{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"_type":"localeString","en":"Offer a reference bonus","ru":"Предложить бонус за референс"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Сonfigurator"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"en":"Selling","ru":"Продают","_type":"localeString"},"using":{"en":"Using","ru":"Используют","_type":"localeString"},"show-more-button":{"ru":"Показать еще","_type":"localeString","en":"Show more"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"supplier-popover":{"en":"supplier","ru":"поставщик","_type":"localeString"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"_type":"localeString","en":"manufacturer","ru":"производитель"},"short-description":{"ru":"Краткое описание","_type":"localeString","en":"Pitch"},"i-use-it-popover":{"ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"product-features":{"en":"Product features","ru":"Особенности продукта","_type":"localeString"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"solutions":{"ru":"Проблемы которые решает","_type":"localeString","en":" Problems that solves"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"testing":{"_type":"localeString","en":"Testing","ru":"Тестирование"},"compare":{"_type":"localeString","en":"Compare with competitors","ru":"Сравнить с конкурентами"},"characteristics":{"en":" Characteristics","ru":"Характеристики","_type":"localeString"},"transaction-features":{"ru":"Особенности сделки","_type":"localeString","en":"Transaction Features"},"average-discount":{"_type":"localeString","en":"Partner average discount","ru":"Средняя скидка партнера"},"deal-protection":{"_type":"localeString","en":"Deal protection","ru":"Защита сделки"},"average-deal":{"ru":"Средний размер сделки","_type":"localeString","en":"Average deal size"},"average-time":{"ru":"Средний срок закрытия сделки","_type":"localeString","en":"Average deal closing time"},"login":{"_type":"localeString","en":"Login","ru":"Войти"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"to-know-more":{"ru":"Чтобы узнать больше","_type":"localeString","en":"To know more"},"scheme":{"en":" Scheme of work","ru":"Схема работы","_type":"localeString"},"competitive-products":{"en":" Competitive products","ru":"Конкурентные продукты","_type":"localeString"},"implementations-with-product":{"ru":"Внедрения с этим продуктом","_type":"localeString","en":"Deployments with this product"},"user-features":{"ru":"Особенности пользователей","_type":"localeString","en":"User features"},"job-roles":{"_type":"localeString","en":" Roles of Interested Employees","ru":"Роли заинтересованных сотрудников"},"organizational-features":{"ru":"Организационные особенности","_type":"localeString","en":"Organizational Features"},"calculate-price":{"_type":"localeString","en":" Calculate product price","ru":"Рассчитать цену продукта"},"selling-stories":{"ru":"Продающие истории","_type":"localeString","en":" Selling stories"},"materials":{"ru":"Материалы","_type":"localeString","en":"Materials"},"about-product":{"en":"About Product","ru":"О продукте","_type":"localeString"},"or":{"en":"or","ru":"или","_type":"localeString"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"_type":"localeString","en":"Calculate Product ROI","ru":"Рассчитать ROI продукта"},"complementary-categories":{"ru":"Схожие категории","_type":"localeString","en":"Complementary Categories"},"program-receives-data":{"en":"Program Receives Data","_type":"localeString"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"rebate-for-poc":{"_type":"localeString","en":"Bonus 4 POC","ru":"Бонус 4 POC"},"configurator-content":{"en":"Calculate price for this product here","ru":"Рассчитайте стоимость продукта","_type":"localeString"},"configurator-link":{"en":"here","ru":"тут","_type":"localeString"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"en":"select product for presentation","ru":"выбрать продукт для презентации","_type":"localeString"},"auth-message":{"_type":"localeString","en":"You have to register or login.","ru":"Вам нужно зарегистрироваться или войти."},"add-to-comparison":{"_type":"localeString","en":"Add to comparison","ru":"Добавить в сравнение"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"_type":"localeString","en":"Calculate ROI for this product here","ru":"Рассчитайте ROI для данного продукта"},"not-yet-converted":{"en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString"},"videos":{"en":"Videos","ru":"Видео","_type":"localeString"},"vendor-verified":{"ru":"Подтверждено производителем","_type":"localeString","en":"Vendor verified"},"event-schedule":{"en":"Events schedule","ru":"Расписание событий","_type":"localeString"},"scheduling-tip":{"ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event."},"register-to-schedule":{"en":"To register for the event please log in or register on the site.","ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString"},"comparison-matrix":{"_type":"localeString","en":"Comparison matrix","ru":"Матрица сравнений"},"compare-with-competitive":{"en":" Compare with competitive","ru":"Сравнить с конкурентными","_type":"localeString"},"avg-deal-closing-unit":{"ru":"месяцев","_type":"localeString","en":"months"},"under-construction":{"en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString"},"product-presentation":{"ru":"Презентация продукта","_type":"localeString","en":"Product presentation"},"go-to-comparison-table":{"_type":"localeString","en":" Go to comparison table","ru":"Перейти к таблице сравнения"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Roi4Webinar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"title":{"ru":"ROI4CIO: Продукт","_type":"localeString","en":"ROI4CIO: Product"},"meta":[{"name":"og:type","content":"website"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Конкретный продукт","_type":"localeString","en":"Example product"}},{"translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"},"name":"og:description"},{"name":"title","translations":{"en":"Product","ru":"Продукт","_type":"localeString"}},{"translations":{"ru":"Описание продукта","_type":"localeString","en":"Product description"},"name":"description"},{"name":"keywords","translations":{"ru":"Ключевые слова продукта","_type":"localeString","en":"Product keywords"}}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"mcafee-complete-endpoint-threat-protection":{"id":538,"logoURL":"https://old.b4r.io/fileadmin/content/csm_McAfee.png","logo":true,"scheme":false,"title":"McAfee Complete Endpoint Threat Protection","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-complete-endpoint-threat-protection","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: #53565a; font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;\">McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.</p>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: #53565a; font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;\">Core endpoint protection, including anti-malware, firewall, device control, email and web security works together with machine learning and dynamic application containment to detect zero-day threats in near real time, and classify and halt them before they can execute on your systems. Actionable forensic data and easy-to-read reports keep you informed and help you make the move from responding to outbreaks, to investigating and hardening your defenses. And, because McAfee Complete Endpoint Threat Protection is built using an extensible framework, you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.</p>","shortDescription":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.\r\n","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Complete Endpoint Threat Protection","keywords":"McAfee, Complete, defenses, your, Threat, Endpoint, Protection, zero-day","description":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and","og:title":"McAfee Complete Endpoint Threat Protection","og:description":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and","og:image":"https://old.b4r.io/fileadmin/content/csm_McAfee.png"},"eventUrl":"","translationId":595,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[{"id":1287,"logoURL":"https://old.b4r.io/fileadmin/user_upload/BeyondTrust.png","logo":true,"scheme":false,"title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"beyondtrust-powerbroker-endpoint-protection-platform","companyTitle":"BeyondTrust","companyTypes":["supplier","vendor"],"companyId":4098,"companyAlias":"beyondtrust","description":"<span style=\"font-weight: bold;\">Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment</span>\r\nTargeted attacks can easily bypass antivirus solutions and other individual lines of defense, necessitating multi-layered endpoint protection. The PowerBroker Endpoint Protection Platform eliminates the need to implement and manage multiple point products by combining system and application firewalls, intrusion prevention, anti-malware, antivirus, and local vulnerability assessment capabilities. PowerBroker Endpoint Protection secures systems from entire classes of attack, without constant rule or signature updates.\r\n<ul><li>Protect critical endpoints with an all-in-one firewall, IPS, anti-malware, antivirus solution</li><li>Conduct local vulnerability assessments of air-gapped and otherwise disconnected systems</li><li>Protect web servers and web applications against exploits, zero-days, and unauthorized access (optional)</li><li>Reduce system management costs with a “no-touch” solution that eliminates the need for constant updates</li><li>Rely on updates from the renowned BeyondTrust Security Research Team</li></ul>","shortDescription":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM - Unified Firewall, IPS, Anti-Malware and Anti-Virus\r\nIntegrated multi-layered endpoint protection in a single, lightweight client that replaces multiple security agents, protecting against Advanced Persistent Threats (APTs), known exploits, zero-days, and all other attack vectors.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","keywords":"antivirus, need, Protection, PowerBroker, Endpoint, eliminates, BeyondTrust, updates","description":"Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment\rTargeted attacks can easily bypass antivirus solutions and other individual","og:title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","og:description":"Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment\rTargeted attacks can easily bypass antivirus solutions and other individual","og:image":"https://old.b4r.io/fileadmin/user_upload/BeyondTrust.png"},"eventUrl":"","translationId":1288,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1289,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Avast_Business_Antivirus_Pro_Plus.jpg","logo":true,"scheme":false,"title":"Avast Business Antivirus Pro Plus","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"avast-business-antivirus-pro-plus","companyTitle":"Avast","companyTypes":["supplier","vendor"],"companyId":4099,"companyAlias":"avast","description":"<span style=\"font-weight: bold;\">The ultimate security for your business</span>\r\nIntellectual property, customer data, your business strategy; you have everything to protect, and we have the all-in-one solution ready to protect it. Make the most of our award-winning antivirus enhanced with server, email, and VPN protection for complete security, even on the go.\r\n\r\n<span style=\"font-weight: bold;\">Your business can’t afford to stay defenseless</span>\r\nWith over 4,000 attacks a day, it’s only a matter of time until your business becomes a target. Fight back with the best — Avast Business Antivirus Pro Plus offers exceptional protection with a 100% malware detection rate.\r\n\r\n<span style=\"font-weight: bold;\">Light on resources, heavy on threats</span>\r\nThe best antivirus should work as hard as you do. Avast performs lightning-fast analyses of unknown files in the Cloud, for a lightweight solution that won’t slow down your employees or your business.\r\n\r\n<span style=\"font-weight: bold;\">Keep spies and snoops off your webcam</span>\r\nCan hackers really hijack your webcam? Yes — until now. Webcam Shield makes anything and anyone get your permission before they can use it so nobody takes a peek unless you say so. You can even disable your camera for good — and enable it again.\r\n\r\n<span style=\"font-weight: bold;\">Full identity protection with an easy-to-use VPN</span>\r\nSecure your employees’ ability to work safely on public Wi-Fi. Avast Business Antivirus Pro Plus comes with an easy-to-use VPN, so you can keep all your business communication — including employee and customer data, private.\r\n\r\n<span style=\"font-weight: bold;\">Don’t let weak points in your security become points of attack</span>\r\nComplete data protection takes more than keeping your PCs malware-free. Stop cybercriminals using vulnerabilities in out-of-date software to access your network, safely delete confidential documents so they can’t be recovered, and protect inboxes and sharepoints from infection.\r\n\r\n<span style=\"font-weight: bold;\">Everything you need to protect your business</span>\r\nAvast Business Antivirus Pro Plus combines powerful data, identity, and server protection with the award-winning features of Avast Business Antivirus. Take a look.\r\n\r\n<span style=\"font-weight: bold;\">Antivirus</span>\r\nActively scans files, URLs, and email attachments to protect your business from malware, spyware, ransomware and more.\r\n\r\n<span style=\"font-weight: bold;\">File Shield</span>\r\nAutomatically scans files that are opened on a PC to make sure they’re malware-free, without slowing users down or getting in their way.\r\n\r\n<span style=\"font-weight: bold;\">Web Shield</span>\r\nEnsures every website visited is trustworthy by checking the URL and website certificate, before any risky connections are made to your network.\r\n\r\n<span style=\"font-weight: bold;\">Email Shield</span>\r\nOpen every email and download every attachment confidently. We’ll check both incoming and outgoing emails to ensure they’re completely malware-free.\r\n\r\n<span style=\"font-weight: bold;\">Behavior Shield</span>\r\nDeeply-rooted malware can hide inside your running programs. Behavior Shield monitors them all for any suspicious activity to shut down attacks.\r\n\r\n<span style=\"font-weight: bold;\">CyberCapture</span>\r\nWhen an unrecognized file is downloaded onto one of your PCs, a copy will be sent to our experts at the Avast Threat Labs to identify if it's safe or not.\r\n\r\n<span style=\"font-weight: bold;\">Software Defender</span>\r\nDon’t waste time updating application after application. Let Software Defender update your software automatically.\r\n\r\n<span style=\"font-weight: bold;\">Passwords</span>\r\nDefend employees’ login details with a secure master password. Comes with a browser add-on for easy and secure auto-filling of online login forums.\r\n\r\n<span style=\"font-weight: bold;\">SecureLine VPN</span>\r\nMake every connection private no matter what network or WiFi your employees use to prevent their identities, or your data, from being seen and stolen online.\r\n\r\n<span style=\"font-weight: bold;\">Webcam Shield</span>\r\nStop webcam spying for good. Now apps have to ask you for permission to use your webcam, so you always know who’s watching.","shortDescription":"Avast Business Antivirus Pro Plus - everything your business needs in one package. Leave nothing to chance with powerful antivirus, data, and identity protection.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avast Business Antivirus Pro Plus","keywords":"your, business, with, Avast, Shield, Antivirus, protection, protect","description":"The ultimate security for your business\rIntellectual property, customer data, your business strategy; you have everything to protect, and we have the","og:title":"Avast Business Antivirus Pro Plus","og:description":"The ultimate security for your business\rIntellectual property, customer data, your business strategy; you have everything to protect, and we have the","og:image":"https://old.b4r.io/fileadmin/user_upload/Avast_Business_Antivirus_Pro_Plus.jpg"},"eventUrl":"","translationId":1290,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":5,"title":"EndPoint Security"}],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1291,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Panda_Security.png","logo":true,"scheme":false,"title":"Panda Endpoint Protection","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"panda-endpoint-protection","companyTitle":"Panda Security","companyTypes":["supplier","vendor"],"companyId":4100,"companyAlias":"panda-security","description":"<span style=\"font-weight: 700; \">Contextual Intelligence</span>\r\nThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter known and unknown threats.\r\nIt analyzes, categorizes and correlates all the data obtained about cyber-threats in order to initiate prevention, detection, response and remediation routines.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Next-Generation Endpoint Security</span>\r\nAdvanced cyber-security to counter malware, with prevention, detection and remediation capabilities.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Endpoint Detection and Response</span>\r\nMonitoring, collecting and categorization of 100% of the active processes on all the organization’s endpoints\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Malware Intelligence Platform</span>\r\nThe correlation of data on cyber-threats configures a security intelligence system able to uncover patterns of malicious behavior.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Advanced threats are gone</span>\r\nThe Platform connects contextual intelligence with defensive operations to pre-empt malicious behavior and data leaks.\r\nThis way, protection systems can be activated before threats are executed.\r\nComplete advanced protection for endpoints and servers to eradicate the malware.\r\n","shortDescription":"Panda Endpoint Protection is the intelligent cyber-security platform designed to eradicate advanced threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Panda Endpoint Protection","keywords":"malicious, behavior, threats, Endpoint, intelligence, data, protection, malware","description":"Contextual Intelligence\rThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter","og:title":"Panda Endpoint Protection","og:description":"Contextual Intelligence\rThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter","og:image":"https://old.b4r.io/fileadmin/user_upload/Panda_Security.png"},"eventUrl":"","translationId":1292,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1293,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Bitdefender.png","logo":true,"scheme":false,"title":"Bitdefender Gravity Zone Ultra Security (XDR)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"bitdefender-gravity-zone-ultra-security-xdr","companyTypes":[],"description":"<span style=\"font-weight: bold;\">UNCOVER AND STOP ELUSIVE THREATS WITH EDR THAT WORKS.</span>\r\nEasy-to-Use, High-Fidelity EDR Is Part of our Comprehensive and Integrated Endpoint Protection Platform.\r\nGravityZone XDR excels where pure-play EDR products are too complex and noisy, preventing, detecting and responding to attacks that evade traditional anti-malware. A single solution reduces the attack surface with hardening and controls, stopping malware at pre-execution.\r\nThe new endpoint data recorder and threat analytics automate detection and allow easy investigation and in-place remediation. XDR’s seamless threat prevention, accurate detection and smart response minimize infection exposure and stop breaches.\r\n\r\n<span style=\"font-weight: bold;\">EDR SO EASY, YOU CAN ACTUALLY USE IT</span>\r\nWith clear visibility into indicators of compromise (IOCs), and threat investigation and incident response workflows, GravityZone Ultra reduces resource and skill requirements for security operations.\r\n\r\n<ul><li>Real-time endpoint visibility</li><li>Expose (insight into) suspicious activities</li><li>One-click investigation</li><li>Alert triage and incident analysis visualization</li><li>Track live attacks and lateral movements</li><li>Rapid response</li><li>Reduce dwell time with fast resolution, containment and remediation</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">HIGH-FIDELITY DETECTION MEANS ENHANCED SECURITY OPTICS AND FREEDOM FROM ALERT FATIGUE</span>\r\nFree up your security resources to focus on real threats.\r\n\r\n<ul><li>Minimize noise and distraction from false alarms</li><li>Reduce the volume of incidents with effective threat prevention</li><li>Eliminate manual remediation of blocked attacks with automatic remediation and repair</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">COMPREHENSIVE ENDPOINT SECURITY PLATFORM IN ONE AGENT AND CONSOLE</span>\r\nGravityZone Ultra comes with all the hardening and next-generation prevention controls included in GravityZone HD and the Elite suite.\r\n\r\n<ul><li>Minimize exposure with strong prevention</li><li>Machine-learning and behavior-based detection stops unknown threats at pre-execution and on-execution</li><li>Detect and block script-based, fileless, obfuscated and custom malware with automatic remediation</li><li>Memory protection to prevent exploits</li><li>Reduce attack surface by enabling IT security controls</li><li>Integrated client firewall, device control, web content filtering, app control, patch management and more.</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">SMART RESPONSE MEANS EVOLVED PREVENTION</span>\r\nBecause GravityZone Ultra is an integrated prevent-detect-respond solution, it lets you quickly respond and restore endpoints to a “better-than-before” stage.\r\nLeveraging threat intelligence gathered from endpoints during the investigation, you can in one interface adjust policy immediately and patch vulnerabilities, improving the security posture of your environment.","shortDescription":"Bitdefender Gravity Zone Ultra Security (XDR) - LAYERED NEXT-GENERATION ENDPOINT SECURITY NOW WITH EDR","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Bitdefender Gravity Zone Ultra Security (XDR)","keywords":"with, GravityZone, threat, remediation, security, Ultra, investigation, detection","description":"UNCOVER AND STOP ELUSIVE THREATS WITH EDR THAT WORKS.\rEasy-to-Use, High-Fidelity EDR Is Part of our Comprehensive and Integrated Endpoint Protection Platform.","og:title":"Bitdefender Gravity Zone Ultra Security (XDR)","og:description":"UNCOVER AND STOP ELUSIVE THREATS WITH EDR THAT WORKS.\rEasy-to-Use, High-Fidelity EDR Is Part of our Comprehensive and Integrated Endpoint Protection Platform.","og:image":"https://old.b4r.io/fileadmin/user_upload/Bitdefender.png"},"eventUrl":"","translationId":1294,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1297,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Avira_GmbH___Co._KG.jpg","logo":true,"scheme":false,"title":"Avira Antivirus Pro - Business Edition","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"avira-antivirus-pro-business-edition","companyTitle":"Avira GmbH & Co. KG","companyTypes":["supplier","vendor"],"companyId":4103,"companyAlias":"avira-gmbh-co-kg","description":"<span style=\"font-weight: bold;\">Antivirus Protection</span>\r\n\r\n<span style=\"font-weight: bold;\">Real-Time Threat Prevention</span>\r\nSignature-based detection, heuristic analysis and cloud-based scanning offer you complete protection from malware.\r\n\r\n<span style=\"font-weight: bold;\">Enhanced Network Drive Protection</span>\r\nAntivirus Pro prevents malware from being stored or spread via your internal network or a shared cloud storage solution.\r\n\r\n<span style=\"font-weight: bold;\">Advanced Web Protection</span>\r\nPhishing scams, infected websites, drive-by downloads… Antivirus Pro ensures employees never land on harmful websites.\r\n\r\n<span style=\"font-weight: bold;\">Email Protection</span>\r\nAntivirus Pro scans locally installed email clients so that employees neither receive malware nor spread it to colleagues, customers or patients.\r\n\r\n<span style=\"font-weight: bold;\">Management Console</span>\r\n\r\n<span style=\"font-weight: bold;\">Centralized Management</span>\r\nAll Avira-secured devices can effortlessly be managed from an intuitive an online dashboard.\r\n<span style=\"font-weight: bold;\">Mobile Device Management</span>\r\nSmartphones equipped with an Avira mobile app can be tracked from the dashboard, while antitheft safeguards can be triggered remotely.\r\n<span style=\"font-weight: bold;\">System Information</span>\r\nThe dashboard offers you helpful information on PC components, hard drive partitions and available disk space of your corporate devices.\r\n\r\n<span style=\"font-weight: bold;\">Features</span>\r\n\r\n<span style=\"font-weight: bold;\">Antivirus Scanner</span>\r\nAward-winning protection from malware (viruses, Trojans, worms, etc.)\r\n<span style=\"font-weight: bold;\">Protection Cloud Technology</span>\r\nScans unknown files in real time for malware and exploits.\r\n<span style=\"font-weight: bold;\">Smart A.I.</span>\r\nUnique, deep-learning algorithms protect you from the latest threats.\r\n<span style=\"font-weight: bold;\">Anti-ransomware</span>\r\nIdentifies, blocks, and removes ransomware before it encrypts your files.\r\n<span style=\"font-weight: bold;\">Email Protection</span>\r\nProtects your unsecured, non-encrypted email traffic.\r\n<span style=\"font-weight: bold;\">Avira Intelligent Repair System</span>\r\nBest-in-class technology that repairs damage caused by malware to your files.\r\n<span style=\"font-weight: bold;\">Self-Defense</span>\r\nPrevents malware from altering or even disabling your antivirus protection.\r\n<span style=\"font-weight: bold;\">Device control</span>\r\nThwarts malware intrusions by scanning removable devices connected to your USB ports\r\n\r\n<span style=\"font-weight: bold;\">System Requirements</span>\r\nYou really don’t need much! Here are the essentials:\r\n<ul><li>A PC running Windows 7 or higher (with Service Pack 1 and the latest updates)</li><li>Or a Mac running OSX 10.11 (El Capitan) or higher.</li><li>2 GB of RAM, over 2 GB of hard disk space, and an internet connection</li><li>Android: Android 4.0.3 or later</li></ul>","shortDescription":"Avira Antivirus Pro - Business Edition\r\nSimple yet sophisticated security – ideal for small and midsize businesses.\r\n- Powerful plug and play protection\r\n- Resource-light with zero maintenance costs\r\n- Runs on both Windows and macOS\r\n- Manage your customers remotely using premium on premise and cloud management consoles.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avira Antivirus Pro - Business Edition","keywords":"malware, from, your, Antivirus, Protection, protection, System, devices","description":"Antivirus Protection\r\rReal-Time Threat Prevention\rSignature-based detection, heuristic analysis and cloud-based scanning offer you complete protection from","og:title":"Avira Antivirus Pro - Business Edition","og:description":"Antivirus Protection\r\rReal-Time Threat Prevention\rSignature-based detection, heuristic analysis and cloud-based scanning offer you complete protection from","og:image":"https://old.b4r.io/fileadmin/user_upload/Avira_GmbH___Co._KG.jpg"},"eventUrl":"","translationId":1298,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1299,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png","logo":true,"scheme":false,"title":"SonicWall Capture Advanced Threat Protection","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sonicwall-capture-advanced-threat-protection","companyTitle":"SonicWall","companyTypes":["supplier","vendor"],"companyId":4104,"companyAlias":"sonicwall","description":"SONICWALL CAPTURE ADVANCED THREAT PROTECTION\r\nSonicWall Capture Advanced Threat Protection service is a cloud-based network sandbox that analyzes suspicious code to help discover and stop newly developed malware.\r\n\r\n<ul><li>Multi-engine cloud sandbox that includes virtualization, hypervisor level analysis and full-system emulation</li><li>High security effectiveness at diagnosing new threats</li><li>Automated breach prevention enabled by blocking files until a security verdict is determined</li><li>Near real-time signature deployment protects organizations from follow-on attacks</li><li>Email and app notifications with robust reporting from the sandbox environment</li></ul>\r\n\r\nMULTI-ENGINE ADVANCED THREAT ANALYSIS\r\nCapture executes suspicious code and analyzes behavior simultaneously in multiple engines. This provides you with comprehensive visibility into malicious activity, while resisting evasion tactics and maximizing zero-day threat detection.\r\n\r\nBROAD FILE TYPE ANALYSIS\r\nAnalyze a broad range of operating systems and file types, including executable programs, DLL, PDF, MS Office documents, archives, JAR and APK.\r\n\r\nBLOCK UNTIL VERDICT\r\nTo prevent potentially malicious files from entering the network, files sent to the cloud for analysis can be held at the gateway until a verdict is determined.\r\n\r\nRAPID DEPLOYMENT OF REMEDIATION SIGNATURES\r\nWhen a file is identified as malicious, a hash is immediately created within Capture and later a signature is sent to firewalls to prevent follow-on attacks.\r\n\r\nREPORTING AND ALERTS\r\nCapture Advanced Threat Protection offers an at-a-glance dashboard with reports that detail the analysis results for files sent to the service, including session information, OS information, OS activity and network activity.","shortDescription":"SonicWall Capture Advanced Threat Protection service is a cloud-based multi-engine sandbox designed to discover and stop unknown, zero-day attacks such as ransomware at the gateway with automated remediation.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SonicWall Capture Advanced Threat Protection","keywords":"Capture, files, from, that, analysis, malicious, sandbox, activity","description":"SONICWALL CAPTURE ADVANCED THREAT PROTECTION\rSonicWall Capture Advanced Threat Protection service is a cloud-based network sandbox that analyzes suspicious","og:title":"SonicWall Capture Advanced Threat Protection","og:description":"SONICWALL CAPTURE ADVANCED THREAT PROTECTION\rSonicWall Capture Advanced Threat Protection service is a cloud-based network sandbox that analyzes suspicious","og:image":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png"},"eventUrl":"","translationId":1300,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1301,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cybowall.png","logo":true,"scheme":false,"title":"Cybonet Cybowall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cybonet-cybowall","companyTitle":"Cybonet","companyTypes":["supplier","vendor"],"companyId":2085,"companyAlias":"cybonet","description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all endpoints. Cybowall protects your network in real time; detecting and reacting to threats as they arise. Cybowall combines multiple cybersecurity tools and capabilities in one solution - securing networks of all sizes and providing unified defense against a continuously evolving threat landscape. \r\n<span style=\"font-weight: bold;\">Solution Benefits</span>\r\n\r\n<ul><li>Stop Endpoint Tampering and Malware - Leverage network and endpoint detection of Advanced Persistent Threats </li><li>Map Network Assets - Increase visibility with a map of all endpoints connected to your network to gain insight into your environment</li><li>Identify Vulnerabilities - Stay informed of vulnerabilities for patch deployment prioritization</li><li>Detect Lateral Movement - Trap attackers that have already breached perimeter defenses</li><li>Detect Active Breaches - Discover network breaches quickly to reduce damaging effects</li><li>Meet Compliance Requirements - Adhere to compliance standards; GDPR, ISO, PCI-DSS, HIPAA etc.</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Breach Detection</span>\r\n\r\n<ul><li>Intrusion Detection - Breach detection capabilities without network interference.</li><li>Network Traps - Insight into lateral movement between endpoints and detects threats by serving as a trip wire for active attacks.</li><li>Network Forensics - Discover and analyze the source of security attacks and incidents.</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Network Visibility</span>\r\nAsset Mapping - Dynamic asset map of all endpoints, including port profiles and activities.\r\nWMI - Leverage WMI and continuous endpoint scanning for full network visibility.\r\nSIEM - Log management, event management, event correlation and reporting to help identify policy violations and enable response procedures.\r\n\r\n<span style=\"font-weight: bold;\">Vulnerability Management</span>\r\n\r\n<ul><li>Vulnerability Assessment - Monitor business assets and identify vulnerable systems inside the network, including risk level, for patch deployment prioritization.</li><li>Default Passwords - Pinpoint and change default passwords to reduce risks.</li><li>Malware Hunter - Identify malicious files and where they reside in the network.</li></ul>\r\n</p>\r\n","shortDescription":"Cybowall combines multiple cybersecurity tools and capabilities in one solution - securing networks of all sizes and providing unified defense against a continuously evolving threat landscape","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cybonet Cybowall","keywords":"network, your, endpoints, Network, Cybowall, threats, endpoint, Leverage","description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all","og:title":"Cybonet Cybowall","og:description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all","og:image":"https://old.b4r.io/fileadmin/user_upload/Cybowall.png"},"eventUrl":"","translationId":1302,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":339,"logoURL":"https://old.b4r.io/fileadmin/user_upload/WatchGuard_Dimension1.png","logo":true,"scheme":false,"title":"WatchGuard Dimension","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"watchguard-dimension","companyTitle":"WatchGuard","companyTypes":["vendor"],"companyId":2741,"companyAlias":"watchguard","description":"From the board room to the branch office, critical decisions about network security often need to be made quickly and with limited information. How can you ensure that your decisions are timely, effective, and better informed? You need Visibility.\r\n\r\nWatchGuard Dimension™ is a cloud-ready network security visibility solution that comes standard with WatchGuard's flagship Unified Threat Management and Next Generation Firewall platform. It provides a suite of big data visibility and reporting tools that instantly identify and distill key network security threats, issues and trends, accelerating the ability to set meaningful security policies across the network.\r\n\r\n\r\nUse WatchGuard Dimension to monitor and gain critical and timely insights about network security, in real-time, from anywhere and at any time, easily and quickly\r\n\r\nStart with the Big Picture\r\nA picture is worth a thousand words or traffic logs! Get a high-level, aggregated “big picture” view of network activity that pinpoints top threats and trends, active policies and traffic patterns, and correlated views of top users and applications.\r\n\r\nTap into Visible Insights\r\nSee network activity presented visually, in real-time, in intuitive and interactive dashboards and reports. The elegant visualizations make it easy to identify potential threats, monitor Internet usage and to gain critical insights about related traffic trends.\r\n\r\nSee, at a glance, who is consuming the most bandwidth, if there are unusual traffic patterns, and what are the most-visited websites.\r\nEasily pivot, drill-down, and filter to get exactly the info you need, when you need it. Then, you can drill all the way down to individual log data that reveals key details\r\nSpot Patterns, Make Better Decisions\r\n\r\nChoose from over 100 comprehensive reports, with the ability to schedule reports for email delivery to key stakeholders – from C-level executives and IT Directors, Network Managers and Security Analysts, to HR and Department Managers. Special reports are available for PCI and HIPAA compliance.\r\n\r\nThen Take Action with Dimension Command\r\nDimension Command is our suite of management tools for WatchGuard Dimension. With it, IT pros have access to a host of network control features including one-click configuration changes, the ability to jump back to previous configurations, direct access to individual appliances through a web UI, and VPN management tools. Dimension Command is a purchase upgrade, and is automatically included in our Total Security Suite.\r\n\r\nZero Install\r\nNo complicated setup is required. Simply deploy a virtual appliance - includes OS, database, utilities, and WatchGuard server software - and you’ll be up and running in a few minutes.","shortDescription":"WatchGuard Dimension brings big data visibility to network security, without the associated cost and complexity.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"WatchGuard Dimension","keywords":"network, WatchGuard, Dimension, with, security, that, traffic, reports","description":"From the board room to the branch office, critical decisions about network security often need to be made quickly and with limited information. How can you","og:title":"WatchGuard Dimension","og:description":"From the board room to the branch office, critical decisions about network security often need to be made quickly and with limited information. How can you","og:image":"https://old.b4r.io/fileadmin/user_upload/WatchGuard_Dimension1.png"},"eventUrl":"","translationId":340,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":489,"title":"Network Security Policy Management","alias":"network-security-policy-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/network-security-policy-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":349,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Proofpoint_Email_Protection.png","logo":true,"scheme":false,"title":"Proofpoint Email Protection","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"proofpoint-email-protection","companyTitle":"Proofpoint","companyTypes":["vendor"],"companyId":2817,"companyAlias":"proofpoint","description":"<p><span style=\"font-weight: bold;\">Protection against BUSINESS EMAIL COMPROMISE (BEC)</span></p>\r\n<p>Dynamically classify impostor email (BEC) other threats that don't involve malware. These low volume, hard-to-detect threats have cost businesses more than $2.3 billion and cannot be detected by solutions that detect only malware. We detect and classify impostor email through a combination of authentication (DMARC), pre-defined rules, and dynamic classification. Our technology actively assesses the reputation of the sender for accurate protection without additional administration overhead.</p>\r\n<p>We analyze:</p>\r\n<ul>\r\n<li>Sender-recipient relationship</li>\r\n<li>Domain reputation</li>\r\n<li>Email headers and envelope attributes</li>\r\n<li>Email content</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Granular filtering and control</span></p>\r\n<p>Email Protection can control all aspects of inbound and outbound email. Our policy engine gives you complete flexibility. Custom rules support global, group and user-level controls to meet the needs of even the most complex enterprise. Individual quarantines enable you to separate email types to allow your people to access their email digest and quarantine while keeping malicious emails away. Quarantines include:</p>\r\n<ul>\r\n<li>Spam</li>\r\n<li>Impostor</li>\r\n<li>Bulk</li>\r\n<li>Phishing</li>\r\n<li>Malware</li>\r\n<li>Adult</li>\r\n<li>Low Priority</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Detailed visibility</span></p>\r\n<p>Email Protection gives you a wealth of data and search tools. Our advanced message tracing features a high-performance search engine to help you quickly pinpoint hard-to-find log data based on dozens of search criteria. With more than 60 real-time reports for detailed visibility into mail flow and trends, Email Protection provides the data that can help address issues and trends as they emerge. <span style=\"font-weight: bold;\">Give your people self-service control over their email preferences such as:</span></p>\r\n<ul>\r\n<li>Quarantines</li>\r\n<li>Safe and block lists</li>\r\n<li>Bulk mail delivery</li>\r\n</ul>\r\n<p>These services are also easy to brand, providing familiarity for users who access these tools. And with support for numerous languages, you can deploy them globally. More than 90% of targeted attacks start with email, and these security threats are always evolving. Proofpoint Email Protection provides multiple layers of security to stop malware and non-malware threats, such as email fraud. It can control all aspects of inbound and outbound email to detect and block threats, and prevent confidential information from getting into the wrong hands.</p>\r\n<p><span style=\"font-weight: bold;\">Features and Benefits</span></p>\r\n<ul>\r\n<li>Advanced Email Filtering, Control and Visibility. Email Protection allows you to set up robust policies as a first step in routing email to users. You can create detailed firewall rules based on your needs. Even set up policies for anti-virus. We also leverage user bulk mail actions to improve accuracy of future detection and classification. With a wealth of data and search tools, you can ensure your organization's email is protected.</li>\r\n<li>Impostor Email Threat Protection. Imposter attacks are hard to detect. Our Stateful Composite Scoring Service (SCSS) is a machine learning approach that searches specifically for these email threats. It uses what’s known about your unique environment, along with data from all Proofpoint customers, to more effectively detect and block email fraud. </li>\r\n<li>Internal Mail Defense. As organization move to cloud-based email services, compromised accounts are on the rise. Internal Mail Defense can automatically scan all internal email traffic, providing a multilayered approach to looking for such things as spam, malware or phishing attacks being sent via compromised accounts. It removes these emails and provides reporting to shows which accounts have been compromised.</li>\r\n<li>Email Continuity. Email downtime can be a significant hit to worker productivity. Enterprise Continuity ensures email is always available, even if your company email is down. It provides full access to users—via Outlook integration, a web portal or native mobile support. And it automatically activates in an outage, with fully automated recovery. </li>\r\n</ul>","shortDescription":"Proofpoint Email Protection stops malware and non-malware threats such as impostor email (also known as business email compromise, or BEC). ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Proofpoint Email Protection","keywords":"email, Email, Protection, data, search, that, control, rules","description":"Protection against BUSINESS EMAIL COMPROMISE (BEC)\rDynamically classify impostor email (BEC) other threats that don't involve malware. These low volume,","og:title":"Proofpoint Email Protection","og:description":"Protection against BUSINESS EMAIL COMPROMISE (BEC)\rDynamically classify impostor email (BEC) other threats that don't involve malware. These low volume,","og:image":"https://old.b4r.io/fileadmin/user_upload/Proofpoint_Email_Protection.png"},"eventUrl":"","translationId":350,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1166,"logoURL":"https://old.b4r.io/fileadmin/user_upload/NetSparker.png","logo":true,"scheme":false,"title":"Netsparker Desktop","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"netsparker-desktop","companyTitle":"NetSparker","companyTypes":["supplier","vendor"],"companyId":4064,"companyAlias":"netsparker","description":"<span style=\"font-weight: bold;\">Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws.</span>\r\nNetsparker automatically exploits the identified vulnerabilities in a read-only and safe way, and also produces a proof of exploitation. Therefore you can immediately see the impact of the vulnerability and do not have to manually verify it.\r\n<span style=\"font-weight: bold;\">Netsparker's dead accurate scanning technology finds more vulnerabilities.</span>\r\nNetsparker’s unique vulnerability scanning technology has better coverage and finds more vulnerabilities than any other scanner, as proven when tested in head to head independent comparison tests.\r\n<span style=\"font-weight: bold;\">Netsparker Desktop allows you to automate more.</span>\r\nThe primary goal of a web application security scanner is to eliminate the repetitive drudgery of web security testing, leaving you free to use your skills in areas where you make a real difference. Netsparker Desktop boasts an arsenal of automated security testing weapons that get straight to the point, providing users with the precise information.","shortDescription":"Netsparker Desktop is available as a Windows application and is an easy-to-use web application security scanner that uses the advanced Proof-Based vulnerability scanning technology and has built-in penetration testing and reporting tools.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Netsparker Desktop","keywords":"Netsparker, more, security, Desktop, vulnerabilities, finds, vulnerability, technology","description":"Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws.\rNetsparker automatically exploits the","og:title":"Netsparker Desktop","og:description":"Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws.\rNetsparker automatically exploits the","og:image":"https://old.b4r.io/fileadmin/user_upload/NetSparker.png"},"eventUrl":"","translationId":1167,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":79,"title":"VM - Vulnerability management","alias":"vm-vulnerability-management","description":"Система управления уязвимостями выполняет проактивное сканирование IT-инфраструктуры на наличие неверных конфигураций, слабых мест, вредоносных компонентов и предоставляет рекомендации по устранению существующих рисков.\r\n \r\nТакая система анализирует все компоненты инфраструктуры, включая сети, операционные системы, базы данных и web-приложения. По итогам проверки приложение осуществляет приоритезацию обнаруженных угроз и генерирует руководства, как снизить каждую из них. \r\n ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/VM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1168,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Netsparker_Cloud.png","logo":true,"scheme":false,"title":"Netsparker Cloud","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"netsparker-cloud","companyTitle":"NetSparker","companyTypes":["supplier","vendor"],"companyId":4064,"companyAlias":"netsparker","description":"<span style=\"font-weight: bold;\">Affordable And Maintenance Free Web Application Security Solution</span>\r\nEmbrace the benefits of the cloud! With Netsparker Cloud you do not need to buy, license, install and support any hardware or software. Simply pay a yearly fee and launch as many web application security scans as you want from anywhere using the web based dashboard.\r\n<span style=\"font-weight: bold;\">Scalable & always Available: Scan as many websites as you want, when you want</span>\r\nLaunch as many web application vulnerability scans as you want within just a few minutes, boost your productivity and stay a step ahead of the bad guys. A new vulnerability such as Heartbleed or Shellshock is being exploited in the wild? Do you need to scan 500, or 1000 web applications in just a few hours? You have new web applications that you need to add to your extensive web vulnerability scanning program? Login to Netsparker Cloud and launch the web security scans.","shortDescription":"Netsparker Cloud is a scalable multi-user online web application security scanning solution with built-in workflow tools. It has built-in enterprise workflow tools and is specifically designed to help enterprises scan and manage the security of 100s and 1000s of websites.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Netsparker Cloud","keywords":"want, Netsparker, vulnerability, need, scans, many, Cloud, launch","description":"Affordable And Maintenance Free Web Application Security Solution\rEmbrace the benefits of the cloud! With Netsparker Cloud you do not need to buy, license,","og:title":"Netsparker Cloud","og:description":"Affordable And Maintenance Free Web Application Security Solution\rEmbrace the benefits of the cloud! With Netsparker Cloud you do not need to buy, license,","og:image":"https://old.b4r.io/fileadmin/user_upload/Netsparker_Cloud.png"},"eventUrl":"","translationId":1169,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":79,"title":"VM - Vulnerability management","alias":"vm-vulnerability-management","description":"Система управления уязвимостями выполняет проактивное сканирование IT-инфраструктуры на наличие неверных конфигураций, слабых мест, вредоносных компонентов и предоставляет рекомендации по устранению существующих рисков.\r\n \r\nТакая система анализирует все компоненты инфраструктуры, включая сети, операционные системы, базы данных и web-приложения. По итогам проверки приложение осуществляет приоритезацию обнаруженных угроз и генерирует руководства, как снизить каждую из них. \r\n ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/VM.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1170,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SKYBOX_HORIZON.png","logo":true,"scheme":false,"title":"SKYBOX HORIZON","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"skybox-horizon","companyTitle":"SkyBox","companyTypes":["supplier","vendor"],"companyId":4065,"companyAlias":"skybox","description":"Get unprecedented visibility of the attack surface, including indicators of exposure (IOEs). Horizon’s security visualization and mapping capabilities are rooted in Skybox intelligence and analysis of all the layers that make up the attack surface — including assets, hybrid network topology, weaknesses and threats.\r\nHorizon makes it easier for operational teams to understand and discuss security risks and cyberthreats — and plan how to address them. Horizon tracks risk levels over time, so status and progress can easily be communicated with security stakeholders — including the C-suite and the board.","shortDescription":"Horizon provides unprecedented visibility of the attack surface, including indicators of exposure, giving the insight needed to build a security management program ready to take on cyberthreats. Cutting-edge attack surface visualization solution powered by indicators of exposure","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SKYBOX HORIZON","keywords":"including, security, surface, attack, Horizon, them, risks, address","description":"Get unprecedented visibility of the attack surface, including indicators of exposure (IOEs). Horizon’s security visualization and mapping capabilities are","og:title":"SKYBOX HORIZON","og:description":"Get unprecedented visibility of the attack surface, including indicators of exposure (IOEs). Horizon’s security visualization and mapping capabilities are","og:image":"https://old.b4r.io/fileadmin/user_upload/SKYBOX_HORIZON.png"},"eventUrl":"","translationId":1171,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"ITSM (IT Service Management, управление ИТ-услугами) — подход к управлению и организации ИТ-услуг, направленный на удовлетворение потребностей бизнеса. Управление ИТ-услугами реализуется поставщиками ИТ-услуг путём использования оптимального сочетания людей, процессов и информационных технологий. Для содействия реализации подхода к управлению ИТ-услугами используется серия документов ITIL.\r\n\r\nВ отличие от более традиционного технологического подхода, ITSM рекомендует сосредоточиться на клиенте и его потребностях, на услугах, предоставляемых пользователю информационными технологиями, а не на самих технологиях. При этом процессная организация предоставления услуг и наличие заранее оговоренных в соглашениях об уровне услуг параметров эффективности (KPI) позволяет ИТ-отделам предоставлять качественные услуги, измерять и улучшать их качество.\r\n\r\nВажным моментом при изложении принципов ITSM является системность. При изложении каждого составного элемента ITSM (управление инцидентами, управление конфигурациями, управление безопасностью и т. д.) в обязательном порядке прослеживается его взаимосвязь и координация с остальными элементами (службами, процессами) и при этом даются необходимые практические рекомендации.\r\n\r\nITIL не является конкретным алгоритмом или руководством к действию, но она описывает передовой опыт (best practices) и предлагает рекомендации по организации процессного подхода и управления качеством предоставления услуг. Это позволяет оторваться от особенностей данного конкретного предприятия в данной конкретной отрасли. Вместе с тем, несмотря на определённую абстрактность, ITIL всячески нацелено на практическое использование. В каждом разделе библиотеки приводятся ключевые факторы успеха внедрения того или иного процесса, практические рекомендации при этом превалируют над чисто теоретическими рассуждениями.\r\nИсточник: https://ru.wikipedia.org/wiki/ITSM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ITSM.png"},{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1172,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SKYBOX_FIREWALL_ASSURANCE.png","logo":true,"scheme":false,"title":"SKYBOX FIREWALL ASSURANCE","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"skybox-firewall-assurance","companyTitle":"SkyBox","companyTypes":["supplier","vendor"],"companyId":4065,"companyAlias":"skybox","description":"Firewall Assurance brings all firewalls into one normalized view, continuously monitoring policy compliance, optimizing firewall rulesets and finding attack vectors that others miss.\r\nCOMPLETE MULTI-VENDOR FIREWALL MANAGEMENT\r\nContinuously monitor all firewalls and network devices. Skybox covers the most comprehensive list of firewall vendors, complex rulesets, even virtual and cloud-based firewalls.\r\nWith proven scalability in 1,500+ firewall deployments, Firewall Assurance keeps rules optimized and ensures changes don’t introduce new risk.","shortDescription":"Skybox Firewall Assurance\r\nFirewall management software for a clean, optimized and compliant firewall state","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SKYBOX FIREWALL ASSURANCE","keywords":"firewalls, firewall, rulesets, FIREWALL, Firewall, Assurance, cloud-based, With","description":"Firewall Assurance brings all firewalls into one normalized view, continuously monitoring policy compliance, optimizing firewall rulesets and finding attack","og:title":"SKYBOX FIREWALL ASSURANCE","og:description":"Firewall Assurance brings all firewalls into one normalized view, continuously monitoring policy compliance, optimizing firewall rulesets and finding attack","og:image":"https://old.b4r.io/fileadmin/user_upload/SKYBOX_FIREWALL_ASSURANCE.png"},"eventUrl":"","translationId":1173,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1179,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Threat_Intelligence.png","logo":true,"scheme":false,"title":"Group-IB Threat Intelligence (Киберразведка по подписке)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"group-ib-threat-intelligence-kiberrazvedka-po-podpiske","companyTitle":"Group-IB","companyTypes":["supplier","vendor"],"companyId":4067,"companyAlias":"group-ib","description":"Оперативные уведомления об атаках и угрозах для вас, ваших клиентов и партнеров Прямой доступ к скомпрометированным данным и идентификаторам Отслеживание, разбор и прогнозирование хакерской активности в интересных вам отраслях\r\nНаглядный веб-интерфейс – не требует установки Поддержка STIX/TAXII при предоставлении данных об угрозах, API для Enterprise Security Персональный аналитик и круглосуточная поддержка\r\nДанные для проактивной защиты от киберугроз\r\nЗанимаясь расследованием киберпреступлений и изучением угроз более 14 лет, Group-IB создала собственную высокотехнологичную систему слежения за инфраструктурой и взаимодействиями киберпреступников, управляемую опытными аналитиками, практикующими криминалистами и специалистами по реагированию на инциденты.\r\n\r\nОбрабатывая и анализируя данные из сотен источников, мы предоставляем персонализированную, проверенную и значимую информацию, необходимую для подготовки к атакам и отражению актуальных угроз.\r\nДанные для проактивной защиты от киберугроз\r\nТактические индикаторы\r\nСократите время реакции на инциденты до минимума с мгновенными уведомлениями о критических угрозах, прямым доступом к скомпрометированным данным и целому спектру технических индикаторов для настройки средств защиты.\r\nВАШИ ВОЗМОЖНОСТИ\r\nОперативно блокируйте скомпрометированные учетные записи, банковские карты, узнавайте о заражениях мобильных телефонов\r\nНаходите вредоносные объекты, не детектируемые антивирусами, изучайте их происхождение и назначение\r\nВыявляйте зараженных пользователей корпоративной сети, связывающихся с серверами управления ботнетами \r\nБлокируйте вредоносные ресурсы на сетевом оборудовании\r\nПредотвращайте распространение фишинговых писем по корпоративной почте\r\nПресекайте использование вашего бренда в преступных целях\r\n\r\nОперативные данные\r\nПолучайте персонализированные данные с закрытых хакерских площадок, узнавая о предстоящих атаках на этапе их подготовки.\r\n\r\nПогрузитесь в детализированный контекст угроз, отслеживайте появление новых инструментов и методов атак, которые могут быть использованы против вас.\r\nВАШИ ВОЗМОЖНОСТИ\r\nОперативно узнавайте о появлении вредоносных программ, нацеленных на вас и ваших клиентов\r\nУзнавайте об утечках, продажах баз данных, поиске инсайдеров в вашей компании и обсуждениях ее уязвимостей\r\nПредотвращайте продажу закрытых данных третьим лицам\r\nСледите за атаками и всплесками активности, устанавливая взаимосвязи с вашими инцидентами\r\nКорректируйте карту угроз и план реагирования, базируясь на актуальной информации\r\n\r\nСтратегическая информация\r\nСледите за постоянно меняющейся средой киберугроз, изучайте риски, характерные для компаний вашей отрасли, оцениваете эффективность и корректируйте вашу стратегию инвестиций в обеспечение информационной безопасности.\r\nВАШИ ВОЗМОЖНОСТИ\r\nМаксимизируйте ROI от инвестиций в системы безопасности, Incident Response команды и аналитиков\r\nПриоритизируйте угрозы и выбирайте решения для защиты на основании экспертных прогнозов\r\nИзучайте тактику и инструменты преступных групп, атакующих компании вашей отрасли\r\nСобирайте дополнительные сведения об угрозах с помощью персонального аналитика\r\nКак работает Threat Intelligence?\r\nThreat Intelligence — сочетание высокотехнологичной инфраструктуры мониторинга киберугроз с экспертизой опытных аналитиков, вирусологов, криминалистов, специалистов отдела расследований и Центра реагирования (CERT) Group-IB.\r\nКиберразведка для проактивной защиты от киберугроз\r\nРазведка и сбор данных\r\nМы создали высокотехнологичную инфраструктуру для мониторинга хакерской активности, слежения за ботсетями и извлечения данных, необходимых для предотвращения инцидентов. 90% данных поступает в систему из закрытых источников, абсолютное большинство из них – уникально. Мы мониторим закрытые площадки, следим за изменениями бот-сетей, извлекая конфигурационные файлы вредоносных программ и информацию об украденных идентификаторах.\r\nИСТОЧНИКИ ДАННЫХ\r\n<ul><li>Распределенная сеть мониторинга и HoneyNet ловушек</li><li>Аналитика бот-сетей</li><li>Закрытые и публичные хакерские площадки, онлайн-конференции</li><li>Приватные группы в соцсетях</li><li>Трекеры сетевых атак</li><li>Данные сенсоров Threat Detection System</li><li>Результаты криминалистических экспертиз Лаборатории Group-IB</li><li>Мониторинг и исследование вредоносных программ</li><li>База обращений в Центр реагирования CERT‑GIB</li><li>Результаты поведенческого анализа вредоносных файлов с помощью машинного интеллекта</li><li>Контакты с регисторами доменных имен и хостинг-провайдерами по всему миру</li><li>Обмен данными с Europol, Interpol и объединениями по противодействию киберугрозам</li><li>Целевые исследования Group-IB</li></ul>\r\nАналитика\r\n13 лет отслеживая развитие киберпреступной среды, мы накопили практический опыт и базу знаний, которые позволяют нам видеть в разрозненных потоках данных скрытые связи и угрозы, которые оставляют без внимания наши конкуренты.\r\nНАПРАВЛЕНИЯ АНАЛИЗА\r\n<ul><li>Проверка данных и сбор дополнительных сведений</li><li>Реконструкция сценариев атак</li><li>Исследования вредоносных программ</li><li>Установление взаимосвязей между преступными группами</li><li>Отслеживание трендов, формирование прогнозов</li><li>Разработка рекомендаций по реагированию</li></ul>\r\nПредоставление данных\r\nДанные в системе Threat Intelligence сгруппированы по подпискам, что дает возможность получать именно те сведения, которые вам необходимы.\r\n\r\n<span style=\"font-weight: bold;\">Уведомления об отраслевых и целевых угрозах</span>\r\nПостоянно участвуя в расследованиях и реагировании на инциденты, мы узнаем о новых угрозах из первых рук. Кроме того, мы имеем доступ к сотням закрытых хакерских сообществ, что позволяет нам следить за их активностью и доставлять эти знания нашим заказчикам.\r\n\r\nК сведениям об угрозах относятся:\r\n<ul><li>сведения о новых вредоносных программе или сервисах для хакерского сообщества,</li><li>изменения в тактике проведения атак,</li><li>утечки и продажи корпоративных данных,</li><li>объявления о поиске инсайдеров в разных компаниях или исполнителей атак,</li><li>обсуждение уязвимостей.</li></ul>\r\nЭксклюзивные разведданные Threat Intelligence позволяют спрогнозировать неочевидные риски, узнать о предстоящих атаках на этапе их подготовки, адаптировать план реагирования и минимизировать ущерб, если украденные данные уже попали в сеть.\r\n\r\nПри необходимости ваш персональный аналитик может собрать дополнительную информацию об актуальных угрозах и проверить достоверность данных.\r\n\r\n<span style=\"font-weight: bold;\">Уведомления о целевых вредоносных программах</span>\r\nЕжедневно мы исследуем сотни вредоносных файлов и участвуем в расследованиях инцидентов, застрагивающих компании самых разных отраслей. Это позволяет нам обнаруживать и извлекать подробные данные о вредоносных программах, нацеленных на вас и ваших клиентов.\r\n\r\nЕсли мы видим, что вредоносная программа имеет файл настроек, затрагивающих ваши системы, IP‑адреса, домены или телефоны, вы немедленно узнаете об этом.\r\n\r\nДаже если программа не имеет соответствующих настроек, но в результате реагирования на инцидент мы узнали, что она может быть использована для атаки на вас, вы также получите подробные сведения об этой программе, включая:\r\n<ul><li>хеш-сумму вредоносного файла,</li><li>полное описание функциональных возможностей вредоносной программы,</li><li>копию файла настроек или веб-инжектов,</li><li>адреса серверов управления (C&C) и обновлений.</li></ul>\r\n<span style=\"font-weight: bold;\">Данные о фишинговых сайтах, использующих ваш бренд</span>\r\nПреступники используют доверие клиентов к вашему бренду, выманивая с его помощью личные данные и вовлекая пользователей в мошеннические схемы. Мы узнаем о появлении потенциально опасного для вашей репутации сайтов на этапе регистрации доменов, и выявляем всю инфраструктуру их продвижения – e-mail рассылки, контекстную рекламу, инструменты SEO-оптимизации.\r\n\r\nКорреляция используемых злоумышленников инструментов с базой системы киберразведки Threat Intelligence помогает становить владельца площадки, выявить взаимосвязи между разными площадками и извлечь другие данные, необходимые для реагирования и расследования.\r\n\r\nЭто позволяет нам адресно уведомлять владельцев площадок о нарушении ваших прав и оперативно блокировать ресурсы по вашему запросу, полностью закрывая преступникам доступ к их инфраструктуре.\r\n\r\n<span style=\"font-weight: bold;\">Уведомления о компрометации учетных записей, банковских карт, ключей ЭЦП</span>\r\nМы исследуем сетевые инфраструктуры бот-сетей и применяем специальные технические меры для оперативного извлечения скомпрометированных идентификаторов ваших клиентов и сотрудников:\r\n<ul><li>учетные записи, ассоциированные с корпоративными доменами и диапазонами IP: e-mail аккаунты, доступы к intranet-ресурсам и т.д.</li><li>номера банковских карт,</li><li>копии ключей электронной цифровой подписи.</li></ul>\r\nМы также предоставляем сведениях о счетах, картах и телефонах, на которые преступники переводят похищаемые денежные средства.\r\n\r\nВы получите широкий спектр дополнительных сведений, помогающих понять стратегию и тактику компрометации данных:\r\n<ul><li>дата детектирования скомпрометированной учетной записи,</li><li>источник получения данных (серверы, адреса для управления бот-сетью),</li><li>информация о расположении и IP зараженного пользователя,</li><li>название и подробное описание вредоносной программы, использованной злоумышленниками,</li><li>название преступной группы и тактика ее действий,</li><li>фото-отчеты осмотров панелей управления бот‑сетями.</li></ul>\r\n<span style=\"font-weight: bold;\">Уведомления о заражении мобильных устройств</span>\r\nПопулярность финансовых приложений для мобильных телефонов и планшетов на фоне слабой защищенности таких устройств делают их самой привлекательной мишенью для хакеров. Каждый месяц появляется несколько новых вредоносных программ под мобильные операционные системы, а функционал известных вирусов усложняется. Заражение телефона может дать доступ не только к финансам владельца, но и к его почте, звонкам, сообщениям, а также данным о его передвижениях.\r\n\r\nМы предоставляем регулярно обновляемые списки зараженных мобильных устройств ваших клиентов и сотрудников, идентифицируемых по IMEI. Оперативные уведомления о заражениях позволят не только предотвратить хищения, но и выявить попытки шпионажа за руководством компании.\r\n\r\nСообщите нам обезличенный список корпоративных устройств, и если одно из них будет найдено в мобильной бот-сети, мы установим факт слежки немедленно.\r\n\r\n<span style=\"font-weight: bold;\">Сведения об атаках</span>\r\nЧерез нашу систему ловушек и сетевые сенсоры ежедневно проходят тысячи атак на компании из разных отраслей. В режиме реального времени мы предоставляем доступ к данным о следующих атаках:\r\n<ul><li>списки целей DDoS-атак,</li><li>cписки сайтов с размещенным фишинговым контентом,</li><li>списки взломанных сайтов, распространяющих вредоносные программы,</li><li>списки сайтов, подвергшихся deface-атакам.</li><li>Для распространения вредоносных программ хакеры часто используют метод Driveby, который заключается в заражении пользователей легитимных сайтов, ни посетители, ни администраторы которого не догадываются об активности преступников. Благодаря своевременному получению данных о взломанных сайтах возможно полностью предотвратить такие атаки.</li></ul>\r\nИнформация об атакованных ресурсах делятся по странам и отраслям, чтобы вы могли анализировать данные по тем секторам, к которым относится ваша компания, ее партнеры или клиенты.\r\n\r\n<span style=\"font-weight: bold;\">Сведения о хактивистских группировках и их активности, включая данные:</span>\r\n<ul><li>о начале новой операции,</li><li>о результатах успешных атак в рамках отдельной операции или независимо от нее,</li><li>о тактике и инструментах каждой атаки,</li><li>о связях между разными группами.</li><li>Информация позволит взвешенно оценить риски быть атакованными в рамках определенной операции, смоделировать возможный инцидент и подготовиться к нему.</li><li>Подозрительные IP-адреса</li></ul>","shortDescription":"Узнавайте об угрозах, утечках, взломах и хакерской активности до того, как они смогут вам навредить","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Group-IB Threat Intelligence (Киберразведка по подписке)","keywords":"данных, вредоносных, данные, угрозах, Threat, реагирования, клиентов, Intelligence","description":"Оперативные уведомления об атаках и угрозах для вас, ваших клиентов и партнеров Прямой доступ к скомпрометированным данным и идентификаторам Отслеживание,","og:title":"Group-IB Threat Intelligence (Киберразведка по подписке)","og:description":"Оперативные уведомления об атаках и угрозах для вас, ваших клиентов и партнеров Прямой доступ к скомпрометированным данным и идентификаторам Отслеживание,","og:image":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Threat_Intelligence.png"},"eventUrl":"","translationId":2660,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1180,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Threat_Intelligence.png","logo":true,"scheme":false,"title":"Group-IB Threat Intelligence","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"group-ib-threat-intelligence","companyTitle":"Group-IB","companyTypes":["supplier","vendor"],"companyId":4067,"companyAlias":"group-ib","description":"<ul><li>Prompt attack and threat notifications for your company, clients and partners</li><li>Direct access to compromised data and TTPs of malicious activity</li><li>Detections, analysis and forecasts of hacking activity in the areas of your interest</li><li>Convenient web interface for data search and analysis – no installation required</li><li>STIX/TAXII ready, official OASIS Cyber Threat Intelligence (CTI) Technical Committee Member</li><li>24x7 Personal cyber intelligence analyst support: tailored reports, malware analysis and much more</li></ul>\r\nWe give you vital intelligence about upcoming threats and actual cyber security risks\r\nIt takes a few minutes to infect a computer, while incident detection and remediation activities may last months. Even if you feel confident in your systems' safety, vulnerabilities of your clients, employees, or partners may become your problem – this potential threat has become a reality for financial institutions, payment systems and telecommunications operators. Security breach in a company of your industry may be a warning sign of future attacks on your business, while insiders will help criminals bypass your defensive barriers.\r\nBe prepared to any attack scenario with Intelligence cyber analytics: receive the most specific and detailed information for prompt response and the most recent data for threat prevention.\r\n<span style=\"font-weight: bold; \">Strategic planning with cyber intelligence</span>\r\nKeep up with the constantly changing threat landscape, learn about threats targeting your business area, evaluate and improve your IT security investment strategy\r\n<ul><li>Evaluate risks, analyze statistics and assess potential damages</li><li>Prioritize threats based on expert forecasts</li><li>Learn attack tactics and cybercrime strategy</li><li>Know your enemy</li></ul>\r\n<span style=\"font-weight: bold;\">Taking control on upcoming cyber threats</span>\r\nPrepare for cyber attacks with comprehensive information on malware threatening your company and clients, attack targets and methods, cyber espionage tools, news and notifications on potential threats from private hacker resources.\r\n\r\n<ul><li>Adapt your security tools and response plans</li><li>Learn about data leaks and identify insiders</li><li>Prevent confidential data from being sold to third parties</li><li>Monitor hacking attacks and activity peaks correlating with your incidents</li><li>Apply IoCs to you layered cyber security infrastructure</li></ul>\r\nMinimize the time you spend on incident response with instant notifications to critical threats, direct access to compromised data and a variety of technical indicators used to bolster your security.\r\n\r\n<ul><li>Protect your clients, employees, and partners against fraud and personal data theft</li><li>Receive attack confirmation, learn about the attack source and mechanisms used</li><li>Prevent leakage and industrial espionage</li><li>Effectively stop targeted attacks</li><li>Prevent illegal use of your brand</li></ul>\r\n<span style=\"font-weight: bold;\">Intelligence and data collection</span>\r\nGroup-IB specialists daily analyze thousands of compromised credentials, bank card numbers, messages and postings of “black hats” on deep web hacking forums, information on hundreds of attacks. We analyze the most recent malware, attack mechanisms and participate in incident investigations collecting the most recent and detailed information about cybercriminals, their strategies and tools.\r\nTHREE PILLARS OF COMPETENCEWHAT’S SPECIAL\r\n\r\n<ul><li>More than 10 patented technologies, automation and special tactics, algorithms and machine learning are helping us to collect raw data on cyber threats.</li><li>Best analysts are making intelligence out of threat data, enriching them with context, revealing kill chains and TTPs (tactics, technics and procedures) of cyber criminals.</li><li>Building links between incidents, IoCs and cyber criminals activities all over the world with the help of CERTs, Europol, Interpol and other international cyber crime fighters.</li></ul>\r\n<span style=\"font-weight: bold;\">Analytics</span>\r\nGroup-IB leverages its 14 years of unique expertise in cybercrime investigations to discover hidden connections buried within disparate data. We closely cooperate with best experts in cyber security around the world, which helps us to solve the most complicated global cases. Information analysis enables us to understand motives of criminals and create hacker profiles to forecast their future activity.\r\n<ul><li>Deep knowledge of Russian-speaking and international cybercriminal markets</li><li>Adjustable amount of hours of remote analysts</li><li>Ability to request assistance from special team of Group-IB security experts responsible for handling high-profile investigations</li></ul>","shortDescription":"Must have cyber intelligence \r\nservice to mitigate cyber threats\r\nLearn about threats, leaks, attacks, and hacking activity before they can harm your business\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Group-IB Threat Intelligence","keywords":"your, cyber, data, with, attack, threats, security, about","description":"Prompt attack and threat notifications for your company, clients and partnersDirect access to compromised data and TTPs of malicious activityDetections,","og:title":"Group-IB Threat Intelligence","og:description":"Prompt attack and threat notifications for your company, clients and partnersDirect access to compromised data and TTPs of malicious activityDetections,","og:image":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Threat_Intelligence.png"},"eventUrl":"","translationId":1180,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1205,"logoURL":"https://old.b4r.io/fileadmin/user_upload/ObserveIT.png","logo":true,"scheme":false,"title":"ObserveIT","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"observeit","companyTitle":"ObserveIT","companyTypes":["supplier","vendor"],"companyId":4077,"companyAlias":"observeit","description":"<span style=\"font-weight: bold;\">Insider Threat Detection</span>\r\n\r\n<ul><li>Uncover risky user activity by identifying anomalous behavior in real time.</li><li>Insider Threat Rules</li><li>Rely on hundreds of carefully calibrated, out-of-the-box Insider Threat Rules</li><li>Gain insight into 25 risk categories (all customizable by user group)</li><li>Categorize website visits and enable alerts based on risky activity</li><li>Insider Threat Intelligence & Reporting</li><li>Enhance security operations and regulatory compliance with detailed reports</li><li>Investigate and view information about any user’s activities</li><li>Secure Key-Logging</li><li>Detect inappropriate activity in real time</li><li>Trigger alerts on sensitive keywords and commands typed</li><li>Detect data exfiltration attempts when users type protected keywords</li></ul>\r\n<span style=\"font-weight: bold;\">Incident Investigation</span>\r\n\r\n<ul><li>Investigate risky user activity in minutes—not days. Gain a comprehensive, 360-degree view into user behavior.</li><li>User Session Recording</li><li>Record user sessions for visual playback of exactly what happened, when, where, and why</li><li>Rich, user-centric metadata provides full context of any user session</li><li>Precise activity trails show every user action</li><li>Receive easy-to-understand alerts based on user activity</li><li>Easily search through captured sessions and get a breakdown of each user session</li></ul>\r\n<span style=\"font-weight: bold;\">Insider Threat Prevention</span>\r\n\r\n<ul><li>Reduce risk with real-time user notifications and blocking. Directly enforce company security policy—automatically and in real time—to promote security awareness and prevent insider threats.</li><li>Block Out-of-Policy Actions</li><li>Block user activities that breach security or violate company policies</li><li>Stop incidents before they can progress</li><li>Real-Time User Notifications</li><li>Warn users against proceeding with actions that violate policy</li><li>Notify users that policy violations will be recorded and reviewed</li><li>Reduce non-compliant actions by 80% with real-time warnings</li><li>Optimize security and IT processes by collecting user feedback</li></ul>\r\n<span style=\"font-weight: bold;\">Monitoring and Management of Privileged Users</span>\r\n\r\n<ul><li>Precise visibility helps security account for all user activity and is crucial for root cause analysis, regulatory compliance audit reporting, and proactive user monitoring on high-risk users.</li><li>Get user audit trails of everything that happens on your critical systems</li><li>Monitor, record and analyze any privileged user action</li><li>Monitor critical system access & activity on any system including:</li><li>Windows Server</li><li>31 Distributions of Unix/Linux</li><li>Citrix, VMware, and Hyper-V</li><li>AWS/Azure Systems</li><li>Detect Privileged Escalation & System Access</li><li>Monitor remote connections such as Remote Desktop, Terminal Services, VMware, GoToMyPC, LogMeIn, SSH, Telnet, ICA, and local logins</li><li>Alert security and IT teams to abnormal, suspicious or malicious privileged user activity</li><li>Account for any service or shared account with secondary identification</li></ul>\r\n<span style=\"font-weight: bold;\">Compliance</span>\r\n\r\n<ul><li>ObserveIT helps organizations meet appropriate compliance requirements across a range of frameworks.</li><li>Secondary Authentication</li><li>Require a secondary challenge-response for user using shared account IDs</li><li>Increase visibility into who did what, even when credentials are shared by team members</li><li>Secure shared accounts</li><li>DBA Auditing</li><li>Monitor SQL queries executed by DBAs against production databases</li><li>Capture SQL query activity</li><li>Review SQL queries performed by date and other criteria</li><li>Reporting</li><li>Generate basic reports from preconfigured templates</li><li>Produce flexible application usage reports and trend analysis reviews</li><li>Create comprehensive customized reports based on their own requirements</li><li>Aggregate or summarize information about all monitored user activity</li></ul>\r\n<span style=\"font-weight: bold;\">User Privacy Protection</span>\r\n\r\n<ul><li>Anonymize user data to protect employee and contractor privacy, meet regulations, and maintain trust with your users.</li><li>Anonymization Mode</li><li>Encrypt and obfuscate all personal user information</li><li>In anonymization mode, information remains hidden unless specifically </li><li>requested and approved by an authorized administrator</li><li>Meet stringent privacy laws, including the EU General Data Protection Regulation</li></ul>\r\n<span style=\"font-weight: bold;\">Tool Integration</span>\r\nObserveIT natively integrates with major SIEM tools, ticketing systems, log management applications, and more.\r\nIntegrations\r\nGain a holistic view of your organization’s IT security\r\nEnable deeper insight into what’s going on across systems\r\nAccess ObserveIT data quickly via top SIEM & automation tools\r\nIntegrate ObserveIT insight into:\r\n<ul><li>Splunk</li><li>HP ArcSight</li><li>IBM QRadar</li><li>LogRhythm</li><li>Securonix</li><li>Exabeam</li><li>ServiceNow</li><li>Lieberman</li></ul>","shortDescription":"ObserveIT - Insider Threat Detection and Prevention","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ObserveIT","keywords":"user, security, with, activity, into, users, ObserveIT, Threat","description":"Insider Threat Detection\r\rUncover risky user activity by identifying anomalous behavior in real time.Insider Threat RulesRely on hundreds of carefully","og:title":"ObserveIT","og:description":"Insider Threat Detection\r\rUncover risky user activity by identifying anomalous behavior in real time.Insider Threat RulesRely on hundreds of carefully","og:image":"https://old.b4r.io/fileadmin/user_upload/ObserveIT.png"},"eventUrl":"","translationId":1206,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1263,"logoURL":"https://old.b4r.io/fileadmin/user_upload/WEBROOT_SECUREANYWHERE_R__BUSINESS_ENDPOINT_PROTECTION.png","logo":true,"scheme":false,"title":"Webroot SECUREANYWHERE® BUSINESS ENDPOINT PROTECTION","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"webroot-secureanywherer-business-endpoint-protection","companyTitle":"WEBROOT","companyTypes":["supplier","vendor"],"companyId":4091,"companyAlias":"webroot","description":"<span style=\"font-weight: bold;\">Multi-vector protection</span>\r\nProtects against threats across email, browsers, files, URLs, ads, apps, and more in real time.\r\n\r\n<span style=\"font-weight: bold;\">Deep learning intelligence</span>\r\nUses a layered approach to global threat intelligence to continually refine and enhance classification accuracy.\r\n\r\n<span style=\"font-weight: bold;\">Zero-hour security</span>\r\nUses advanced behavioral heuristics to identify and protect against never-before-seen threats.\r\n\r\n<span style=\"font-weight: bold;\">Industry-leading efficacy</span>\r\nSecures endpoints with 100% efficacy over a 24-hour period, as shown in independent tests by MRG Effitas.\r\n\r\n<span style=\"font-weight: bold;\">Fast deployment & scans</span>\r\n<1 MB client deploys and scans in seconds and is always up-to-date, without bulky updates or definitions.\r\n\r\n<span style=\"font-weight: bold;\">No conflicts</span>\r\nRuns alongside other security software. No need to uninstall existing protection just to give us a try.\r\n\r\n<span style=\"font-weight: bold;\">No reimaging</span>\r\nUses journaling and rollback features to restore files to their uninfected state, so you don't have to reimage.\r\n\r\n<span style=\"font-weight: bold;\">Online management</span>\r\nEnables endpoint management anywhere, anytime, online with hierarchical controls and visibility.\r\n\r\n<span style=\"font-weight: bold;\">RMM & PSA integrations</span>\r\nIntegrates with leading RMM and PSA platforms for single-pane-of-glass MSP management.\r\n\r\n<span style=\"font-weight: bold;\">Flexible billing</span>\r\nOffers monthly and annual subscription options, so MSPs pay as you go, per device, per month.\r\n\r\n<span style=\"font-weight: bold;\">Lower TCO</span>\r\nImposes minimal system burden, improves automation, and streamlines management to boost MSP profitability.\r\n<span style=\"font-weight: bold;\">Unity API</span>\r\nEnhances automation, reduces management costs, improves reporting, and simplifies billing for MSPs.\r\n\r\n","shortDescription":"SECUREANYWHERE® BUSINESS ENDPOINT PROTECTION - Cybercriminals attack endpoints from all angles. Multi-vector protection from Webroot is the only way to secure endpoints and users across all stages of a cyberattack.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Webroot SECUREANYWHERE® BUSINESS ENDPOINT PROTECTION","keywords":"management, Uses, with, scans, MSPs, security, intelligence, efficacy","description":"Multi-vector protection\rProtects against threats across email, browsers, files, URLs, ads, apps, and more in real time.\r\rDeep learning intelligence\rUses a","og:title":"Webroot SECUREANYWHERE® BUSINESS ENDPOINT PROTECTION","og:description":"Multi-vector protection\rProtects against threats across email, browsers, files, URLs, ads, apps, and more in real time.\r\rDeep learning intelligence\rUses a","og:image":"https://old.b4r.io/fileadmin/user_upload/WEBROOT_SECUREANYWHERE_R__BUSINESS_ENDPOINT_PROTECTION.png"},"eventUrl":"","translationId":1264,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1265,"logoURL":"https://old.b4r.io/fileadmin/user_upload/WEBROOT_SECUREANYWHERE_R__BUSINESS_ENDPOINT_PROTECTION.png","logo":true,"scheme":false,"title":"Webroot SecureAnywhere® Small Business AntiVirus","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"webroot-secureanywherer-small-business-antivirus","companyTitle":"WEBROOT","companyTypes":["supplier","vendor"],"companyId":4091,"companyAlias":"webroot","description":"Benefits\r\n\r\n<span style=\"font-weight: bold;\">Complete protection</span>\r\nStops threats from email, web browsers, files, URLs, ads, apps, and more in real time.\r\n\r\n<span style=\"font-weight: bold;\">1-click installation</span>\r\nInstalls and is fully operational in less time than it takes to refill your coffee. It's that easy.\r\n\r\n<span style=\"font-weight: bold;\">No more slowdowns</span>\r\nReal-time protection from the cloud means your devices don’t get bogged down with bulky updates.\r\n\r\n<span style=\"font-weight: bold;\">No software conflicts</span>\r\nWon't conflict with other software or security. No need to uninstall your programs to give us a try.\r\n\r\n<span style=\"font-weight: bold;\">Lightning fast scans</span>\r\nAt under 1 MB, our security client only takes a few seconds to scan and secure your devices.\r\n\r\n<span style=\"font-weight: bold;\">Ransomware protection</span>\r\nRevolutionary rollback technology can unlock and restore various files that have been infected and held for ransom.\r\n\r\n<span style=\"font-weight: bold;\">Real-time anti-phishing</span>\r\nBlocks fake sites that try to steal your data by disguising themselves as websites you trust.\r\n\r\n<span style=\"font-weight: bold;\">Online management</span>\r\nNo matter where you are, you can manage the security of your devices from one simple dashboard console.","shortDescription":"Webroot SecureAnywhere® Small Business AntiVirus protects your small business or home office from viruses and other online threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Webroot SecureAnywhere® Small Business AntiVirus","keywords":"your, security, protection, from, devices, that, more, time","description":"Benefits\r\rComplete protection\rStops threats from email, web browsers, files, URLs, ads, apps, and more in real time.\r\r1-click installation\rInstalls and is","og:title":"Webroot SecureAnywhere® Small Business AntiVirus","og:description":"Benefits\r\rComplete protection\rStops threats from email, web browsers, files, URLs, ads, apps, and more in real time.\r\r1-click installation\rInstalls and is","og:image":"https://old.b4r.io/fileadmin/user_upload/WEBROOT_SECUREANYWHERE_R__BUSINESS_ENDPOINT_PROTECTION.png"},"eventUrl":"","translationId":1266,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":303,"logoURL":"https://old.b4r.io/fileadmin/user_upload/UserGate_Proxy___Firewall.png","logo":true,"scheme":false,"title":"UserGate Proxy & Firewall","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"usergate-proxy-firewall","companyTitle":"Entensys","companyTypes":["vendor"],"companyId":2811,"companyAlias":"entensys","description":"Control Internet Access. Protect from Advanced Threats.\r\nUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe.\r\n\r\nNetwork Firewall, IDPS, and Router\r\nEnforce uninterrupted connectivity, network access controls, and regulate Internet traffic.\r\nKeep viruses, worms, Trojans, and spyware from infesting your network.\r\nGuarantee the bandwidth levels required to serve business-critical applications.\r\nMonitoring User Internet Activity\r\n\r\nControl access to websites and enforce any reasonable corporate policy.\r\nLink the headquarters to remote users and branch offices through a Secure VPN connection\r\nProduct Overview\r\nUserGate Proxy & Firewall is an all-in-one gateway security solution combining a network firewall, router, gateway antivirus, intrusion detection and prevention (IDPS), VPN server, web filtering, reporting and statistics and other important functions. It allows you to manage network traffic, optimize bandwidth, and provide Internet access control.\r\n\r\nHow does it work?\r\nUserGate Proxy & Firewall can be installed on any Windows-based machine and works as a web security gateway. It provides Internet access sharing, web security, and traffic management. UserGate works basing on user account and applicable policies. The product lets administrators control traffic flow and trace web pages visited by employees. Numerous policies can be used to grant or restrict access to specific website categories, control downloads or application use, set traffic quotas, and keep detailed statistics.\r\n","shortDescription":"UserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"UserGate Proxy & Firewall","keywords":"access, Internet, Firewall, UserGate, traffic, network, Proxy, security","description":"Control Internet Access. Protect from Advanced Threats.\rUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous","og:title":"UserGate Proxy & Firewall","og:description":"Control Internet Access. Protect from Advanced Threats.\rUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous","og:image":"https://old.b4r.io/fileadmin/user_upload/UserGate_Proxy___Firewall.png"},"eventUrl":"","translationId":304,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":576,"logoURL":"https://old.b4r.io/fileadmin/user_upload/infotecs_ViPNet_Coordinator_HW.jpg","logo":true,"scheme":false,"title":"infotecs ViPNet Coordinator HW","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"infotecs-vipnet-coordinator-hw","companyTitle":"infotecs","companyTypes":["supplier","vendor"],"companyId":2979,"companyAlias":"infoteks","description":"ViPNet Coordinator — семейство шлюзов безопасности, входящих в состав продуктовой линейки ViPNet Network Security. В зависимости от настроек ViPNet Coordinator может выполнять следующие функции в защищенной сети ViPNet: \r\n<span style=\"font-weight: bold;\">Маршрутизатор VPN-пакетов:</span> маршрутизация зашифрованных IP-пакетов, передаваемых между сегментами защищенной сети.\r\n<span style=\"font-weight: bold;\">VPN-шлюз:</span> туннелирование (шифрование и имитозащита) открытых IP-пакетов, передаваемых между локальными сегментами сети.\r\n<span style=\"font-weight: bold;\">Межсетевой экран:</span> анализ, фильтрация и регистрация IP-трафика на границе сегмента сети.\r\n<span style=\"font-weight: bold;\">Транспортный сервер: </span>маршрутизация передачи защищенных служебных данных в сети ViPNet, почтовых сообщений, передаваемых программой «ViPNet Деловая почта».\r\n<span style=\"font-weight: bold;\">Сервер IP-адресов, сервер соединений:</span> обеспечивает регистрацию и доступ в реальном времени к информации о состоянии объектов защищенной сети и о текущем значении их сетевых настроек (IP- адресов и т.п.).\r\nПродукты ViPNet Coordinator адаптированы для использования в различных отраслях и сценариях применения. Семейство шлюзов безопасности ViPNet Coordinator подразделяется на решения, в зависимости от особенностей их исполнения, в том числе аппаратной платформы продукта, набора дополнительных сетевых сервисов, производительности, сетевых интерфейсов и др. ","shortDescription":"ViPNet Coordinator HW — семейство шлюзов безопасности, входящих в состав продуктовой линейки ViPNet Network Security","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"infotecs ViPNet Coordinator HW","keywords":"ViPNet, сети, Coordinator, защищенной, передаваемых, сетевых, маршрутизация, настроек","description":"ViPNet Coordinator — семейство шлюзов безопасности, входящих в состав продуктовой линейки ViPNet Network Security. В зависимости от настроек ViPNet Coordinator","og:title":"infotecs ViPNet Coordinator HW","og:description":"ViPNet Coordinator — семейство шлюзов безопасности, входящих в состав продуктовой линейки ViPNet Network Security. В зависимости от настроек ViPNet Coordinator","og:image":"https://old.b4r.io/fileadmin/user_upload/infotecs_ViPNet_Coordinator_HW.jpg"},"eventUrl":"","translationId":2423,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":43,"title":"Data Encryption","alias":"data-encryption","description":"Шифрова́ние — обратимое преобразование информации в целях сокрытия от неавторизованных лиц, с предоставлением, в это же время, авторизованным пользователям доступа к ней. Главным образом, шифрование служит задачей соблюдения конфиденциальности передаваемой информации. Важной особенностью любого алгоритма шифрования является использование ключа, который утверждает выбор конкретного преобразования из совокупности возможных для данного алгоритма[1][2].\r\n\r\nПользователи являются авторизованными, если они обладают определенным аутентичным ключом. Вся сложность и, собственно, задача шифрования состоит в том, как именно реализован этот процесс[1].\r\n\r\nВ целом, шифрование состоит из двух составляющих — зашифрование и расшифрование.\r\n\r\nС помощью шифрования обеспечиваются три состояния безопасности информации[1]:\r\n\r\nКонфиденциальность.\r\nШифрование используется для скрытия информации от неавторизованных пользователей при передаче или при хранении.\r\nЦелостность.\r\nШифрование используется для предотвращения изменения информации при передаче или хранении.\r\nИдентифицируемость.\r\nШифрование используется для аутентификации источника информации и предотвращения отказа отправителя информации от того факта, что данные были отправлены именно им.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-encryption.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":["Ensure Security and Business Continuity"],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}