptable use</span>\r\nAllot helps you embrace and maximize the business value of cloud (web) applications by detecting and blocking malware, phishing and other web threats before they harm application performance and user productivity. Allot Secure Service Gateway also detects and surgically filters DDoS and bot traffic before it affects your network.\r\n\r\n<span style=\"font-weight: bold;\">With Allot Secure Service Gateway you can:</span>\r\n<ul><li>See how well your mission-critical applications are performing and supporting user productivity</li><li>Control application performance and improve Quality of Experience according to business priorities</li><li>Keep malicious or unauthorized user/application traffic off your network</li><li>Neutralize threats and ensure ongoing performance of business applications</li><li>Enforce Acceptable Use Policy for shadow IT, BYOD, resource usage</li><li>Troubleshoot and resolve network issues in real time</li><li>Simplify and automate your operations</li><li>Reduce opex and TCO</li></ul>","shortDescription":"Allot Communications Secure Service Gateway is a Smart Way to Protect Users and Control Application Performance\r\nYour business relies on employees and customers being able to connect and work productively with mission-critical applications at all times and from any location. The performance and efficiency of your network can be easily compromised by the ever-increasing demand for LAN, WAN and Internet bandwidth driven by cloud, mobile and video applications. Moreover, the growing use of BYOD and shadow IT have opened complex attack vectors for web threats to infect user devices, get into your network, and harm business productivity and viability. Allot Secure Service Gateway combines the functionality of Allot Service Gateway with our powerful web security and DDoS protection systems, to offer a single, scalable solution that lowers the cost of supporting your evolving requirements for application and user visibility, performance, and security.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Allot Communications Secure Service Gateway","keywords":"Allot, your, performance, Service, Secure, application, Gateway, network","description":"Protect network uptime and efficiency\rAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of","og:title":"Allot Communications Secure Service Gateway","og:description":"Protect network uptime and efficiency\rAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of","og:image":"https://old.b4r.io/fileadmin/user_upload/Allot_Communications.png"},"eventUrl":"","translationId":1278,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"},{"id":325,"title":"Performance Management Software","alias":"performance-management-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/performance-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1507,"logoURL":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg","logo":true,"scheme":false,"title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager от SecureData","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"f5-big-ip-dns-big-ip-local-traffic-manager-ot-securedata","companyTitle":"SecureData","companyTypes":["supplier"],"companyId":2950,"companyAlias":"securedata","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Менеджер локального трафика BIG-IP Local Traffic Manager (LTM) выполняет роль полного посредника между пользователями и сервером приложений, создавая уровень абстракции для защиты, оптимизации и балансировки нагрузки трафика приложений. Таким образом, вы получаете необходимый уровень гибкости и управления, облегчающий добавление приложений и серверов, исключающий возможность простоя, повышающий производительность приложений и отвечающий вашим требованиям к обеспечению безопасности.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">BIG‐IP LTM – это полный прокси между пользователями и серверами приложений, обеспечивающий безопасность, оптимизацию трафика приложений и балансировку его нагрузки.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Преимущества F5 BIG-IP DNS:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<ul><li>глобальная балансировка нагрузки на приложения</li><li>легкая масштабируемость системы доменных имен.</li><li>повышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)</li><li>защита DNS от DDoS-атак</li></ul>","shortDescription":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM) — модуль, распределяющий запросы и нагрузки на корпоративные приложения и систему DNS\r\nМенеджер локального трафика BIG-IP Local Traffic Manager (LTM) ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager от SecureData","keywords":"приложений, BIG-IP, нагрузки, трафика, Manager, Traffic, уровень, системы","description":"Менеджер локального трафика BIG-IP Local Traffic Manager (LTM) выполняет роль полного посредника между пользователями и сервером приложений, создавая уровень","og:title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager от SecureData","og:description":"Менеджер локального трафика BIG-IP Local Traffic Manager (LTM) выполняет роль полного посредника между пользователями и сервером приложений, создавая уровень","og:image":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg"},"eventUrl":"","translationId":2707,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"ITSM (IT Service Management, управление ИТ-услугами) — подход к управлению и организации ИТ-услуг, направленный на удовлетворение потребностей бизнеса. Управление ИТ-услугами реализуется поставщиками ИТ-услуг путём использования оптимального сочетания людей, процессов и информационных технологий. Для содействия реализации подхода к управлению ИТ-услугами используется серия документов ITIL.\r\n\r\nВ отличие от более традиционного технологического подхода, ITSM рекомендует сосредоточиться на клиенте и его потребностях, на услугах, предоставляемых пользователю информационными технологиями, а не на самих технологиях. При этом процессная организация предоставления услуг и наличие заранее оговоренных в соглашениях об уровне услуг параметров эффективности (KPI) позволяет ИТ-отделам предоставлять качественные услуги, измерять и улучшать их качество.\r\n\r\nВажным моментом при изложении принципов ITSM является системность. При изложении каждого составного элемента ITSM (управление инцидентами, управление конфигурациями, управление безопасностью и т. д.) в обязательном порядке прослеживается его взаимосвязь и координация с остальными элементами (службами, процессами) и при этом даются необходимые практические рекомендации.\r\n\r\nITIL не является конкретным алгоритмом или руководством к действию, но она описывает передовой опыт (best practices) и предлагает рекомендации по организации процессного подхода и управления качеством предоставления услуг. Это позволяет оторваться от особенностей данного конкретного предприятия в данной конкретной отрасли. Вместе с тем, несмотря на определённую абстрактность, ITIL всячески нацелено на практическое использование. В каждом разделе библиотеки приводятся ключевые факторы успеха внедрения того или иного процесса, практические рекомендации при этом превалируют над чисто теоретическими рассуждениями.\r\nИсточник: https://ru.wikipedia.org/wiki/ITSM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ITSM.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1508,"logoURL":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg","logo":true,"scheme":false,"title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager from SecureData","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"f5-big-ip-dns-big-ip-local-traffic-manager-from-securedata","companyTitle":"SecureData","companyTypes":["supplier"],"companyId":2950,"companyAlias":"securedata","description":"BIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries.\r\nWith a set of features that includes multicore scalability, DNS Express, and IP Anycast integration, BIG-IP DNS handles millions of DNS queries, protects your business from DDoS attacks, and ensures top application performance for users.\r\nBIG-IP DNS delivers a real-time, signed DNSSEC query response and DNS firewall services for attack protection and mitigates complex threats by blocking access to malicious domains.\r\nWorks with what you already have in place.\r\nBIG-IP DNS services integrate with DNS zone management solutions, increase DNS performance at the network edge, and mask the DNS back-end infrastructure.\r\nBIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms the chaotic volume of network traffic into logically assembled streams of data, and then makes intelligent traffic management decisions, selecting the right destination based on server performance, security, and availability.","shortDescription":"BIG-IP DNS improves the performance and availability of your global applications.\r\nBIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager from SecureData","keywords":"BIG-IP, traffic, performance, queries, network, your, application, with","description":"BIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries.\rWith a set of features that includes multicore","og:title":"F5 BIG-IP DNS, BIG-IP Local Traffic Manager from SecureData","og:description":"BIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries.\rWith a set of features that includes multicore","og:image":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg"},"eventUrl":"","translationId":1508,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"ITSM (IT Service Management, управление ИТ-услугами) — подход к управлению и организации ИТ-услуг, направленный на удовлетворение потребностей бизнеса. Управление ИТ-услугами реализуется поставщиками ИТ-услуг путём использования оптимального сочетания людей, процессов и информационных технологий. Для содействия реализации подхода к управлению ИТ-услугами используется серия документов ITIL.\r\n\r\nВ отличие от более традиционного технологического подхода, ITSM рекомендует сосредоточиться на клиенте и его потребностях, на услугах, предоставляемых пользователю информационными технологиями, а не на самих технологиях. При этом процессная организация предоставления услуг и наличие заранее оговоренных в соглашениях об уровне услуг параметров эффективности (KPI) позволяет ИТ-отделам предоставлять качественные услуги, измерять и улучшать их качество.\r\n\r\nВажным моментом при изложении принципов ITSM является системность. При изложении каждого составного элемента ITSM (управление инцидентами, управление конфигурациями, управление безопасностью и т. д.) в обязательном порядке прослеживается его взаимосвязь и координация с остальными элементами (службами, процессами) и при этом даются необходимые практические рекомендации.\r\n\r\nITIL не является конкретным алгоритмом или руководством к действию, но она описывает передовой опыт (best practices) и предлагает рекомендации по организации процессного подхода и управления качеством предоставления услуг. Это позволяет оторваться от особенностей данного конкретного предприятия в данной конкретной отрасли. Вместе с тем, несмотря на определённую абстрактность, ITIL всячески нацелено на практическое использование. В каждом разделе библиотеки приводятся ключевые факторы успеха внедрения того или иного процесса, практические рекомендации при этом превалируют над чисто теоретическими рассуждениями.\r\nИсточник: https://ru.wikipedia.org/wiki/ITSM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ITSM.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1581,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IMPERVA_Incapsula.png","logo":true,"scheme":false,"title":"Imperva Incapsula","vendorVerified":0,"rating":"1.70","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":2,"alias":"imperva-incapsula","companyTitle":"Imperva","companyTypes":["vendor"],"companyId":207,"companyAlias":"imperva","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula can protect your organization against any DDoS threat.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">WEBSITE PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Always-on DDoS protection that automatically detects and mitigates attacks targeting websites and web applications.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Website Protection is an optional DDoS mitigation service that can be added to any Website Security subscription.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">INFRASTRUCTURE PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">On-demand or always-on protection against DDoS attacks that directly target your network infrastructure.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Infrastructure Protection can be used to defend entire subnets.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">NAME SERVER PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Always-on DDoS protection for your Name Server (NS) that protects DNS servers against network and application layer assaults.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Name Server Protection also accelerates DNS responses.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">ALL-INCLUSIVE DDOS PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula DDoS protection supports Unicast and Anycast technologies to power a many-to-many defense methodology. This automatically detects and mitigates attacks exploiting application and server vulnerabilities, hit-and-run events and large botnets.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">10-SECOND MITIGATION SLA</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">When DDoS strikes, it takes target services moments to go down and hours to recover. Incapsula is the only service to offer a SLA-backed guarantee to detect and block all attacks in under 10 seconds.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">HIGH-CAPACITY NETWORK</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our high-capacity global network holds over (Terabits per second) of on-demand scrubbing capacity and can process 30 billion attack packets per second. Incapsula network has successfully defended clients against some of the largest attacks on record.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">ATTACK VISIBILITY</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula shows you attacks as they are happening and gives you actionable insight into Layer 7 attacks. Incapsula security dashboard lets you quickly analyze attacks and lets you adjust security policies on-the-fly to stop web application attacks.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">BLOCK ANY TYPE OF DDOS ATTACK</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula proxies all web requests to block DDoS attacks from being relayed to client origin servers. Incapsula detects and mitigates any type of attack, including:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<ul><li>TCP SYN+ACK</li><li>TCP FIN</li><li>TCP RESET</li><li>TCP ACK</li><li>TCP ACK+PSH</li><li>TCP Fragment</li><li>UDP</li><li>Slowloris</li><li>Spoofing</li><li>ICMP</li><li>IGMP</li><li>HTTP Flood</li><li>Brute Force</li><li>Connection Flood</li><li>DNS Flood</li><li>NXDomain</li><li>Mixed SYN + UDP or ICMP + UDP Flood</li><li>Ping of Death</li><li>Smurf</li><li>Reflected ICMP & UDP</li><li>As well as other attacks</li></ul>","shortDescription":"Incapsula is guaranteed to mitigate any DDoS attack in under 10 seconds, regardless of its size and without getting in the way of legitimate traffic. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":10,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Imperva Incapsula","keywords":"attacks, Incapsula, DDoS, against, network, PROTECTION, protection, that","description":"Incapsula can protect your organization against any DDoS threat.\rWEBSITE PROTECTION\rAlways-on DDoS protection that automatically detects and mitigates attacks","og:title":"Imperva Incapsula","og:description":"Incapsula can protect your organization against any DDoS threat.\rWEBSITE PROTECTION\rAlways-on DDoS protection that automatically detects and mitigates attacks","og:image":"https://old.b4r.io/fileadmin/user_upload/IMPERVA_Incapsula.png"},"eventUrl":"","translationId":1446,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":500,"logoURL":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg","logo":true,"scheme":false,"title":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM)","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"f5-big-ip-dns-ranee-global-traffic-manager-gtm","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"Преимущества:\r\n\r\nглобальная балансировка нагрузки на приложения\r\nповышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)\r\nзащита DNS от DDoS-атак\r\nлегкая масштабируемость системы доменных имен.\r\n","shortDescription":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM) — модуль, распределяющий запросы и нагрузки на корпоративные приложения и систему DNS , также обеспечивает защиту вашей DNS инфраструктуры от DDoS-атак и обеспечивает решение DNSSEC в реальном времени.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM)","keywords":"системы, имен, доменных, свыше, запросов, обработка, секунду, легкая","description":"Преимущества:\r\rглобальная балансировка нагрузки на приложения\rповышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)","og:title":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM)","og:description":"Преимущества:\r\rглобальная балансировка нагрузки на приложения\rповышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)","og:image":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg"},"eventUrl":"","translationId":2394,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":501,"logoURL":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg","logo":true,"scheme":false,"title":"F5 BIG-IP DNS (formerly Global Traffic Manager - GTM)","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"f5-big-ip-dns-formerly-global-traffic-manager-gtm","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"Speed, meet security.\r\nBIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries. \r\nWith a set of features that includes multicore scalability, DNS Express, and IP Anycast integration, BIG-IP DNS handles millions of DNS queries, protects your business from DDoS attacks, and ensures top application performance for users.\r\nBIG-IP DNS delivers a real-time, signed DNSSEC query response and DNS firewall services for attack protection and mitigates complex threats by blocking access to malicious domains.\r\nWorks with what you already have in place.\r\nBIG-IP DNS services integrate with DNS zone management solutions, increase DNS performance at the network edge, and mask the DNS back-end infrastructure.\r\n\r\nThat translates into higher productivity, server consolidation, faster responses, and protected DNS management.\r\nAll-over availability.\r\nBIG-IP DNS routes distributed app traffic to keep pace with changing network and user volumes that can overwhelm data centers during peak traffic times.\r\nBIG-IP DNS can also be configured as a full proxy for global load balancing applications and DNS across architectures, as well as across the globe. Plus, you can use it in virtual and hybrid cloud environments to extend DNS services and global app availability while keeping centralized control within the data center.\r\n","shortDescription":"BIG-IP DNS improves the performance and availability of your global applications by sending users to the closest or best-performing physical, virtual, or cloud environment. It also hyperscales and secures your DNS infrastructure from DDoS attacks and delivers a real-time DNSSEC solution that protects against hijacking attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 BIG-IP DNS (formerly Global Traffic Manager - GTM)","keywords":"BIG-IP, services, with, across, availability, that, global, queries","description":"Speed, meet security.\rBIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries. \rWith a set of","og:title":"F5 BIG-IP DNS (formerly Global Traffic Manager - GTM)","og:description":"Speed, meet security.\rBIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries. \rWith a set of","og:image":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg"},"eventUrl":"","translationId":501,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":496,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Check_Point_programmnyi_bleid_IPS1.jpg","logo":true,"scheme":false,"title":"Check Point программный блейд IPS","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-programmnyi-bleid-ips","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по сравнению с традиционными отдельными инструментами IPS. Программный блейд обеспечивает максимальную проактивную систему борьбы с вторжениями — и все это вместе с преимуществами унифицированного фаервола нового поколения.\r\n\r\n<span style=\"font-weight: bold;\">Преимущества</span>\r\n<ul><li>Новое поколение IPS — более совершенная защита, более высокая производительность</li><li>Лидер в области защиты от вторжений и среди фаерволов по данным тестов NSS Labs. Решение содержит тысячи методов сигнатурной, поведенческой и превентивной защиты.</li><li>Решения Check Point обеспечивают наибольший охват угроз для приложений Microsoft и Adobe.</li><li>Сочетание современного фаервола, контроля приложений, фильтрации URL, DLP и многого другого в самом передовом фаерволе нового поколения сетевого класса.</li><li>Исключительно высокая многогигабитная производительность</li><li>До 15 Гб/с пропускная способность IPS и до 30 Гб/с пропускная способность фаервола.</li><li>Технологии Stateful Inspection и SecureXL обеспечивают многоуровневую проверку и ускоряют пропускную способность.</li><li>Технология CoreXL обеспечивает наиболее эффективное и производительное использование многоядерных технологий.</li><li>Низкая общая стоимость владения и быстрый возврат инвестиций</li><li>Активация в один клик IPS и фаервола на любом шлюзе Check Point.</li><li>Гибкость и возможность расширения защиты без дополнительных капиталовложений.</li><li>Интеграция с архитектурой программных блейдов для выбора защиты, соответствующей требованиям бизнеса.</li></ul>\r\n<span style=\"font-weight: bold;\">Возможности</span>\r\n\r\n<ul><li>Производительная и надежная система предотвращения вторжений</li><li>Программный блейд Intrusion Protection System дополняет защиту фаервола и прочнее защищает вашу сеть без потери производительности.</li><li>Полнофункциональная IPS</li><li>Программный блейд IPS — это полноценная система защиты от вторжений, которая обеспечивает максимальную защиту от вредоносных файлов и нежелательного сетевого трафика, включая:</li><li>Вредоносные атаки</li><li>DoS- и DDoS-атаки</li><li>Уязвимости в приложениях и серверах Application and server vulnerabilities</li><li>Инсайдерские угрозы</li><li>Нежелательный трафик в приложениях, включая IM и P2P</li></ul>\r\n\r\n\r\n\r\n\r\n\r\n<span style=\"font-weight: bold;\">Геозащита</span>\r\n\r\nГеозащита отслеживает трафик на основании источника или страны назначения. Создание правил геозащиты с исключениями позволит получать легитимный трафик и блокировать или следить за трафиком из неизвестных или недоверенных источников. Мониторинг активностей помогает осуществить программный блейд SmartEvent.\r\n\r\n<span style=\"font-weight: bold;\">Высокий уровень защиты</span>\r\n\r\nЗащита в режиме реального времени — программный блейд IPS постоянно обновляет инструментарий защиты против развивающихся угроз. Многие из этих инструментов превентивные и обеспечивают защиту до того, как уязвимости будут обнаружены, а эксплойты созданы.\r\nМаксимальное покрытие угроз для приложений Microsoft — Check Point является компанией № 1 по покрытию угроз, включая превентивную защиту против развивающихся уязвимостей и эксплойтов.\r\n<span style=\"font-weight: bold;\">Встроенная система IPS</span>\r\nПрограммный блейд со встроенной системой IPS обеспечивает максимальную защиту по более низкой цене (до 50%) по сравнению с многочисленными отдельными решениями. По соотношению цены и производительности этот блейд до десяти раз превосходит другие решения. Встроенная система IPS имеет много преимуществ, которые становятся новым стандартом в отрасли, включая:\r\n\r\nУменьшение издержек за счет консолидации многочисленных независимых решений.\r\n\r\n<span style=\"font-weight: bold;\">Благодаря интеграции IPS с cуществующим фаерволом вы экономите на:</span>\r\n\r\n<ul><li>Покупке оборудования</li><li>Свободном объеме на жестких дисках</li><li>Тренингах и повседневном управлении</li><li>Местах для стоек</li><li>Прокладке кабелей</li><li>Охлаждении</li><li>Электроэнергии</li><li>Снижение задержек</li><li>Инспекция трафика производится только один раз — сразу фаерволом и IPS.</li><li>Последовательная реализация политик</li><li>Интегрированное решение обладает едиными совместными политиками безопасности.</li><li>Упрощение управления и обучения</li><li>Снижение расходов на управление и обучение.</li><li>Уменьшение ошибок.</li><li>Простое сочетание с организационной структурой IT.</li><li>Увеличение операционной эффективности и рентабельности.</li><li>Простое развертывание</li><li>Быстрое добавление защиты IPS на шлюз безопасности без лишних проверок.</li></ul>\r\n\r\n\r\n<span style=\"font-weight: bold;\">Многогигабитная производительность</span>\r\nБлейд обеспечивает пропускную способность до 15 Гб/с с установленным по умолчанию профилем IPS. Блейд содержит высокоскоростную модель, которая обеспечивает многоуровневую проверку.\r\n\r\n<span style=\"font-weight: bold;\">Проверка защищенного SSL-трафика</span>\r\nПроверяйте и делайте безопасным защищенный SSL-трафик, проходящий через шлюз безопасности. Когда трафик проходит через шлюз, тот расшифровывает трафик с помощью публичного ключа отправителя, затем проверяет и очищает, а после повторно шифрует и посылает вновь зашифрованный контент получателю. Гранулярность позволяет устанавливать исключения для инспекции SSL, чтобы не нарушить конфиденциальность и обеспечить выполнение политик безопасности. Некоторая часть зашифрованного контента может не инспектироваться — администратор может установить исключения из правил проверки. Правила определяет администратор.\r\n\r\n<span style=\"font-weight: bold;\">Динамическое управление защитой от угроз</span>\r\nС программными блейдами IPS и SmartEvent вы получаете новую динамическую возможность для борьбы с многочисленными угрозами — в том числе с развивающимися и поступающими в режиме реального времени. Механизмы управления защитой от угроз позволяют вам быстро и эффективно производить постоянные изменения, сокращая количество ошибок и позволяя внедрять защиту оперативно и конфиденциально.\r\n\r\n<span style=\"font-weight: bold;\">Программный блейд IPS предлагает:</span>\r\n\r\n<ul><li>Защита в «песочнице» — обеспечивает уверенность благодаря запуску приложений без влияния на сеть. Автоматическая активация защиты — активация новой защиты основывается на настраиваемых параметрах (воздействие на производительность, индекс доверия, тяжесть угроз). Тем самым устраняется сложность постоянного индивидуального администрирования.</li><li>Унифицированное управление — блейд IPS настраивается и управляется через стандартный интерфейс управления Check Point, который в частности используется, чтобы управлять другими шлюзами безопасности Check Point и отдельной системой IPS.</li><li>Настраиваемый мониторинг — отслеживание событий через детальные отчеты поможет узнать о самом важном. Новый программный блейд Управление безопасностью для блейдов IPS и программный блейд Security Provisioning упрощают анализ угроз и сокращают операционные ошибки.</li><li>Бизнес-уровень — настраиваемые отчеты обеспечивают простой мониторинг критических событий безопасности, которые ассоциированы с вашими критически важными системами.</li><li>Многомерная сортировка — перетащите колонку с данными о событии, и информация будет автоматически перестроена.</li><li>Применимые на практике логи событий — редактируйте связанную защиту, создавайте исключения и просматривайте пакетные данные прямо из записей логов.</li><li>Простое развертывание. Развертывание на вашем существующем фаерволе — сократите время и уменьшите издержки за счет повышения эффективности текущей инфраструктуры.</li><li>Гранулярная защита — легкие в использовании профили позволяют администраторам создавать подписи и активировать правила, которые соответствуют специфическим потребностям ваших сетевых активов.</li><li>Преднастроенные и рекомендованные профили — позволяют вам немедленно использовать профили и легко работать с ними, оптимизируя их в соответствии с требованиями производительности.</li><li>Опционально доступный режим «только обнаружение» — вся ваша защита будет работать на обнаружение, но трафик блокировать не будет, что позволит вам работать без риска сбоев.</li><li>Защита получения обновлений. Установка обновлений — это небезопасная процедура, которая подвергает вашу сеть риску атаки. Но благодаря более глубокому подходу, сочетающему надежную функциональность IPS с продуманной стратегией установки обновлений, администраторы сети могут лучше подготовиться к установкам и обезопасить сеть.</li><li>Интеграция с архитектурой программных блейдов. Программный блейд IPS интегрирован с архитектурой программных блейдов. Он может быть легко и быстро активирован на существующих шлюзах Check Point, что экономит время и сокращает издержки за счет повышения качества защитной инфраструктуры.</li></ul>\r\n\r\n\r\n\r\n\r\n","shortDescription":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по сравнению с традиционными отдельными инструментами IPS.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point программный блейд IPS","keywords":"блейд, защиты, угроз, защиту, Point, Check, обеспечивает, трафик","description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по","og:title":"Check Point программный блейд IPS","og:description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по","og:image":"https://old.b4r.io/fileadmin/user_upload/Check_Point_programmnyi_bleid_IPS1.jpg"},"eventUrl":"","translationId":2390,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":["Internet access is available for employees"],"complementaryCategories":[],"solutions":["Unaurthorized access to corporate IT systems and data","Risk or Leaks of confidential information","Risk of attacks by hackers"],"materials":[],"useCases":[],"best_practices":[],"values":["Ensure Security and Business Continuity"],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}