{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"_type":"localeString","en":"Offer a reference bonus","ru":"Предложить бонус за референс"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Сonfigurator"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"en":"I use it","ru":"I use it","_type":"localeString"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"_type":"localeString","en":"Selling","ru":"Продают"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"show-more-button":{"_type":"localeString","en":"Show more","ru":"Показать еще"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"_type":"localeString","en":"manufacturer","ru":"производитель"},"short-description":{"_type":"localeString","en":"Pitch","ru":"Краткое описание"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"product-features":{"ru":"Особенности продукта","_type":"localeString","en":"Product features"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"solutions":{"_type":"localeString","en":" Problems that solves","ru":"Проблемы которые решает"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"testing":{"ru":"Тестирование","_type":"localeString","en":"Testing"},"compare":{"ru":"Сравнить с конкурентами","_type":"localeString","en":"Compare with competitors"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":" Characteristics"},"transaction-features":{"ru":"Особенности сделки","_type":"localeString","en":"Transaction Features"},"average-discount":{"ru":"Средняя скидка партнера","_type":"localeString","en":"Partner average discount"},"deal-protection":{"_type":"localeString","en":"Deal protection","ru":"Защита сделки"},"average-deal":{"_type":"localeString","en":"Average deal size","ru":"Средний размер сделки"},"average-time":{"en":"Average deal closing time","ru":"Средний срок закрытия сделки","_type":"localeString"},"login":{"ru":"Войти","_type":"localeString","en":"Login"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"to-know-more":{"ru":"Чтобы узнать больше","_type":"localeString","en":"To know more"},"scheme":{"en":" Scheme of work","ru":"Схема работы","_type":"localeString"},"competitive-products":{"_type":"localeString","en":" Competitive products","ru":"Конкурентные продукты"},"implementations-with-product":{"en":"Deployments with this product","ru":"Внедрения с этим продуктом","_type":"localeString"},"user-features":{"ru":"Особенности пользователей","_type":"localeString","en":"User features"},"job-roles":{"ru":"Роли заинтересованных сотрудников","_type":"localeString","en":" Roles of Interested Employees"},"organizational-features":{"ru":"Организационные особенности","_type":"localeString","en":"Organizational Features"},"calculate-price":{"ru":"Рассчитать цену продукта","_type":"localeString","en":" Calculate product price"},"selling-stories":{"ru":"Продающие истории","_type":"localeString","en":" Selling stories"},"materials":{"en":"Materials","ru":"Материалы","_type":"localeString"},"about-product":{"en":"About Product","ru":"О продукте","_type":"localeString"},"or":{"ru":"или","_type":"localeString","en":"or"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"ru":"Рассчитать ROI продукта","_type":"localeString","en":"Calculate Product ROI"},"complementary-categories":{"ru":"Схожие категории","_type":"localeString","en":"Complementary Categories"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"en":"Bonus","ru":"Бонус","_type":"localeString"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"configurator-content":{"ru":"Рассчитайте стоимость продукта","_type":"localeString","en":"Calculate price for this product here"},"configurator-link":{"ru":"тут","_type":"localeString","en":"here"},"vendor-popover":{"en":"vendor","ru":"производитель","_type":"localeString"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"en":"select product for presentation","ru":"выбрать продукт для презентации","_type":"localeString"},"auth-message":{"en":"You have to register or login.","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString"},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"ru":"Рассчитайте ROI для данного продукта","_type":"localeString","en":"Calculate ROI for this product here"},"not-yet-converted":{"en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString"},"videos":{"ru":"Видео","_type":"localeString","en":"Videos"},"vendor-verified":{"ru":"Подтверждено производителем","_type":"localeString","en":"Vendor verified"},"event-schedule":{"_type":"localeString","en":"Events schedule","ru":"Расписание событий"},"scheduling-tip":{"ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event."},"register-to-schedule":{"ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To register for the event please log in or register on the site."},"comparison-matrix":{"ru":"Матрица сравнений","_type":"localeString","en":"Comparison matrix"},"compare-with-competitive":{"ru":"Сравнить с конкурентными","_type":"localeString","en":" Compare with competitive"},"avg-deal-closing-unit":{"ru":"месяцев","_type":"localeString","en":"months"},"under-construction":{"en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString"},"product-presentation":{"en":"Product presentation","ru":"Презентация продукта","_type":"localeString"},"go-to-comparison-table":{"_type":"localeString","en":" Go to comparison table","ru":"Перейти к таблице сравнения"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"_type":"localeString","en":"Requests","de":"References","ru":"Мои запросы"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"title":{"ru":"ROI4CIO: Продукт","_type":"localeString","en":"ROI4CIO: Product"},"meta":[{"content":"website","name":"og:type"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Конкретный продукт","_type":"localeString","en":"Example product"}},{"translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"},"name":"og:description"},{"translations":{"ru":"Продукт","_type":"localeString","en":"Product"},"name":"title"},{"name":"description","translations":{"_type":"localeString","en":"Product description","ru":"Описание продукта"}},{"name":"keywords","translations":{"en":"Product keywords","ru":"Ключевые слова продукта","_type":"localeString"}}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"hideez-key-hk":{"id":1200,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Hideez.jpg","logo":true,"scheme":false,"title":"Hideez Key (HK)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"hideez-key-hk","companyTitle":"Hideez","companyTypes":["supplier","vendor"],"companyId":4073,"companyAlias":"hideez","description":"<span style=\"font-weight: bold;\">Hideez Key — Your Only Digital Key</span>\r\nHideez Key will become a daily companion to your computer, smartphone and tablet\r\nForget having to type passwords for apps, websites and services. Hideez Key will do it for you while\r\nsimply laying in your pocket. Your computer will ask for password if somebody tries accessing it\r\nwhile you are away and will wake automatically and log you in when you come back. You phone\r\nwon’t ask for passcode anymore, yet it will be securely protected from a stranger. Hideez Key can\r\nalso be used to open your home, garage and office doors as a single digital key using 125 kHz RFID\r\nfrequency (Em-Marine and HID compatible).\r\n<span style=\"font-weight: bold;\">Store Your Passwords in Your Pocket</span>\r\nStill spending time and effort to recall that important password? Hideez Key stores up to 1000\r\npasswords for your social networks, emails, cloud services and applications. Just press the button on\r\nyour Hideez Key or a hotkey on the keyboard of your computer to input your password\r\nautomatically. Try it, it looks like magic!\r\n<span style=\"font-weight: bold;\">Enjoy Convenient and Reliable Internet-Security</span>\r\nHave you considered that by using a ‘simple’ password for email, banking account or social network\r\nyou are risking your money and relations with the other people? Hideez Key allows using\r\ncomplicated passwords of any preferred length, which are difficult to brute force. And the good\r\nnews are that you don’t have to input these passwords from your keyboard all the time. Your\r\npasswords aren’t stored on your computer as well, so a hacker cannot intercept them from your\r\nphone, browser or a hard drive.\r\nYou might also consider using your Hideez Key as a second factor in two-factor authentication and to\r\ngenerate one time passwords for various applications.\r\n<span style=\"font-weight: bold;\">Let Your Smartphone Remind You When You Are About to Lose Something</span>\r\nPlace your Hideez Key in your bag and your smartphone will notify you when the signal is about to\r\nfade away together with your belongings. Even if that happens, you will be able to quickly locate\r\nyour Hideez Key (and the bag in which it is placed) on the digital map.\r\n<span style=\"font-weight: bold;\">Ready for the Internet of Things</span>\r\nMore connected devices are appearing every day. Hideez Key supports over the air updates and you\r\nwill be able to easily integrate it with your future devices and services.\r\n<span style=\"font-weight: bold;\">Remote Activation</span>\r\nWant to take a selfie with a friend or start recording a conversation without touching your\r\nsmartphone? Just press the multifunctional button on your Hideez Key and it will do the rest. Need\r\nan urgent help? Program the multifunctional button on your Hideez Key as your panic button to\r\nactivate alarm scenario on your smartphone. For example: your smartphone will send a message\r\nwith your current location to several trusted contacts from your address book. You can program any\r\nother alarm scenario with your Hideez Key.\r\n<span style=\"font-weight: bold;\">Opening Doors and Locks</span>\r\nHideez Key comes equipped with an RFID module, so it can be used as your RFID token for a modern\r\ndoor equipped with an RFID lock. You can copy the RFID credentials to your Hideez Key from your\r\nexisting RFID key or access card or ask your local access service provider to do this for you, or you\r\ncan add your Hideez Key to the access registry on your smart lock.\r\n<span style=\"font-weight: bold;\">Key Features</span>\r\n● Identify users to information systems.\r\n● Automatic locking/unlocking of the computer, tablet or smartphone.\r\n● External hardware password manager with automated password input that works for\r\napplications as well as for websites.\r\n● Theft alarm for valuables like wallet, purse or keychain.\r\n● Remote control for an user computer or smartphone using device button.\r\n● More useful features to be delivered wirelessly via over the air updates.\r\n<span style=\"font-weight: bold;\">The use of Hideez Key reduces human factor influence on Enterprise information security field. In</span>\r\n<span style=\"font-weight: bold;\">particular:</span>\r\n● To solve weak password problem\r\n● Employees don’t have to remember passwords.\r\n● Automatically lock PCs or apps when an user is away.\r\n● To turn on 2FA on public or corporate resources without complicating the routine users\r\nwork.\r\n● To provide Two-hardware factor authentication for users. To authorize, the user need two\r\ndevices: his/her PC and the Hideez Key.\r\n<span style=\"font-weight: bold;\">An appropriate control service Hideez Enterprise Server features:</span>\r\n● Eliminates control traffic between Hideez Keys and extranet. All the traffic routes are inside\r\nan enterprise perimeter.\r\n● Basic LDAP integration (e.g Active Directory)\r\n● End-to-end encrypted information channel between the control server and Hideez Key\r\nkeyfobs. Nobody can intercept user passwords.\r\n● Administrator can change, add and delete credentials in users keyfobs remotely.\r\n● Strong passwords and with the limited expiration term without user inconvenience.\r\n● Strong authorization by changing passwords to keys, which are unknown for users.\r\n<span style=\"font-weight: bold;\">Minimum system requirements</span>\r\nBluetooth 4.0, Windows 7 (an additional USB Bluetooth adapter is needed), Windows 8.1 +, MacOS\r\n10,11+, Android 4.4 or newer, iOS 9.3+.\r\n<span style=\"font-weight: bold;\">Specifications</span>\r\nModel: Hideez Key 1 (ST 101)\r\nProcessor: Nordic nRF51822\r\nRFID Module: ATMEL T5577\r\nRFID Standards: eM-Marin and HID on 125 kHz\r\nConnectivity: Bluetooth 4.0 and higher\r\nPower: CR2032 battery, up to 6 months in active mode.\r\nUser memory: 74 Kb\r\nLED Indicators: red and green\r\nButtons: 1 multi-functional button\r\nColor: black\r\nWeight: 9 grams (package weight is 44 grams)\r\nDimensions: 32,5 x 32,5 x 9 mm\r\nWarranty: 12 months\r\n<span style=\"font-weight: bold;\">What Is In the Box?</span>\r\n● Hideez Key\r\n● Quick Start Manual\r\n● Keychain\r\n● CR2032 battery (installed inside your Hideez Key)\r\n● Spare CR2032 battery\r\n● Hideez Safe application for Windows and Android is available for free from\r\nhttp://hideez.com\r\n","shortDescription":"Hideez Key is a universal identifier and storage of user credentials","type":"Hardware","isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":0,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Hideez Key (HK)","keywords":"your, device, Hideez, when, from, user, this, Safe","description":"Hideez Key — Your Only Digital Key\rHideez Key will become a daily companion to your computer, smartphone and tablet\rForget having to type passwords for apps,","og:title":"Hideez Key (HK)","og:description":"Hideez Key — Your Only Digital Key\rHideez Key will become a daily companion to your computer, smartphone and tablet\rForget having to type passwords for apps,","og:image":"https://old.b4r.io/fileadmin/user_upload/Hideez.jpg"},"eventUrl":"","translationId":1201,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":10000,"dealSizeCurrency":"USD","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the client data to the vendor to get a device (one or more) for testing","categories":[{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[{"id":259,"logoURL":"https://old.b4r.io/fileadmin/user_upload/DatAdvantage.png","logo":true,"scheme":false,"title":"DatAdvantage","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"datadvantage","companyTitle":"Varonis","companyTypes":["vendor"],"companyId":2319,"companyAlias":"varonis","description":"Take your file analysis and data security to the next level\r\n\r\nMonitor file activity and user behavior, prevent data breaches, and make permissions management and auditing a breeze.\r\n\r\nTake control of your data\r\n\r\nWe don’t just show you where sensitive data lives, we show you where it’s overexposed, who is accessing it, and how to lock it down. DatAdvantage will also identify stale data that is no longer accessed by actual humans – save disk space, lower cost and simplify your environment all at once.\r\n\r\nDatAdvantage uses machine learning and bi-directional cluster analysis to pinpoint users that have access to files they don’t need to do their job. It’s your single interface for managing permissions and security groups.\r\n\r\nSecure your data from the inside out\r\n\r\nVaronis performs User Behavior Analytics (UBA) to secure your data from the inside-out, using machine learning to find patterns and anomalous behavior to stop breaches before they happen.\r\n\r\nOur sophisticated threat models analyze behavior across multiple platforms and alert you to suspicious activity and potential data breaches. From CryptoLocker infections to compromised service accounts to disgruntled employees, we’ll detect and alert you on all sorts of abnormal user behavior.\r\nMonitor and analyze every single file touch\r\n\r\nMonitoring with DatAdvantage is non-intrusive and doesn’t require native auditing – making it easier than ever to perform security investigations, prove compliance, and find lost files.\r\n\r\nAutomatically detect and correct changes that don’t meet your organization’s change management policies. Satisfy many of the requirements prescribed by SOX, HIPAA, PCI, GLB, FERC/NERC, and more.\r\n","shortDescription":"DatAdvantage is a platform for tracking activity on file servers and user behavior, data loss prevention. Effective access control and auditing.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DatAdvantage","keywords":"data, your, behavior, DatAdvantage, security, don’t, breaches, that","description":"Take your file analysis and data security to the next level\r\rMonitor file activity and user behavior, prevent data breaches, and make permissions management","og:title":"DatAdvantage","og:description":"Take your file analysis and data security to the next level\r\rMonitor file activity and user behavior, prevent data breaches, and make permissions management","og:image":"https://old.b4r.io/fileadmin/user_upload/DatAdvantage.png"},"eventUrl":"","translationId":260,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":369,"title":"File Synchronization and Sharing Software","alias":"file-synchronization-and-sharing-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/file-sync.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":343,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SearchInform_Information_Security_Perimeter.png","logo":true,"scheme":false,"title":"Контур информационной безопасности SearchInform","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"kontur-informacionnoi-bezopasnosti-searchinform","companyTitle":"SearchInform","companyTypes":["vendor"],"companyId":2814,"companyAlias":"searchinform","description":"DLP-система «Контур информационной безопасности SearchInform» (КИБ) — решение, которое защитит бизнес в несколько шагов:\r\n\r\nВозьмет под контроль информационные потоки.\r\nИсследует содержимое всех переписок и отправлений.\r\nОповестит о нарушениях политик безопасности.\r\nПоможет провести расследование и предупредить утечку.\r\nСистема работает на двух уровнях: контролирует данные, которые уходят в Интернет и следит за тем, что происходит на компьютерах работников. Это позволяет КИБ SearchInform защищать компанию 24 часа в сутки как внутри офиса, так и в случаях, когда сотрудники отправляются в командировки или работают из дома.\r\n\r\nЧто контролирует?\r\n\r\nEmail-переписку.\r\nГолосовые и текстовые сообщения, а также переданные файлы (Skype, Viber, ICQ и др.).\r\nИнформацию, отправленную на облачные сервисы или принятую с них (Cloud).\r\nПосты на форумах и комментарии в блогах.\r\nВнешние устройства (флешки, жесткие, CD- и DVD-диски).\r\nДокументы, отправленные на печать.\r\nСистема в режиме реального времени анализирует все информационные потоки и сообщает об инцидентах. КИБ хранит всю перехваченную информацию и позволяет восстановить детали, если возникает необходимость расследования.\r\n\r\nКакие задачи решает?\r\n\r\nЗащищает от убытков, связанных с утечками информации.\r\nРазоблачает мошеннические схемы и саботаж.\r\nСтимулирует соблюдение трудовой дисциплины и рабочего регламента.\r\nПомогает повысить продуктивность служащих.\r\nВыявляет связи между сотрудниками и внешним миром, помогает проводить расследования.\r\nПозволяет управлять лояльностью коллектива и выявлять негатив.\r\nКонтролирует расход ресурсов организации.\r\nВыполняет требования регуляторов.\r\nУпрощает процесс инвентаризации оборудования и мониторинга ПО.\r\nКонтур информационной безопасности «SearchInform» используется в более чем 1650 компаниях России, Украины, Беларуси, Казахстана, Иордании и Польши. Узнайте подробнее о том, как работает система.","shortDescription":"DLP-система «Контур информационной безопасности SearchInform» (КИБ) — решение, которое защитит вас, контролирует данные, которые уходят в Интернет и следит за тем, что происходит на компьютерах работников.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Контур информационной безопасности SearchInform","keywords":"SearchInform, безопасности, Контур, информационной, потоки, Система, работает, контролирует","description":"DLP-система «Контур информационной безопасности SearchInform» (КИБ) — решение, которое защитит бизнес в несколько шагов:\r\rВозьмет под контроль информационные","og:title":"Контур информационной безопасности SearchInform","og:description":"DLP-система «Контур информационной безопасности SearchInform» (КИБ) — решение, которое защитит бизнес в несколько шагов:\r\rВозьмет под контроль информационные","og:image":"https://old.b4r.io/fileadmin/user_upload/SearchInform_Information_Security_Perimeter.png"},"eventUrl":"","translationId":2371,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":344,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SearchInform_Information_Security_Perimeter.png","logo":true,"scheme":false,"title":"SearchInform Information Security Perimeter","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"searchinform-information-security-perimeter","companyTitle":"SearchInform","companyTypes":["vendor"],"companyId":2814,"companyAlias":"searchinform","description":"SearchInform Information Security Perimeter\r\n\r\n<span style=\"font-weight: bold;\">Omni-Channel Protection</span>\r\nPlace all information flows under control\r\nCapture and analyze the contents of all communications and transmitted files\r\nDefine and enforce consistent security policies throughout your ecosystem\r\nGet alerts about breaches of the security policies\r\nInvestigate and prevent the breaches with the help of retrospective analysis capabilities\r\nThe system operates at two levels: controls the data outgoing to the Internet and monitors the events on work stations, including the laptops used outside of corporate network, when employees go on business trips or work from home.\r\n\r\n<span style=\"font-weight: bold;\">Monitoring</span>\r\nEmail communications\r\nVoice and text messages as well as files (sent via Skype, Viber, ICQ, and others)\r\nData transferred to/from cloud storage services\r\nPosts and comments on web forums and blogs\r\nExternal devices (flash drives, hard drives, CDs and others)\r\nDocuments sent to printers\r\nThe system performs real-time inspection of all information flows and alerts about suspicious events. SISP stores all captured data and lets you reconstruct details should an investigation be required.\r\n\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\nMitigate the risks pertaining to data leaks\r\nManage employee loyalty and positive attitude\r\nPrevent fraud, kickbacks, sabotage and other harmful activities\r\nEncourage adherence to code of conduct\r\nImprove productivity\r\nControl corporate expenses\r\nSimplify hardware and software inventory tracking\r\nSISP is used by over 1650 companies in Russia, Ukraine, Belarus, Kazakhstan, Jordan, and Poland. Find out more about how our solution works.","shortDescription":"SearchInform Information Security Perimeter is an Omni-Channel Protection. \r\nThe system operates at two levels: controls the data outgoing to the Internet and monitors the events on work stations, including the laptops used outside of corporate network, when employees go on business trips or work from home.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SearchInform Information Security Perimeter","keywords":"data, about, system, drives, breaches, SISP, policies, alerts","description":"SearchInform Information Security Perimeter\r\rOmni-Channel Protection\rPlace all information flows under control\rCapture and analyze the contents of all","og:title":"SearchInform Information Security Perimeter","og:description":"SearchInform Information Security Perimeter\r\rOmni-Channel Protection\rPlace all information flows under control\rCapture and analyze the contents of all","og:image":"https://old.b4r.io/fileadmin/user_upload/SearchInform_Information_Security_Perimeter.png"},"eventUrl":"","translationId":344,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1184,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Secure_Bank.png","logo":true,"scheme":false,"title":"Group-IB Secure Bank","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"group-ib-secure-bank","companyTitle":"Group-IB","companyTypes":["supplier","vendor"],"companyId":4067,"companyAlias":"group-ib","description":"<ul><li>Quick and straightforward integration, that doesn't slow down your website </li><li>Fraud prevention at early stages of attempted execution </li><li>Secure banking solution with advanced fraud detection techniques</li><li>Top-tier functionality and incident reporting features </li><li>API for integration with your fraud monitoring systems </li><li>Analytics and consulting by Group-IB experts</li></ul>\r\nSecure Bank controls risks related to <span style=\"white-space:pre\">\t</span>the weakest link in banking cyber security — your clients.\r\n\r\nWhile your customers do not need to <span style=\"white-space:pre\">\t</span>install any software, Secure Bank offers financial fraud prevention and detection, guarding them against:\r\n<ul><li>Malicious injections in Internet payment systems</li><li>Phishing attacks, social engineering attacks</li><li>Unsanctioned remote connection and e‑banking transactions</li><li>Malicious code for online banking fraud that involves making automatic payments or using false account details</li><li>Employing zero-day vulnerabilities to <span style=\"white-space: pre;\">\t</span>run malicious software and intrusions</li></ul>\r\n<span style=\"font-weight: bold;\">How Secure Bank ensures online banking safety</span>\r\n<ul><li>Secure Bank mitigates online banking risks for your customers, running alongside existing IT systems. No need to <span style=\"white-space: pre;\">\t</span>have it installed on your customers’ devices.</li><li>The script does not slow down the operation of your website.</li><li>Secure Bank takes a proactive stand to ensure fraud prevention and detection, screening operations for any sign of malicious activities.</li><li>Collected information goes from your bank’s IT systems to Secure Bank.</li><li>No personal data are collected, transmitted or stored.</li><li>Group-IB experts are up-to-date with the latest cyber threats to the banking industry in order to properly break down and rate the collected data.</li></ul>\r\nSecure Bank sends immediate notifications of online fraud or suspicious e‑banking transactions, allowing you to offset their consequences. Secure Bank can be integrated with your organization’s anti-fraud software and existing IT infrastructure to ensure an even faster response to online banking frauds.","shortDescription":"Innovative solution for secure online payments\r\nFinancial fraud prevention and detection to better protect your customers\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Group-IB Secure Bank","keywords":"Secure, your, Bank, banking, fraud, online, with, software","description":"Quick and straightforward integration, that doesn't slow down your website Fraud prevention at early stages of attempted execution Secure banking","og:title":"Group-IB Secure Bank","og:description":"Quick and straightforward integration, that doesn't slow down your website Fraud prevention at early stages of attempted execution Secure banking","og:image":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Secure_Bank.png"},"eventUrl":"","translationId":1185,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"},{"id":52,"title":"SaaS - software as a service","alias":"saas-software-as-a-service","description":"SaaS (англ. software as a service — программное обеспечение как услуга; также англ. software on demand — программное обеспечение по требованию) — одна из форм облачных вычислений, модель обслуживания, при которой подписчикам предоставляется готовое прикладное программное обеспечение, полностью обслуживаемое провайдером. Поставщик в этой модели самостоятельно управляет приложением, предоставляя заказчикам доступ к функциям с клиентских устройств, как правило через мобильное приложение или веб-браузер.\r\n\r\nОсновное преимущество модели SaaS для потребителя услуги состоит в отсутствии затрат, связанных с установкой, обновлением и поддержкой работоспособности оборудования и работающего на нём программного обеспечения.\r\n\r\nВ модели SaaS:\r\n\r\nприложение приспособлено для удаленного использования;\r\nодним приложением пользуется несколько клиентов (приложение коммунально);\r\nоплата взимается либо в виде ежемесячной абонентской платы, либо на основе объёма операций;\r\nтехническая поддержка приложения включена в оплату;\r\nмодернизация и обновление приложения происходит оперативно и прозрачно для клиентов.\r\nКак и во всех формах облачных вычислений, заказчики платят не за владение программным обеспечением как таковым, а за его аренду (то есть за его использование через мобильное приложение или веб-интерфейс). Таким образом, в отличие от классической схемы лицензирования программного обеспечения, заказчик несет сравнительно небольшие периодические затраты, и ему не требуется инвестировать значительные средства в приобретение прикладной программы и необходимых программно-платформенных и аппаратных средств для его развёртывания, а затем поддерживать его работоспособность. Схема периодической оплаты предполагает, что если необходимость в программном обеспечении временно отсутствует, то заказчик может приостановить его использование и заморозить выплаты разработчику.\r\n\r\nС точки зрения разработчика некоторого проприетарного программного обеспечения модель SaaS позволяет эффективно бороться с нелицензионным использованием программного обеспечения, поскольку программное обеспечение как таковое не попадает к конечным заказчикам. Кроме того, концепция SaaS часто позволяет уменьшить затраты на развёртывание и внедрение систем технической и консультационной поддержки продукта, хотя и не исключает их полностью.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SaaS","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/cloud_computing2__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1186,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Secure_Portal.png","logo":true,"scheme":false,"title":"Group-IB Secure Portal","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"group-ib-secure-portal","companyTitle":"Group-IB","companyTypes":["supplier","vendor"],"companyId":4067,"companyAlias":"group-ib","description":"<ul><li>Prevent personal information leakage and bank card data theft </li><li>Detect purchases paid by stolen cards or comparative advertisement misleading customers, and other fraud </li><li>Develop a unique fingerprint for each user in real-time</li><li>No installation or investments in IT infrastructure required </li><li>Real time API for integration with fraud monitoring systems Analytical support and consulting by Group-IB specialists</li></ul>\r\n<span style=\"font-weight: bold;\">What is Secure Portal</span>\r\n<ul><li>Secure Portal enables businesses to control risks related to the weakest link in the Internet business security chain – website users. Secure Portal detects fraud preparation and attempts in real-time without installation of any additional software on client devices to identify the following groups of threats:</li><li>Unsanctioned access and use of sensitive or confidential information</li><li>Bank card data collection and stolen card use</li><li>Phishing attacks, social engineering attack methods</li><li>Unsanctioned remote connection to a consumer’s device using their indicators to conduct transactions on his/her behalf</li><li>New types of fraud committed on the client side</li></ul>\r\n<span style=\"font-weight: bold;\">Secure Portal benefits</span>\r\n<ul><li>E-commerce</li><li>Reduce the number of account credentials stolen by cyber criminals</li><li>Reduce financial loss caused by rivals’ launching comparative advertising on online store pages</li><li>Reduce the number of chargebacks from stolen bank cards being used</li><li>Corporate portals</li><li>Prevention of confidential data leakage</li><li>Block unsanctioned access to confidential information</li><li>Prevent financial and reputational losses</li><li>Paid subscription services</li><li>Protect revenues from joint use of paid subscriptions</li><li>Prevention of stolen website authorization data use</li><li>Reduction in chargebacks by preventing the use of compromised credit cards</li></ul>\r\n","shortDescription":"Personal data security and fraud protection for your customers\r\nAn innovative solution for websites, e‑commerce platforms, and paid subscription services","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Group-IB Secure Portal","keywords":"stolen, Secure, Portal, data, confidential, fraud, cards, card","description":"Prevent personal information leakage and bank card data theft Detect purchases paid by stolen cards or comparative advertisement misleading customers, and","og:title":"Group-IB Secure Portal","og:description":"Prevent personal information leakage and bank card data theft Detect purchases paid by stolen cards or comparative advertisement misleading customers, and","og:image":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Secure_Portal.png"},"eventUrl":"","translationId":1187,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1207,"logoURL":"https://old.b4r.io/fileadmin/user_upload/digital_guardian.png","logo":true,"scheme":false,"title":"Digital Guardian Data Protection Platform","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"digital-guardian-data-protection-platform","companyTitle":"Digital Guardian","companyTypes":["supplier","vendor"],"companyId":4080,"companyAlias":"digital-guardian","description":"PLATFORM COMPONENTS\r\nDG ANALYTICS & REPORTING CLOUD (ARC)\r\nThe big data advanced analytics and reporting cloud service that powers the DG Platform. Information security analysts, incident responders and threat hunters can detect and respond to threats faster and more efficiently regardless of the threat.\r\nDG SOLUTIONS\r\nSolutions that meet essential use cases such as insider threat protection, data compliance, IP protection, enterprise data visibility and advanced threat protection.\r\nDG Data Discovery – visibility and auditing of potentially unsecured data\r\nDG Data Classification – the most comprehensive classification – content, context and user-based\r\nDG Network DLP – stops sensitive data from leaving your network\r\nDG Endpoint DLP – stops data loss by securing endpoints\r\nDG Cloud Data Protection – stops loss of data in cloud applications such as Office 365\r\nDG Endpoint Detection and Response – detect, investigate, and mitigate suspicious activities and behaviors at the endpoint\r\nDG INTEGRATIONS\r\nDigital Guardian has developed custom applications and leverages APIs to integrate with the security products you already own.\r\nDG MANAGED SERVICES\r\nDG Managed Security Programs (MSPs) can extend the capability of your team. Our security experts will host, administer and run your threat aware data protection program. These 24*7 global analyst teams will help you contain insider and outsider threats before sensitive data gets out of your organization.\r\nWHY DIGITAL GUARDIAN\r\nCLOUD SERVICES ARCHITECTURE THAT PROTECTS SENSITIVE DATA FROM ALL THREATS\r\nTraditional DLP is only focused on policy enforcement and detection of anomalous insider activity. The amount of data produced and the tools required to analyze external threats presents a challenge to traditional DLP architectures.\r\nThat’s why we developed a cloud services security platform that meets the requirements of both DLP and advanced threat detection and response use cases. Our design encompasses new database technologies for very large storage and query requirements, analytic engines for automated threat detection, and new UI elements and workflows to drive incident response and investigations.\r\n","shortDescription":"Digital Guardian Data Protection Platform is The First and Only Solution that Provides Data Protection from ALL THREATS. Leveraging our new DG ARC cloud service, the DG Data Protection Platform detects threats and stops data exfiltration from both well-meaning and malicious insiders as well as external adversaries. By converging DLP and endpoint detection and response, you have one less endpoint agent to manage and one less console to monitor. Our platform puts your most sensitive information assets at the center of all data protection, activity monitoring and threat prevention, detection and response activities.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Digital Guardian Data Protection Platform","keywords":"data, threat, security, your, protection, Data, threats, cloud","description":"PLATFORM COMPONENTS\rDG ANALYTICS & REPORTING CLOUD (ARC)\rThe big data advanced analytics and reporting cloud service that powers the DG Platform.","og:title":"Digital Guardian Data Protection Platform","og:description":"PLATFORM COMPONENTS\rDG ANALYTICS & REPORTING CLOUD (ARC)\rThe big data advanced analytics and reporting cloud service that powers the DG Platform.","og:image":"https://old.b4r.io/fileadmin/user_upload/digital_guardian.png"},"eventUrl":"","translationId":1208,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1217,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Tenable_SecurityCenter_R_.png","logo":true,"scheme":false,"title":"Tenable SecurityCenter®","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"tenable-securitycenterr","companyTitle":"Tenable (Cyber Exposure)","companyTypes":["supplier","vendor"],"companyId":4084,"companyAlias":"tenable-cyber-exposure","description":"<span style=\"font-weight: bold;\">Advanced Analytics</span>\r\nConsolidate and analyze all vulnerability data gathered from multiple Nessus® scanners distributed across your enterprise. Use Assurance Report Cards (ARCs) to measure, analyze and visualize your security program and evaluate program effectiveness.\r\n<span style=\"font-weight: bold;\">Reporting and Dashboards</span>\r\nLeverage pre-built, highly customizable HTML5-based dashboards and reports. Quickly give CISOs, security managers, analysts and practitioners the visibility and context they need to take decisive action to reduce exposure and risk.\r\n<span style=\"font-weight: bold;\">Alerts and Notifications</span>\r\nUtilize customizable alerts, notifications and actions to enable rapid response. Quickly alert administrators to high-priority security events, speed up incident response and vulnerability remediation, and reduce overall risk.\r\n<span style=\"font-weight: bold;\">Asset Grouping and Assessment</span>\r\nDynamically group assets based on policies to obtain a near real-time view into overall risk when new vulnerabilities are discovered. Speed mitigation by identifying how many assets are affected by new vulnerabilities in minutes instead of days, and easily see remediation progress.\r\n<span style=\"font-weight: bold;\">Compliance</span>\r\nUse pre-defined checks against industry standards and regulatory mandates, such as CIS benchmarks, DISA STIG, FISMA, PCI DSS, HIPAA/HITECH, SCAP and more. Get the visibility and context you need to easily demonstrate adherence to multiple compliance initiatives.\r\n<span style=\"font-weight: bold;\">Integrations</span>\r\nUtilize intelligent connectors to integrate with leading solutions in patch management, mobile device management, threat intelligence, cloud and more. Integrations leverage existing security investments to provide additional data and improve visibility, context and analysis.","shortDescription":"SecurityCenter® consolidates and evaluates vulnerability data across your organization, prioritizing security risks and providing a clear view of your security posture. With SecurityCenter’s pre-built, highly customizable dashboards and reports, and the industry’s only Assurance Report Cards® (ARCs), you can visualize, measure and analyze the effectiveness of your security program.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Tenable SecurityCenter®","keywords":"security, visibility, context, risk, Integrations, easily, overall, customizable","description":"Advanced Analytics\rConsolidate and analyze all vulnerability data gathered from multiple Nessus® scanners distributed across your enterprise. Use Assurance","og:title":"Tenable SecurityCenter®","og:description":"Advanced Analytics\rConsolidate and analyze all vulnerability data gathered from multiple Nessus® scanners distributed across your enterprise. Use Assurance","og:image":"https://old.b4r.io/fileadmin/user_upload/Tenable_SecurityCenter_R_.png"},"eventUrl":"","translationId":1218,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":963,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Garda_BD.jpg","logo":true,"scheme":false,"title":"Гарда БД","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"garda-bd","companyTitle":"MFI Soft","companyTypes":["supplier","vendor"],"companyId":1801,"companyAlias":"mfi-soft","description":"Безопасность баз данных под контролем\r\n\r\n \r\n«Гарда БД» обеспечивает тотальную защиту различных баз данных и бизнес-приложений из единого интерфейса.\r\n\r\nМногоуровневый анализ сетевого трафика выявит неконтролируемые базы данных, уязвимости в комплексе СУБД и подозрительные действия пользователей баз данных. \r\n\r\nИнтеллектуальная система отчетности сделает расследование инцидентов простым и быстрым. \r\n\r\n \r\nПрофессиональный подход к защите\r\n\r\nПовышение уровня защищенности баз данных и веб-приложений.\r\nКонтроль администраторов и привилегированных пользователей.\r\nОповещение о попытках доступа (неудачные авторизации к базам данных, ошибки доступа).\r\nМониторинг неправомочных обращений к базам данных в режиме реального времени.\r\nСканирование и выявление уязвимостей СУБД.\r\nХранение всех запросов и ответов баз данных для ретроспективного анализа.\r\nОбеспечение соответствия требованиям законодательства, отраслевых стандартов и международных соглашений (СТО БР ИББС, PCI DSS, 152-ФЗ, 161-ФЗ, П-1119, 382-П, PCI DSS, Basel ll, SOX и пр.)\r\nПреимущества\r\n\r\n\r\nКонтроль нескольких баз данных из единого центра управления\r\n\r\nОбнаружение неконтролируемых баз данных и классификация по содержимому\r\n\r\nХранение ответов и запросов пользователей и приложений, ретроспективный анализ за любой период\r\n\r\nДиагностика состояния СУБД, оповещение о неустановленных патчах и уязвимостях\r\n\r\nБолее 70 предустановленных шаблонов для выявления аномалий\r\n\r\nКонтроль интернет-обращений к базам-данных через веб-приложения\r\n\r\nАнализ десятков Тб за секунды\r\n\r\nЛегкая масштабируемость\r\n\r\nМинимальное влияние на производительность сети и серверов СУБД\r\nФункциональные возможности\r\n\r\nПоддерживаемые СУБД\r\n\r\n• Oracle\r\n• Microsoft SQL\r\n• MySQL\r\n• PostgreSQL\r\n• Teradata\r\n• Sybase ASE\r\n• IBM Netezza\r\n• IBM DB2\r\n• Линтер\r\n• Apache Cassandra\r\n\r\nКонтроль веб-приложений\r\n\r\n• SAP Business Object\r\n• Microsoft Dynamics CRM\r\n• Веб-формы\r\n• Гибкие настройки для работы с другими бизнес-приложениями на основе HTTP(s)-протоколов\r\n\r\nИнтеллектуальные алгоритмы поиска\r\n\r\n• Контентный - по запросам, ответам и переменным;\r\n• Атрибутивный - по IP-адресам, учетным записям, текстам ошибок и т.д;\r\n• Поиск неконтролируемых баз данных в сети предприятия;\r\n• Классификация баз данных по типу содержимого.\r\n\r\nКлассификация баз данных\r\n• Сканирование баз данных на наличие конфиденциальной информации, номеров кредитных карт, ИНН и т.п.\r\n• Регулярное отслеживание новых баз данных или изменения контролируемых\r\n\r\nСпособы защиты\r\n\r\nПассивный режим (мониторинг). Система не оказывает влияния на работу баз данных, так как работает с копией трафика (SPAN).\r\nКонтроль локальных обращений на сервере баз данных с помощью агентского ПО. Увеличение времени выполнения локальных клиентских запросов не превышает 5% в пиковую нагрузку.\r\nАктивная защита. Для блокировки нежелательных действий пользователей баз данных используется сетевой экран\r\nГибкое формирование политик\r\n\r\nИмя пользователя в базе данных и имя пользователя в ОС\r\nКонтроль обращений к регулярным выражениям (номер карты, ИНН и др.)\r\nСетевые параметры: ip-адрес (хоста, подсети), порт, диапазон адресов\r\nОбъем данных ответа\r\nКоличество записей в ответе\r\nКонтроль неявных обращений\r\nНазвание используемого клиентского приложения\r\nЗапрашиваемые/передаваемые поля таблицы, синонима, представления\r\nКлючевое слово (поиск в запросах, ответах и переменных)\r\nТип SQL-команды\r\nОбъекты БД: функция, поля, таблица\r\nПросмотр "сырых" данных\r\n\r\nВысокоэффективное хранение всего трафика объемом до 100 Тб и быстрый критериальный и полнотекстовый поиск информации позволяют анализировать данные за любой период времени вне зависимости от того, учтены они в политиках или нет. Данные хранятся в обезличенном виде благодаря технологии маскирования.\r\n\r\nПроизводительность\r\n\r\nМониторинг баз данных происходит в режиме реального времени. Система адаптирована для обработки входящего трафика на высоких скоростях.\r\n\r\nУведомление о событии\r\n• SIEM\r\n• e-mail\r\n• отчет на главном экране\r\n\r\nСканирование на уязвимости\r\nТесты уязвимости определяют:\r\n\r\n• незаблокированные учетные записи;\r\n• неустановленные патчи;\r\n• учетные записи с простыми паролями;\r\n• активность системных учетных записей других приложений;\r\n• атаки по подбору учетных записей или названий таблиц.\r\n","shortDescription":"Аппаратно-программный комплекс класса DAM (Database Activity Monitoring - система аудита сетевого доступа к базам данных), который выявляет возможные утечки информации и повышает надежность защиты баз данных. Система проводит мониторинг обращений к базам данных в режиме реального времени и выявляет подозрительные операции.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Гарда БД","keywords":"данных, Контроль, СУБД, пользователей, времени, трафика, обращений, записей","description":"Безопасность баз данных под контролем\r\r \r«Гарда БД» обеспечивает тотальную защиту различных баз данных и бизнес-приложений из единого интерфейса.\r","og:title":"Гарда БД","og:description":"Безопасность баз данных под контролем\r\r \r«Гарда БД» обеспечивает тотальную защиту различных баз данных и бизнес-приложений из единого интерфейса.\r","og:image":"https://old.b4r.io/fileadmin/user_upload/Garda_BD.jpg"},"eventUrl":"","translationId":2608,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":303,"logoURL":"https://old.b4r.io/fileadmin/user_upload/UserGate_Proxy___Firewall.png","logo":true,"scheme":false,"title":"UserGate Proxy & Firewall","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"usergate-proxy-firewall","companyTitle":"Entensys","companyTypes":["vendor"],"companyId":2811,"companyAlias":"entensys","description":"Control Internet Access. Protect from Advanced Threats.\r\nUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe.\r\n\r\nNetwork Firewall, IDPS, and Router\r\nEnforce uninterrupted connectivity, network access controls, and regulate Internet traffic.\r\nKeep viruses, worms, Trojans, and spyware from infesting your network.\r\nGuarantee the bandwidth levels required to serve business-critical applications.\r\nMonitoring User Internet Activity\r\n\r\nControl access to websites and enforce any reasonable corporate policy.\r\nLink the headquarters to remote users and branch offices through a Secure VPN connection\r\nProduct Overview\r\nUserGate Proxy & Firewall is an all-in-one gateway security solution combining a network firewall, router, gateway antivirus, intrusion detection and prevention (IDPS), VPN server, web filtering, reporting and statistics and other important functions. It allows you to manage network traffic, optimize bandwidth, and provide Internet access control.\r\n\r\nHow does it work?\r\nUserGate Proxy & Firewall can be installed on any Windows-based machine and works as a web security gateway. It provides Internet access sharing, web security, and traffic management. UserGate works basing on user account and applicable policies. The product lets administrators control traffic flow and trace web pages visited by employees. Numerous policies can be used to grant or restrict access to specific website categories, control downloads or application use, set traffic quotas, and keep detailed statistics.\r\n","shortDescription":"UserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"UserGate Proxy & Firewall","keywords":"access, Internet, Firewall, UserGate, traffic, network, Proxy, security","description":"Control Internet Access. Protect from Advanced Threats.\rUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous","og:title":"UserGate Proxy & Firewall","og:description":"Control Internet Access. Protect from Advanced Threats.\rUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous","og:image":"https://old.b4r.io/fileadmin/user_upload/UserGate_Proxy___Firewall.png"},"eventUrl":"","translationId":304,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":490,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SecureTower.jpg","logo":true,"scheme":false,"title":"SecureTower","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"securetower","companyTitle":"Falcongaze","companyTypes":["supplier","vendor"],"companyId":2942,"companyAlias":"falcongaze","description":"SecureTower multifunctional tools allow to control data flows of a company and prevent theft of confidential data and accidental data leaks. It is possible due to monitoring the maximum possible number of channels of business communication. It is worth noting that SecureTower can operate in passive and active protection modes, if necessary, blocking the sending and placing messages that contain critical information into quarantine.\r\n\r\nNot only is capable integrated approach in SecureTower of data leak prevention but also helps to improve the working process. The means of employee activities control will help you to improve staff performance, simplify target setting and assist to HR managers.\r\n\r\nThe SecureTower system comprises the functionality of employee monitoring software, which includes capturing of network traffic, performance tracking, working time control, correspondence interception, including e-mail and instant messengers.\r\n\r\nWhat is more, SecureTower generates graphical statistical reports based on the intercepted data where detailed information is represented on what applications have been used by employees during working day, what documents have been sent (and it is possible to instantly open and view a particular document), how many web sites have been visited and how much time has been spent there. In addition, SecureTower automatically takes desktop screenshots at a predetermined interval of time, allowing you to objectively evaluate all processes in the company.\r\n\r\nSecureTower is a software solution that allows to investigate incidents in retrospective and prevent them in advance.\r\n\r\nControlled data:\r\n\r\ne-mail messages sent via POP3, SMTP, IMAP and MAPI protocols (MS Outlook, Thunderbird, The Bat!), MS Exchange Server, IBM Lotus Notes/Domino, Kerio Connect, Sendmail, hMailServer and other mail servers;\r\nweb traffic including e-mail messages of external mail clients (such as gmail.com, yahoo.com, hotmail.com, etc.), forum messages and posts, traffic in social networks and other web services;\r\ne-mail messages sent and received via cloud service Microsoft Office 365;\r\nconversations in instant messengers using OSCAR (ICQ/AIM), XMPP (Jabber) (Miranda, Google Talk, QIP Infium, PSI), YIM (Yahoo! Messenger), SIP, as well as text and voice messages in Skype, Viber, MS Lync;\r\nfiles transferred via FTP, FTPS, HTTP and HTTPS protocols, in instant messengers, as well as mail attachments;\r\nHTTP and HTTPS traffic sent via ICAP protocol from corporate proxy server;\r\nSSL traffic transmitted over encrypted protocols (including HTTPS, FTPS, with encrypted SSL for POP3, SMTP and messengers etc.);\r\nMS SQL Server, Oracle, PostgreSQL, SQLite and MySQL database contents;\r\ndata transferred to external devices (USB storage devices, WiFi-and GPRS modems, external hard drives etc.);\r\ninformation sent to network drives of computers and terminal servers;\r\ndocuments printed out;\r\nthe registration of keystrokes on the keyboard (keylogger);\r\nIP telephony (text and voice messages on the protocol SIP);\r\ntextual and numerical information that is copied to clipboard;\r\nremote recording from microphones, built-in or connected to workstations;\r\ncontrol of information in images.","shortDescription":"SecureTower is the software created especially for solving information security issues and control of work processes.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SecureTower","keywords":"SecureTower, data, messages, traffic, information, sent, been, messengers","description":"SecureTower multifunctional tools allow to control data flows of a company and prevent theft of confidential data and accidental data leaks. It is possible due","og:title":"SecureTower","og:description":"SecureTower multifunctional tools allow to control data flows of a company and prevent theft of confidential data and accidental data leaks. It is possible due","og:image":"https://old.b4r.io/fileadmin/user_upload/SecureTower.jpg"},"eventUrl":"","translationId":491,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":150,"title":"Workforce Performance Management","alias":"workforce-performance-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/employee-performance-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":834,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Protection_-_Advanced_Suite.jpg","logo":true,"scheme":false,"title":"McAfee Endpoint Protection — Advanced Suite","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-endpoint-protection-advanced-suite","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"Обеспечение всесторонней защиты конечных точек\r\nВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от вредоносных программ в режиме реального времени позволяют блокировать вирусы, троянских коней, червей, рекламные, шпионские и другие потенциально нежелательные программы.\r\nОбеспечение безопасности и нормативно-правового соответствия систем\r\nИспользование централизованного механизма управления и аудита на основе политик позволяет повысить надежность защиты.\r\nОбеспечение комплексного контроля над устройствами\r\nМониторинг и ограничение копирования данных на съемные устройства и носители позволяет упреждать утечки данных и обеспечивать сохранность конфиденциальной информации.\r\nСкорость и легкость развертывания\r\nНаличие единой консоли централизованного управления позволяет устанавливать средства защиты за считанные минуты всего несколькими щелчками мышью, а также обеспечивать более подробный сбор информации о происходящем и более эффективный контроль над средствами защиты и мерами обеспечения нормативно-правового соответствия.\r\nОптимизация процессов управления защитой конечных точек\r\n\r\nБлокирование угроз «нулевого дня»\r\nИнтегрированная в данное решение технология McAfee Host Intrusion Prevention for Desktop обеспечивает защиту от новых уязвимостей и сокращает необходимость срочной установки исправлений.\r\nКонтроль за использованием сети Интернет\r\nАдминистраторы могут ограничивать доступ пользователей, находящихся в корпоративной сети и вне ее, к веб-сайтам неуместного содержания и запрещать запуск нежелательных программ на системах путем блокирования приложений.\r\nАвтоматизация выполнения требований политик\r\nMcAfee Policy Auditor позволяет интегрировать отчеты о соответствии требованиям стандартов HIPAA, PCI и других нормативно-правовых документов.\r\n\r\nТребования к системе\r\nКомплект McAfee Endpoint Protection — Advanced Suite поддерживается в операционных системах Windows и Mac.","shortDescription":"Комплексная система упреждающей защиты, позволяющая блокировать вредоносные программы и угрозы «нулевого дня»\r\nКомплект McAfee Endpoint Protection — Advanced Suite обеспечивает защиту систем Windows, Mac и Linux, находящихся внутри вашей сети и за пределами.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Endpoint Protection — Advanced Suite","keywords":"защиты, McAfee, позволяет, сети, управления, Обеспечение, политик, точек","description":"Обеспечение всесторонней защиты конечных точек\rВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от","og:title":"McAfee Endpoint Protection — Advanced Suite","og:description":"Обеспечение всесторонней защиты конечных точек\rВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Protection_-_Advanced_Suite.jpg"},"eventUrl":"","translationId":2523,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1631,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint DLP","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-dlp","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Forcepoint DLP accelerates your compliance efforts by </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">combining pre-packaged coverage of global regulations </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">with central control across your IT environment. </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Forcepoint DLP efficiently secures sensitive customer </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">information and regulated data so you can confidently </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">prove ongoing compliance.</span> Forcepoint DLP provides critical capability addressing compliance with features such as:\r\n<ul>\r\n<li>Optical Character Recognition (OCR) identifies data imbedded in images while at rest or in motion (available with Forcepoint DLP – Network).</li>\r\n<li>Robust identification for Personally Identifiable Information (PII) offers data validation checks, real name detection, proximity analysis and context identifiers.</li>\r\n<li>Custom encryption identification exposes data hidden from discovery and applicable controls.</li>\r\n<li>Cumulative analysis for drip DLP detection (i.e., data that leaks out slowly over time).</li>\r\n<li>Integration with Microsoft Azure Information Protection analyzes encrypted files and applies appropriate DLP controls to the data.</li>\r\n</ul>\r\nForcepoint DLP applies advanced analytics to correlate seemingly unrelated DLP events into prioritized incidents. Incident Risk Ranking (IRR) provided with Forcepoint DLP fuses disparate DLP indicators into a framework of Bayesian belief networks to assess the likelihood of data risk scenarios, such as data theft and broken business processes. Forcepoint DLP includes advanced analytics and regulatory policy templates from a single point of control with every deployment. Enterprises choose the deployment options for their IT environment.","shortDescription":"Forcepoint DLP addresses human-centric risk with visibility and control everywhere your people work and everywhere your data resides.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":1,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint DLP","keywords":"Forcepoint, data, with, compliance, analytics, such, detection, advanced","description":"Forcepoint DLP accelerates your compliance efforts by combining pre-packaged coverage of global regulations with central control across your IT","og:title":"Forcepoint DLP","og:description":"Forcepoint DLP accelerates your compliance efforts by combining pre-packaged coverage of global regulations with central control across your IT","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1527,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":942,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint CASB (Cloud Access Security Broker)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-casb-cloud-access-security-broker","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Discover Shadow IT & Risk\r\nUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive approach to cloud app discovery and risk scoring ensures that IT can eliminate blind spots by uncovering what cloud apps are used by employees and their risk profiles.\r\nPrevent Leaks of Sensitive Data\r\nInspect files and cloud content in real-time to prevent the malicious or unintentional leakage of confidential information. Identify and analyze sensitive or regulated data stored in cloud file-sync services to understand sharing permissions exposure and ensure compliance with regulations such as PCI, SOX, and HIPAA.\r\nControl BYOD Access\r\nMinimize the risk of data proliferation to unmanaged or untrusted devices by enforcing device-based access rules. Prevent the downloading or syncing of data to unmanaged devices while allowing online access only to cloud data.\r\nDetect & Block Cyber Attacks\r\nForcepoint CASB monitors all user activity and analyzes usage patterns to rapidly detect anomalies that can indicate an account takeover. The dashboard provides a wealth of cloud analytics, highlighting suspicious activities and attempts to compromise accounts.\r\nForcepoint CASB provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use.\r\nDiscover Shadow IT & Risk\r\nUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive approach to cloud app discovery and risk scoring ensures that IT can eliminate blind spots by uncovering what cloud apps are used by employees and their risk profiles.\r\nPrevent Leaks of Sensitive Data\r\nInspect files and cloud content in real-time to prevent the malicious or unintentional leakage of confidential information. Identify and analyze sensitive or regulated data stored in cloud file-sync services to understand sharing permissions exposure and ensure compliance with regulations such as PCI, SOX, and HIPAA.\r\nControl BYOD Access\r\nMinimize the risk of data proliferation to unmanaged or untrusted devices by enforcing device-based access rules. Prevent the downloading or syncing of data to unmanaged devices while allowing online access only to cloud data.\r\nDetect & Block Cyber Attacks\r\nForcepoint CASB monitors all user activity and analyzes usage patterns to rapidly detect anomalies that can indicate an account takeover. The dashboard provides a wealth of cloud analytics, highlighting suspicious activities and attempts to compromise accounts.\r\nIdentify Security Gaps\r\nForcepoint CASB uses cloud APIs to analyze your cloud tenants, helping IT review users and admins to detect dormant accounts, external users, and ex-employees that might still have access to your cloud apps. In addition, Forcepoint CASB inspects your tenant security configurations to detect deficiencies and to recommend best-practice settings for effective cloud governance.\r\nOptimize Detection of Anomalies and Threats\r\nForcepoint CASB is the only cloud access security broker out there that protects enterprise data from theft and loss due to compromised, malicious, and careless users and that correlates activity anomalies with risky IP addresses.\r\n\r\nCLOUD GOVERNANCE\r\nCloud App Discovery\r\nUncovers cloud apps – sanctioned and unsanctioned – by inspecting data in user access logs across the enterprise. Also, Forcepoint CASB provides a searchable Cloud App Directory where customers can view details, including customized risk factors, for each cloud app discovered.\r\nCloud App Risk Scoring\r\nHarness the ability to categorize and prioritize each cloud app as high, medium, or low risk. Application risk scoring and weighting are based on several categories (Compliance, Security Settings, General Info, Data Leakage, Data Ownership, Account Termination Policy and Auditing), the consolidated results of which can help you prioritize your risk mitigation “to do” list.\r\nDetection of Compliance Gaps\r\nGain visibility into cloud app security settings and get notified when SaaS admins make critical configuration changes. Forcepoint CASB compares these settings against a set of industry best practices or compliance standards (e.g., HIPAA, PCI DSS, ISO, CSA) and highlights deficiencies that require immediate attention.\r\nData Governance\r\nScan corporate files and data stored in file-sharing services such as OneDrive, Box, Dropbox and Google Drive. See which ones are sensitive or contain regulated data so that you can initiate a remediation workflow, if necessary (e.g., alert) to meet your compliance requirements.\r\nCloud App Metrics\r\nAutomate the process of determining what cloud apps users are accessing and details the number of users, activity level, traffic volume and usage hours for each app.\r\nIdentification of Overspend\r\nReview the entitlements of your users. You could be overlooking potential areas of risk or possibly some cost savings opportunities.\r\nAUDIT & PROTECTION\r\nEnforce BYOD Access Rules to Prevent Data Proliferation\r\nPrevent data proliferation to unmanaged devices through auto-sync clients such as Outlook, OneDrive for Business and Box Sync. Forcepoint CASB distinguishes between managed and unmanaged devices so you can create granular device-based access rules to stop data proliferation.\r\nPrevent Data Leakage\r\nForcepoint CASB inspects content in real-time, scanning for keywords, phrases, regular expressions, and several other parameters, to ensure compliance with regulations such as PCI DSS, HIPAA, HITECH, GLBA and SOX by applying comprehensive data leak prevention (DLP) capabilities. Forcepoint CASB also includes an ICAP interface to integrate with 3rd-party DLP solutions.\r\nIdentify Access Anomalies and Threats\r\nForcepoint CASB strengthens cloud security by detecting access anomalies and issues that may indicate an external or insider threat targeting your data.\r\nMonitor User & Admin Activity\r\nCreate a clear and accurate picture of user activity attributes, including user ID, department, location, time, device, application actions and data objects accessed. Track, monitor, and report all administrative and privileged user activity, including data accesses, configuration changes and user permission modifications.\r\n\r\n","shortDescription":"Forcepoint CASB provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint CASB (Cloud Access Security Broker)","keywords":"cloud, data, Forcepoint, CASB, risk, that, access, apps","description":"Discover Shadow IT & Risk\rUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive","og:title":"Forcepoint CASB (Cloud Access Security Broker)","og:description":"Discover Shadow IT & Risk\rUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":943,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":946,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Web Security Cloud (ранее TRITON AP-WEB Cloud)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-web-security-cloud-ranee-triton-ap-web-cloud","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Усовершенствованные угрозы, связанные со сложными многоступенчатыми атаками со встроенными методами, уклоняются от обнаружения при краже ваших конфиденциальных данных. Инсайдерские угрозы, такие как внутренне доступное вредоносное ПО, так же вредны, как и внешние угрозы.\r\nForcepoint Web Security Cloud обеспечивает лидирующие в отрасли возможности создания отчетов и DLP, а также останавливает более сложные угрозы для ваших данных, чем любое другое решение, включая Blue Coat, Cisco и Zscaler. Forcepoint Web Security Cloud построена на единой платформе, которая позволяет продуктам Forcepoint работать вместе и защищает данные повсюду - в облаке, в пути, в офисе - упрощает соблюдение и обеспечивает более эффективное принятие решений и повышает безопасность.\r\n\r\nДостижения в облачных технологиях предоставили организациям повышенную гибкость и возможности быстрого сотрудничества. Чтобы воспользоваться этими преимуществами, ваша организация должна оптимизировать безопасность с помощью интеллектуального, облачного решения, которое защищает в режиме реального времени, что позволит защитить вашу репутацию.\r\nForcepoint Web Security Cloud обеспечивает встроенную защиту от передовых угроз, которые используют сложные методы предотвращения обхода, чтобы украсть конфиденциальные данные, а также инсайдерские угрозы, такие как вредоносное ПО. Forcepoint Web Security Cloud является проверенным лидером в области безопасности веб-контента SaaS.\r\n\r\nИНТЕГРИРОВАННАЯ ИНТЕЛЛЕКТУАЛЬНАЯ УГРОЗА\r\nОбеспечивает ввод данных из более чем 155 стран в Forcepoint Cloud Web Security\r\nСредняя скорость обновления 3,2 единицы информации об угрозах каждую секунду","shortDescription":"Forcepoint Web Security Cloud - предоставление первостепенной облачной безопасности для защиты пользователей и данных во всем мире","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Web Security Cloud (ранее TRITON AP-WEB Cloud)","keywords":"Forcepoint, Cloud, Security, угрозы, данных, более, обеспечивает, защищает","description":"Усовершенствованные угрозы, связанные со сложными многоступенчатыми атаками со встроенными методами, уклоняются от обнаружения при краже ваших конфиденциальных","og:title":"Forcepoint Web Security Cloud (ранее TRITON AP-WEB Cloud)","og:description":"Усовершенствованные угрозы, связанные со сложными многоступенчатыми атаками со встроенными методами, уклоняются от обнаружения при краже ваших конфиденциальных","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":2606,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":451,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Sensitive_Information_Management_Solution.png","logo":true,"scheme":false,"title":"CyberArk Sensitive Information Management Solution","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"cyberark-sensitive-information-management-solution","companyTitle":"CyberArk","companyTypes":["vendor"],"companyId":174,"companyAlias":"cyberark","description":"Securely store and share sensitive files and business passwords\r\n\r\nIn today’s dynamic business environment that includes mobile, web and cloud-based interactions, users require convenient access to information wherever and whenever they need it. The ability for users to confidentially share files internally and externally, as well as securely keep track of login credentials to an ever-increasing number of business applications are critical requirements to maintain user productivity without compromising security. At the same time, IT and security teams are tasked with securing sensitive information shared in automated business processes while reducing costs to ensure business efficiency.\r\n\r\nThe CyberArk Sensitive Information Management Solution is a complete platform for securely storing, sharing and distributing information between users and systems. Developed with a focus on security, the solution includes patented digital vault technology, military-grade encryption and tamper-resistant auditing designed to help enterprise organizations meet compliance requirements. Organizations use the CyberArk Sensitive Information Management Solution to enable individuals to securely store and share sensitive files and business passwords, as well as automate business processes to securely collect, distribute and access sensitive information.\r\n\r\nFeatures:\r\nSingle-platform solution for file sharing between enterprise users, systems and business processes\r\nSecure repository in which users can store and share personal business passwords such as those used to access CRM systems, HR applications or expense management systems\r\nGranular access controls restrict which users are able to download, forward or print documents and ensure that only one user may edit a document at a time\r\nSegregation of duties between IT teams and content owners prevents IT teams from viewing content that is securely stored and transferred\r\nFlexible connectors enable seamless integration with existing business applications and complementary security tools such as content filtering or data loss prevention solutions\r\nTamper-resistant audit logs can be used to report on who accessed what information and if any changes were made\r\nBuilt-in FIPS 140-2 compliant encryption secures data at-rest and in-transit\r\nChoice of on-premises or cloud-based deployments enables organizations to select the option that best fits their organizational requirements\r\nHigh availability and disaster recovery help organizations ensure reliability in complex, enterprise IT environments\r\n\r\nBenefits\r\nReduce the risk of unauthorized access to sensitive data by centrally storing and granularly controlling access to confidential files\r\nFacilitate productivity by enabling secure anytime, anywhere sharing of files between authorized internal and external users\r\nReduce the risk of password loss or theft by providing a central, secure repository in which users can store and manage personal business passwords\r\nSimplify the user experience by eliminating the need for users to manually write down, save or remember login credentials for dozens of disparate business applications\r\nReduce help desk costs associated with password resets by encouraging users to centrally and securely store credentials needed to access business applications\r\nSupport cross-functional efficiency by automatically preventing multiple users from duplicating efforts and editing the same document at once\r\nReduce administrative costs associated with file transfer processes by leveraging a single platform to secure interactive and automated file transfers throughout the enterprise\r\nAutomatically encrypt sensitive data at-rest and in-transit without having to manage encryption keys or purchase a separate encryption solution\r\nMore easily demonstrate compliance by reporting on which users accessed what sensitive information and if any changes were made\r\nEasily expand the solution with changing business needs and meet enterprise requirements for scalability and reliability","shortDescription":"The CyberArk Sensitive Information Management Solution is a complete platform for securely storing, sharing and distributing information between users and systems. Developed with a focus on security, the solution includes patented digital vault technology, military-grade encryption and tamper-resistant auditing designed to help enterprise organizations meet compliance requirements.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CyberArk Sensitive Information Management Solution","keywords":"business, users, access, sensitive, securely, information, with, applications","description":"Securely store and share sensitive files and business passwords\r\rIn today’s dynamic business environment that includes mobile, web and cloud-based","og:title":"CyberArk Sensitive Information Management Solution","og:description":"Securely store and share sensitive files and business passwords\r\rIn today’s dynamic business environment that includes mobile, web and cloud-based","og:image":"https://old.b4r.io/fileadmin/user_upload/Sensitive_Information_Management_Solution.png"},"eventUrl":"","translationId":452,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":561,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Kod_Bezopasnosti_vGate1.jpg","logo":true,"scheme":false,"title":"Код Безопасности vGate","vendorVerified":0,"rating":"2.10","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":1,"alias":"kod-bezopasnosti-vgate","companyTitle":"Security Code","companyTypes":["supplier","vendor"],"companyId":2120,"companyAlias":"kod-bezopasnosti","description":"<span style=\"font-weight: bold;\">vGate для безопасности Hyper-V и vSphere предназначен для решения следующих типовых задач:</span>\r\n\r\n<ul><li>Усиленный контроль доступа к управлению системой виртуализации</li><li>Приведение защиты среды виртуализации в соответствие требованиям российского законодательства</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Основные возможности</span>\r\n\r\n<ul><li>Защита от специфических угроз среды виртуализации. Контроль виртуальных устройств и компонентов, изменений в системе и целостности данных. Доверенная загрузка виртуальных машин</li><li>Разграничение доступа к управлению. Разделение прав администраторов виртуальной инфраструктуры. Защита от ошибок и злоупотреблений администраторов<span style=\"white-space: pre;\">\t</span></li><li>Защита распределенных инфраструктур. Горячее резервирование, подключение агента аутентификации к нескольким серверам авторизации vGate и построение леса серверов авторизации</li><li>Централизованное управление, мониторинг и аудит. Мониторинг безопасности, оповещение об инцидентах безопасности. Построение графических отчетов.<span style=\"white-space: pre;\">\t</span></li><li>Соответствие законодательству и отраслевым стандартам. Встроенные шаблоны для настройки политик для защиты ПДн и ГИС в один клик. Шаблоны для приведения среды виртуализации в соответствие СТО БР ИББС, PCI DSS и др. стандартов<span style=\"white-space: pre;\">\t</span></li><li>Поддержка VMware vSphere и MS Hyper-V. Поддержка самых распространенных сред виртуализации – Vmware vSphere (в том числе vSphere 6) и Microsoft Hyper-V</li></ul>\r\n\r\n\r\n\r\n<span style=\"font-weight: bold;\">Преимущества<span style=\"white-space: pre;\">\t</span></span>\r\n<ul><li>Выполнение требований ФСТЭК России к защите среды виртуализации</li><li>Ограничение доступа администраторов к данным виртуальных машин</li><li>Автоматическая проверка и шаблоны настроек на соответствие стандартам и требованиям по безопасности</li><li>Простота внедрения в существующую инфраструктуру</li></ul>\r\n","shortDescription":"Код Безопасности vGate - сертифицированное средство защиты платформ виртуализации на базе VMware vSphere или Microsoft Hyper-V","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Код Безопасности vGate","keywords":"виртуализации, среды, vSphere, доступа, соответствие, Защита, администраторов, виртуальных","description":"vGate для безопасности Hyper-V и vSphere предназначен для решения следующих типовых задач:\r\rУсиленный контроль доступа к управлению системой","og:title":"Код Безопасности vGate","og:description":"vGate для безопасности Hyper-V и vSphere предназначен для решения следующих типовых задач:\r\rУсиленный контроль доступа к управлению системой","og:image":"https://old.b4r.io/fileadmin/user_upload/Kod_Bezopasnosti_vGate1.jpg"},"eventUrl":"","translationId":2420,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":492,"logoURL":"https://old.b4r.io/fileadmin/user_upload/DeviceLock.jpg","logo":true,"scheme":false,"title":"DeviceLock Endpoint DLP Suite","vendorVerified":0,"rating":"2.10","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":1,"alias":"devicelock-endpoint-dlp-suite","companyTitle":"DeviceLock (SmartLine Inc)","companyTypes":["vendor"],"companyId":2841,"companyAlias":"devicelock-smart-lain-ink","description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players. In addition, policies can be set and enforced for copy operations via the Windows Clipboard, as well as screenshot operations on the endpoint computer.\r\nNetworkLock adds contextual-level control of user network communications via the Internet through such means as: company email, personal webmail, instant messaging services, social networks (like Facebook, Google+, Twitter), web surfing, FTP file transfers, as well as cloud-based file sharing services like Dropbox, SkyDrive and Google Drive.\r\nContentLock adds the capability to look inside files and other data objects (like emails and webmails, chats, blog posts, etc.) for sensitive information like social security numbers, credit card numbers, bank account numbers or other user-definable information and to make block-or-allow decisions based on policies having to do with file contents.\r\nDiscovery is a separately licensed component, which helps network administrators and security personnel locating certain types of content stored within and outside the limits of the corporate network. Discovering unwanted content is essential when trying to protect the company’s intellectual property, control employee activities and administer computer networks.\r\nSearch Server is an optional separately licensed component, which provides full-text searching of logged data. The full-text search functionality is especially useful in situations when you need to search for shadow copies of documents based on their contents.\r\nDeviceLock DLP Suite provides both contextual and content-based control for devices and network resources via Group Policy in an Active Directory domain The combination of all of these modules working together is the DeviceLock DLP Suite. The DLP Suite provides protection against local and network data leaks at the endpoint (laptop, desktop or server) via a wide array of threat vectors.\r\nThese include: iPhones, Androids, BlackBerry, other smart-phones, iPods, iPads, digital cameras, Wi-Fi, Bluetooth, FireWire, social media, IM, webmail, company email, printing, CD or DVD ROM, USB flash drives, Compact Flash, FTP/FTPS, HTTP/HTTPS and the clipboard.\r\nNatively integrated with Microsoft Active Directory Group Policy, the DeviceLock DLP Suite is very easy and straight-forward to install and configure. Typical installations are handled by Microsoft Network Administrators and do not require expensive, specially trained resources.\r\nThe other great customer benefit of DeviceLock’s tight integration with Active Directory is that it gives the solution virtually limitless scalability. The DeviceLock DLP Suite can effortlessly run on every endpoint listed in your Active Directory database … even if there are tens of thousands.","shortDescription":"DeviceLock DLP Suite consists of five modules that protect your organization from data leak threats","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeviceLock Endpoint DLP Suite","keywords":"network, Suite, DeviceLock, like, Directory, Active, provides, data","description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved","og:title":"DeviceLock Endpoint DLP Suite","og:description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved","og:image":"https://old.b4r.io/fileadmin/user_upload/DeviceLock.jpg"},"eventUrl":"","translationId":493,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":376,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Symantec_Data_Loss_Prevention.jpg","logo":true,"scheme":false,"title":"Symantec Data Loss Prevention","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":11,"alias":"symantec-data-loss-prevention","companyTitle":"Symantec","companyTypes":["vendor"],"companyId":175,"companyAlias":"symantec","description":"<span style=\"font-weight: bold;\">Extend Data Loss Prevention to the Cloud</span>\r\nDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access security broker (CASB) capabilities from Symantec CloudSOC.\r\nExtend your DLP coverage and get direct visibility of content in over sixty cloud apps - including Office 365, Box, Dropbox, Google Apps or Salesforce\r\nLeverage full CASB capabilities so you can continuously monitor content additions, changes, and access rights in cloud apps\r\nLeverage existing DLP policies and workflows for cloud apps so you don’t have to rewrite your finely-tuned rule sets\r\n\r\n<span style=\"font-weight: bold;\">Discover Where Sensitive Data Is Stored Across Your Infrastructure</span>\r\nDescribed Content Matching looks for matches on regular expressions or patterns, e.g., “block if we see a credit card pattern”\r\nExact Data Matching identifies sensitive data directly in your database, e.g., “block exfiltration of any customer name and their associated bank account number”\r\nIndexed Document Matching applies a “full file fingerprint” to identify confidential information in unstructured data including Microsoft Office documents; PDF files; as well as binary files such as JPEGs, CAD designs, and multimedia files\r\nVector Machine Learning automatically learns and identifies the layout of sensitive document types such as financial documents, source code, etc.\r\nFile Type Detection recognizes more than 330 different file types including email, graphics and encapsulated formats, and can also recognize virtually any custom file type\r\n\r\n<span style=\"font-weight: bold;\">Monitor and Protect Sensitive Data On Mobile Devices, On-Premise, and In the Cloud</span>\r\nKeep data safe on Windows and Mac endpoints by performing local scanning and real-time monitoring\r\nMonitor confidential data that is being downloaded, copied or transmitted to or from laptops and desktops, including through email or cloud storage\r\nExtend data loss prevention monitoring and protection to iOS and Android devices, whether corporate-owned or user-owned\r\nFind and protect confidential unstructured data by scanning network file shares, databases, and other enterprise data repositories\r\nMonitor and protect data in motion, including sensitive data sent via email, web and a wide range of network protocols\r\n\r\n<span style=\"font-weight: bold;\">Define and Enforce Policies Consistently Across Your Environment</span>\r\nUse a single web-based console to define data loss policies, review and remediate incidents, and perform system administration across all of your endpoints, mobile devices, cloud-based services, and on-premise network and storage systems\r\nTake advantage of more than 60 pre-built policy templates and a convenient policy builder to get your Symantec Data Loss Prevention solution up and running quickly\r\nUse robust workflow and remediation capabilities to streamline and automate incident response processes\r\nApply business intelligence to your Symantec Data Loss Prevention efforts with a sophisticated analytics tool that provides advanced reporting and ad-hoc analysis capabilities","shortDescription":"Discover, monitor and protect your sensitive data with the industry’s leading data loss prevention solution.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Symantec Data Loss Prevention","keywords":"data, Data, your, cloud, Symantec, Loss, including, Prevention","description":"Extend Data Loss Prevention to the Cloud\rDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access","og:title":"Symantec Data Loss Prevention","og:description":"Extend Data Loss Prevention to the Cloud\rDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access","og:image":"https://old.b4r.io/fileadmin/user_upload/Symantec_Data_Loss_Prevention.jpg"},"eventUrl":"","translationId":377,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":947,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-web-security-cloud-formerly-triton-ap-web-cloud","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\r\nAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while stealing your sensitive data. Insider threats—such as employee theft and internally accessed malware—are just as damaging as external threats.\r\nForcepoint Web Security Cloud provides industry-leading reporting, sandboxing and DLP capabilities, and stops more advanced, non-signature threats to your data than any other solution – including Blue Coat, Cisco, and Zscaler. Forcepoint Web Security Cloud is built on a unified platform that enables Forcepoint products to work together, and protects data everywhere– in the Cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient security.\r\nADOPT INDUSTRY-LEADING PROTECTION AGAINST ADVANCED THREATS AND DATA THEFT\r\nAdvances in cloud technology have given organizations increased flexibility and rapid collaboration capabilities. In order to reap these benefits, your organization must streamline security with an intelligent, cloud-first solution that protects in real-time and that will enable your long term mission and protect your reputation.\r\nForcepoint Web Security Cloud provides in-line protection against advanced threats that use sophisticated detection evasion techniques to steal sensitive data, as well as insider threats such as employee theft and malware. Forcepoint Web Security Cloud is a proven leader in SaaS web content security, stopping more advanced, non-signature threats to your data than any other solution.\r\nEASY TO USE DASHBOARDS\r\nSee threat levels, productivity and bandwidth in an instant\r\nDrill-down for quick analysis\r\nEasy to use dashboards\r\nREPORTING\r\nOver 80 predefined reports\r\nCreate infinite custom reports by drag and drop of 70 attributes\r\nOptional extended reporting history for up to 18 months to support Regulatory & Compliance requirements\r\nReporting\r\nINTEGRATED CLOUD SANDBOX\r\nReal-time code analysis for Advanced Threat identification.\r\nSafe execution of suspicious code away from your network resources\r\nINTEGRATED THREAT INTELLIGENCE\r\nProvides input from over 155 countries into Forcepoint Cloud Web Security\r\nAverage update rate of 3.2 pieces of threat intelligence every second","shortDescription":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)\r\nDelivering premier cloud security to protect users and data everywhere","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","keywords":"Cloud, your, Forcepoint, threats, Security, data, that, solution","description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\rAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while","og:title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","og:description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\rAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":947,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[{"id":58,"title":"Chief Executive Officer"},{"id":60,"title":"Chief Information Officer"},{"id":64,"title":"Chief IT Security Officer"},{"id":70,"title":"IT Security and Risk Management"}],"organizationalFeatures":["Web-based customer portal","Mobile users","IT Security Department in company","Сonfidential data","Internet access is available for employees","Social networks are used","PCI DSS Compliance","NIST Compliance","Data Warehouse","GDPR Compliance","Personal data operation"],"complementaryCategories":[{"id":37,"title":"PC - personal computer"},{"id":453,"title":"Desktop PC"},{"id":455,"title":"Portrable PC"},{"id":38,"title":"Tablet PC"},{"id":441,"title":"Pen Tablets"},{"id":439,"title":"Smartphone"},{"id":544,"title":"DLP - Appliance"},{"id":39,"title":"IaaS - Infrastructure as a Service"},{"id":52,"title":"SaaS - software as a service"},{"id":54,"title":"MDM - master data management"}],"solutions":["Risk of lost access to data and IT systems","Insufficient risk management"],"materials":[{"id":14,"title":"","description":"Presentation","uri":"https://drive.google.com/file/d/1YWC4CSQNDlmcokHYnjC7v2_myr_qT15C/view?usp=sharing"},{"id":15,"title":"","description":"Video introduction","uri":"https://www.youtube.com/hideez/"},{"id":16,"title":"","description":"Demo Video","uri":"https://youtu.be/aUFE7oHC9o4"}],"useCases":[{"id":8,"title":"","description":"HIDEEZ SOLUTION FOR VERTICALS\r\nhttps://drive.google.com/file/d/1nKsW8cV05TJfERrV5XOex0dhQY1kXzA0/view"}],"best_practices":[],"values":["Ensure Security and Business Continuity","Enhance Staff Productivity","Manage Risks"],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}