{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"_type":"localeString","en":"Offer a reference bonus","ru":"Предложить бонус за референс"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Сonfigurator"},"i-sell-it":{"_type":"localeString","en":"I sell it","ru":"I sell it"},"i-use-it":{"en":"I use it","ru":"I use it","_type":"localeString"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"en":"Selling","ru":"Продают","_type":"localeString"},"using":{"en":"Using","ru":"Используют","_type":"localeString"},"show-more-button":{"_type":"localeString","en":"Show more","ru":"Показать еще"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"ru":"производитель","_type":"localeString","en":"manufacturer"},"short-description":{"ru":"Краткое описание","_type":"localeString","en":"Pitch"},"i-use-it-popover":{"en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString"},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"product-features":{"ru":"Особенности продукта","_type":"localeString","en":"Product features"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"solutions":{"_type":"localeString","en":" Problems that solves","ru":"Проблемы которые решает"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"testing":{"_type":"localeString","en":"Testing","ru":"Тестирование"},"compare":{"_type":"localeString","en":"Compare with competitors","ru":"Сравнить с конкурентами"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":" Characteristics"},"transaction-features":{"ru":"Особенности сделки","_type":"localeString","en":"Transaction Features"},"average-discount":{"ru":"Средняя скидка партнера","_type":"localeString","en":"Partner average discount"},"deal-protection":{"ru":"Защита сделки","_type":"localeString","en":"Deal protection"},"average-deal":{"_type":"localeString","en":"Average deal size","ru":"Средний размер сделки"},"average-time":{"_type":"localeString","en":"Average deal closing time","ru":"Средний срок закрытия сделки"},"login":{"ru":"Войти","_type":"localeString","en":"Login"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"to-know-more":{"ru":"Чтобы узнать больше","_type":"localeString","en":"To know more"},"scheme":{"en":" Scheme of work","ru":"Схема работы","_type":"localeString"},"competitive-products":{"ru":"Конкурентные продукты","_type":"localeString","en":" Competitive products"},"implementations-with-product":{"ru":"Внедрения с этим продуктом","_type":"localeString","en":"Deployments with this product"},"user-features":{"_type":"localeString","en":"User features","ru":"Особенности пользователей"},"job-roles":{"en":" Roles of Interested Employees","ru":"Роли заинтересованных сотрудников","_type":"localeString"},"organizational-features":{"_type":"localeString","en":"Organizational Features","ru":"Организационные особенности"},"calculate-price":{"ru":"Рассчитать цену продукта","_type":"localeString","en":" Calculate product price"},"selling-stories":{"_type":"localeString","en":" Selling stories","ru":"Продающие истории"},"materials":{"ru":"Материалы","_type":"localeString","en":"Materials"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"ru":"или","_type":"localeString","en":"or"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"ru":"Рассчитать ROI продукта","_type":"localeString","en":"Calculate Product ROI"},"complementary-categories":{"en":"Complementary Categories","ru":"Схожие категории","_type":"localeString"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"_type":"localeString","en":"Bonus","ru":"Бонус"},"rebate-for-poc":{"ru":"Бонус 4 POC","_type":"localeString","en":"Bonus 4 POC"},"configurator-content":{"ru":"Рассчитайте стоимость продукта","_type":"localeString","en":"Calculate price for this product here"},"configurator-link":{"en":"here","ru":"тут","_type":"localeString"},"vendor-popover":{"en":"vendor","ru":"производитель","_type":"localeString"},"user-popover":{"_type":"localeString","en":"user","ru":"пользователь"},"select-for-presentation":{"en":"select product for presentation","ru":"выбрать продукт для презентации","_type":"localeString"},"auth-message":{"_type":"localeString","en":"You have to register or login.","ru":"Вам нужно зарегистрироваться или войти."},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"en":"Calculate ROI for this product here","ru":"Рассчитайте ROI для данного продукта","_type":"localeString"},"not-yet-converted":{"en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString"},"videos":{"ru":"Видео","_type":"localeString","en":"Videos"},"vendor-verified":{"ru":"Подтверждено производителем","_type":"localeString","en":"Vendor verified"},"event-schedule":{"ru":"Расписание событий","_type":"localeString","en":"Events schedule"},"scheduling-tip":{"_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event.","ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент."},"register-to-schedule":{"ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To register for the event please log in or register on the site."},"comparison-matrix":{"ru":"Матрица сравнений","_type":"localeString","en":"Comparison matrix"},"compare-with-competitive":{"ru":"Сравнить с конкурентными","_type":"localeString","en":" Compare with competitive"},"avg-deal-closing-unit":{"_type":"localeString","en":"months","ru":"месяцев"},"under-construction":{"_type":"localeString","en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке."},"product-presentation":{"_type":"localeString","en":"Product presentation","ru":"Презентация продукта"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"_type":"localeString","en":"Requests","de":"References","ru":"Мои запросы"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Roi4Webinar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"_type":"localeString","en":"Company name","ru":"Компания"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"title":{"en":"ROI4CIO: Product","ru":"ROI4CIO: Продукт","_type":"localeString"},"meta":[{"name":"og:type","content":"website"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}],"translatable_meta":[{"translations":{"ru":"Конкретный продукт","_type":"localeString","en":"Example product"},"name":"og:title"},{"translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"},"name":"og:description"},{"name":"title","translations":{"ru":"Продукт","_type":"localeString","en":"Product"}},{"name":"description","translations":{"_type":"localeString","en":"Product description","ru":"Описание продукта"}},{"name":"keywords","translations":{"en":"Product keywords","ru":"Ключевые слова продукта","_type":"localeString"}}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"sophos-utm":{"id":251,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Sophos_UTM.gif","logo":true,"scheme":false,"title":"Sophos UTM","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"sophos-utm","companyTitle":"Sophos","companyTypes":["vendor"],"companyId":2791,"companyAlias":"sophos","description":"Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks. And clear, detailed reports will give you the insight you need to improve your network performance and protection.\r\nHighlights\r\nÌ Every feature available on every appliance\r\nÌ Firewall, VPN, ATP, IPS, email, web filtering and app control\r\nÌ Hardware, virtualized, software or cloudbased appliance\r\nÌ Intuitive browserbased interface\r\nÌ Built-in reporting on all models\r\nÌ Two-factor authentication with one-time password (OTP) in many areas\r\nÌ Integrated wireless controller\r\n\r\nConsolidated network security platform—no compromise\r\nProtect your network using multi-layered proven protection technologies including\r\nAdvanced Threat Protection (ATP), IPS, VPN, email and web filtering combined with the\r\nindustry’s simplest admin interface. We’ve engineered our software and hardware to give\r\nyou the throughput speeds you need. And, you can choose the level of protection you need\r\nwith modular subscriptions as every feature is available on every appliance.\r\nAll the Next-Gen Firewall features you need\r\nWe’ll give you complete control to block, allow, shape and prioritize applications. Our Deep\r\nLayer-7 inspection (Next-Generation Firewall) ensures true application identification and has\r\nregular automatic updates. And you’ll get feedback on unclassified applications too.\r\nIntuitive management and detailed reporting\r\nYou’ll know what’s happening with your users and you’ll have complete control over all the\r\nfeatures you need, with none of the complexity. Easily build policies while getting detailed\r\nreal-time and historical data with our on-box reporting, helping you to fix problems fast. And\r\nour Free Sophos UTM Manager lets you centrally administer several appliances through a\r\nsingle login.\r\nConnect remote offices with easy VPN and Wi-Fi\r\nSophos RED (Remote Ethernet Device) provides secure remote access to your off-site\r\nlocations. It’s the first security gateway that requires no technical skills at the remote site.\r\nOnce installed, it forwards traffic to the UTM for complete security. Sophos UTM also works\r\nas a wireless controller; access points are automatically set up and receive complete UTM\r\nprotection.","shortDescription":"Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions.","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Sophos UTM","keywords":"with, security, need, your, Sophos, control, protection, appliance","description":"Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular","og:title":"Sophos UTM","og:description":"Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular","og:image":"https://old.b4r.io/fileadmin/user_upload/Sophos_UTM.gif"},"eventUrl":"","translationId":252,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[{"id":1739,"logoURL":"https://old.b4r.io/fileadmin/content/Copy_of_Gurucul_Logo_-_2018-_High_.png","logo":true,"scheme":false,"title":"Gurucul Identity Analytics","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"gurucul-identity-analytics","companyTitle":"Gurucul","companyTypes":["supplier","vendor"],"companyId":4328,"companyAlias":"gurucul","description":"<p style=\"box-sizing: border-box; margin: 0px 0px 20px; font-family: Lato; color: #3a4145; font-size: 16px;\">Gurucul Identity Analytics (IdA) comprehensively manages and monitors identity-based risks and threats across an organization’s siloed environments. Using big data, Gurucul provides a holistic 360-degree view of identity, access, privileged access, and usage in the cloud, on mobile and on-premises. IdA reduces the access plane by detecting and removing access risks, access outliers, and orphan or dormant accounts. This improves an organization’s security posture by significantly decreasing the number of accounts that can be compromised or abused.</p>\r\n<p style=\"box-sizing: border-box; margin: 0px 0px 20px; font-family: Lato; color: #3a4145; font-size: 16px;\">Identity Analytics delivers the data science that improves IAM and PAM, enriching existing identity management investments and accelerating deployments. IdA surpasses human capabilities by leveraging machine learning models to define, review and confirm accounts and entitlements for access. It uses dynamic risk scores and advanced analytics data as key indicators for provisioning, de-provisioning, authentication and privileged access management.</p>\r\n<p style=\"box-sizing: border-box; margin: 0px; font-family: Lato; color: #3a4145; font-size: 16px;\">The impact of machine learning with Identity Analytics can radically reduce accounts and entitlements. Machine learning models provide 360-degree visibility for an identity, accounts and access, with the ability to compare to peer groups using baselines to determine normal and anomalous access. The objective is to clean up the access plane to enable access only where it should be provided.</p>","shortDescription":"Real-Time Access Control Automation Using Risk and Intelligence","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Gurucul Identity Analytics","keywords":"access, accounts, Identity, Analytics, data, Gurucul, identity, learning","description":"Gurucul Identity Analytics (IdA) comprehensively manages and monitors identity-based risks and threats across an organization’s siloed environments.","og:title":"Gurucul Identity Analytics","og:description":"Gurucul Identity Analytics (IdA) comprehensively manages and monitors identity-based risks and threats across an organization’s siloed environments.","og:image":"https://old.b4r.io/fileadmin/content/Copy_of_Gurucul_Logo_-_2018-_High_.png"},"eventUrl":"","translationId":1739,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"},{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"},{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1283,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Lieberman_RED_Suite.jpg","logo":true,"scheme":false,"title":"Lieberman RED Suite","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"lieberman-red-suite","companyTitle":"Lieberman Software Corporation","companyTypes":["supplier","vendor"],"companyId":4097,"companyAlias":"lieberman-software-corporation","description":"<span style=\"font-weight: bold;\">What Does The Lieberman REDTM Suite Do?</span>\r\nClean-Up compromised/poorly built environments in minutes with our Security Mass Management & Remediation Tools.\r\nTake back an “owned” environment with compromised administrator accounts by rapidly deploying our automated Privileged Identity Management solution.\r\nAutomate Privileged Identity & Access Management by implementing hard access controls to sensitive systems and identities.\r\nCreate a closed loop environment that automatically remediates intrusions in real-time by using our pre-built connectors for defense-in-depth applications: SIEMs, Advanced Analytics, Vulnerability Scanners, etc.\r\n<span style=\"font-weight: bold;\">Intrusion Remediation Cyber Security Suite</span>\r\nThe Lieberman RED – Rapid Enterprise DefenseTM Suite is a series of modules designed for Intrusion Response professionals. The components of the suite focus on the different areas of security, configuration and identity management necessary to successfully analyze and remediate a compromised environment.\r\n\r\n<span style=\"font-weight: bold;\">Cyber Security Suite</span>\r\nThe suite components provide permanent automated countermeasures against sophisticated attackers to reduce losses to acceptable levels, even during constant attack. The Lieberman RED Suite is optimized for speed, handles alternate credentials, understands platforms, and can crawl stacks for credential use.\r\nThese tools limit the lifetime of stolen credentials, get rid of well-known and shared credentials, and help you kill off unauthorized installed software. The Lieberman RED Suite disrupts intrusions rapidly, immediately and interactively with surgical precision.","shortDescription":"The Lieberman RED Suite provides award-winning automated privileged identity & access management for large and complex environments. The modules of the Lieberman RED Suite help red/blue teams, intrusion remediation specialists (IR), IT Admins, and auditors find and clean up intrusions and security weaknesses – a key activity to be performed before any PIM/PAM project is started. The platform scales to large, dispersed enterprise environments – on premises and in the cloud.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Lieberman RED Suite","keywords":"Suite, Lieberman, Security, environment, Management, with, compromised, credentials","description":"What Does The Lieberman REDTM Suite Do?\rClean-Up compromised/poorly built environments in minutes with our Security Mass Management & Remediation Tools.","og:title":"Lieberman RED Suite","og:description":"What Does The Lieberman REDTM Suite Do?\rClean-Up compromised/poorly built environments in minutes with our Security Mass Management & Remediation Tools.","og:image":"https://old.b4r.io/fileadmin/user_upload/Lieberman_RED_Suite.jpg"},"eventUrl":"","translationId":1284,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"},{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1285,"logoURL":"https://old.b4r.io/fileadmin/user_upload/BeyondTrust.png","logo":true,"scheme":false,"title":"BeyondTrust Privileged Password Management","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"beyondtrust-privileged-password-management","companyTitle":"BeyondTrust","companyTypes":["supplier","vendor"],"companyId":4098,"companyAlias":"beyondtrust","description":"<span style=\"font-weight: bold;\">Secure Privileged Password Management and Privileged Session Management</span>\r\nPowerBroker Password Safe is an automated password and privileged session management solution offering secure access control, auditing, alerting and recording for any privileged account – from local or domain shared administrator, to a user’s personal admin account (in the case of dual accounts), to service, operating system, network device, database (A2DB) and application (A2A) accounts – even to SSH keys, cloud, and social media accounts. Password Safe offers multiple deployment options and broad and adaptive device support.\r\n\r\n<ul><li>Reduce attack surfaces by eliminating credential sharing</li><li>Monitor and audit sessions for unauthorized access</li><li>Analyze behavior to detect suspicious user, account and asset activity</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Disrupt the Attack Chain Inside and Out</span>\r\nWhen integrated with PowerBroker Privileged Access Management platform solutions, PowerBroker Password Safe enables you to disrupt all stages of the cyber attack chain. The solutions combine best-in-class privilege, password and vulnerability management on top of a centralized reporting and analytics platform. As a result, you can efficiently reduce your organization’s attack surface, prevent lateral movement by attackers, and actively detect and respond to in-progress breaches.","shortDescription":"BeyondTrust Privileged Password Management - control and audit access to privileged accounts such as shared administrative accounts, application accounts, local administrative accounts, service accounts, database accounts, cloud and social media accounts, devices and SSH keys.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BeyondTrust Privileged Password Management","keywords":"Password, Management, Privileged, account, attack, accounts, Safe, PowerBroker","description":"Secure Privileged Password Management and Privileged Session Management\rPowerBroker Password Safe is an automated password and privileged session management","og:title":"BeyondTrust Privileged Password Management","og:description":"Secure Privileged Password Management and Privileged Session Management\rPowerBroker Password Safe is an automated password and privileged session management","og:image":"https://old.b4r.io/fileadmin/user_upload/BeyondTrust.png"},"eventUrl":"","translationId":1286,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"},{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1287,"logoURL":"https://old.b4r.io/fileadmin/user_upload/BeyondTrust.png","logo":true,"scheme":false,"title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"beyondtrust-powerbroker-endpoint-protection-platform","companyTitle":"BeyondTrust","companyTypes":["supplier","vendor"],"companyId":4098,"companyAlias":"beyondtrust","description":"<span style=\"font-weight: bold;\">Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment</span>\r\nTargeted attacks can easily bypass antivirus solutions and other individual lines of defense, necessitating multi-layered endpoint protection. The PowerBroker Endpoint Protection Platform eliminates the need to implement and manage multiple point products by combining system and application firewalls, intrusion prevention, anti-malware, antivirus, and local vulnerability assessment capabilities. PowerBroker Endpoint Protection secures systems from entire classes of attack, without constant rule or signature updates.\r\n<ul><li>Protect critical endpoints with an all-in-one firewall, IPS, anti-malware, antivirus solution</li><li>Conduct local vulnerability assessments of air-gapped and otherwise disconnected systems</li><li>Protect web servers and web applications against exploits, zero-days, and unauthorized access (optional)</li><li>Reduce system management costs with a “no-touch” solution that eliminates the need for constant updates</li><li>Rely on updates from the renowned BeyondTrust Security Research Team</li></ul>","shortDescription":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM - Unified Firewall, IPS, Anti-Malware and Anti-Virus\r\nIntegrated multi-layered endpoint protection in a single, lightweight client that replaces multiple security agents, protecting against Advanced Persistent Threats (APTs), known exploits, zero-days, and all other attack vectors.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","keywords":"antivirus, need, Protection, PowerBroker, Endpoint, eliminates, BeyondTrust, updates","description":"Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment\rTargeted attacks can easily bypass antivirus solutions and other individual","og:title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","og:description":"Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment\rTargeted attacks can easily bypass antivirus solutions and other individual","og:image":"https://old.b4r.io/fileadmin/user_upload/BeyondTrust.png"},"eventUrl":"","translationId":1288,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1291,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Panda_Security.png","logo":true,"scheme":false,"title":"Panda Endpoint Protection","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"panda-endpoint-protection","companyTitle":"Panda Security","companyTypes":["supplier","vendor"],"companyId":4100,"companyAlias":"panda-security","description":"<span style=\"font-weight: 700; \">Contextual Intelligence</span>\r\nThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter known and unknown threats.\r\nIt analyzes, categorizes and correlates all the data obtained about cyber-threats in order to initiate prevention, detection, response and remediation routines.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Next-Generation Endpoint Security</span>\r\nAdvanced cyber-security to counter malware, with prevention, detection and remediation capabilities.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Endpoint Detection and Response</span>\r\nMonitoring, collecting and categorization of 100% of the active processes on all the organization’s endpoints\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Malware Intelligence Platform</span>\r\nThe correlation of data on cyber-threats configures a security intelligence system able to uncover patterns of malicious behavior.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Advanced threats are gone</span>\r\nThe Platform connects contextual intelligence with defensive operations to pre-empt malicious behavior and data leaks.\r\nThis way, protection systems can be activated before threats are executed.\r\nComplete advanced protection for endpoints and servers to eradicate the malware.\r\n","shortDescription":"Panda Endpoint Protection is the intelligent cyber-security platform designed to eradicate advanced threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Panda Endpoint Protection","keywords":"malicious, behavior, threats, Endpoint, intelligence, data, protection, malware","description":"Contextual Intelligence\rThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter","og:title":"Panda Endpoint Protection","og:description":"Contextual Intelligence\rThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter","og:image":"https://old.b4r.io/fileadmin/user_upload/Panda_Security.png"},"eventUrl":"","translationId":1292,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1299,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png","logo":true,"scheme":false,"title":"SonicWall Capture Advanced Threat Protection","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sonicwall-capture-advanced-threat-protection","companyTitle":"SonicWall","companyTypes":["supplier","vendor"],"companyId":4104,"companyAlias":"sonicwall","description":"SONICWALL CAPTURE ADVANCED THREAT PROTECTION\r\nSonicWall Capture Advanced Threat Protection service is a cloud-based network sandbox that analyzes suspicious code to help discover and stop newly developed malware.\r\n\r\n<ul><li>Multi-engine cloud sandbox that includes virtualization, hypervisor level analysis and full-system emulation</li><li>High security effectiveness at diagnosing new threats</li><li>Automated breach prevention enabled by blocking files until a security verdict is determined</li><li>Near real-time signature deployment protects organizations from follow-on attacks</li><li>Email and app notifications with robust reporting from the sandbox environment</li></ul>\r\n\r\nMULTI-ENGINE ADVANCED THREAT ANALYSIS\r\nCapture executes suspicious code and analyzes behavior simultaneously in multiple engines. This provides you with comprehensive visibility into malicious activity, while resisting evasion tactics and maximizing zero-day threat detection.\r\n\r\nBROAD FILE TYPE ANALYSIS\r\nAnalyze a broad range of operating systems and file types, including executable programs, DLL, PDF, MS Office documents, archives, JAR and APK.\r\n\r\nBLOCK UNTIL VERDICT\r\nTo prevent potentially malicious files from entering the network, files sent to the cloud for analysis can be held at the gateway until a verdict is determined.\r\n\r\nRAPID DEPLOYMENT OF REMEDIATION SIGNATURES\r\nWhen a file is identified as malicious, a hash is immediately created within Capture and later a signature is sent to firewalls to prevent follow-on attacks.\r\n\r\nREPORTING AND ALERTS\r\nCapture Advanced Threat Protection offers an at-a-glance dashboard with reports that detail the analysis results for files sent to the service, including session information, OS information, OS activity and network activity.","shortDescription":"SonicWall Capture Advanced Threat Protection service is a cloud-based multi-engine sandbox designed to discover and stop unknown, zero-day attacks such as ransomware at the gateway with automated remediation.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SonicWall Capture Advanced Threat Protection","keywords":"Capture, files, from, that, analysis, malicious, sandbox, activity","description":"SONICWALL CAPTURE ADVANCED THREAT PROTECTION\rSonicWall Capture Advanced Threat Protection service is a cloud-based network sandbox that analyzes suspicious","og:title":"SonicWall Capture Advanced Threat Protection","og:description":"SONICWALL CAPTURE ADVANCED THREAT PROTECTION\rSonicWall Capture Advanced Threat Protection service is a cloud-based network sandbox that analyzes suspicious","og:image":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png"},"eventUrl":"","translationId":1300,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1301,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cybowall.png","logo":true,"scheme":false,"title":"Cybonet Cybowall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cybonet-cybowall","companyTitle":"Cybonet","companyTypes":["supplier","vendor"],"companyId":2085,"companyAlias":"cybonet","description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all endpoints. Cybowall protects your network in real time; detecting and reacting to threats as they arise. Cybowall combines multiple cybersecurity tools and capabilities in one solution - securing networks of all sizes and providing unified defense against a continuously evolving threat landscape. \r\n<span style=\"font-weight: bold;\">Solution Benefits</span>\r\n\r\n<ul><li>Stop Endpoint Tampering and Malware - Leverage network and endpoint detection of Advanced Persistent Threats </li><li>Map Network Assets - Increase visibility with a map of all endpoints connected to your network to gain insight into your environment</li><li>Identify Vulnerabilities - Stay informed of vulnerabilities for patch deployment prioritization</li><li>Detect Lateral Movement - Trap attackers that have already breached perimeter defenses</li><li>Detect Active Breaches - Discover network breaches quickly to reduce damaging effects</li><li>Meet Compliance Requirements - Adhere to compliance standards; GDPR, ISO, PCI-DSS, HIPAA etc.</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Breach Detection</span>\r\n\r\n<ul><li>Intrusion Detection - Breach detection capabilities without network interference.</li><li>Network Traps - Insight into lateral movement between endpoints and detects threats by serving as a trip wire for active attacks.</li><li>Network Forensics - Discover and analyze the source of security attacks and incidents.</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Network Visibility</span>\r\nAsset Mapping - Dynamic asset map of all endpoints, including port profiles and activities.\r\nWMI - Leverage WMI and continuous endpoint scanning for full network visibility.\r\nSIEM - Log management, event management, event correlation and reporting to help identify policy violations and enable response procedures.\r\n\r\n<span style=\"font-weight: bold;\">Vulnerability Management</span>\r\n\r\n<ul><li>Vulnerability Assessment - Monitor business assets and identify vulnerable systems inside the network, including risk level, for patch deployment prioritization.</li><li>Default Passwords - Pinpoint and change default passwords to reduce risks.</li><li>Malware Hunter - Identify malicious files and where they reside in the network.</li></ul>\r\n</p>\r\n","shortDescription":"Cybowall combines multiple cybersecurity tools and capabilities in one solution - securing networks of all sizes and providing unified defense against a continuously evolving threat landscape","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cybonet Cybowall","keywords":"network, your, endpoints, Network, Cybowall, threats, endpoint, Leverage","description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all","og:title":"Cybonet Cybowall","og:description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all","og:image":"https://old.b4r.io/fileadmin/user_upload/Cybowall.png"},"eventUrl":"","translationId":1302,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":321,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Ekran_System.png","logo":true,"scheme":false,"title":"Ekran System","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"ekran-system","companyTitle":"Cloud Labs","companyTypes":["vendor"],"companyId":2338,"companyAlias":"cloud-labs","description":"Ekran System performs user activity monitoring on servers and workstations with local, RDP, and terminal session recording for Windows and Citrix platforms as well as Telnet SSH session recording for Linux servers.\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\nUnlike focused software to track user activity (i.e. solutions to record terminal server sessions only or PC activity monitoring tools), Ekran System is a universal solution providing you with detailed user activity audit logs for any end-point in your corporate network via a single Web-based console. Thus you record RDP sessions and local user activity on end-points, perform terminal server user monitoring and Telnet SSH session monitoring using a single tool enabling cross-analytic options.\r\nWhen you choose Ekran System computer monitoring software, you receive:\r\nUniversal and network protocol agnostic monitoring\r\nSimple and integrated video format\r\nMultifactor search and corresponding reports\r\nIncident response tools\r\nAffordable floating licensing\r\n\r\n<span style=\"font-weight: bold;\">When to use Ekran System</span>\r\nEkran System is a universal user activity control software and can assist with multiple business tasks from staff PC monitoring to sensitive data access control:\r\nMonitor employee computer activity\r\nRecord user activity on critical servers\r\nControl privileged user activity\r\nAudit third-party IT service providers accessing your infrastructure\r\nTrack work with critical data and applications\r\n\r\n<span style=\"font-weight: bold;\">Advanced video format</span>\r\nSolutions are based on the principles of passive computer activity monitoring with advanced indexed video format at its core.\r\nVideo recording is an efficient tool to log and monitor user activity as it is all-inclusive and integrated, thus allowing for quick comprehension, reconstruction, and the tools to respond to a security incident.\r\n<span style=\"font-weight: bold;\">Real-time Monitoring Tool</span>\r\nEkran System allows you to perform the monitoring of user activity in real time, and if a user session is still running you can connect to it and monitor a live user screen. Besides recordings and alert functionality, Ekran System live sessions provide tools for a proper incident response. If dangerous activity is detected you can manually block the user.\r\n<span style=\"font-weight: bold;\">Record filtering</span>\r\nSoftware to monitor user activity will log thousands of user actions over a typical day. Solutions for monitoring computer activity of a number of users should provide some tools to make logging more focused.\r\nEkran System gives you several recording filtering options. You may record a selected number of key applications or optionally set up a list of private/non-critical applications or URLs you do not wish to monitor.\r\n<span style=\"font-weight: bold;\">Client Protection</span>\r\nEkran System Client and its data are protected from unauthorized intrusions of users with any privileges. By enabling the Protected Mode, you prevent Client uninstallation, process interruption, solution component editing and other monitoring blocking actions.\r\n<span style=\"font-weight: bold;\">Offline Monitoring Option</span>\r\nIf the network connection on the Client computer breaks for an undisclosed time, Ekran System Client will continue to work gathering monitored data in the offline mode to then send it to the server once the connection resumes.","shortDescription":"Ekran System is a user activity monitoring solution. It performs user session recording capturing all user on-screen activity in a video format as well as accompanying meta-data like active application name, active window title, visited URLs, typed keystrokes, and typed commands.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Ekran System","keywords":"activity, user, Ekran, monitoring, System, with, Client, computer","description":"Ekran System performs user activity monitoring on servers and workstations with local, RDP, and terminal session recording for Windows and Citrix platforms as","og:title":"Ekran System","og:description":"Ekran System performs user activity monitoring on servers and workstations with local, RDP, and terminal session recording for Windows and Citrix platforms as","og:image":"https://old.b4r.io/fileadmin/user_upload/Ekran_System.png"},"eventUrl":"","translationId":322,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1602,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Akamai_Technologies.png","logo":true,"scheme":false,"title":"Akamai Kona Web Application Firewall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"akamai-kona-web-application-firewall","companyTitle":"Akamai Technologies","companyTypes":["supplier","vendor"],"companyId":4283,"companyAlias":"akamai-technologies","description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application attacks. Globally-distributed across the Akamai Intelligent Platform™, Kona WAF can easily scale to defend against massive application attacks. Deployed at the edge of your network rather than in a data center, Kona WAF can identify and mitigate suspicious traffic without affecting performance or availability of the origin server. Security rules for Kona WAF are continuously refined by Akamai’s Threat Intelligence Team to protect against known attacks and respond to emerging threats. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">With Kona WAF you can: </span>\r\n<ul>\r\n<li>Reduce the risk of downtime, data theft and security breaches with a WAF that can scale to protect against the largest DoS and DDoS attacks.</li>\r\n<li>Ensure high performance even during attacks thanks to Akamai’s globally architecture.</li>\r\n<li>Defending against new and emerging threats with help from Akamai’s Threat Intelligence Team.</li>\r\n<li>Minimize costs of cloud security by avoiding the need for expensive dedicated hardware.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Key capabilities of Kona WAF</span>\r\n<ul>\r\n<li>Kona WAF provides comprehensive capabilities to protect against application-layer attacks. </li>\r\n<li>Adaptive rate controls automatically protect against application-layer DDoS and other volumetric attacks by monitoring and controlling the rate of requests against applications.</li>\r\n<li>Application-layer controls offer pre-defined, configurable WAF rules that govern Request Limit Violations, Protocol Violations, HTTP Policy Violations and more.</li>\r\n<li>Network-layer controls automatically deflect network-layer DDoS attacks at the network edge and define and enforce IP whitelists and blacklists to restrict requests from certain IP addresses or geographical regions.</li>\r\n<li>Security monitor provides real-time visibility into security events and enables administrators to drill down into attack alerts.</li>\r\n<li>Logging features enable you to integrate WAF and event logs with security information and event management to increase your threat posture awareness.</li>\r\n</ul>\r\n","shortDescription":"Kona Web Application Firewall from Akamai provides an highly scalable application firewall that defends against emerging threats to web security while keeping application performance high.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Akamai Kona Web Application Firewall","keywords":"attacks, against, Kona, with, security, Akamais, protect, controls","description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application","og:title":"Akamai Kona Web Application Firewall","og:description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application","og:image":"https://old.b4r.io/fileadmin/user_upload/Akamai_Technologies.png"},"eventUrl":"","translationId":1603,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1608,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cloudflare.png","logo":true,"scheme":false,"title":"Cloudflare web application firewall WAF","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cloudflare-web-application-firewall-waf","companyTitle":"Cloudflare","companyTypes":["supplier","vendor"],"companyId":4284,"companyAlias":"cloudflare","description":"Cloudflare’s enterprise-class web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site scripting, and cross-site forgery requests with no changes to your existing infrastructure.\r\nCloudflare sees roughly 2.9 million requests every second and our WAF is continually identifying and blocking new potential threats.\r\n<span style=\"font-weight: bold;\">Automatic WAF Updates</span>\r\nCloudflare security engineers constantly monitor the Internet for new vulnerabilities. When we find threats that apply to a large portion of our users, we automatically apply WAF rules to protect their Internet properties. Let us take care of tracking state-of-the-art hacking techniques so you can focus on creating useful features instead of protecting them from would-be attackers.\r\nOn-premise firewalls quickly become outdated and require professional service hours to regularly update rules to protect against new threats. Cloudflare’s WAF helps you stay ahead of threats by automatically updating when new security vulnerabilities are released. Rules created by Cloudflare in response to new threats are responsible for mitigating the vast majority of threats on our network. While traditional OWASP rules and customer specific rules are important, they are not enough without Cloudflare's automatic WAF updates.\r\n<span style=\"font-weight: bold;\">Collective Intelligence</span>\r\nCloudflare sees roughly 2.9 million requests every second, and our WAF is continually identifying and blocking new potential threats. If you’re using a web application firewall that doesn’t leverage the collective intelligence of other web properties, you need to supply all your own WAF rules from scratch, which means you need to monitor the entire Internet security landscape on your own.\r\n<span style=\"font-weight: bold;\">Intelligent WAF</span>\r\nWhen one customer requests a new custom WAF rule, we analyze whether it applies to all 7 million domains on our network. If it does, we automatically apply that rule to everybody on our network. The more web properties on our network, the stronger our WAF gets, and the safer the Cloudflare community becomes.\r\n<span style=\"font-weight: bold;\">Multi-Cloud Holistic Security Framework</span>\r\nCloudflare offers a single source of control for the security of websites, applications, and APIs, hosted across multiple cloud environments. Multi-cloud security provides visibility into security events, while allowing for consistent security controls, across all clouds in which Internet assets are deployed. Any attack traffic seen by Cloudflare is recorded and analyzed. Cloudflare’s network then shields Internet assets across all cloud providers.\r\n<span style=\"font-weight: bold;\">PCI Compliance</span>\r\nUtilizing Cloudflare’s WAF helps you cost effectively fulfill PCI compliance. If you’re a merchant who handles consumer credit card information, PCI DSS 2.0 and 3.0 Requirement 6.6 allows for two options to meet this requirement:\r\n<span style=\"font-weight: bold;\">Deploy a WAF in front of your website</span>\r\nOr, conduct application vulnerability security reviews of all of your in-scope web applications\r\n<span style=\"font-weight: bold;\">OWASP, Application-Specific, and Custom Rules</span>\r\nCloudflare’s WAF protects your web properties from the OWASP top 10 vulnerabilities by default. These OWASP rules are supplemented by 148 built-in WAF rules that you can apply with the click of a button. Business and Enterprise customers can also request custom WAF rules to filter out specific attack traffic.\r\n<span style=\"font-weight: bold;\">OWASP Top 10 Vulnerabilities</span>\r\n<ul><li>Injection</li><li>Broken Authentication and Session Management</li><li>Sensitive Data Exposure</li><li>XML External Entities (XXE)</li><li>Broken Access Control</li><li>Security Misconfiguration</li><li>Cross-Site Scripting (XSS)</li><li>Insecure Deserialization</li><li>Using Components with Known Vulnerabilities</li><li>Insufficient Logging & Monitoring</li></ul>\r\n<span style=\"font-weight: bold;\">Protecting Against Zero-Day Vulnerabilities</span>\r\nCloudflare security engineers have dealt with a lot of zero-day vulnerabilities over the years. Read our developer blog to learn how every website on our network benefits from their virtual patches.\r\n<span style=\"font-weight: bold;\">A Look at the New WP Brute Force Amplification Attack</span>\r\nA vulnerability in the XML remote procedure protocol allowed potentially thousands of brute force password attempts in a single HTTP request.\r\n<span style=\"font-weight: bold;\">The Joomla Unserialize Vulnerability</span>\r\nThe Joomla Unserialize Vulnerability allowed remote code execution via a poorly sanitized User-Agent and X-Forwarded-For headers.\r\n<span style=\"font-weight: bold;\">Protection Against Critical Windows Vulnerability (CVE-2015-1635)</span>\r\nCloudflare WAF protected users from a critical bug that allowed unpriviledeged users to hang a Windows web server.\r\n<span style=\"font-weight: bold;\">Threat Blocking & Privacy Features</span>\r\n<ul><li>Collective intelligence to identify new threats</li><li>Reputation-based threat protection</li><li>Comment spam protection</li><li>Block or challenge visitors by IP address</li><li>Block or challenge visitors by AS number</li><li>Block or challenge visitors by country code</li><li>User agent blocking</li><li>Zone lockdown</li><li>Security level configuration</li></ul>","shortDescription":"Cloudflare’s web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site scripting.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cloudflare web application firewall WAF","keywords":"Cloudflare, security, rules, your, threats, network, from, Internet","description":"Cloudflare’s enterprise-class web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site","og:title":"Cloudflare web application firewall WAF","og:description":"Cloudflare’s enterprise-class web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site","og:image":"https://old.b4r.io/fileadmin/user_upload/Cloudflare.png"},"eventUrl":"","translationId":1609,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1610,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Radware.jpg","logo":true,"scheme":false,"title":"Radware AppWall - Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"radware-appwall-web-application-firewall-waf","companyTitle":"radware","companyTypes":["vendor"],"companyId":2746,"companyAlias":"radware","description":"AppWall is an ICSA Labs certified and PCI compliant WAF that combines positive and negative security models to provide complete protection against web application attacks, web application attacks behind CDNs, API manipulations, advanced HTTP attacks (slowloris, dynamic floods), brute force attacks on login pages and more.\r\nA core and integrated part of Radware's Attack Mitigation Solution – a complete application and network security suite. AppWall is a web application firewall (WAF) that provides patent-protected technology to create and maintain security policies in real-time for widest security coverage with the lowest false positives and minimal operational effort. Radware’s Web application security technology features a variety of deployment modes – as a stand-alone or integrated on an ADC, on-premise and in the cloud, inline or out-of-band.\r\nWhat Makes AppWall a Better Web Application Firewall (WAF)?\r\n<span style=\"font-weight: bold;\">Protection from Zero-Day Web Attacks </span>\r\nUsing both negative (signature based) and positive security models - AppWall is a web application firewall (WAF) that features not only the lowest false positives and minimal operational effort, but also robust protection against known and unknown (Zero-day) threats.\r\n<span style=\"font-weight: bold;\">Reduced TCO with Lowest False Positives</span>\r\nUnique Auto Policy Generation technology designed to secure a web application as automatically as possible with little or limited user interaction. AppWall is a web application firewall (WAF) that analyzes the protected Web application and derives the potential threats in it. It then generates individual, granular protection rules and sets a policy in blocking mode - thus eliminating the need for human intervention and saving on maintenance and labor resources.\r\n<span style=\"font-weight: bold;\">Continuous Security Delivery</span>\r\nFirst web application firewall (WAF) to provide a real-time security patching solution for Web applications in continuous application deployment environments via a tight integration with Dynamic Application Security Testing (DAST) solutions.\r\n<span style=\"font-weight: bold;\">Device Fingerprinting for Bot Protection</span>\r\nAppWall is an IP agnostic web-application security solution. It disregards IP source address context to protect from dynamic IP attacks. The power of the fingerprint is in the consolidated information extracted from dozens of browser attributes collected on the client side, facilitating accurate bot classification.\r\n<span style=\"font-weight: bold;\">Unique Out-of-Path Deployment with Full Mitigation</span>\r\nAppWall is the only web application firewall (WAF) that can be deployed out-of-path while still providing full mitigation. As part of Radware's integrated Attack Mitigation Solution, AppWall can communicate attack footprint and blocking policies to Radware’s perimeter attack-mitigation device, DefensePro, so the attack is blocked at the perimeter and the rest of the network is protected.\r\n<span style=\"font-weight: bold;\">Full Coverage of OWASP Top-10 Out-of-the-box</span>\r\nIncluding injections, cross-site scripting (XSS), cross-site request forgery (CSRF), broken authentication and session management and security misconfiguration.\r\n<span style=\"font-weight: bold;\">Data Leak Prevention</span>\r\nIdentifying and blocking sensitive information transmission such as credit card numbers (CCN) and social security numbers (SSN).\r\n<span style=\"font-weight: bold;\">Integrated Application Security & Application Delivery</span>\r\nAppWall is an integral part of Radware's Application Delivery Controller (ADC) solution suite, which allows customers to augment their web application security protection with local and global traffic redirection, application acceleration, bandwidth management, and other application-aware services, while benefitting from a single hardware platform.\r\n<span style=\"font-weight: bold;\">Easy Migration From Test Environments to Production</span>\r\nAn AppWall VA can be deployed with the application in the production environment or – if deployed in a lab – policy is easily migrated to the AppWall appliance in production. This approach simplifies the integration and shortens the deployment time of new applications and services in the virtualized and cloud data centers.\r\n<span style=\"font-weight: bold;\">ICSA Labs Certified WAF</span>\r\nRecognized for both the appliance and VM versions, ICSA Labs certifies AppWall for its depth and breadth of vulnerability protection, effectiveness, ease of implementation and low operation overhead.\r\n<span style=\"font-weight: bold;\">Comprehensive PCI Compliance Solution</span>\r\nAppWall enables organizations to fully comply with PCI DSS section 6.6 requirements and includes the most advanced security graphical reports to convey visibility into the application security and detected attacks.","shortDescription":"AppWall - Radware’s Web Application Firewall (WAF), ensures fast, reliable and secure delivery of mission-critical Web applications for corporate networks and in the cloud.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Radware AppWall - Web Application Firewall (WAF)","keywords":"application, AppWall, security, with, Application, attacks, protection, that","description":"AppWall is an ICSA Labs certified and PCI compliant WAF that combines positive and negative security models to provide complete protection against web","og:title":"Radware AppWall - Web Application Firewall (WAF)","og:description":"AppWall is an ICSA Labs certified and PCI compliant WAF that combines positive and negative security models to provide complete protection against web","og:image":"https://old.b4r.io/fileadmin/user_upload/Radware.jpg"},"eventUrl":"","translationId":1611,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1615,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Instart_Logic.jpg","logo":true,"scheme":false,"title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"instart-logic-visionary-web-application-firewall-and-ddos","companyTitle":"Instart Logic","companyTypes":["supplier","vendor"],"companyId":4285,"companyAlias":"instart-logic","description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of attacks including OWASP Top 10 vulnerabilities:\r\n<ul><li>Cross-Site Scripting</li><li>SQL injection</li><li>Slow HTTP DoS</li><li>Cross-Site Request Forgery</li></ul>\r\nInstart Logic also offers comprehensive distributed denial of service (DDOS) attack protection using our globally distributed platform to absorb and mitigate attacks. As an internet-scale service provider, our global-ready infrastructure ensures a best-in-class protection for your online presence.","shortDescription":"Instart Logic’s globally distributed carrier-grade security applications use artificial intelligence and machine learning to protect cloud, web and mobile applications from the threat","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","keywords":"attacks, Instart, distributed, DDOS, Visionary, Logic, service, protection","description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of","og:title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","og:description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of","og:image":"https://old.b4r.io/fileadmin/user_upload/Instart_Logic.jpg"},"eventUrl":"","translationId":1616,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1105,"logoURL":"https://old.b4r.io/fileadmin/user_upload/avanpost.jpg","logo":true,"scheme":false,"title":"Avanpost IDM","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"avanpost-idm","companyTitle":"Avanpost","companyTypes":["supplier","vendor"],"companyId":4014,"companyAlias":"avanpost","description":"<span style=\"font-weight: bold;\">Управление жизненным циклом учетных записей</span>\r\n\r\nУправление учетными записями пользователей информационных систем - это рутинная каждодневная работа ИТ-администраторов, которые вынуждены тратить много времени на такие операции, как их создание, изменение свойств, блокировку и разблокировку. При этом от корректного управления напрямую зависит защищенность информационных систем и обрабатываемой в них информации. В частности, так называемые «мертвые души», являющиеся серьезным риском несанкционированного доступа к системам - это результат отсутствия своевременной блокировки учетной записи при увольнении сотрудника. Поэтому автоматизация и контроль данных процессов - одна из важнейших задач управления доступом к информационным ресурсам.\r\n\r\n<ul><li>Создание, блокировка, разблокировка и удаление учетных записей на основании кадровых событий и заявок</li><li>Быстрая синхронизация изменений свойств из источников данных в учетные записи пользователей</li><li>Гибкая настройка автоматической обработки разных кадровых событий для разных групп работников</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Кадровые политики</span>\r\n\r\nПроцессы предоставления, изменения и отзыва доступа могут отличаться в зависимости от уровня организационной иерархии, времени работы в организации, географического местоположения филиала или подразделения и т.д. Для того, чтобы обеспечить особенности данных процессов в организации, Avanpost IDM позволяет настраивать кадровые политики в зависимости от различных условий и признаков, которые могут быть определены на основании персональной информации пользователя. Например, при увольнении рядового сотрудника, его учетная запись блокируется автоматически с отзывом всех полномочий в день увольнения. Но при увольнении топ-менеджера отзыв прав доступа происходит через согласование руководителя организации с целью возможности продления соответствующих полномочий на некоторое время после увольнения для передачи дел другому сотруднику.\r\n\r\n<span style=\"font-weight: bold;\">Множество источников, объединение данных</span>\r\n\r\nОдной из ключевых возможностей Avanpost IDM является одновременное взаимодействие с несколькими доверенными источниками информации по пользователям и управление ей на основании настраиваемых правил и политик. При этом источники информации могут быть как независимыми с точки зрения данных пользователя, так и пересекающимися, т.е. с дублируемой информацией. В этом случае в службе синхронизации с кадровыми источниками Avanpost IDM настраивается их приоритезация на уровне данных (какие типы данных и в каком источнике являются более достоверными для их загрузки и обновления в Avanpost IDM).\r\n\r\n<span style=\"font-weight: bold;\">Управление доступом</span>\r\n\r\nУправление доступом к информационным ресурсам современной организации является сложным многообразием различных процессов, таких как управление ролевой моделью, предоставление доступа при приеме на работу и отзыв при увольнении, согласование заявок на доступ и их исполнение, аудит прав доступа и расследование инцидентов. От эффективности данных процессов зависит не только защищенность корпоративной информации, но и производительность работы сотрудников, а в ряде случае и контрагентов. Чтобы обеспечить компромисс между безопасностью и эффективностью бизнес-процессов необходимо организовать единый центр управления данными процессами с максимальным сокращением числа ручных операций и минимизации человеческого фактора при принятии решений.\r\n\r\n<ul><li>Ролевая модель позволяет определить учетные записи и права доступа, предоставляемые по умолчанию или по запросу для разных групп пользователей, определяемых на основании организационно- штатной структуры</li><li>При изменении признаков пользователей (изменение подразделения, должности) доступы пользователя могут изменяться как автоматически, так и с подтверждением через заявку</li><li>Правила разграничения полномочий (SOD) позволяют контролировать совмещение критичных функций пользователем</li><li>Управление интегрированными системами</li></ul>\r\n<span style=\"font-weight: bold;\">Role Manager</span>\r\n\r\nAvanpost Role Manager – уникальный инструмент входящий в состав Avanpost IDM, предназначенный для автоматизации создания ролевой модели на предприятии любого масштаба. Если ранее «ручное» создание ролевой модели занимало несколько месяцев, то автоматизированный механизм аналитического построения ролей делает это за несколько часов.\r\nAvanpost Role Manager сравнивает существующие наборы прав пользователей по принципу похожести и нахождения сотрудников на одинаковых должностях, даже если они будут отличаться в названии. По результатам сравнения он предлагает предварительную ролевую модель с возможностью ручного редактирования до необходимого результата. Полученный финальный вариант можно автоматически загрузить в Avanpost IDM и запустить систему в промышленную эксплуатацию.\r\n\r\n<span style=\"font-weight: bold;\">История ролей</span>\r\n\r\nAvanpost IDM хранит максимальное количество исторических данных по изменению доступа к информационным ресурсам. Такая информация имеет огромное значения для проведения ретроспективного анализа при расследовании возможных инцидентов информационной безопасности. В Avanpost IDM хранится вся информации по изменению перечня ролей в контексте конкретного пользователя, включая их назначение и отзыв с указанием даты, времени и источника соответствующей задачи (ручное изменение, кадровое событие или заявка). Данная информация доступна для просмотра как через консоль администратора, так и в виде настраиваемых отчетов.\r\n\r\n<span style=\"font-weight: bold;\">Централизованный аудит и контроль соответствия</span>\r\n\r\nЧтобы обеспечить эффективную работу процессов по управлению доступом, недостаточно просто автоматизировать операции по согласованию и предоставлению прав. Администраторы корпоративных систем всегда будут обладать достаточными полномочиями, позволяющими внести изменения в матрицу доступа в обход автоматизированных процессов. Поэтому для минимизации таких рисков обязательно должны присутствовать процессы аудита и контроля соответствия. При этом данные процессы также должны быть автоматизированы, потому что ручное сравнение реальных полномочий пользователей с разрешенными потребует огромных трудозатрат и не сможет обеспечить актуальность полученных результатов.\r\n\r\n\r\n<ul><li>Все изменения прав доступа хранятся в одном месте, что позволяет получить информацию как о текущем доступе пользователя, так и произвести ретроспективный анализ.</li><li>Постоянная сверка прав и атрибутов учетных записей позволяет выявить несанкционированные изменения, сделанные в обход IDM</li><li>При выявлении несоответствий доступна возможность автоматического исправления, отправки прямого уведомления администраторам или отправки события в SIEM</li></ul>\r\n</p>\r\n<span style=\"font-weight: bold;\">Работа с отчетами</span>\r\n\r\nAvanpost IDM имеет в своем составе графический конструктор для построения отчетных форм и генерации соответствующих отчетов. При этом хранение в Avanpost IDM полной информации как по текущим правам доступа, так и в ретроспективе, позволяет получить в виде отчетов все данные, касающиеся пользовательского доступа, в различных срезах. Для максимального удобства бизнес-пользователей модуль отчетности имеет web-интерфейс и позволяет создавать отчеты в различных форматах, в том числе rtf, pdf и xls, а также настраивать расписание их генерации и отправлять полученные результаты на email.\r\n\r\n<span style=\"font-weight: bold;\">Устранение конфликтов и журнал аудита</span>\r\n\r\nВ архитектуре Avanpost IDM предусмотрен модуль аудита, который в онлайн-режиме осуществляет сверку существующих учетных записей и прав доступа в целевых системах с теми данными, которые присутствуют в его базе данных. Если в результате сверки обнаружены расхождения, это показатель несанкционированного изменения перечня учетных записей или их полномочий и свойств в целевых систем в обход IDM. По результатам обнаружения таких расхождений генерируются соответствующие события безопасности, которые отображаются в журнале аудита в консоли администратора, при этом администратору безопасности отправляется уведомление на email. Интерфейс журнала аудита позволяет не только просмотреть обнаруженные несоответствия, а также исправить их непосредственно из данной консоли.\r\n<span style=\"font-weight: bold;\">Сервис самообслуживания пользователей</span>\r\n\r\nРабота пользователей с заявками на доступ, включая операции по их созданию, согласованию и исполнению, является регулярной и чаще всего касается среднего менеджмента. Ведь создание и согласование заявок, как правило, осуществляют руководители подразделений, являющиеся либо непосредственными начальниками получателей доступа, либо бизнес-владельцами систем и ролей. Поэтому обеспечение удобства их работы и максимальная оптимизация этих рутинных операций является важнейшей задачей в контексте пользовательских процессов по управлению доступом. Для реализации такого юзабилити-подхода бизнес-пользователям доступен сервис самообслуживания, реализованный в виде web-приложения, в котором они могут просмотреть всю информацию по личному доступу, инициировать запрос на новые полномочия, а также участвовать в процессах доступных им согласований.\r\n\r\n\r\n<ul><li>Пользователи могут создавать заявки на получение дополнительных доступов, изменение статусов учетных записей, корректировку атрибутов своей карточки.</li><li>Руководители имеют возможность просмотра доступа и создания заявок на своих подчиненных</li><li>Функционал изменения паролей позволяет пользователям управлять своими паролями через единый интерфейс во всех интегрированных системах</li><li>Развитый движок workflow позволяет настраивать самые сложные процессы согласования, реализовывать сквозные бизнес процессы со смежными системами</li></ul>\r\n</p>\r\n<span style=\"font-weight: bold;\">Редактор БП</span>\r\n\r\nЧтобы гибко и удобно настраивать процессы согласования доступа, в состав модулей Avanpost IDM входит редактор бизнес-процессов, реализованный в виде графического конструктора. Данный редактор имеет дружелюбный web-интерфейс и максимально учитывает особенности согласования доступа в различных организациях. Процесс в редакторе представляет собой схему, состоящую из набираемых из предустановленного списка различных условий и действий, настраиваемых и соединяемых между собой с помощью графического интерфейса. Гибкая настройка позволяет осуществлять как последовательные, так и параллельные согласования, с возможностью тайминга, эскалации, замещения или делегирования. При этом вычисление согласующих лиц осуществляется с помощью специальных функций, позволяющих учесть все уникальные условия и признаки, такие как географическое местоположение, вид ресурса или роли, уровень организационной иерархии и т.п. Процессы согласования могут настраиваться на различные типы заявок, например, как запрос новой роли, отзыв роли, блокировка и разблокировка учетной записи, изменение личных данных, ресертификация доступа при смене должности.\r\n\r\n<span style=\"font-weight: bold;\">Управление паролями</span>\r\n\r\nНа ряду с управлением учетными записями и полномочиями управление паролями является основным процессом, необходимым для противодействия несанкционированного доступа к корпоративным ресурсам. Парольные политики должны быть достаточными для того, чтобы минимизировать соответствующий риск. Но в то же время они не должны доставлять больших неудобств пользователю, т.е. фактически должен быть достигнут некий компромисс между удобством и безопасностью. В Avanpost IDM cоздание учетной записи пользователя сопровождается автоматической генерацией пароля согласно заданной политике, при этом пароль безопасно доставляется пользователю, например, с помощью корпоративной почты на его личный почтовый ящик или SMS.\r\n\r\n\r\n<ul><li>Интеграция с Active Directory позволяет синхронизировать доменный пароль пользователя во все системы.</li><li>Пользователь может задать общий пароль для всех систем одновременно, или управлять паролями для каждой учетной записи отдельно</li><li>Парольные политики позволяют определить сложность пароля, количество повторений и интервалы смены вне зависимости от наличия этих функций в управляемой системе</li><li>Пароль, сгенерированный при создании учетной записи может быть доставлен пользователю</li></ul>\r\n</p>\r\n<span style=\"font-weight: bold;\">Парольные политики</span>\r\n\r\nAvanpost IDM позволяет настроить парольные политики для каждого целевого ресурса в отдельности. Помимо классических признаков, таких как длина пароля и алфавит, можно настроить и более сложные, например, максимальное и минимальное время действия пароля, длина истории паролей и минимальное количество изменяемых символов. Многообразие настроек парольных политик обеспечивает в том числе соответствие требованиям Приказов № 17 и 21 ФСТЭК России. Обеспечение и контроль данных политик осуществляется при создании учетной записи, истечению срока действия пароля и его смене через консоль администратора или личный кабинет пользователя.\r\n","shortDescription":"Avanpost IDM - система управления учетными записями и правами доступа пользователей к корпоративным ресурсам организации\r\n\r\nВ 60 раз быстрее исполняются заявки\r\nЗа 5 минут создается новая учетная запись пользователя\r\nНа 40% меньше нагрузка на администраторов почтовой системы","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avanpost IDM","keywords":"доступа, Avanpost, данных, позволяет, пользователя, записи, этом, прав","description":"Управление жизненным циклом учетных записей\r\rУправление учетными записями пользователей информационных систем - это рутинная каждодневная работа","og:title":"Avanpost IDM","og:description":"Управление жизненным циклом учетных записей\r\rУправление учетными записями пользователей информационных систем - это рутинная каждодневная работа","og:image":"https://old.b4r.io/fileadmin/user_upload/avanpost.jpg"},"eventUrl":"","translationId":2650,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1618,"logoURL":"https://old.b4r.io/fileadmin/user_upload/NSFOCUS.jpeg","logo":true,"scheme":false,"title":"NSFOCUS Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nsfocus-web-application-firewall-waf","companyTitle":"NSFOCUS","companyTypes":["supplier","vendor"],"companyId":4287,"companyAlias":"nsfocus","description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web application layer. It also includes up to 1 Gbps of DDoS protection from other volumetric and application layer attacks, including TCP flood and HTTP/S GET/ POST floods. Additionally, if deployed in conjunction with a higher capacity NSFOCUS ADS Series Anti-DDoS appliance, the WAF can direct flows in real-time to the ADS to keep your servers running under the most extreme conditions.\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Features and Benefits</span>\r\n<span style=\"font-weight: bold;\">Prevent Theft of Critical Data</span>\r\nData breaches are extremely complex and surprisingly frequent. The NSFOCUS WAF offers powerful protection against web attacks with a complete set of signatures for web vulnerabilities and the ability to detect unauthorized file uploads. WAF enforces access control policy from layer 4 through layer 7, to prevent access to data without proper authorization. In the later phases of an attack, WAF provides outbound data leakage detection, including illegal file download detection, web shell prevention, and filtering of sensitive information (such as credit card numbers and social security numbers).\r\n<span style=\"font-weight: bold;\">Ensure Website Availability</span>\r\nThe NSFOCUS WAF offers a built-in anti-DDoS module to protect against TCP flood attacks, HTTP/S GET/POST flood attacks and slow rate attacks up to 1Gbps. The WAF employs access rate thresholding, IP reputation and algorithm-based protection mechanisms. Coupled with the NSFOCUS ADS anti-DDoS product line, higher rate DDoS attacks can be thwarted.\r\n<span style=\"font-weight: bold;\">Close the PCI DSS Compliance Gap</span>\r\nThe NSFOCUS WAF provides reports for PCI audits as well as suggestions for policy tuning and configuration in order to help ensure compliance with PCI DSS. Protections like the cookie security feature within the WAF protects against cookie tampering and cookie poisoning in compliance with section 6.5.10 in the new PCI 3.2 standard.\r\n","shortDescription":"The WAF serves as an essential part of any defense-in-depth security architecture by providing advanced inspection and specialized security for the web application layer. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"NSFOCUS Web Application Firewall (WAF)","keywords":"attacks, NSFOCUS, with, security, layer, access, against, rate","description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web","og:title":"NSFOCUS Web Application Firewall (WAF)","og:description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web","og:image":"https://old.b4r.io/fileadmin/user_upload/NSFOCUS.jpeg"},"eventUrl":"","translationId":1619,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1622,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Airlock.png","logo":true,"scheme":false,"title":"Airlock Web Application Firewall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"airlock-web-application-firewall","companyTitle":"Ergon Informatik AG","companyTypes":["supplier","vendor"],"companyId":4288,"companyAlias":"ergon-informatik-ag","description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance, security for online banking or protection for eCommerce: Airlock WAF will upgrade security for your internet applications – a permanent solution with a host of well thought-out functionalities.\r\nThanks to Airlock WAF, businesses can exploit the potential of the internet without jeopardizing the security and availability of their web applications and services. Each access is systematically monitored and filtered at every level. Used in conjunction with an authentication solution such as Airlock Login or IAM, Airlock WAF can force upstream user authentication and authorization. This allows a uniform, central single sign-on infrastructure. All important information is also made available via monitoring and reporting functions. Airlock WAF is the only web application security solution on the market that provides superlative end-to-end protection for complex web environments.\r\n<span style=\"font-weight: bold;\">Airlock WAF - The main features</span>\r\n<ul><li>Secure Reverse Proxy</li><li>Central Checkpoint</li><li>Filtering</li><li>API Security</li><li>Dynamic Whitelisting</li><li>Central Security Hub</li><li>High Availability and Performance</li></ul>\r\n<span style=\"font-weight: bold;\">Airlock WAF is also available as a hardware appliance</span>\r\nWith the Airlock WAF hardware appliance, setup and going live will be even easier than today. Of course, hardware appliances can be connected to build a failover cluster with active session synchronization.","shortDescription":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications, whether your objective is PCI DSS compliance, security for online banking or protection ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Airlock Web Application Firewall","keywords":"Airlock, security, with, solution, applications, hardware, will, also","description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance,","og:title":"Airlock Web Application Firewall","og:description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance,","og:image":"https://old.b4r.io/fileadmin/user_upload/Airlock.png"},"eventUrl":"","translationId":1623,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1624,"logoURL":"https://old.b4r.io/fileadmin/user_upload/VenusTech.jpeg","logo":true,"scheme":false,"title":"Venusense Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"venusense-web-application-firewall-waf","companyTitle":"VenusTech","companyTypes":["supplier","vendor"],"companyId":4289,"companyAlias":"venustech","description":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. It mainly provides HTTP/HTTPS traffic analysis for Web servers, prevents attacks aimed at Web application vulnerabilities, optimizes Web application accesses to improve the availability, performance, and security of Web/network protocol based applications and ensure the quick, secure, and reliable delivery of Web service applications.\r\n<span style=\"font-weight: bold;\">Features:</span>\r\n● Web attack prevention\r\n-SQL injection attack prevention (based on the advanced patented algorithm)\r\n-XSS attack prevention (based on the advanced patented algorithm)\r\n-Malicious Web scanning prevention (supports virtual patching)\r\n-Application layer DoS attack prevention\r\n-HTTPS SSL3.0/TLS1.0/TLS1.1/TLS1.2.\r\n● Unauthorized Web access prevention\r\n-CSRF attack prevention (supports self-learning)\r\n-Cookie tamper prevention (supports self-learning)\r\n-Website hotlink prevention\r\n● Malicious Web code prevention\r\n-Webpage embedded Trojan prevention (based on the patented advanced algorithm)\r\n-WebShell prevention\r\n● Web application compliance\r\n-URL-based access control\r\n-HTTP protocol compliance (supports machine self-learning)\r\n-Sensitive information leakage prevention\r\n-File upload and download control\r\n-Web form keyword filtering\r\n● Web application delivery\r\n-Webpage defacement prevention\r\n-URL-based traffic control\r\n-Web application acceleration\r\n-Server load balancing\r\nValue: Venusense WAF uses a set of HTTP session policies that can protect security from common Web attacks such as SQL injection and XSS. Users can customize policies in order to recognize and block more attacks and mitigate Web security problems that cannot be resolved by using traditional security devices such as firewalls and UTMs. Venusense WAF does well in Web security protection and application delivery, provides the professional Web attack prevention capability, and brings an integrated Web security solution that is easy to deploy and manage. 4Advantages:\r\n● Leading Web security delivery and security protection capabilities in the industry: Integrates Web attack prevention, malicious Web code prevention, unauthorized Web access prevention, Web application compliance, and Web application delivery acceleration to build an excellent Web security delivery platform.\r\n● Complete and effective Web attack detection: Integrates VXID detection, event signature detection, customized event signature detection, and self-learning modeling detection to prevent known Web attacks such as SQL injection attacks, XSS attacks, and CSRF attacks and protect against special attacks and unknown attacks by using detection measures such as customized event signature and self-learning modeling.\r\n● Quick response to Web attack events: Has a built-in Web prevention event library, provides periodical upgrade and immediate upgrade once upon emergent Web events, quickly responds to latest, emergent, or hotspot Web attack events. With a large number of vulnerability discoverers and analysts, Venustech's ADLab has independently discovered the most CVE vulnerabilities in China.\r\nDeployment:\r\n● Bridge mode\r\nIn bridge mode, users do not need to change the original network topology and configurations, to protect the Web server.\r\n● Proxy mode\r\nIn proxy mode, the actual IP address of the Web server can be hidden to access users, to protect the Web server.\r\n● One-arm mode\r\nThe one-arm mode is similar to one-arm routing, in which WAF is physically deployed in bypass mode and logically deployed in path mode. In one-arm mode, attacks from the network application layer can be blocked. When WAF becomes unavailable, service traffic will not be blocked. In this mode, only one network interface is used to filter internal network traffic. Users do not need to change the physical network structure and IP settings, so configuration can be completed quickly.\r\n● BYPASS\r\nAs a serial access security device, WAF provides the software BYPASS function and hardware BYPASS function in bridge deployment mode to ensure smooth service links.\r\nCertifications and Honors: ● EAL3 Plus Certificate (Megabit, Gigabit, Ten-Gigabit)\r\n● CVE Certificate\r\n● Web Application Firewall Certificate issued by OWASP China\r\n● IPv6 Ready Logo Phase 2 Gold Accreditation Certificate","shortDescription":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Venusense Web Application Firewall (WAF)","keywords":"prevention, security, mode, application, attacks, attack, delivery, detection","description":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. It mainly","og:title":"Venusense Web Application Firewall (WAF)","og:description":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. It mainly","og:image":"https://old.b4r.io/fileadmin/user_upload/VenusTech.jpeg"},"eventUrl":"","translationId":1625,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1626,"logoURL":"https://old.b4r.io/fileadmin/user_upload/WAPPLES.jpg","logo":true,"scheme":false,"title":"WAPPLES Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"wapples-web-application-firewall-waf","companyTitle":"Penta Security Systems","companyTypes":["supplier","vendor"],"companyId":4290,"companyAlias":"penta-security-systems","description":"Market share leader for three consecutive years, WAPPLES is the Web Application Firewall (WAF) of choice for customers in the Asia Pacific.\r\nBesides blocking basic web attacks, WAPPLES is deployed to effectively guard against sensitive data leakage, block malicious web access and prevent website defacement in this era of intensified attacks.\r\nPowered by an intelligent detection engine, WAPPLES is capable of combating the newest threats, including attacks often utilized in Advanced Persistent Threats (APT) launched by malicious agents to obtain data assets of governments and enterprises or for terrorism or political gains.\r\nWhile traditional WAFs depend on high-maintenance signature updates for low-accuracy pattern-matching, WAPPLES uses a logic-based detection engine called COCEP™ (Contents Classification and Evaluation Processing).\r\nUtilizing 28 pre-configured detection rules, modified and even unknown attacks are categorized and blocked heuristically and semantically. This proprietary technology allows WAPPLES to deliver superior security with industry-leading accuracy and low false positive rates under various network environments. Maintaining high stability and performance, WAPPLES’ ease of deployment and low operational workload was recognized by Gartner as what made the WAF a popular choice for surveyed clients.\r\n<span style=\"font-weight: bold;\">WAF comparison</span>\r\nThrough the analysis of an attack’s characteristics, WAPPLES is able to identify attacks that utilize new patterns of exploit that often bypass typical WAFs utilizing signature-based detection engines.\r\n1st and 2nd generation WAFs that operate on blacklists and whitelists lag behind due to their reliance on signature updates to detect the latest threats. In comparison, the sophistication of security that WAPPLES can provide greatly surpasses that of signature-based WAFs.\r\n<span style=\"font-weight: bold;\">WAPPLES Product Family and Related Services</span>\r\n<ul><li>WAPPLES (Appliance-type WAF product)</li><li>WAPPLES SA (Virtual WAF optimized for cloud environment)</li><li>Cloudbric (Cloud-based web security service)</li><li>Cloudbric Business Edition (Web security delivered from Cloudbric or Partner infrastructure)</li></ul>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Features</span>\r\n<span style=\"font-weight: bold;\">High-Accuracy Web Attack Defense</span>\r\n<ul><li>Logic-analysis based COCEP™ engine protects websites against OWASP Top 10 risks</li><li>Extremely low false positive rates through heuristic and semantic traffic analysis</li><li>Utilizes 28 detection rules that can be fine-tuned to create robust custom security policies</li><li>Defense from known, zero-day, and HTTP DDoS attacks</li><li>Validity testing (Luhn: ISO/IEC7812) prevents leakage of sensitive data</li><li>High Performance and Stability</li></ul>\r\n<span style=\"font-weight: bold;\">Optimized core provides enhanced performance</span>\r\n<ul><li>High processing power with in-memory computing capability</li><li>Stable performance even with strict security policy settings enabled</li><li>Increased bandwidth through bonding technology</li><li>Easy to Install & Configure</li></ul>\r\n<span style=\"font-weight: bold;\">Minimal changes to existing systems</span>\r\n<ul><li>Quick setup with preconfigured security policies</li><li>Statistics visualized on centralized dashboard</li><li>Intuitive and easy-to-use GUI management console</li><li>Increases efficiency in web security management</li></ul>\r\n<span style=\"font-weight: bold;\">Supports Various Environments</span>\r\n<ul><li>Can be deployed in Reverse proxy, Inline, or High Availability (HA) configuration modes</li><li>Support for EtherChannel and Multi-Segment</li><li>Integration with SIEM (Micro Focus ArcSight, Splunk)</li></ul>\r\n<span style=\"font-weight: bold;\">Implementation</span>\r\nWhen a customer chooses to deploy WAPPLES, a thorough analysis of the customer environment will be conducted prior to installation. This is important for optimizing policy settings tailored to specific operational and business needs to achieve an optimal configuration. Post-installation, detection logs are also monitored over a period of time and analyzed to further fine-tune the security policies and complete the implementation process.\r\n<ul><li>Pre-inspection</li><li>WAPPLES installation</li><li>WAPPLES configuration</li><li>Operation testing and demonstration</li><li>Detection log analysis</li><li>Analysis report</li><li>Policy modification</li></ul>","shortDescription":"WAPPLES WAF is deployed to effectively guard against sensitive data leakage, blocking basic web attacks, block malicious web access and prevent website defacement in this era of intensified attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"WAPPLES Web Application Firewall (WAF)","keywords":"WAPPLES, security, detection, that, with, attacks, WAFs, performance","description":"Market share leader for three consecutive years, WAPPLES is the Web Application Firewall (WAF) of choice for customers in the Asia Pacific.\rBesides blocking","og:title":"WAPPLES Web Application Firewall (WAF)","og:description":"Market share leader for three consecutive years, WAPPLES is the Web Application Firewall (WAF) of choice for customers in the Asia Pacific.\rBesides blocking","og:image":"https://old.b4r.io/fileadmin/user_upload/WAPPLES.jpg"},"eventUrl":"","translationId":1627,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1628,"logoURL":"https://old.b4r.io/fileadmin/user_upload/DenyAll.png","logo":true,"scheme":false,"title":"DenyAll Web Application Firewall (LTS)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"denyall-web-application-firewall-lts","companyTitle":"DenyAll, a Rohde & Schwarz Cybersecurity company","companyTypes":["supplier","vendor"],"companyId":4291,"companyAlias":"denyall-kompanija-rohde-schwarz-cybersecurity","description":"DenyAll Web Application Firewall provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently passing benign traffic through. This all-in-one solution protects and manages multiple security solutions - Web Application Firewall, Web Services Firewall and Web Access Management - in a single management console (centralized administration station, monitoring, reverse proxy, etc.). The platform also provides cache, acceleration and optimization of your web traffic.\r\n<span style=\"font-weight: bold;\">Highlights</span>\r\n<ul><li>Web Application Firewall (WAF): to protect the web applications vital to every business against external threats and to assure continuous service.</li><li>Web Services Firewall (WSF): to protect the infrastructure, information networks and application servers against attacks while preventing denial of service and anticipating traffic overload.</li><li>Web Access Management (WAM): to simplify Web access authentication while maintaining a high level of security, without agent deployment on the application server.</li></ul>","shortDescription":"DenyAll Web Application Firewall (WAF) provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently passing benign traffic through.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DenyAll Web Application Firewall (LTS)","keywords":"Firewall, Application, security, while, traffic, service, application, DenyAll","description":"DenyAll Web Application Firewall provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently","og:title":"DenyAll Web Application Firewall (LTS)","og:description":"DenyAll Web Application Firewall provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently","og:image":"https://old.b4r.io/fileadmin/user_upload/DenyAll.png"},"eventUrl":"","translationId":1629,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":351,"logoURL":"https://old.b4r.io/fileadmin/user_upload/portnox.png","logo":true,"scheme":false,"title":"PORTNOX CORE","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"portnox-core","companyTitle":"Portnox","companyTypes":["supplier","vendor"],"companyId":2818,"companyAlias":"portnox","description":"\r\n<ul>\r\n<li>See relevant security risks on the network.</li>\r\n<li>Control access to ensure compliance with security protocols.</li>\r\n<li>Automate reactions based on device and user behavior to prevent breaches.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">See</span> Utilizing its agentless technology, Portnox CORE can detect and profile any device on the corporate network in real time and across all network layers. It is deployed from a central location and but can see activity across all network locations – from headquarters to remote offices. It integrates with most third party security applications to provide a complete and thorough picture of the network. <span style=\"font-weight: bold;\">Control</span> Portnox CORE mitigates cybersecurity risks with automated features to limit access, quarantine and block rogue devices or install patch updates. It remediates immediate security issues by allowing for complete control and wield over all network variables – from a smartwatch to a network server. CORE gives network admins the control they need to prevent risks and effectively respond to the ones that get through. <span style=\"font-weight: bold;\">Automate</span> Some say that the future of IT is automation. With Portnox CORE – you can have those cutting-edge features today. Deliver unique automated reactions based on network security protocols or risky device behavior, dramatically reducing the time and cost associated with manual response. Whether the reaction is enforcement or remediation, Portnox CORE can automate it and learn from the event context to maximize future protection.","shortDescription":"Portnox CORE is a solution for on-premise network access control, visibility and enforcement in real-time on all devices.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":9,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"PORTNOX CORE","keywords":"Portnox, devices, such, accuracy, only, network, user, right","description":"\r\rSee relevant security risks on the network.\rControl access to ensure compliance with security protocols.\rAutomate reactions based on device and user behavior","og:title":"PORTNOX CORE","og:description":"\r\rSee relevant security risks on the network.\rControl access to ensure compliance with security protocols.\rAutomate reactions based on device and user behavior","og:image":"https://old.b4r.io/fileadmin/user_upload/portnox.png"},"eventUrl":"","translationId":352,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"},{"id":205,"title":"NAC - Network Access Control","alias":"nac-network-access-control","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NAC.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1634,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Trustwave.png","logo":true,"scheme":false,"title":"TrustWave Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"trustwave-web-application-firewall-waf","companyTitle":"Trustwave","companyTypes":["supplier","vendor"],"companyId":4293,"companyAlias":"trustwave","description":"The Trustwave WAF integrates with Trustwave application scanning solution, App Scanner to provide customized protection for any application via virtual patching and is backed by the expertise of our elite SpiderLabs Research team, who deliver ongoing application vulnerability and emerging threat information.\r\nAttackers use a wide range or techniques to attack web applications: site scraping, malicious bots, zero-day, targeted attacks and more. The Trustwave WAF protects against these and others, including the OWASP Top 10 by offering a comprehensive set of capabilities, including positive and negative security, virtual patching, inspection of outgoing traffic, and more. The Trustwave WAF is fueled by the SpiderLabs Research team, who provide rules and threat intelligence that identify the latest web application attacks and threats.\r\n<span style=\"font-weight: bold;\">Features</span>\r\n<ul><li>Continuous Protection. Delivers continuous protection With a combination of positive and negative security, perpetual tuning and dynamic virtual patching.</li><li>Ease of Use. Centralized management dashboards and an intuitive UI let you prioritize and respond faster and more effectively to threats.</li><li>Multiple Deployment Options. Implement Trustwave WAF how you need it - inline or out-of-line and as a cloud service in Amazon Web Services or Microsoft Azure or as a physical or virtual appliance.</li><li>Real-Time Threat Detection. Identify abnormal behavior, improve threat blocking and prevent outbound data leaks with bi-directional traffic analysis and behavioral profiling.</li><li>Simplified Customization. Pre-define rules and customize scenarios to focus on the specific requirements of your applications and your business.</li><li>Improved Performance. Take advantage of features outside of security to improve performance by load balancing traffic or identifying issues and trends in the web application environment.</li><li>Built-in Threat Intelligence. The elite SpiderLabs team delivers ongoing application vulnerability and emerging threat information to the Trustwave WAF.</li><li>Built-In Compliance Reporting. Includes pre-built best practice controls and reports for compliance mandates including the PCI DSS.</li><li>Built-in Integration. Integration with Trustwave App Scanner provides customized protection for any application via virtual patching.</li></ul>","shortDescription":"The Trustwave Web Application Firewall (WAF) helps you protect your valuable web applications and data by continuously monitoring traffic and enforcing policies to identify and block threats. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"TrustWave Web Application Firewall (WAF)","keywords":"Trustwave, application, virtual, patching, threat, SpiderLabs, team, protection","description":"The Trustwave WAF integrates with Trustwave application scanning solution, App Scanner to provide customized protection for any application via virtual","og:title":"TrustWave Web Application Firewall (WAF)","og:description":"The Trustwave WAF integrates with Trustwave application scanning solution, App Scanner to provide customized protection for any application via virtual","og:image":"https://old.b4r.io/fileadmin/user_upload/Trustwave.png"},"eventUrl":"","translationId":1635,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":["Ensure Security and Business Continuity"],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}