{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"en":"Offer a reference bonus","ru":"Предложить бонус за референс","_type":"localeString"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Сonfigurator"},"i-sell-it":{"en":"I sell it","ru":"I sell it","_type":"localeString"},"i-use-it":{"en":"I use it","ru":"I use it","_type":"localeString"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"en":"Selling","ru":"Продают","_type":"localeString"},"using":{"en":"Using","ru":"Используют","_type":"localeString"},"show-more-button":{"ru":"Показать еще","_type":"localeString","en":"Show more"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"_type":"localeString","en":"deployment","ru":"внедрение"},"manufacturer-popover":{"_type":"localeString","en":"manufacturer","ru":"производитель"},"short-description":{"_type":"localeString","en":"Pitch","ru":"Краткое описание"},"i-use-it-popover":{"ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier."},"details":{"_type":"localeString","en":"Details","ru":"Детальнее"},"description":{"en":"Description","ru":"Описание","_type":"localeString"},"product-features":{"ru":"Особенности продукта","_type":"localeString","en":"Product features"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"solutions":{"en":" Problems that solves","ru":"Проблемы которые решает","_type":"localeString"},"values":{"_type":"localeString","en":"Values","ru":"Ценности"},"сomparison-matrix":{"_type":"localeString","en":"Comparison matrix","ru":"Матрица сравнения"},"testing":{"_type":"localeString","en":"Testing","ru":"Тестирование"},"compare":{"en":"Compare with competitors","ru":"Сравнить с конкурентами","_type":"localeString"},"characteristics":{"en":" Characteristics","ru":"Характеристики","_type":"localeString"},"transaction-features":{"_type":"localeString","en":"Transaction Features","ru":"Особенности сделки"},"average-discount":{"en":"Partner average discount","ru":"Средняя скидка партнера","_type":"localeString"},"deal-protection":{"ru":"Защита сделки","_type":"localeString","en":"Deal protection"},"average-deal":{"ru":"Средний размер сделки","_type":"localeString","en":"Average deal size"},"average-time":{"en":"Average deal closing time","ru":"Средний срок закрытия сделки","_type":"localeString"},"login":{"en":"Login","ru":"Войти","_type":"localeString"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"to-know-more":{"_type":"localeString","en":"To know more","ru":"Чтобы узнать больше"},"scheme":{"ru":"Схема работы","_type":"localeString","en":" Scheme of work"},"competitive-products":{"_type":"localeString","en":" Competitive products","ru":"Конкурентные продукты"},"implementations-with-product":{"en":"Deployments with this product","ru":"Внедрения с этим продуктом","_type":"localeString"},"user-features":{"en":"User features","ru":"Особенности пользователей","_type":"localeString"},"job-roles":{"_type":"localeString","en":" Roles of Interested Employees","ru":"Роли заинтересованных сотрудников"},"organizational-features":{"_type":"localeString","en":"Organizational Features","ru":"Организационные особенности"},"calculate-price":{"ru":"Рассчитать цену продукта","_type":"localeString","en":" Calculate product price"},"selling-stories":{"_type":"localeString","en":" Selling stories","ru":"Продающие истории"},"materials":{"en":"Materials","ru":"Материалы","_type":"localeString"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"ru":"или","_type":"localeString","en":"or"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"_type":"localeString","en":"Calculate Product ROI","ru":"Рассчитать ROI продукта"},"complementary-categories":{"en":"Complementary Categories","ru":"Схожие категории","_type":"localeString"},"program-receives-data":{"en":"Program Receives Data","_type":"localeString"},"rebate":{"en":"Bonus","ru":"Бонус","_type":"localeString"},"rebate-for-poc":{"_type":"localeString","en":"Bonus 4 POC","ru":"Бонус 4 POC"},"configurator-content":{"en":"Calculate price for this product here","ru":"Рассчитайте стоимость продукта","_type":"localeString"},"configurator-link":{"en":"here","ru":"тут","_type":"localeString"},"vendor-popover":{"_type":"localeString","en":"vendor","ru":"производитель"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"ru":"выбрать продукт для презентации","_type":"localeString","en":"select product for presentation"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You have to register or login."},"add-to-comparison":{"_type":"localeString","en":"Add to comparison","ru":"Добавить в сравнение"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"en":"Calculate ROI for this product here","ru":"Рассчитайте ROI для данного продукта","_type":"localeString"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"videos":{"_type":"localeString","en":"Videos","ru":"Видео"},"vendor-verified":{"_type":"localeString","en":"Vendor verified","ru":"Подтверждено производителем"},"event-schedule":{"_type":"localeString","en":"Events schedule","ru":"Расписание событий"},"scheduling-tip":{"en":"Please, сhoose a convenient date and time and register for the event.","ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString"},"register-to-schedule":{"_type":"localeString","en":"To register for the event please log in or register on the site.","ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт."},"comparison-matrix":{"_type":"localeString","en":"Comparison matrix","ru":"Матрица сравнений"},"compare-with-competitive":{"ru":"Сравнить с конкурентными","_type":"localeString","en":" Compare with competitive"},"avg-deal-closing-unit":{"en":"months","ru":"месяцев","_type":"localeString"},"under-construction":{"ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString","en":"Current feature is still developing to become even more useful for you."},"product-presentation":{"_type":"localeString","en":"Product presentation","ru":"Презентация продукта"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"en":"See Details","ru":"Детали","_type":"localeString"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"en":"logout","ru":"Выйти","_type":"localeString"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Roi4Webinar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"title":{"en":"ROI4CIO: Product","ru":"ROI4CIO: Продукт","_type":"localeString"},"meta":[{"content":"website","name":"og:type"},{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"}],"translatable_meta":[{"name":"og:title","translations":{"en":"Example product","ru":"Конкретный продукт","_type":"localeString"}},{"translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"},"name":"og:description"},{"translations":{"ru":"Продукт","_type":"localeString","en":"Product"},"name":"title"},{"name":"description","translations":{"ru":"Описание продукта","_type":"localeString","en":"Product description"}},{"name":"keywords","translations":{"ru":"Ключевые слова продукта","_type":"localeString","en":"Product keywords"}}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"forcepoint-sureview-analytics":{"id":950,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Forcepoint_SureView_Analytics.jpg","logo":true,"schemeURL":"https://old.b4r.io/fileadmin/user_upload/Forcepoint_SureView_Analytics_scheme.png","scheme":true,"title":"Forcepoint SureView Analytics","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-sureview-analytics","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Security analysts in law enforcement, military and commercial settings spend too much time collecting and collating data across different public and private sources. Their time would be much better spent analyzing the real threats so they can respond rapidly and effectively .\r\nSureView Analytics delivers a dramatically different experience: By employing virtual data warehousing, federated search, powerful algorithms for automated information discovery and intuitive workflow tools, security analysts gain the ability to respond to cyber threats, fraud, other criminal activity and even terrorism as they’re happening — not hours, days or months later.\r\nThe Forcepoint Advantage\r\nVirtual Data Warehousing\r\nTraditional approaches to security analysis require organizations to set up data warehouses and ingest mass data — a process that taxes IT resources, triggers onerous compliance requirements, raises sticky questions of data ownership and drives up your total cost of ownership (TCO). By contrast, we avoid those pitfalls by using virtual data warehousing technology that accesses data at high speed without ever needing to copy or move it.\r\nThe result is a faster, more economical solution that is quicker and easier to set up, and that avoids putting long-term burdens on your IT and compliance resources.\r\nFederated Search\r\nThe federated search capabilities of SureView Analytics allow your analysts to quickly develop a centralized picture of threats by giving your team instant access to live data across websites, emails, social media, documents and internal or external databases (e.g., of crimes, parolees, or FBI-shared data). Besides being highly flexible and scalable, this technology eliminates the traditional need to wait on batch processes, meaning that analysis is based on near-real-time information rather than yesterday’s data. It also allows organizations to take advantage of investments they have already made on enterprise systems for a lower Total Cost of Ownership.\r\nAnalytical Workflows and Tools\r\nSureView Analytics has been designed from the ground up to be easy to use and to enable rapid collaboration across teams. Its sophisticated data visualization tools enable your analysts to interactively expose patterns, trends and anomalies hiding in large amounts of complex data:\r\nLink Analysis — Easily uncover clusters of information or key individuals and their relationship to suspicious events\r\nTemporal Analysis — Quickly recognize a change in behavioral patterns or unusual conduct needing further investigation\r\nGeospatial Analysis — Unearth an unknown relationship or the importance of information based on geographic correlations\r\nStatistical Analysis — Identify unexpected peaks in activities or values\r\nSureView Analytics also includes faceted and tactical searching for selective information discovery using visual search filters, as well as alerting functionality and an integrated intelligence database that supports secure information sharing.\r\n Now, our most important assets, people, have more time to focus on critical success tasks and objectives. The agency is now more agile and able to add data flows on demand. \r\nConfidential Government Customer\r\nForrester Total Economic Impact Study","shortDescription":"SureView Analytics\r\nRapidly Search and Analyze Large Amounts of Data to Detect Cyber and Real-World Threats","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint SureView Analytics","keywords":"data, information, that, Analytics, your, SureView, analysts, Analysis","description":"Security analysts in law enforcement, military and commercial settings spend too much time collecting and collating data across different public and private","og:title":"Forcepoint SureView Analytics","og:description":"Security analysts in law enforcement, military and commercial settings spend too much time collecting and collating data across different public and private","og:image":"https://old.b4r.io/fileadmin/user_upload/Forcepoint_SureView_Analytics.jpg"},"eventUrl":"","translationId":951,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"},{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"characteristics":[],"concurentProducts":[{"id":2202,"logo":false,"scheme":false,"title":"test postman","vendorVerified":1,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":3,"alias":"test-postman","companyTitle":"1C","companyTypes":["supplier","vendor"],"companyId":2773,"companyAlias":"1c","description":null,"shortDescription":"test postman ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"test postman","keywords":"","description":"","og:title":"test postman","og:description":""},"eventUrl":"","translationId":2961,"dealDetails":{"avgPartnerDiscount":0,"dealProtection":1,"avgDealSize":100,"dealSizeCurrency":"","avgDealClosing":100},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":3,"title":"CRM"}],"testingArea":"1111111111111111111111111111111111","categories":[{"id":174,"title":"System and Network Management Software","alias":"","description":"Software-defined networking (SDN) is an approach to computer networking that allows network administrators to manage network services through abstraction of lower-level functionality. SDN is meant to address the fact that the static architecture of traditional networks doesn't support the dynamic, scalable computing and storage needs of more modern computing environments such as data centers. This is done by decoupling or disassociating the system that makes decisions about where traffic is sent (the control plane) from the underlying systems that forward traffic to the selected destination (the data plane).\r\n\r\nSDN was commonly associated with the OpenFlow protocol (for remote communication with network plane elements for the purpose of determining the path of network packets across network switches) since the latter's emergence in 2011. Since 2012, however, many companies have moved away from OpenFlow as a single-solution, and have embraced a number of different techniques. These include Cisco's Open Network Environment and Nicira’s Network virtualization platform.\r\n\r\nSD-WAN is an emerging Wide Area Networking (WAN) technology that is an implementation of software-defined networking.\r\n\r\nSource: https://en.wikipedia.org/wiki/Software-defined_networking","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/system-and-network-management-software.png"},{"id":293,"title":"System Software","alias":"","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/system-software.png"},{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"","description":"Инфраструктура как услуга (IaaS, англ. Infrastructure-as-a-Service) предоставляется как возможность использования облачной инфраструктуры для самостоятельного управления ресурсами обработки, хранения, сетями и другими фундаментальными вычислительными ресурсами, например, потребитель может устанавливать и запускать произвольное программное обеспечение, которое может включать в себя операционные системы, платформенное и прикладное программное обеспечение. Потребитель может контролировать операционные системы, виртуальные системы хранения данных и установленные приложения, а также обладать ограниченным контролем за набором доступных сетевых сервисов (например, межсетевым экраном, DNS). Контроль и управление основной физической и виртуальной инфраструктурой облака, в том числе сети, серверов, типов используемых операционных систем, систем хранения осуществляется облачным провайдером.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9E%D0%B1%D0%BB%D0%B0%D1%87%D0%BD%D1%8B%D0%B5_%D0%B2%D1%8B%D1%87%D0%B8%D1%81%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F#.D0.98.D0.BD.D1.84.D1.80.D0.B0.D1.81.D1.82.D1.80.D1.83.D0.BA.D1.82.D1.83.D1.80.D0.B0_.D0.BA.D0.B0.D0.BA_.D1.83.D1.81.D0.BB.D1.83.D0.B3.D0.B0\r\n\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IaaS_-_infrastructure_as_a_service.png"},{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"},{"id":485,"title":"Web security","alias":"","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1739,"logoURL":"https://old.b4r.io/fileadmin/content/Copy_of_Gurucul_Logo_-_2018-_High_.png","logo":true,"scheme":false,"title":"Gurucul Identity Analytics","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"gurucul-identity-analytics","companyTitle":"Gurucul","companyTypes":["supplier","vendor"],"companyId":4328,"companyAlias":"gurucul","description":"<p style=\"box-sizing: border-box; margin: 0px 0px 20px; font-family: Lato; color: #3a4145; font-size: 16px;\">Gurucul Identity Analytics (IdA) comprehensively manages and monitors identity-based risks and threats across an organization’s siloed environments. Using big data, Gurucul provides a holistic 360-degree view of identity, access, privileged access, and usage in the cloud, on mobile and on-premises. IdA reduces the access plane by detecting and removing access risks, access outliers, and orphan or dormant accounts. This improves an organization’s security posture by significantly decreasing the number of accounts that can be compromised or abused.</p>\r\n<p style=\"box-sizing: border-box; margin: 0px 0px 20px; font-family: Lato; color: #3a4145; font-size: 16px;\">Identity Analytics delivers the data science that improves IAM and PAM, enriching existing identity management investments and accelerating deployments. IdA surpasses human capabilities by leveraging machine learning models to define, review and confirm accounts and entitlements for access. It uses dynamic risk scores and advanced analytics data as key indicators for provisioning, de-provisioning, authentication and privileged access management.</p>\r\n<p style=\"box-sizing: border-box; margin: 0px; font-family: Lato; color: #3a4145; font-size: 16px;\">The impact of machine learning with Identity Analytics can radically reduce accounts and entitlements. Machine learning models provide 360-degree visibility for an identity, accounts and access, with the ability to compare to peer groups using baselines to determine normal and anomalous access. The objective is to clean up the access plane to enable access only where it should be provided.</p>","shortDescription":"Real-Time Access Control Automation Using Risk and Intelligence","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Gurucul Identity Analytics","keywords":"access, accounts, Identity, Analytics, data, Gurucul, identity, learning","description":"Gurucul Identity Analytics (IdA) comprehensively manages and monitors identity-based risks and threats across an organization’s siloed environments.","og:title":"Gurucul Identity Analytics","og:description":"Gurucul Identity Analytics (IdA) comprehensively manages and monitors identity-based risks and threats across an organization’s siloed environments.","og:image":"https://old.b4r.io/fileadmin/content/Copy_of_Gurucul_Logo_-_2018-_High_.png"},"eventUrl":"","translationId":1739,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"},{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"},{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":323,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Securonix_Enterprise.jpg","logo":true,"scheme":false,"title":"Securonix Enterprise","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"securonix-enterprise","companyTitle":"Securonix","companyTypes":["vendor"],"companyId":2733,"companyAlias":"securonix","description":" Using patent pending signature-less anomaly detection techniques that track user, account, and system behavior, Securonix Enterprise automatically and accurately detects the most advanced and sophisticated insider threats and cyber attacks.\r\nDetect insider threats and cyber attacks that go unnoticed by signature-based technologies\r\nFocus on protecting the data that is the most valuable to the organization\r\nReduce the number of alerts and incidents that warrant investigations\r\n\r\n<span style=\"font-weight: bold;\">Entity Profiling</span>\r\nSecuronix aggregates everything of importance to a user, account, application, device, to create a unified view for every entity. Securonix automatically learns each entity’s normal behavior patterns and track its risk posture over time.\r\n<span style=\"font-weight: bold;\">Threat detection</span>\r\nSecuronix uses patent pending signature-less anomaly detection algorithms paired with known threat indicators and third party intelligence to continuously monitor data to identify high risk, abnormal, and fraudulent activities from within or outside the organization.\r\n<span style=\"font-weight: bold;\">Investigation</span>\r\nSecuronix provides everything that an investigator needs on one screen to investigate and track an incident, and take actions. Investigate any identified threat, security event, user, account, or system using a drag and drop visualization palette to explore linkages in data.\r\n\r\n<span style=\"font-weight: bold; font-style: italic;\">Product Highlights</span>\r\n\r\n<span style=\"font-weight: bold;\">High-Risk Entity Dashboard</span>\r\nSecuronix’s High-Risk Entity Dashboard provides a unified and prioritized view of all the high-risk insider and cyber threats across all users, accounts, hosts, endpoints in the enterprise.\r\n<span style=\"font-weight: bold;\">Multi-Entity Investigation Workbench</span>\r\nSecuronix’s Investigation Workbench is a powerful tool for the analyst to visually investigate the most sophisticated threats and attacks using simple drag-and-drops, and identify similarities and anomalies between all entities in the organization.\r\n<span style=\"font-weight: bold;\">Advanced Correlation of 3rd Party Intelligence</span>\r\nSecuronix combines event analytics with over 15 3rd party intelligence providers to correlate events in the network with known bad threat actors and suspicious network events such as remote access to sensitive data from abnormal geographical locations.\r\n<span style=\"font-weight: bold;\">Data Encryption and Masking</span>\r\nSecuronix’s data encryption and masking capabilities provides the complete capability to secure, encrypt, and mask PII (Personally Identifiable Information) data, which is in alignment with the most stringent data security and privacy requirements in the industry.\r\n<span style=\"font-weight: bold;\">Product Key Features</span>\r\n<span style=\"white-space:pre\">\t</span>Real-Time Behavior Analytics Real-Time creation and continuous update of behavior profiles for every entity and peer group at the time of data and event ingestion.\r\n<span style=\"white-space:pre\">\t</span>Threat Dashboards Personalized and fully-customizable threat dashboards presenting prioritized and aggregated risk scores by organization and department.\r\n<span style=\"white-space:pre\">\t</span>Threat Management Threat management capability for the analysts to review, investigate and escalate incidents, including embedded incident management system with customizable workflows.\r\n<span style=\"white-space:pre\">\t</span>Threat Library The industry’s largest and most mature library of threat models and indicators to detect the most advanced insider and cyber attacks.\r\n<span style=\"white-space:pre\">\t</span>Scalability Horizontally scalable architecture able to monitor organizations with close to 1 million users and billions of transactions per day.\r\n<span style=\"white-space:pre\">\t</span>Third-Party Integrations Data collection and analysis from over 200 supported data sources directly, or from any major log aggregation and SIEM technologies.","shortDescription":"Securonix Enterprise is a behavior-based threat prediction, detection and prevention engine that mines, enriches, analyzes, prioritizes, and transforms machine data into actionable intelligence.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Securonix Enterprise","keywords":"data, Securonix, with, most, Threat, threat, that, attacks","description":" Using patent pending signature-less anomaly detection techniques that track user, account, and system behavior, Securonix Enterprise automatically and","og:title":"Securonix Enterprise","og:description":" Using patent pending signature-less anomaly detection techniques that track user, account, and system behavior, Securonix Enterprise automatically and","og:image":"https://old.b4r.io/fileadmin/user_upload/Securonix_Enterprise.jpg"},"eventUrl":"","translationId":324,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1658,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Securonix_Enterprise.jpg","logo":true,"scheme":false,"title":"Securonix User and Entity Behavior Analytics (UEBA)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"securonix-user-and-entity-behavior-analytics-ueba","companyTitle":"Securonix","companyTypes":["vendor"],"companyId":2733,"companyAlias":"securonix","description":"Securonix UEBA threat detection is built on the latest advanced data sciences concepts, and leverages a big data Hadoop technology stack to enable the required supervised and unsupervised machine learning algorithms for highly accurate attack detection and prioritization. Securonix’s team of scientists and analysts, led by Chief Scientist Igor Baikalov (former head of security intelligence at Bank of America), continuously builds and updates threat models specific to data sources and industries. With our list of marquee customers, Securonix has the most comprehensive and mature set of behavior-based threat models in the industry. Our research efforts are further bolstered by our Threat Research Labs, focused on threat research, response and behavior analysis based detection of critical attacks and data breaches (like WannaCry, NotPetya and the recent Equifax breach).\r\n\r\n<span style=\"font-weight: bold; \">Reduce Your Risk of Insider Threats</span>\r\n<ul> <li>Build a comprehensive risk profile of every user in your environment, based on identity, employment, security violations, IT activity and access, physical access, and even phone records.</li> <li>Identify true areas of risk by comparing user activity to their individual baseline, their peer group baseline, and known threat indicators.</li> <li>Results are scored and presented in interactive scorecards.</li> </ul>\r\n<span style=\"font-weight: bold; \"><br /></span> <span style=\"font-weight: bold; \">Clear Visibility into Your Cloud</span>\r\n<ul> <li>Provide cloud-to-cloud monitoring capabilities with built-in APIs for all major cloud infrastructure and application technologies.</li> <li>Detect malicious activity by analyzing user entitlements and events.</li> <li>Correlate cloud data and on-premises data to add entity context information.</li> <li>Analyze end-to-end activities to detect actionable threat patterns.</li> </ul>\r\n<span style=\"font-weight: bold; \"><br /></span> <span style=\"font-weight: bold; \">Proactive Enterprise Fraud Detection</span>\r\n<ul> <li>Identify complex fraud attacks that typically escape signature-based detection methods using advanced signatureless behavior and peer-based outlier analysis techniques.</li> <li>Detect account takeover, anomalous user behavior, transaction fraud, and anti-money laundering violations.</li> </ul>\r\n<span style=\"font-weight: bold; \"><br /></span> <span style=\"font-weight: bold; \">Revolutionize Your Cloud Security</span> With Securonix Cloud you can enjoy all the capabilities of Securonix Security Analytics Platform, with the convenience of a software-as-a-service (SaaS) solution. It provides security that spans across your cloud infrastructure, data, applications, and access control solutions. Benefit from the quick deployment, easy scalability, and shorter time to value of Securonix Cloud.\r\n","shortDescription":"Securonix User and Entity Behavior Analytics is a software based on Advanced Analytics Powered by Machine Learning","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Securonix User and Entity Behavior Analytics (UEBA)","keywords":"data, threat, Securonix, user, detection, Cloud, Your, behavior","description":"Securonix UEBA threat detection is built on the latest advanced data sciences concepts, and leverages a big data Hadoop technology stack to enable the required","og:title":"Securonix User and Entity Behavior Analytics (UEBA)","og:description":"Securonix UEBA threat detection is built on the latest advanced data sciences concepts, and leverages a big data Hadoop technology stack to enable the required","og:image":"https://old.b4r.io/fileadmin/user_upload/Securonix_Enterprise.jpg"},"eventUrl":"","translationId":1659,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1660,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Exabeam.png","logo":true,"scheme":false,"title":"Exabeam Advanced Analytics","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"exabeam-advanced-analytics","companyTitle":"Exabeam","companyTypes":["supplier","vendor"],"companyId":4093,"companyAlias":"exabeam","description":"<span style=\"font-weight: bold;\">Complex Threat Identification with Behavioral Analysis</span> Cyberattacks are becoming more complex and harder to find. Often correlation rules can’t find the attacks because they lack context or miss incidents they’ve never seen — generating false negatives. Correlation rules also require much maintenance. Advanced Analytics automatically detects the behaviors indicative of a threat. Now teams don’t have to spend time with frequently faulty correlation rules. <span style=\"font-weight: bold;\">Prebuilt Timelines Automatically Reconstruct Security Incidents</span> Analysts shouldn’t spend days or weeks gathering evidence and constructing timelines of incidents by querying and pivoting through their SIEM. With Advanced Analytics, a prebuilt-incident timeline flags anomalies and displays details of the incident for the full scope of the event and its context. Now analysts can stop spending time combing through raw logs to investigate incidents. What took weeks to investigate in a legacy SIEM can now be done in seconds. <span style=\"font-weight: bold;\">Dynamic Peer Grouping</span> User behavior patterns often differ based on a myriad of attributes, including: the team they are on, what projects they are involved in, where they are located, and more. Thus, behavioral baselines shouldn’t be static. Dynamic peer grouping uses machine learning to assign users to groups based on their behavior, then to compare their activity against that of those groups to identify anomalous, risky behavior. <span style=\"font-weight: bold;\">Lateral Movement Detection</span> Lateral movement is a method attackers use to move through a network by using IP addresses, credentials, and machines in search of key assets. Tracking is difficult because the trace information only tells part of the story. Data must be analyzed from everywhere, linking the attack to the source. The Advanced Analytics patented technology tracks suspected activities even if there are changes to devices, IP addresses, or credentials. <span style=\"font-weight: bold;\">Asset Ownership Association</span> Another time-intensive part of performing a security investigation is the manual process of determining who owns or regularly uses the devices involved in an incident. There isn’t a convenient IT database linking devices to their owners, and mobile devices can exist outside of any tracking. Advanced Analytics is able to determine the owner of a device based on their pattern of behavior and interactions.","shortDescription":"Exabeam Advanced Analytics is the world’s most-deployed UEBA solution - Modern threat detection using behavioral modeling and machine learning.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Exabeam Advanced Analytics","keywords":"their, Analytics, Advanced, devices, they, behavior, incidents, through","description":"Complex Threat Identification with Behavioral Analysis Cyberattacks are becoming more complex and harder to find. Often correlation rules can’t find the","og:title":"Exabeam Advanced Analytics","og:description":"Complex Threat Identification with Behavioral Analysis Cyberattacks are becoming more complex and harder to find. Often correlation rules can’t find the","og:image":"https://old.b4r.io/fileadmin/user_upload/Exabeam.png"},"eventUrl":"","translationId":1662,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1663,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Gurucul.jpg","logo":true,"scheme":false,"title":"Gurucul User and Entity Behavior Analytics (UEBA)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"gurucul-user-and-entity-behavior-analytics-ueba","companyTitle":"Gurucul","companyTypes":["supplier","vendor"],"companyId":4328,"companyAlias":"gurucul","description":"<b>Gurucul User and Entity Behavior Analytics (UEBA) uses machine learning models on open choice big data to detect unknown threats early in the kill chain.</b>\r\nUEBA provides the most realistically effective approach to comprehensively manage and monitor user and entity-centric risks. UEBA quickly identifies anomalous activity, thereby maximizing timely incident or automated risk response. The range of Gurucul UEBA use cases is what makes the solution extensible and valuable. It focuses on the detection of risks and threats beyond the capabilities of signatures, rules, and patterns. Using big data, Gurucul provides risk-based behavior analytics delivering actionable intelligence for security teams with low false positives. Gurucul leads the market in demonstrating UEBA results where others cannot. We consume the most data sources out-of-the-box and leverage the largest machine learning library. Additionally, we deliver a single unified prioritized risk score per user and entity. Find threats – unknown unknowns – quickly with no manual threat hunting and no configuration. Get immediate results without writing queries, rules or signatures. \r\n\r\nThe mature capabilities of UEBA provide robust and optimal advanced security analytics. It applies across a range of on-premises and hybrid environments, scoring the gray areas of unknowns and minimizing false positives. The result is improving the focus of ‘find-fix’ resources and optimizing the time of security analysts, efficiency in the SOC, and making operations and people more productive. ","shortDescription":"Gurucul User and Entity Behavior Analytics (UEBA) Finds & Stops Threats Immediately with Behavior Based Predictive Risk Scoring","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Gurucul User and Entity Behavior Analytics (UEBA)","keywords":"UEBA, Gurucul, security, data, threats, with, user, risks","description":"Gurucul User and Entity Behavior Analytics (UEBA) uses machine learning models on open choice big data to detect unknown threats early in the kill chain.\rUEBA","og:title":"Gurucul User and Entity Behavior Analytics (UEBA)","og:description":"Gurucul User and Entity Behavior Analytics (UEBA) uses machine learning models on open choice big data to detect unknown threats early in the kill chain.\rUEBA","og:image":"https://old.b4r.io/fileadmin/user_upload/Gurucul.jpg"},"eventUrl":"","translationId":1664,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1665,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Splunk_Enterprise.png","logo":true,"scheme":false,"title":"Splunk User Behavior Analytics","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"splunk-user-behavior-analytics","companyTitle":"Splunk","companyTypes":["vendor"],"companyId":2815,"companyAlias":"splunk","description":"Detect unknown threats and anomalous behavior using machine learning\r\n<ul> <li>Advanced Threat Detection. Discover abnormalities and unknown threats that traditional security tools miss</li> <li>Higher Productivity. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life</li> <li>Accelerate Threat Hunting. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat</li> </ul>\r\n<span style=\"font-weight: bold;\">Automatically find unknown threats using machine learning</span>\r\n<ul> <li>Enhance Visibility and Detection. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution.</li> <li>Accelerate Threat Hunting. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications.</li> <li>Augment SOC Resources. Automatically stitch hundreds of anomalies observed across multiple-entities—users, accounts, devices and applications - to a single threat for faster action.</li> <li>Better Together: Splunk ES and Splunk UBA. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions by combing Splunk® Enterprise Security and Splunk UBA.</li> </ul>","shortDescription":"Splunk User Behavior Analytics - Securing against unkown threats through user and entity behavior analytics","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Splunk User Behavior Analytics","keywords":"threat, Splunk, threats, learning, anomalies, Threat, machine, using","description":"Detect unknown threats and anomalous behavior using machine learning\r Advanced Threat Detection. Discover abnormalities and unknown threats that traditional","og:title":"Splunk User Behavior Analytics","og:description":"Detect unknown threats and anomalous behavior using machine learning\r Advanced Threat Detection. Discover abnormalities and unknown threats that traditional","og:image":"https://old.b4r.io/fileadmin/user_upload/Splunk_Enterprise.png"},"eventUrl":"","translationId":1666,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1669,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Elastic.png","logo":true,"scheme":false,"title":"Elastic Stack","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"elastic-stack","companyTitle":"Elastic","companyTypes":["supplier","vendor"],"companyId":4329,"companyAlias":"elastic","description":"Elastic, the company behind Elasticsearch, and the Elastic Stack, the most widely used collection of open source products for solving mission-critical use cases like search, logging, and analytics, has acquired Prelert, a leading provider of behavioral analytics technology. Elastic will integrate the Prelert technology into the Elastic Stack, and will offer it as part of its subscription packages in 2017, giving Elastic customers more capabilities to solve complex use cases such as cybersecurity, fraud detection, and IT operations analytics, among others. Prelert was founded in 2008 to create technology that automates the discovery of anomalies in large, complex datasets, predicts actions and outcomes, and provides enterprises and their end users with a consumable application that doesn't require them to perform data science. Using unsupervised machine learning techniques applied to a customer's historical and real-time continuous data, Prelert's predictive models perform behavioral analytics to understand the probability of failures and events occurring with built-in alerting and notifications for end users to explain 'why' something has happened and 'what' to do with that information. More companies, from startups to large enterprises, are storing large amounts of structured and unstructured data in Elasticsearch. With 'search' becoming the foundation for many of these companies to address their most complex use cases, Prelert built an Elastic Stack integration to provide Elasticsearch users with an automated way to understand the 'why' in their data and take action on 'difficult to see' insights. Combining Elastic's Kibana user interface framework and Prelert's behavioral analytics technology, customers are able to solve common problems in their continuous and ever-growing data, including:\r\n<ul> <li>detecting advanced security threat activities and anomalies in log data,</li> <li>discovering hidden fraud patterns in highly sensitive data,</li> <li>identifying anomalous systems or metrics and their root causes across IT systems,</li> <li>linking together complex series of events in data to expose early warning signals,</li> <li>automatically pinpointing where and why critical system outages are occurring,</li> <li>detecting unexpected drops in transactional activity, and much more.</li> </ul>","shortDescription":"Elastic Stack is UEBA.Built on an open source foundation, the Elastic Stack lets you reliably and securely take data from any source, in any format, and search, analyze, and visualize it in real time.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Elastic Stack","keywords":"data, Elastic, Prelert, analytics, their, complex, technology, Stack","description":"Elastic, the company behind Elasticsearch, and the Elastic Stack, the most widely used collection of open source products for solving mission-critical use","og:title":"Elastic Stack","og:description":"Elastic, the company behind Elasticsearch, and the Elastic Stack, the most widely used collection of open source products for solving mission-critical use","og:image":"https://old.b4r.io/fileadmin/user_upload/Elastic.png"},"eventUrl":"","translationId":1670,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1671,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Micro_Focus.png","logo":true,"scheme":false,"title":"Micro Focus Security ArcSight User Behavior Analytics (UBA)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"micro-focus-security-arcsight-user-behavior-analytics-uba","companyTitle":"Micro Focus","companyTypes":["supplier","vendor"],"companyId":4386,"companyAlias":"micro-focus","description":"Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. It helps detect and investigate malicious user behavior, insider threat and account misuse. Therefore, it enables organizations to detect breaches before significant damage occurs by finding the adversary faster. <span style=\"font-weight: 700; \">Micro Focus</span><span style=\"font-weight: bold; \"> User behavior Analytics helps you with:</span>\r\n<ul> <li>Lowering the risk and impact of cyber attacks</li> <li>Detect unusual behavior by correlating user identity management with rest of the IT logs from apps and network</li> <li>Achieve faster event resolution to identified threats through deeper integration with SIEM</li> <li>Quick forensics investigation UBA analyzes user related data looking for threats in comparison to peers, historical activity, and/or violations of predefined expected behavior.</li> </ul>","shortDescription":"Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Micro Focus Security ArcSight User Behavior Analytics (UBA)","keywords":"behavior, Micro, threats, Analytics, User, Focus, user, Behavior","description":"Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to","og:title":"Micro Focus Security ArcSight User Behavior Analytics (UBA)","og:description":"Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to","og:image":"https://old.b4r.io/fileadmin/user_upload/Micro_Focus.png"},"eventUrl":"","translationId":1672,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1170,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SKYBOX_HORIZON.png","logo":true,"scheme":false,"title":"SKYBOX HORIZON","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"skybox-horizon","companyTitle":"SkyBox","companyTypes":["supplier","vendor"],"companyId":4065,"companyAlias":"skybox","description":"Get unprecedented visibility of the attack surface, including indicators of exposure (IOEs). Horizon’s security visualization and mapping capabilities are rooted in Skybox intelligence and analysis of all the layers that make up the attack surface — including assets, hybrid network topology, weaknesses and threats.\r\nHorizon makes it easier for operational teams to understand and discuss security risks and cyberthreats — and plan how to address them. Horizon tracks risk levels over time, so status and progress can easily be communicated with security stakeholders — including the C-suite and the board.","shortDescription":"Horizon provides unprecedented visibility of the attack surface, including indicators of exposure, giving the insight needed to build a security management program ready to take on cyberthreats. Cutting-edge attack surface visualization solution powered by indicators of exposure","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SKYBOX HORIZON","keywords":"including, security, surface, attack, Horizon, them, risks, address","description":"Get unprecedented visibility of the attack surface, including indicators of exposure (IOEs). Horizon’s security visualization and mapping capabilities are","og:title":"SKYBOX HORIZON","og:description":"Get unprecedented visibility of the attack surface, including indicators of exposure (IOEs). Horizon’s security visualization and mapping capabilities are","og:image":"https://old.b4r.io/fileadmin/user_upload/SKYBOX_HORIZON.png"},"eventUrl":"","translationId":1171,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"ITSM (IT Service Management, управление ИТ-услугами) — подход к управлению и организации ИТ-услуг, направленный на удовлетворение потребностей бизнеса. Управление ИТ-услугами реализуется поставщиками ИТ-услуг путём использования оптимального сочетания людей, процессов и информационных технологий. Для содействия реализации подхода к управлению ИТ-услугами используется серия документов ITIL.\r\n\r\nВ отличие от более традиционного технологического подхода, ITSM рекомендует сосредоточиться на клиенте и его потребностях, на услугах, предоставляемых пользователю информационными технологиями, а не на самих технологиях. При этом процессная организация предоставления услуг и наличие заранее оговоренных в соглашениях об уровне услуг параметров эффективности (KPI) позволяет ИТ-отделам предоставлять качественные услуги, измерять и улучшать их качество.\r\n\r\nВажным моментом при изложении принципов ITSM является системность. При изложении каждого составного элемента ITSM (управление инцидентами, управление конфигурациями, управление безопасностью и т. д.) в обязательном порядке прослеживается его взаимосвязь и координация с остальными элементами (службами, процессами) и при этом даются необходимые практические рекомендации.\r\n\r\nITIL не является конкретным алгоритмом или руководством к действию, но она описывает передовой опыт (best practices) и предлагает рекомендации по организации процессного подхода и управления качеством предоставления услуг. Это позволяет оторваться от особенностей данного конкретного предприятия в данной конкретной отрасли. Вместе с тем, несмотря на определённую абстрактность, ITIL всячески нацелено на практическое использование. В каждом разделе библиотеки приводятся ключевые факторы успеха внедрения того или иного процесса, практические рекомендации при этом превалируют над чисто теоретическими рассуждениями.\r\nИсточник: https://ru.wikipedia.org/wiki/ITSM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ITSM.png"},{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1034,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Coco_Framework.png","logo":true,"scheme":false,"title":"Microsoft Coco Framework","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-coco-framework","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these requirements, Coco presents an alternative approach to ledger construction, giving enterprises the scalability, distributed governance and enhanced confidentiality they need without sacrificing the inherent security and immutability they expect.\r\nLeveraging the power of existing blockchain protocols, trusted execution environments (TEEs) such as Intel SGX and Windows Virtual Secure Mode (VSM), distributed systems and cryptography, Coco enables enterprise-ready blockchain networks that deliver:\r\n\r\n<ul><li>Throughput and latency approaching database speeds.</li><li>Richer, more flexible, business-specific confidentiality models.</li><li>Network policy management through distributed governance.</li><li>Support for non-deterministic transactions.</li></ul>\r\nBy providing these capabilities, Coco offers a trusted foundation with which existing blockchain protocols can be integrated to deliver complete, enterprise-ready ledger solutions, opening up broad, high scale scenarios across industries, and furthering blockchain's ability to digital transform business.\r\nWe have already begun exploring Coco’s potential across a variety of industries, including retail, supply chain and financial services.\r\nWhether a customer is designing an end-to-end trade finance solution, using blockchain to ensure security at the edge or leveraging Enterprise Smart Contracts to drive back office efficiencies, Coco enables them to meet their enterprise requirements. Microsoft is the only cloud provider that delivers consistency across on-premises and the public cloud at hyperscale while providing access to the rich Azure ecosystem for the wide range of applications that will be built on top of blockchain as a shared data layer.\r\nAn open approach\r\nBy design, Coco is open and compatible with any blockchain protocol. Microsoft has already begun integrating Ethereum into Coco and we’re thrilled to announce that J.P. Morgan Chase, Intel and R3 have committed to integrating enterprise ledgers, Quorum, Hyperledger Sawtooth and Corda, respectively. This is just the beginning, and we look forward to exploring integration opportunities with other ledgers in the near future.\r\n","shortDescription":"Microsoft Coco Framework is an open-source system that enables high-scale, confidential blockchain networks that meet all key enterprise requirements—providing a means to accelerate production enterprise adoption of blockchain technology.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Coco Framework","keywords":"Coco, blockchain, that, with, distributed, Microsoft, across, existing","description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these","og:title":"Microsoft Coco Framework","og:description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these","og:image":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Coco_Framework.png"},"eventUrl":"","translationId":1035,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":816,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Dr.Web_Light_dlja_Android.png","logo":true,"scheme":false,"title":"Dr.Web Light для Android","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":6,"alias":"drweb-light-dlja-android","companyTitle":"Dr.Web","companyTypes":["vendor"],"companyId":2794,"companyAlias":"drweb","description":"Приложение имеет множество сервисов, ориентированных на одну главную цель: защитить ваше устройство. Прежде всего, это SpIDer Guard – инструмент, который в режиме реального времени сканирует все файлы, сохраненные на устройстве. \r\n\r\nДругой очень полезный инструмент, входящий в состав Dr.Web Anti-virus – это классический сканер. Как обычно в классических сканерах, мы можем выбирать, хотим ли мы сканировать все устройство или только конкретные выбранные области.\r\n\r\nУгрозы, обнаруженные во время сканирования, могут быть устранены или перемещены в карантин. Во время сканирования есть возможность просмотра подробных сведений о найденных вредоносных программах.\r\n\r\nОчень интересным является инструмент защиты SD-карты мобильного устройства, который особенно полезен, поскольку мы можем обезопасить не только само устройство, но и компьютеры, к которому его подключаем.\r\n\r\nDr.Web Anti-virus Light (free) – это один из лучших антивирусов, которые можно найти для Android. Он не только полезен и предоставляет качественный поиск, но и имеет удобный интерфейс, отлично адаптированный в двух различных размеров экрана.","shortDescription":"Dr.Web Anti-virus Light – это антивирус для защиты мобильных устройств Android от всех видов более и менее распространенных (и опасных) угроз.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dr.Web Light для Android","keywords":"устройство, инструмент, только, полезен, который, можем, Anti-virus, Light","description":"Приложение имеет множество сервисов, ориентированных на одну главную цель: защитить ваше устройство. Прежде всего, это SpIDer Guard – инструмент, который в","og:title":"Dr.Web Light для Android","og:description":"Приложение имеет множество сервисов, ориентированных на одну главную цель: защитить ваше устройство. Прежде всего, это SpIDer Guard – инструмент, который в","og:image":"https://old.b4r.io/fileadmin/user_upload/Dr.Web_Light_dlja_Android.png"},"eventUrl":"","translationId":2510,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2124,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IBM_Qradar.png","logo":true,"scheme":false,"title":"IBM QRADAR UBA","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":223,"alias":"ibm-qradar-uba","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":" IBM QRadar User Behavior Analytics (UBA) - это приложение для опережающего выявления внутренних угроз. Оно расширяет платформу QRadar Security Intelligence Platform и анализирует шаблоны поведения внутренних пользователей, выявляя идентификационные данные или системы, взломанные злоумышленниками. Приложение отображает пользователей из группы риска на сводной панели, где показаны их имена и аномальные действия, а также инциденты из QRadar. Одним щелчком мыши подозрительный пользователь может быть добавлен в список наблюдения, или его действия могут получить текстовый комментарий. Панель также открывает доступ к данным протокола и текущих событий.\r\n<span style=\"font-weight: bold; \">Возможности:</span>\r\n<span style=\"font-weight: bold; \">Выявление внутренних угроз.</span> Защита от внутренних злоумышленников и киберпреступников, использующих похищенные идентификационные данные. Обнаружение аномального поведения, отклонений от шаблонов, угроз и утечки данных с упором на действия пользователей.\r\n<span style=\"font-weight: bold; \">Расширение функций защиты QRadar.</span> Сводная панель UBA входит в состав консоли QRadar и расширяет возможности платформы QRadar Security Intelligence Platform.\r\n<span style=\"font-weight: bold; \">Повышение отдачи от аналитики.</span> Оценка рисков и ранжирование пользователей по уровню риска. Используйте данные, собранные QRadar, и применяйте новые правила поведения и аналитику. Продукт выводит данные протокола и текущих событий, связанные с угрозами безопасности.\r\n<span style=\"font-weight: bold; \">Быстрое внедрение.</span> Клиенты QRadar могут быстро загрузить и установить приложение с IBM Security App Exchange. Результаты становятся доступными сразу после развертывания продукта.\r\n<span style=\"font-weight: bold;\">Сведения о функциях:</span>\r\n<span style=\"font-weight: bold;\">Сводная панель в составе консоли QRadar</span>\r\nВ одном окне показаны пользователи и подозрительные операции, которые могут указывать на наличие внутренних угроз. IBM® QRadar® User Behavior Analytics (UBA) расширяет возможности платформы QRadar Security Intelligence Platform и добавляет представление действий пользователей. На сводной панели показано число отслеживаемых пользователей, пользователи из группы риска, категории рисков, события защиты и угрозы, а также общее состояние пользователей и список наблюдения за пользователями.\r\n<span style=\"font-weight: bold;\">Обнаружение внутренних угроз на основе подозрительных действий пользователей</span>\r\nРешение UBA создает шаблон типичных действий пользователей и обнаруживает заметные отклонения от него. Внутренние угрозы входят в число наиболее распространенных векторов атак на организации, которые могут быть следствием действий недобросовестных сотрудников, хищения идентификационных данных хакерами, операций контрагентов или партнеров, ставших жертвами вредоносных фишинговых атак, или других угроз.\r\n<span style=\"font-weight: bold;\">Списки наблюдения за пользователями</span>\r\nПользователи из группы риска помещаются в список наблюдения и отображаются на вкладке QRadar и в сводной панели. Благодаря интеграции с решениями по реагированию на инциденты угрозы могут быть нейтрализованы быстрее.\r\n<span style=\"font-weight: bold;\">Алгоритмы машинного обучения для мониторинга изменений поведения</span>\r\nТонко настроенные алгоритмы машинного обучения обнаруживают, когда пользователи необычным образом работают в приложениях, выполняют действия, чем-то отличающиеся от действий коллег, или недопустимые операции. Все это может указывать на внутренние угрозы.\r\n<span style=\"font-weight: bold;\">Подробное ранжирование рисков отдельных пользователей</span>\r\nАналитик может одним щелчком вывести подробное представление действий и нарушений, которые определяют степень риска пользователя. С каждым нарушением связаны индивидуальные протоколы и данные операций, которые также можно просмотреть. Приложение UBA ускоряет расследование и интегрируется с решениями для реагирования на инциденты, тем самым сокращая время, требуемое для нейтрализации внутренних угроз.\r\n<span style=\"font-weight: bold;\">Доступно на IBM Security App Exchange</span>\r\nПродукт QRadar UBA предназначен для существенного расширения возможностей выявления внутренних угроз и поставляется как приложение, которое можно загрузить независимо от расписания выпусков всей платформы. Все текущие пользователи QRadar могут добавить это приложение в версию QRadar не ниже 7.2.6 и получить представление о действиях пользователей внутри своей сети.","shortDescription":"IBM QRadar UBA - приложение для опережающего выявления угроз, анализирующее шаблоны поведения внутренних пользователей, выявляя идентификационные данные или системы, взломанные злоумышленниками.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM QRADAR UBA","keywords":"QRadar, пользователей, внутренних, угроз, могут, действий, данные, риска","description":"IBM QRadar User Behavior Analytics (UBA) - это приложение для опережающего выявления внутренних угроз. Оно расширяет платформу QRadar Security Intelligence","og:title":"IBM QRADAR UBA","og:description":"IBM QRadar User Behavior Analytics (UBA) - это приложение для опережающего выявления внутренних угроз. Оно расширяет платформу QRadar Security Intelligence","og:image":"https://old.b4r.io/fileadmin/user_upload/IBM_Qradar.png"},"eventUrl":"","translationId":2909,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2125,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IBM_Qradar.png","logo":true,"scheme":false,"title":"IBM QRradar UBA","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":223,"alias":"ibm-qrradar-uba","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"IBM QRadar User Behavior Analytics (UBA) analyzes user activity to detect malicious insiders and determine if a user’s credentials have been compromised. As a component of the QRadar Security Intelligence Platform, QRadar UBA adds user context to network, log, vulnerability and threat data to more quickly and accurately detect attacks. Security analysts can easily see risky users, view their anomalous activities and drill down into the underlying log and flow data that contributed to a user’s risk score. QRadar is available in the IBM Security App Exchange and can be downloaded and installed in minutes.\r\n<span style=\"font-weight: bold;\">Capabilities:</span>\r\n<span style=\"font-weight: bold;\">Gain visibility into insider threats.</span> Guard against rogue insiders and cyber criminals using compromised credentials. Uncover anomalous behaviors, lateral movement, threats and data exfiltration─with a user focus.\r\n<span style=\"font-weight: bold;\">Extend QRadar security features.</span> The UBA dashboard is an integrated part of the QRadar console and helps extend capabilities of the QRadar Security Intelligence Platform.\r\n<span style=\"font-weight: bold;\">Improve analyst productivity.</span> Easily identify risky users. Apply machine learning and behavioral analytics to QRadar security data, calculate users’ risk scores and only raise alerts on high risk incidents to reduce alert fatigue.\r\n<span style=\"font-weight: bold;\">Accelerate time to value.</span> Generate meaningful insights within 24 hours. QRadar clients can download and install the UBA app quickly and easily from the IBM Security App Exchange.\r\n<span style=\"font-weight: bold;\">Feature spotlights:</span>\r\n<span style=\"font-weight: bold;\">Detects insider threats based on user behavioral anomalies</span> \r\nUser behavior analysis and fine-grained machine learning algorithms can detect when users deviate from normal activity patterns or behave differently from their peers. QRadar UBA creates a baseline of normal activity and detects significant deviations to expose both malicious insiders and users whose credentials have been compromised by cyber criminals.\r\n<span style=\"font-weight: bold;\">Generates detailed risk scores for individual users</span>\r\nRisk scores dynamically change based on user activity, and high-risk users can be added to a watch list. Security analysts can easily drill down to view the actions, offenses, logs and flow data that contributed to a person’s risk score. This helps shorten the investigation and response times associated with insider threats.\r\n<span style=\"font-weight: bold;\">Integrates seamlessly with QRadar Security Analytics</span>\r\nQRadar UBA integrates directly into the QRadar Security Analytics solution, leveraging the existing QRadar user interface and database. All enterprise-wide security data can remain in one central location, and analysts can tune rules, generate reports and integrate with complementary Identity and Access Management solutions – all without having to learn a new system or build a new integration.\r\n<span style=\"font-weight: bold;\">Available from the IBM Security App Exchange</span>\r\nQRadar UBA is packaged as a downloadable app that is independent of the platform’s formal release cycles. All current QRadar clients can add this app to QRadar version 7.2.7 or higher to begin seeing a user-centric view of activity within their networks.","shortDescription":"IBM QRadar UBA - приложение для опережающего выявления угроз, анализирующее шаблоны поведения внутренних пользователей, выявляя идентификационные данные или системы, взломанные злоумышленниками.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM QRradar UBA","keywords":"QRadar, Security, users, data, user, risk, activity, from","description":"IBM QRadar User Behavior Analytics (UBA) analyzes user activity to detect malicious insiders and determine if a user’s credentials have been compromised. As a","og:title":"IBM QRradar UBA","og:description":"IBM QRadar User Behavior Analytics (UBA) analyzes user activity to detect malicious insiders and determine if a user’s credentials have been compromised. As a","og:image":"https://old.b4r.io/fileadmin/user_upload/IBM_Qradar.png"},"eventUrl":"","translationId":2125,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1667,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint User and Entity Behavior Analytics (UEBA)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-user-and-entity-behavior-analytics-ueba","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"font-weight: bold;\">Identify Potential Sources of Data Exfiltration and Critical IP Loss</span> Determine users exhibiting risky behavior such as stockpiling and atypical data movement before critical IP leaves your organization. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Advanced Compromised Account Detection</span> By understanding attributes like typical access patterns, prevent bad actors from accessing your critical assets and systems with User and Entity Behavior Analytics (UEBA). <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Be a Partner to Human Resources</span> Analyze communications-based data sources to identify potential code-of-conduct infractions. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Get More Out of Your SIEM Investment</span> UEBA adds context and analytics to SIEM data and provides risk scoring to incidents organized by entity, allowing analysts to prioritize the highest risks. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Perform Context & Content-Rich Incident Response</span> Enable transparent comprehensive investigation with advanced analytics like machine learning and artificial intelligence that are tuned toward specific behavior risk. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Solve Challenges in Data Security and Regulatory Compliance</span> Analyze and detect patterns of human behavior in big data, delivering insights into enterprise risk where threats have surpassed the perimeter. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Automate DLP Policy Enforcement</span> Combine UEBA with Forcepoint DLP to utilize analytic risk scores to dynamically change DLP policies. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Transparency</span> Understandable analytics with simple explanation and context to make informed decisions about possible insider threats. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Configurability</span> There is no one-size-fits-all UEBA solution. Forcepoint allows customers to build their own use cases and develop their own analytics without the need of a data scientist. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Entity Timeline</span> View all historical activity during forensics stage with dynamic visualization. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Detect Seemingly Unrelated Threats</span> Single alerts lack context to data. UEBA uses natural language processing and sentiment analysis for a holistic view of the user. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Varied Dataset Calculations</span> Data models informed by both structured data, such as SIEM logs, and unstructured data, such as email and chat, from your disparate security tools and third-party applications.","shortDescription":"Forcepoint User and Entity Behavior Analytics (UEBA) is AI-FUELED BEHAVIOR ANALYTICS TO IDENTIFY REAL ENTITY RISK","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint User and Entity Behavior Analytics (UEBA)","keywords":"data, UEBA, with, analytics, risk, context, SIEM, behavior","description":"Identify Potential Sources of Data Exfiltration and Critical IP Loss Determine users exhibiting risky behavior such as stockpiling and atypical data movement","og:title":"Forcepoint User and Entity Behavior Analytics (UEBA)","og:description":"Identify Potential Sources of Data Exfiltration and Critical IP Loss Determine users exhibiting risky behavior such as stockpiling and atypical data movement","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1668,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1229,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png","logo":true,"scheme":false,"title":"Amazon Pinpoint","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":7,"alias":"amazon-pinpoint","companyTitle":"Amazon Web Services","companyTypes":["supplier","vendor"],"companyId":176,"companyAlias":"amazon-web-services","description":"Amazon Pinpoint makes it easy to engage your customers by tracking the ways in which they interact with your applications. You can then use this information to create segments based on customer attributes and behaviors, and to communicate with those customers using the channels they prefer, including email, SMS and mobile push. Once the customer conversation has begun, Amazon Pinpoint collects metrics that help you better understand the impact of your communications. You can use these insights to improve the effectiveness of your future campaigns. With Amazon Pinpoint, you pay only for what you use. There are no upfront contract negotiations, no fixed charges, and no minimum usage fees. Our competitive pricing model lets you start small and scale up as your needs increase. <span style=\"font-weight: bold; font-style: italic;\">Amazon Pinpoint Benefits</span> <span style=\"font-weight: bold;\">Powerful Segmentation</span> <span style=\"font-weight: bold;\">Powerful Application Analytics</span> Collect information about the users of your applications by integrating the AWS Mobile SDK into your application. Amazon Pinpoint will gather information about the ways in which your customers use your applications, as well as information about the devices they use, and any custom attributes that you define. <span style=\"font-weight: bold;\">Powerful Segmentation</span> <span style=\"font-weight: bold;\">Global Reach</span> Send messages to customers using the communication channels they prefer. You can send email to prospective customers, and send push notifications directly to users of your mobile applications. You can also send text messages to customers in over 200 countries around the world, from Afghanistan to Zimbabwe. <span style=\"font-weight: bold;\">Actionable Insights</span> <span style=\"font-weight: bold;\">Highly Reliable</span> Amazon Pinpoint runs on the highly reliable Amazon Web Services infrastructure. Multiple datacenters and redundant systems ensure the highest levels of availability. <span style=\"font-weight: bold;\">Multi-Channel Execution</span> <span style=\"font-weight: bold;\">Cost-Effective</span> Pay as you go, and pay only for what you use. There are no upfront fees, no fixed expenses, and no minimum charges. Target 1,000 customers, track 100 million app events, and send 1 million push notifications per month for free.","shortDescription":"Amazon Pinpoint - engage in meaningful conversations with your users using email, SMS, and mobile push","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":19,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon Pinpoint","keywords":"your, Amazon, customers, Pinpoint, they, applications, send, information","description":"Amazon Pinpoint makes it easy to engage your customers by tracking the ways in which they interact with your applications. You can then use this information to","og:title":"Amazon Pinpoint","og:description":"Amazon Pinpoint makes it easy to engage your customers by tracking the ways in which they interact with your applications. You can then use this information to","og:image":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png"},"eventUrl":"","translationId":1230,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1757,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IBM_LOGO.png","logo":true,"scheme":false,"title":"IBM Security Connect","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":223,"alias":"ibm-security-connect","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"Pick and choose security capabilities or unified solutions from IBM Security and partners. With embedded analytics from other sources, industries and organizations, uncover new risks and strengthen your security program. The result is effective security customized to your individual priorities, budget and needs.\r\n<ul><li>Gain total insights from all of your data, wherever it resides</li><li>Empower your team with unified solutions</li><li>Improve your security posture with collective intelligence</li></ul>\r\n<span style=\"font-weight: bold;\">Open Data integration</span>\r\nUnify disconnected security systems to improve your visibility and extract more value from your existing investments. Federate search across external data stores, threat intelligence and other cloud and on-premise security products to connect insights. Seamlessly share insights across products and apps. Leverage open standards and libraries to build custom applications.\r\n<span style=\"font-weight: bold;\">Simple Solutions and services</span>\r\nUse solutions integrated by design. With an intuitive and consistent user experience, seamlessly move between applications and consume only the capabilities you need. Effortlessly try and buy from an open catalog of pre-integrated apps from leading and innovative security companies.\r\n<span style=\"font-weight: bold;\">Connected Collective intelligence</span>\r\nLeverage analytics from a global community for personalized recommendations based on industry, program maturity and other factors. Benchmark your program against others and enrich your decisions via aggregated insights from peers.","shortDescription":"IBM Security Connect is a single platform, gather security data from across your existing tools and products. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM Security Connect","keywords":"your, from, security, insights, intelligence, program, other, with","description":"Pick and choose security capabilities or unified solutions from IBM Security and partners. With embedded analytics from other sources, industries and","og:title":"IBM Security Connect","og:description":"Pick and choose security capabilities or unified solutions from IBM Security and partners. With embedded analytics from other sources, industries and","og:image":"https://old.b4r.io/fileadmin/user_upload/IBM_LOGO.png"},"eventUrl":"","translationId":1758,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":71,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IBM_Security_QRadar_SIEM1.png","logo":true,"scheme":false,"title":"IBM Security QRadar SIEM","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":223,"alias":"ibm-security-qradar-siem","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"IBM® QRadar® SIEM consolidates log events and network flow data from thousands of devices, endpoints and applications distributed throughout a network. It normalizes and correlates raw data to identify security offenses, and uses an advanced Sense Analytics engine to baseline normal behavior, detect anomalies, uncover advanced threats, and remove false positives. As an option, this software incorporates IBM X-Force® Threat Intelligence which supplies a list of potentially malicious IP addresses including malware hosts, spam sources and other threats. IBM QRadar SIEM can also correlate system vulnerabilities with event and network data, helping to prioritize security incidents.\r\n<span style=\"font-weight: bold;\">IBM QRadar SIEM:</span>\r\n\r\n<ul>\r\n<li>Provides real-time visibility to the entire IT infrastructure for threat detection and prioritization.</li>\r\n<li>Reduces and prioritizes alerts to focus security analyst investigations on an actionable list of suspected, high probability incidents.</li>\r\n<li>Enables more effective threat management while producing detailed data access and user activity reports.</li>\r\n<li>Operates across on-premises and cloud environments.</li>\r\n<li>Produces detailed data access and user activity reports to help manage compliance.</li>\r\n<li>Offers multi-tenancy and a master console to help managed service providers provide security intelligence solutions in a cost-effective manner.</li>\r\n</ul>\r\n\r\n<span style=\"font-weight: bold;\">Provides real-time visibility</span>\r\n<ul>\r\n<li>Senses and detects inappropriate use of applications, insider fraud, and advanced low and slow threats that can be lost among millions of daily events.</li>\r\n<li>Collects logs and events from several sources including network assets, security devices, operating systems, applications, databases, and identity and access management products.</li>\r\n<li>Collects network flow data, including Layer 7 (application-layer) data, from switches and routers.</li>\r\n<li>Obtains information from identity and access management products and infrastructure services such as Dynamic Host Configuration Protocol (DHCP); and receives vulnerability information from network and application vulnerability scanners.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Reduces and prioritizes alerts</span>\r\n<ul>\r\n<li>Performs immediate event normalization and correlation for threat detection and compliance reporting.</li>\r\n<li>Reduces billions of events and flows into a handful of actionable offenses and prioritizes them according to business impact.</li>\r\n<li>Performs activity baselining and anomaly detection to identify changes in behavior associated with applications, hosts, users and areas of the network.</li>\r\n<li>Uses IBM X-Force Threat Intelligence optionally to identify activity associated with suspicious IP addresses, such as those suspected of hosting malware.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Enables more effective threat management</span>\r\n<ul>\r\n<li>Senses and tracks significant incidents and threats, providing links to all supporting data and context for easier investigation.</li>\r\n<li>Performs event and flow data searches in both real-time streaming mode or on a historical basis to enhance investigations.</li>\r\n<li>Enables the addition of IBM QRadar QFlow and IBM QRadar VFlow Collector appliances for deep insight and visibility into applications (such as enterprise resource management), databases, collaboration products and social media through deep packet inspection of Layer 7 network traffic.</li>\r\n<li>Detects off-hours or unusual use of an application or cloud-based service, or network activity patterns that are inconsistent with historical usage patterns.</li>\r\n<li>Performs federated searches throughout large, geographically distributed environments.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Delivers security intelligence in cloud environments</span>\r\n<ul>\r\n<li>Provides SoftLayer cloud installation capability.</li>\r\n<li>Collects events and flows from applications running both in the cloud and on-premises.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Produces detailed data access and user activity reports</span>\r\n<ul>\r\n<li>Tracks all access to customer data by username and IP address to ensure enforcement of data-privacy policies.</li>\r\n<li>Includes an intuitive reporting engine that does not require advanced database and report-writing skills.</li>\r\n<li>Provides the transparency, accountability and measurability to meet regulatory mandates and compliance reporting.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Offers multi-tenancy and a master console</span>\r\n<ul>\r\n<li>Allows managed service providers to cost-effectively deliver security intelligence using a single console to support multiple customers.</li>\r\n<li>Leverages either on-premises or cloud-based deployments.</li>\r\n</ul>\r\n","shortDescription":"IBM Security QRadar SIEM is an Security intelligence and Sense Analytics for protecting assets and information from advanced threats","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM Security QRadar SIEM","keywords":"data, network, security, from, access, applications, activity, QRadar","description":"IBM® QRadar® SIEM consolidates log events and network flow data from thousands of devices, endpoints and applications distributed throughout a network.","og:title":"IBM Security QRadar SIEM","og:description":"IBM® QRadar® SIEM consolidates log events and network flow data from thousands of devices, endpoints and applications distributed throughout a network.","og:image":"https://old.b4r.io/fileadmin/user_upload/IBM_Security_QRadar_SIEM1.png"},"eventUrl":"","translationId":91,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":30,"title":"UEBA - User and Entity Behavior Analytics"}],"testingArea":"","categories":[{"id":69,"title":"Business Analytics","alias":"","description":"Business intelligence (сокращённо BI) — это методы и инструменты для перевода необработанной информации в осмысленную, удобную форму. Эти данные используются для бизнес-анализа. Технологии BI обрабатывают большие объемы неструктурированных данных, чтобы найти стратегические возможности для бизнеса.\r\n\r\nЦель BI — интерпретировать большое количество данных, заостряя внимание лишь на ключевых факторах эффективности, моделируя исход различных вариантов действий, отслеживая результаты принятия решений.\r\n\r\nBI поддерживает множество бизнес-решений — от операционных до стратегических. Основные операционные решения включают в себя позиционирование продукта или цен. Стратегические бизнес-решения включают в себя приоритеты, цели и направления в самом широком смысле. BI наиболее эффективен, когда он объединяет данные, полученные из рынка, на котором работает компания (внешние данные), с данными из источников внутри компании, таких как финансовые и операции с данными (внутренние данные). В сочетании, внешние и внутренние данные дают полную картину бизнеса, которая, создает «интеллект» — быстрое понимание, которое не получить из простого набора данных.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Business_Intelligence","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/business-analytics.png"},{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"},{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[{"id":45,"title":"SIEM - Security Information and Event Management"}],"solutions":["Decentralized IT systems","No control over data access","Unaurthorized access to corporate IT systems and data","Malware infection via Internet, email, storage devices"],"materials":[],"useCases":[],"best_practices":[],"values":["Ensure Security and Business Continuity"],"implementations":[{"id":276,"title":"SureView Analytics for Arizona Financial Crimes Task Force","url":"https://old.b4r.io/vnedrenija/vnedrenie/sureview-analytics-for-arizona-financial-crimes-task-force/"}],"presenterCodeLng":"","productImplementations":[{"id":276,"title":"SureView Analytics for Arizona Financial Crimes Task Force","description":"The Arizona Financial Crimes Task Force (AZFCTF) was established to investigate and interdict the money laundering activities of complex national and international organized crime and to mitigate the violence associated with the smuggling activities that fund these organizations. In January 2014, the AZFCTF funded the creation of the Transaction Record Analysis Center (TRAC), a centralized searchable database of the financial transactions of global money services business (MSBs). TRAC now serves as the intelligence component for AZFCTF and is staffed by analyst and law enforcement professionals recognized as experts in money laundering activity. The TRAC provides data, meaningful data analysis, collaboration and training to investigators, analysts and prosecutors nationwide in their efforts to disrupt criminal organizations and dismantle their operations.\r\nChallenge\r\nTransnational criminals launder billions of dollars in illegal proceeds every year. In the Southwest Border-affected areas, over half-a-million humans are smuggled and prescription drugs, illegal drugs and intellectual property are stolen. Law enforcement agencies have been challenged to process and analyze an overwhelming amount of data that pertains to these operations. Parsing and finding the incriminating data in a vast sea of constantly expanding data sources became extremely difficult as the sheer volume of transaction data far exceeded the capability and volume capacity of typical database software. Due to the limitations and restrictions of the technology, transaction volume became the enemy, and it became harder and harder to detect money laundering patterns across the financial industry. A simple query involving multiple names, addresses or telephone numbers, for example, took hours or days to complete. Enforcement agencies were forced to invest a great deal of time searching through databases, sometimes containing millions of records each, for the suspicious activity they knew lurked among the data. In this timeframe, it was difficult to conceptualize money laundering patterns while remaining a few steps behind the criminals themselves.\r\nSolution\r\nAZFCTF needed a solution that could manage the huge volumes of data flowing into the TRAC, as well as deliver an easy-to-use analytical platform to law enforcement and regulatory users. Today, Forcepoint™ SureView® Analytics is providing AZFCTF with a turnkey analytical solution that is customized for the varied user community consisting of federal agents, analysts, state and local detectives as well as money services business regulators. For each of these stakeholders, SureView Analytics delivers complete management of the environment from data ingestion to delivery of actionable analytics. The TRAC portal offers a dashboard of easy-to-use analysis tools, training webinars and auditing functions. Through a secure private cloud, the solution avoids overhead expenses of on-site hosting, and offers scalability as needed. Queries can be returned in a matter of seconds instead of hours, which turns the increasing volume of data transactions from an enemy into an ally.\r\nResults\r\nThe SureView Analytics solution has been adopted by over 2,000 users and hosts over 100 Memorandums of Understanding (MOUs), making the TRAC a unique and unprecedented financial fraud investigative tool. Its value to the Southwest Border states and beyond is recognized daily by the number of law enforcement and regulatory agencies requesting MOUs from across the nation. The query result speed attained by today’s experienced TRAC user enables queries to be run in a timely manner, resulting in the recognition of critical activity patterns and the dismantling of criminal organizations. Additionally, the MSB data in the TRAC system is based on geographic organized crime smuggling corridors and contains more relevant data than what would be obtained in a traditional subpoena process. The data access enables investigators to geospatially visualize criminal corridors of illegal transactions, saving thousands of man hours and lengthy delays in the usual subpoena process. The TRAC system, by virtue of its MOU process and access to expert training, necessitates direct communication by law enforcement experts across the U.S. This unprecedented networking among anti-money laundering professionals creates effective multi-agency teams to attack money laundering patterns and methodologies.","alias":"sureview-analytics-for-arizona-financial-crimes-task-force","roi":0,"seo":{"title":"SureView Analytics for Arizona Financial Crimes Task Force","keywords":"data, TRAC, money, laundering, AZFCTF, enforcement, patterns, that","description":"The Arizona Financial Crimes Task Force (AZFCTF) was established to investigate and interdict the money laundering activities of complex national and","og:title":"SureView Analytics for Arizona Financial Crimes Task Force","og:description":"The Arizona Financial Crimes Task Force (AZFCTF) was established to investigate and interdict the money laundering activities of complex national and"},"deal_info":"","user":{},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/arizona-financial-crimes-task-force","title":"-"}},"comments":[],"referencesCount":0}]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}