{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"_type":"localeString","en":"I use it","ru":"I use it"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"_type":"localeString","en":"Using","ru":"Используют"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"sort-title-desc":{"en":"From Z to A","ru":"от Я до А","_type":"localeString"},"sort-rating-asc":{"_type":"localeString","en":"Rating ascending","ru":"По возрастанию рейтинга"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"_type":"localeString","en":"Rebate ascending","ru":"По возрастанию скидки"},"sort-discount-desc":{"en":"Rebate descending","ru":"По убыванию скидки","_type":"localeString"},"i-use-it-popover":{"ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier."},"details":{"_type":"localeString","en":"Details","ru":"Детальнее"},"rebate-for-poc":{"_type":"localeString","en":"Bonus 4 POC","ru":"Бонус 4 POC"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"vendor-verified":{"ru":"Поставщик потверждён","_type":"localeString","en":"Vendor verified"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"categories-popover":{"en":"categories","ru":"категории","_type":"localeString"},"sort-popular-asc":{"ru":"По возростанию популярности","_type":"localeString","en":"Popular ascending"},"sort-popular-desc":{"_type":"localeString","en":"Popular descending","ru":"По убыванию популярности"},"no-results":{"_type":"localeString","en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос."},"login":{"ru":"Войти","_type":"localeString","en":"Login","de":"Einloggen"},"register":{"en":"Register","de":"Registrieren","ru":"Зарегистрироваться","_type":"localeString"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You need to register or login.","de":"Sie müssen sich registrieren oder anmelden"},"add-to-comparison":{"_type":"localeString","en":"Add to comparison","ru":"Добавить в сравнение"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"items-found":{"ru":"Продуктов найдено","_type":"localeString","en":"Products found"},"sort-sales-desc":{"ru":"По продаже","_type":"localeString","en":"By sale"},"sort-purchases-desc":{"ru":"По покупке","_type":"localeString","en":"By purchase"},"product-supplier":{"en":"Product supplier","ru":"Поставщик продукта","_type":"localeString"},"product-vendor":{"_type":"localeString","en":"Product producer","ru":"Производитель продукта"},"products-fetching-error":{"_type":"localeString","en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу."}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"logout"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My Profile","ru":"Мои Данные"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Roi4Webinar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Calculate ROI and price","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}},"filters":{"from":{"en":"from","ru":"от","_type":"localeString"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"en":"Follow","ru":"Следить","_type":"localeString"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"en":"Filter","ru":"Фильтр","_type":"localeString"},"clear-button":{"_type":"localeString","en":"Сlear","ru":"Очистить"},"delivery-type-field":{"en":"Delivery type","ru":"Тип поставки","_type":"localeString"},"product-categories-field":{"_type":"localeString","en":"product categories","ru":"категориz продуктаhjle"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"with-discounts-checkbox":{"_type":"localeString","en":"With discounts","ru":"Со скидками"},"expert-price-checkbox":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"show-all-button":{"en":"Show all","ru":"Показать все","_type":"localeString"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"_type":"localeString","en":"Bonus 4 Reference","ru":"Бонус за референс"},"product-categories":{"_type":"localeString","en":"Product Categories","ru":"Категории продуктов"},"countries":{"_type":"localeString","en":"Countries","ru":"Страны"},"seller":{"_type":"localeString","en":"Seller","ru":"Продавец"},"vendors":{"_type":"localeString","en":"User products vendors","ru":"Производители продуктов пользователя"},"suppliers":{"en":"User suppliers","ru":"Поставщики пользователя","_type":"localeString"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"en":"Info source","ru":"Информационный ресурс","_type":"localeString"},"with-reference-checkbox":{"en":"With reference","ru":"С референсами","_type":"localeString"},"show-deal-checkbox":{"_type":"localeString","en":"Show deal with noname","ru":"Показывать сделки с noname"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"company-size":{"_type":"localeString","en":"Company size","ru":"Размер компании"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"en":"From A to Z","ru":"От А до Я","_type":"localeString"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"От Я до А"},"sellers-field":{"en":"Sellers","ru":"Поставщики, Производители","_type":"localeString"},"supply-types":{"_type":"localeString","en":"Supply type","ru":"Тип поставки"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"_type":"localeString","en":"Company type","ru":"Тип компании"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"_type":"localeString","en":"Customers","ru":"Покупатели"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"_type":"localeString","en":"Deployment date","ru":"Дата внедрения"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"_type":"localeString","en":"Competencies","ru":"Компетенции"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"body":{"en":[{"_type":"block","style":"normal","_key":"8bebcfb34955","markDefs":[],"children":[{"_key":"8bebcfb349550","_type":"span","marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies."}]}],"ru":[{"markDefs":[],"children":[{"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"28241882db7a"}],"_type":"localeBlock"},"label":"catalog-products-text-block"}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"translatable_meta":[{"name":"og:title","translations":{"ru":"Продукты","_type":"localeString","en":"Products"}},{"name":"description","translations":{"_type":"localeString","en":"Description","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI"}},{"name":"og:description","translations":{"_type":"localeString","en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI"}},{"name":"keywords","translations":{"en":"keyword","ru":"каталог, программное обеспечение, софт, ит услуги","_type":"localeString"}},{"name":"title","translations":{"ru":"Продукты","_type":"localeString","en":"Products"}}],"title":{"ru":"ROI4CIO: Продукты","_type":"localeString","en":"ROI4CIO: Products"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"cyberark-sensitive-information-management-solution":{"id":451,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Sensitive_Information_Management_Solution.png","logo":true,"scheme":false,"title":"CyberArk Sensitive Information Management Solution","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"cyberark-sensitive-information-management-solution","companyTitle":"CyberArk","companyTypes":["vendor"],"companyId":174,"companyAlias":"cyberark","description":"Securely store and share sensitive files and business passwords\r\n\r\nIn today’s dynamic business environment that includes mobile, web and cloud-based interactions, users require convenient access to information wherever and whenever they need it. The ability for users to confidentially share files internally and externally, as well as securely keep track of login credentials to an ever-increasing number of business applications are critical requirements to maintain user productivity without compromising security. At the same time, IT and security teams are tasked with securing sensitive information shared in automated business processes while reducing costs to ensure business efficiency.\r\n\r\nThe CyberArk Sensitive Information Management Solution is a complete platform for securely storing, sharing and distributing information between users and systems. Developed with a focus on security, the solution includes patented digital vault technology, military-grade encryption and tamper-resistant auditing designed to help enterprise organizations meet compliance requirements. Organizations use the CyberArk Sensitive Information Management Solution to enable individuals to securely store and share sensitive files and business passwords, as well as automate business processes to securely collect, distribute and access sensitive information.\r\n\r\nFeatures:\r\nSingle-platform solution for file sharing between enterprise users, systems and business processes\r\nSecure repository in which users can store and share personal business passwords such as those used to access CRM systems, HR applications or expense management systems\r\nGranular access controls restrict which users are able to download, forward or print documents and ensure that only one user may edit a document at a time\r\nSegregation of duties between IT teams and content owners prevents IT teams from viewing content that is securely stored and transferred\r\nFlexible connectors enable seamless integration with existing business applications and complementary security tools such as content filtering or data loss prevention solutions\r\nTamper-resistant audit logs can be used to report on who accessed what information and if any changes were made\r\nBuilt-in FIPS 140-2 compliant encryption secures data at-rest and in-transit\r\nChoice of on-premises or cloud-based deployments enables organizations to select the option that best fits their organizational requirements\r\nHigh availability and disaster recovery help organizations ensure reliability in complex, enterprise IT environments\r\n\r\nBenefits\r\nReduce the risk of unauthorized access to sensitive data by centrally storing and granularly controlling access to confidential files\r\nFacilitate productivity by enabling secure anytime, anywhere sharing of files between authorized internal and external users\r\nReduce the risk of password loss or theft by providing a central, secure repository in which users can store and manage personal business passwords\r\nSimplify the user experience by eliminating the need for users to manually write down, save or remember login credentials for dozens of disparate business applications\r\nReduce help desk costs associated with password resets by encouraging users to centrally and securely store credentials needed to access business applications\r\nSupport cross-functional efficiency by automatically preventing multiple users from duplicating efforts and editing the same document at once\r\nReduce administrative costs associated with file transfer processes by leveraging a single platform to secure interactive and automated file transfers throughout the enterprise\r\nAutomatically encrypt sensitive data at-rest and in-transit without having to manage encryption keys or purchase a separate encryption solution\r\nMore easily demonstrate compliance by reporting on which users accessed what sensitive information and if any changes were made\r\nEasily expand the solution with changing business needs and meet enterprise requirements for scalability and reliability","shortDescription":"The CyberArk Sensitive Information Management Solution is a complete platform for securely storing, sharing and distributing information between users and systems. Developed with a focus on security, the solution includes patented digital vault technology, military-grade encryption and tamper-resistant auditing designed to help enterprise organizations meet compliance requirements.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CyberArk Sensitive Information Management Solution","keywords":"business, users, access, sensitive, securely, information, with, applications","description":"Securely store and share sensitive files and business passwords\r\rIn today’s dynamic business environment that includes mobile, web and cloud-based","og:title":"CyberArk Sensitive Information Management Solution","og:description":"Securely store and share sensitive files and business passwords\r\rIn today’s dynamic business environment that includes mobile, web and cloud-based","og:image":"https://old.b4r.io/fileadmin/user_upload/Sensitive_Information_Management_Solution.png"},"eventUrl":"","translationId":452,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"datadvantage":{"id":259,"logoURL":"https://old.b4r.io/fileadmin/user_upload/DatAdvantage.png","logo":true,"scheme":false,"title":"DatAdvantage","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"datadvantage","companyTitle":"Varonis","companyTypes":["vendor"],"companyId":2319,"companyAlias":"varonis","description":"Take your file analysis and data security to the next level\r\n\r\nMonitor file activity and user behavior, prevent data breaches, and make permissions management and auditing a breeze.\r\n\r\nTake control of your data\r\n\r\nWe don’t just show you where sensitive data lives, we show you where it’s overexposed, who is accessing it, and how to lock it down. DatAdvantage will also identify stale data that is no longer accessed by actual humans – save disk space, lower cost and simplify your environment all at once.\r\n\r\nDatAdvantage uses machine learning and bi-directional cluster analysis to pinpoint users that have access to files they don’t need to do their job. It’s your single interface for managing permissions and security groups.\r\n\r\nSecure your data from the inside out\r\n\r\nVaronis performs User Behavior Analytics (UBA) to secure your data from the inside-out, using machine learning to find patterns and anomalous behavior to stop breaches before they happen.\r\n\r\nOur sophisticated threat models analyze behavior across multiple platforms and alert you to suspicious activity and potential data breaches. From CryptoLocker infections to compromised service accounts to disgruntled employees, we’ll detect and alert you on all sorts of abnormal user behavior.\r\nMonitor and analyze every single file touch\r\n\r\nMonitoring with DatAdvantage is non-intrusive and doesn’t require native auditing – making it easier than ever to perform security investigations, prove compliance, and find lost files.\r\n\r\nAutomatically detect and correct changes that don’t meet your organization’s change management policies. Satisfy many of the requirements prescribed by SOX, HIPAA, PCI, GLB, FERC/NERC, and more.\r\n","shortDescription":"DatAdvantage is a platform for tracking activity on file servers and user behavior, data loss prevention. Effective access control and auditing.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DatAdvantage","keywords":"data, your, behavior, DatAdvantage, security, don’t, breaches, that","description":"Take your file analysis and data security to the next level\r\rMonitor file activity and user behavior, prevent data breaches, and make permissions management","og:title":"DatAdvantage","og:description":"Take your file analysis and data security to the next level\r\rMonitor file activity and user behavior, prevent data breaches, and make permissions management","og:image":"https://old.b4r.io/fileadmin/user_upload/DatAdvantage.png"},"eventUrl":"","translationId":260,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":369,"title":"File Synchronization and Sharing Software","alias":"file-synchronization-and-sharing-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/file-sync.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"devicelock-endpoint-dlp-suite":{"id":492,"logoURL":"https://old.b4r.io/fileadmin/user_upload/DeviceLock.jpg","logo":true,"scheme":false,"title":"DeviceLock Endpoint DLP Suite","vendorVerified":0,"rating":"2.10","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":1,"alias":"devicelock-endpoint-dlp-suite","companyTitle":"DeviceLock (SmartLine Inc)","companyTypes":["vendor"],"companyId":2841,"companyAlias":"devicelock-smart-lain-ink","description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players. In addition, policies can be set and enforced for copy operations via the Windows Clipboard, as well as screenshot operations on the endpoint computer.\r\nNetworkLock adds contextual-level control of user network communications via the Internet through such means as: company email, personal webmail, instant messaging services, social networks (like Facebook, Google+, Twitter), web surfing, FTP file transfers, as well as cloud-based file sharing services like Dropbox, SkyDrive and Google Drive.\r\nContentLock adds the capability to look inside files and other data objects (like emails and webmails, chats, blog posts, etc.) for sensitive information like social security numbers, credit card numbers, bank account numbers or other user-definable information and to make block-or-allow decisions based on policies having to do with file contents.\r\nDiscovery is a separately licensed component, which helps network administrators and security personnel locating certain types of content stored within and outside the limits of the corporate network. Discovering unwanted content is essential when trying to protect the company’s intellectual property, control employee activities and administer computer networks.\r\nSearch Server is an optional separately licensed component, which provides full-text searching of logged data. The full-text search functionality is especially useful in situations when you need to search for shadow copies of documents based on their contents.\r\nDeviceLock DLP Suite provides both contextual and content-based control for devices and network resources via Group Policy in an Active Directory domain The combination of all of these modules working together is the DeviceLock DLP Suite. The DLP Suite provides protection against local and network data leaks at the endpoint (laptop, desktop or server) via a wide array of threat vectors.\r\nThese include: iPhones, Androids, BlackBerry, other smart-phones, iPods, iPads, digital cameras, Wi-Fi, Bluetooth, FireWire, social media, IM, webmail, company email, printing, CD or DVD ROM, USB flash drives, Compact Flash, FTP/FTPS, HTTP/HTTPS and the clipboard.\r\nNatively integrated with Microsoft Active Directory Group Policy, the DeviceLock DLP Suite is very easy and straight-forward to install and configure. Typical installations are handled by Microsoft Network Administrators and do not require expensive, specially trained resources.\r\nThe other great customer benefit of DeviceLock’s tight integration with Active Directory is that it gives the solution virtually limitless scalability. The DeviceLock DLP Suite can effortlessly run on every endpoint listed in your Active Directory database … even if there are tens of thousands.","shortDescription":"DeviceLock DLP Suite consists of five modules that protect your organization from data leak threats","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeviceLock Endpoint DLP Suite","keywords":"network, Suite, DeviceLock, like, Directory, Active, provides, data","description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved","og:title":"DeviceLock Endpoint DLP Suite","og:description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved","og:image":"https://old.b4r.io/fileadmin/user_upload/DeviceLock.jpg"},"eventUrl":"","translationId":493,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"digital-guardian-data-protection-platform":{"id":1207,"logoURL":"https://old.b4r.io/fileadmin/user_upload/digital_guardian.png","logo":true,"scheme":false,"title":"Digital Guardian Data Protection Platform","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"digital-guardian-data-protection-platform","companyTitle":"Digital Guardian","companyTypes":["supplier","vendor"],"companyId":4080,"companyAlias":"digital-guardian","description":"PLATFORM COMPONENTS\r\nDG ANALYTICS & REPORTING CLOUD (ARC)\r\nThe big data advanced analytics and reporting cloud service that powers the DG Platform. Information security analysts, incident responders and threat hunters can detect and respond to threats faster and more efficiently regardless of the threat.\r\nDG SOLUTIONS\r\nSolutions that meet essential use cases such as insider threat protection, data compliance, IP protection, enterprise data visibility and advanced threat protection.\r\nDG Data Discovery – visibility and auditing of potentially unsecured data\r\nDG Data Classification – the most comprehensive classification – content, context and user-based\r\nDG Network DLP – stops sensitive data from leaving your network\r\nDG Endpoint DLP – stops data loss by securing endpoints\r\nDG Cloud Data Protection – stops loss of data in cloud applications such as Office 365\r\nDG Endpoint Detection and Response – detect, investigate, and mitigate suspicious activities and behaviors at the endpoint\r\nDG INTEGRATIONS\r\nDigital Guardian has developed custom applications and leverages APIs to integrate with the security products you already own.\r\nDG MANAGED SERVICES\r\nDG Managed Security Programs (MSPs) can extend the capability of your team. Our security experts will host, administer and run your threat aware data protection program. These 24*7 global analyst teams will help you contain insider and outsider threats before sensitive data gets out of your organization.\r\nWHY DIGITAL GUARDIAN\r\nCLOUD SERVICES ARCHITECTURE THAT PROTECTS SENSITIVE DATA FROM ALL THREATS\r\nTraditional DLP is only focused on policy enforcement and detection of anomalous insider activity. The amount of data produced and the tools required to analyze external threats presents a challenge to traditional DLP architectures.\r\nThat’s why we developed a cloud services security platform that meets the requirements of both DLP and advanced threat detection and response use cases. Our design encompasses new database technologies for very large storage and query requirements, analytic engines for automated threat detection, and new UI elements and workflows to drive incident response and investigations.\r\n","shortDescription":"Digital Guardian Data Protection Platform is The First and Only Solution that Provides Data Protection from ALL THREATS. Leveraging our new DG ARC cloud service, the DG Data Protection Platform detects threats and stops data exfiltration from both well-meaning and malicious insiders as well as external adversaries. By converging DLP and endpoint detection and response, you have one less endpoint agent to manage and one less console to monitor. Our platform puts your most sensitive information assets at the center of all data protection, activity monitoring and threat prevention, detection and response activities.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Digital Guardian Data Protection Platform","keywords":"data, threat, security, your, protection, Data, threats, cloud","description":"PLATFORM COMPONENTS\rDG ANALYTICS & REPORTING CLOUD (ARC)\rThe big data advanced analytics and reporting cloud service that powers the DG Platform.","og:title":"Digital Guardian Data Protection Platform","og:description":"PLATFORM COMPONENTS\rDG ANALYTICS & REPORTING CLOUD (ARC)\rThe big data advanced analytics and reporting cloud service that powers the DG Platform.","og:image":"https://old.b4r.io/fileadmin/user_upload/digital_guardian.png"},"eventUrl":"","translationId":1208,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forcepoint-advanced-malware-detection-forcepoint-email-security-cloud-forcepoint-web-security-cloud":{"id":1474,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-advanced-malware-detection-forcepoint-email-security-cloud-forcepoint-web-security-cloud","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Email Security Cloud (formerly TRITON AP-EMAIL Cloud) - Protecting from spam, phishing & ransomware attacks wherever email is accessed</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud) - Delivering premier cloud security to protect users and data everywhere</span>","shortDescription":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","keywords":"Cloud, Forcepoint, Security, Malware, Advanced, TRITON, formerly, Email","description":"Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats\rForcepoint Email Security Cloud (formerly TRITON AP-EMAIL","og:title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","og:description":"Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats\rForcepoint Email Security Cloud (formerly TRITON AP-EMAIL","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1474,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forcepoint-casb-cloud-access-security-broker":{"id":942,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint CASB (Cloud Access Security Broker)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-casb-cloud-access-security-broker","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Discover Shadow IT & Risk\r\nUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive approach to cloud app discovery and risk scoring ensures that IT can eliminate blind spots by uncovering what cloud apps are used by employees and their risk profiles.\r\nPrevent Leaks of Sensitive Data\r\nInspect files and cloud content in real-time to prevent the malicious or unintentional leakage of confidential information. Identify and analyze sensitive or regulated data stored in cloud file-sync services to understand sharing permissions exposure and ensure compliance with regulations such as PCI, SOX, and HIPAA.\r\nControl BYOD Access\r\nMinimize the risk of data proliferation to unmanaged or untrusted devices by enforcing device-based access rules. Prevent the downloading or syncing of data to unmanaged devices while allowing online access only to cloud data.\r\nDetect & Block Cyber Attacks\r\nForcepoint CASB monitors all user activity and analyzes usage patterns to rapidly detect anomalies that can indicate an account takeover. The dashboard provides a wealth of cloud analytics, highlighting suspicious activities and attempts to compromise accounts.\r\nForcepoint CASB provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use.\r\nDiscover Shadow IT & Risk\r\nUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive approach to cloud app discovery and risk scoring ensures that IT can eliminate blind spots by uncovering what cloud apps are used by employees and their risk profiles.\r\nPrevent Leaks of Sensitive Data\r\nInspect files and cloud content in real-time to prevent the malicious or unintentional leakage of confidential information. Identify and analyze sensitive or regulated data stored in cloud file-sync services to understand sharing permissions exposure and ensure compliance with regulations such as PCI, SOX, and HIPAA.\r\nControl BYOD Access\r\nMinimize the risk of data proliferation to unmanaged or untrusted devices by enforcing device-based access rules. Prevent the downloading or syncing of data to unmanaged devices while allowing online access only to cloud data.\r\nDetect & Block Cyber Attacks\r\nForcepoint CASB monitors all user activity and analyzes usage patterns to rapidly detect anomalies that can indicate an account takeover. The dashboard provides a wealth of cloud analytics, highlighting suspicious activities and attempts to compromise accounts.\r\nIdentify Security Gaps\r\nForcepoint CASB uses cloud APIs to analyze your cloud tenants, helping IT review users and admins to detect dormant accounts, external users, and ex-employees that might still have access to your cloud apps. In addition, Forcepoint CASB inspects your tenant security configurations to detect deficiencies and to recommend best-practice settings for effective cloud governance.\r\nOptimize Detection of Anomalies and Threats\r\nForcepoint CASB is the only cloud access security broker out there that protects enterprise data from theft and loss due to compromised, malicious, and careless users and that correlates activity anomalies with risky IP addresses.\r\n\r\nCLOUD GOVERNANCE\r\nCloud App Discovery\r\nUncovers cloud apps – sanctioned and unsanctioned – by inspecting data in user access logs across the enterprise. Also, Forcepoint CASB provides a searchable Cloud App Directory where customers can view details, including customized risk factors, for each cloud app discovered.\r\nCloud App Risk Scoring\r\nHarness the ability to categorize and prioritize each cloud app as high, medium, or low risk. Application risk scoring and weighting are based on several categories (Compliance, Security Settings, General Info, Data Leakage, Data Ownership, Account Termination Policy and Auditing), the consolidated results of which can help you prioritize your risk mitigation “to do” list.\r\nDetection of Compliance Gaps\r\nGain visibility into cloud app security settings and get notified when SaaS admins make critical configuration changes. Forcepoint CASB compares these settings against a set of industry best practices or compliance standards (e.g., HIPAA, PCI DSS, ISO, CSA) and highlights deficiencies that require immediate attention.\r\nData Governance\r\nScan corporate files and data stored in file-sharing services such as OneDrive, Box, Dropbox and Google Drive. See which ones are sensitive or contain regulated data so that you can initiate a remediation workflow, if necessary (e.g., alert) to meet your compliance requirements.\r\nCloud App Metrics\r\nAutomate the process of determining what cloud apps users are accessing and details the number of users, activity level, traffic volume and usage hours for each app.\r\nIdentification of Overspend\r\nReview the entitlements of your users. You could be overlooking potential areas of risk or possibly some cost savings opportunities.\r\nAUDIT & PROTECTION\r\nEnforce BYOD Access Rules to Prevent Data Proliferation\r\nPrevent data proliferation to unmanaged devices through auto-sync clients such as Outlook, OneDrive for Business and Box Sync. Forcepoint CASB distinguishes between managed and unmanaged devices so you can create granular device-based access rules to stop data proliferation.\r\nPrevent Data Leakage\r\nForcepoint CASB inspects content in real-time, scanning for keywords, phrases, regular expressions, and several other parameters, to ensure compliance with regulations such as PCI DSS, HIPAA, HITECH, GLBA and SOX by applying comprehensive data leak prevention (DLP) capabilities. Forcepoint CASB also includes an ICAP interface to integrate with 3rd-party DLP solutions.\r\nIdentify Access Anomalies and Threats\r\nForcepoint CASB strengthens cloud security by detecting access anomalies and issues that may indicate an external or insider threat targeting your data.\r\nMonitor User & Admin Activity\r\nCreate a clear and accurate picture of user activity attributes, including user ID, department, location, time, device, application actions and data objects accessed. Track, monitor, and report all administrative and privileged user activity, including data accesses, configuration changes and user permission modifications.\r\n\r\n","shortDescription":"Forcepoint CASB provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint CASB (Cloud Access Security Broker)","keywords":"cloud, data, Forcepoint, CASB, risk, that, access, apps","description":"Discover Shadow IT & Risk\rUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive","og:title":"Forcepoint CASB (Cloud Access Security Broker)","og:description":"Discover Shadow IT & Risk\rUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":943,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forcepoint-data-security":{"id":1472,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Data Security","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-data-security","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Forcepoint Data Security Suite - detection, control and protection of confidential information and network end data\r\nPreventing data loss\r\nBusiness Process Security\r\nManaging Applications and Threats\r\n\r\nData Discover - Detection of confidential information stored on the network\r\nDetecting the storage of sensitive data\r\nMeasuring and reducing the risk of data loss\r\nSupport for e-discovery for controlled monitoring\r\n\r\nData Monitor - a tool for auditing and monitoring network data channels for leaks of confidential information\r\nMonitoring and blocking the leakage of confidential information\r\nConducting an audit\r\nMeasuring and reducing the risk of data loss\r\n\r\nData Protect - detection and blocking of leaks of confidential information at the level of all network channels\r\nMonitoring and blocking the leakage of confidential information\r\nConducting an audit\r\nMeasuring and reducing the risk of data loss\r\n\r\nData Endpoint - Detection and prevention of leakage of confidential information through target computers and removable media\r\nMonitoring and blocking the leakage of confidential information\r\nConducting an audit\r\nMeasuring and reducing the risk of data loss","shortDescription":"Forcepoint Data Security is a solution from leakage of confidential information (DLP)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Data Security","keywords":"information, data, confidential, Data, loss, Measuring, reducing, risk","description":"Forcepoint Data Security Suite - detection, control and protection of confidential information and network end data\rPreventing data loss\rBusiness Process","og:title":"Forcepoint Data Security","og:description":"Forcepoint Data Security Suite - detection, control and protection of confidential information and network end data\rPreventing data loss\rBusiness Process","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1472,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forcepoint-dlp":{"id":1631,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint DLP","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-dlp","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Forcepoint DLP accelerates your compliance efforts by </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">combining pre-packaged coverage of global regulations </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">with central control across your IT environment. </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Forcepoint DLP efficiently secures sensitive customer </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">information and regulated data so you can confidently </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">prove ongoing compliance.</span> Forcepoint DLP provides critical capability addressing compliance with features such as:\r\n<ul>\r\n<li>Optical Character Recognition (OCR) identifies data imbedded in images while at rest or in motion (available with Forcepoint DLP – Network).</li>\r\n<li>Robust identification for Personally Identifiable Information (PII) offers data validation checks, real name detection, proximity analysis and context identifiers.</li>\r\n<li>Custom encryption identification exposes data hidden from discovery and applicable controls.</li>\r\n<li>Cumulative analysis for drip DLP detection (i.e., data that leaks out slowly over time).</li>\r\n<li>Integration with Microsoft Azure Information Protection analyzes encrypted files and applies appropriate DLP controls to the data.</li>\r\n</ul>\r\nForcepoint DLP applies advanced analytics to correlate seemingly unrelated DLP events into prioritized incidents. Incident Risk Ranking (IRR) provided with Forcepoint DLP fuses disparate DLP indicators into a framework of Bayesian belief networks to assess the likelihood of data risk scenarios, such as data theft and broken business processes. Forcepoint DLP includes advanced analytics and regulatory policy templates from a single point of control with every deployment. Enterprises choose the deployment options for their IT environment.","shortDescription":"Forcepoint DLP addresses human-centric risk with visibility and control everywhere your people work and everywhere your data resides.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":1,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint DLP","keywords":"Forcepoint, data, with, compliance, analytics, such, detection, advanced","description":"Forcepoint DLP accelerates your compliance efforts by combining pre-packaged coverage of global regulations with central control across your IT","og:title":"Forcepoint DLP","og:description":"Forcepoint DLP accelerates your compliance efforts by combining pre-packaged coverage of global regulations with central control across your IT","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1527,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forcepoint-email-security-cloud-forcepoint-web-security-cloud":{"id":1473,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-email-security-cloud-forcepoint-web-security-cloud","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email Security gives you the security you need by protecting you against multi-stage advanced threats that exploit email to penetrate your IT environment.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Email Security applies real-time behavioral sandboxing, enterprise-grade DLP and other advanced defense technologies to prevent leaks of sensitive information, empowering your workers — in the office or on the road — as you safely adopt technologies like Microsoft Office 365. In addition, detect phishing and secure email wherever users need access, even on mobile devices, through features like Phishing Education and URL Wrapping.</span>\r\nYour business and data are under constant attack. Traditional filtering and antivirus products no longer provide sufficient protection, and many web security solutions can’t address advanced threats as they occur.\r\n\r\nForcepoint Web Security provides advanced, real-time threat defense to stop advanced threats and prevent data loss. It provides robust protection through context- and content-aware defenses, coupled with integrated Cloud Access Security Broker (CASB) functionality, to provide control and visibility for cloud applications on both on-premises and roaming users. The combination of industry-leading web protection, CASB functionality and enterprise DLP delivers protection at a value no other vendor can match.","shortDescription":"Forcepoint Email Security Cloud (formerly TRITON AP-EMAIL Cloud) - Protecting from spam, phishing & ransomware attacks wherever email is accessed","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","keywords":"Security, advanced, Forcepoint, protection, threats, like, Email, Cloud","description":"Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email","og:title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","og:description":"Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1473,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forcepoint-url-filtering":{"id":1614,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint URL Filtering","vendorVerified":0,"rating":"3.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-url-filtering","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">With more than 120 security and filtering categories, </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">hundreds of Web application and protocol controls, and 60-plus </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">reports with customization and role-based access, Forcepoint URL </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Filtering is an easy to deploy and transparent filter and security </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">solution that avoids the complexity of a proxy gateway.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Forcepoint URL Filtering’s intuitive management and reporting </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">is accessed via the unified TRITON Architecture user interface, </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">simplifying provisioning and enabling role-based reporting. It </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">includes more than 60 pre-defined reports, many easily customizable </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">reports and administrative alerts. The TRITON architecture supports </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">expansion to Email, Data, Mobile security products and more.</span>","shortDescription":"The Forcepoint URL Filtering solution blocks Web threats to reduce malware infections, decrease help desk incidents and free up valuable IT resources.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":8,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint URL Filtering","keywords":"Forcepoint, more, TRITON, security, than, role-based, unified, reporting","description":"With more than 120 security and filtering categories, hundreds of Web application and protocol controls, and 60-plus reports with customization and","og:title":"Forcepoint URL Filtering","og:description":"With more than 120 security and filtering categories, hundreds of Web application and protocol controls, and 60-plus reports with customization and","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1588,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forcepoint-web-security-cloud-formerly-triton-ap-web-cloud":{"id":947,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-web-security-cloud-formerly-triton-ap-web-cloud","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\r\nAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while stealing your sensitive data. Insider threats—such as employee theft and internally accessed malware—are just as damaging as external threats.\r\nForcepoint Web Security Cloud provides industry-leading reporting, sandboxing and DLP capabilities, and stops more advanced, non-signature threats to your data than any other solution – including Blue Coat, Cisco, and Zscaler. Forcepoint Web Security Cloud is built on a unified platform that enables Forcepoint products to work together, and protects data everywhere– in the Cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient security.\r\nADOPT INDUSTRY-LEADING PROTECTION AGAINST ADVANCED THREATS AND DATA THEFT\r\nAdvances in cloud technology have given organizations increased flexibility and rapid collaboration capabilities. In order to reap these benefits, your organization must streamline security with an intelligent, cloud-first solution that protects in real-time and that will enable your long term mission and protect your reputation.\r\nForcepoint Web Security Cloud provides in-line protection against advanced threats that use sophisticated detection evasion techniques to steal sensitive data, as well as insider threats such as employee theft and malware. Forcepoint Web Security Cloud is a proven leader in SaaS web content security, stopping more advanced, non-signature threats to your data than any other solution.\r\nEASY TO USE DASHBOARDS\r\nSee threat levels, productivity and bandwidth in an instant\r\nDrill-down for quick analysis\r\nEasy to use dashboards\r\nREPORTING\r\nOver 80 predefined reports\r\nCreate infinite custom reports by drag and drop of 70 attributes\r\nOptional extended reporting history for up to 18 months to support Regulatory & Compliance requirements\r\nReporting\r\nINTEGRATED CLOUD SANDBOX\r\nReal-time code analysis for Advanced Threat identification.\r\nSafe execution of suspicious code away from your network resources\r\nINTEGRATED THREAT INTELLIGENCE\r\nProvides input from over 155 countries into Forcepoint Cloud Web Security\r\nAverage update rate of 3.2 pieces of threat intelligence every second","shortDescription":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)\r\nDelivering premier cloud security to protect users and data everywhere","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","keywords":"Cloud, your, Forcepoint, threats, Security, data, that, solution","description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\rAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while","og:title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","og:description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\rAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":947,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forcepoint-web-security-cloud-ranee-triton-ap-web-cloud":{"id":946,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Web Security Cloud (ранее TRITON AP-WEB Cloud)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-web-security-cloud-ranee-triton-ap-web-cloud","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Усовершенствованные угрозы, связанные со сложными многоступенчатыми атаками со встроенными методами, уклоняются от обнаружения при краже ваших конфиденциальных данных. Инсайдерские угрозы, такие как внутренне доступное вредоносное ПО, так же вредны, как и внешние угрозы.\r\nForcepoint Web Security Cloud обеспечивает лидирующие в отрасли возможности создания отчетов и DLP, а также останавливает более сложные угрозы для ваших данных, чем любое другое решение, включая Blue Coat, Cisco и Zscaler. Forcepoint Web Security Cloud построена на единой платформе, которая позволяет продуктам Forcepoint работать вместе и защищает данные повсюду - в облаке, в пути, в офисе - упрощает соблюдение и обеспечивает более эффективное принятие решений и повышает безопасность.\r\n\r\nДостижения в облачных технологиях предоставили организациям повышенную гибкость и возможности быстрого сотрудничества. Чтобы воспользоваться этими преимуществами, ваша организация должна оптимизировать безопасность с помощью интеллектуального, облачного решения, которое защищает в режиме реального времени, что позволит защитить вашу репутацию.\r\nForcepoint Web Security Cloud обеспечивает встроенную защиту от передовых угроз, которые используют сложные методы предотвращения обхода, чтобы украсть конфиденциальные данные, а также инсайдерские угрозы, такие как вредоносное ПО. Forcepoint Web Security Cloud является проверенным лидером в области безопасности веб-контента SaaS.\r\n\r\nИНТЕГРИРОВАННАЯ ИНТЕЛЛЕКТУАЛЬНАЯ УГРОЗА\r\nОбеспечивает ввод данных из более чем 155 стран в Forcepoint Cloud Web Security\r\nСредняя скорость обновления 3,2 единицы информации об угрозах каждую секунду","shortDescription":"Forcepoint Web Security Cloud - предоставление первостепенной облачной безопасности для защиты пользователей и данных во всем мире","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Web Security Cloud (ранее TRITON AP-WEB Cloud)","keywords":"Forcepoint, Cloud, Security, угрозы, данных, более, обеспечивает, защищает","description":"Усовершенствованные угрозы, связанные со сложными многоступенчатыми атаками со встроенными методами, уклоняются от обнаружения при краже ваших конфиденциальных","og:title":"Forcepoint Web Security Cloud (ранее TRITON AP-WEB Cloud)","og:description":"Усовершенствованные угрозы, связанные со сложными многоступенчатыми атаками со встроенными методами, уклоняются от обнаружения при краже ваших конфиденциальных","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":2602,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"group-ib-secure-bank":{"id":1184,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Secure_Bank.png","logo":true,"scheme":false,"title":"Group-IB Secure Bank","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"group-ib-secure-bank","companyTitle":"Group-IB","companyTypes":["supplier","vendor"],"companyId":4067,"companyAlias":"group-ib","description":"<ul><li>Quick and straightforward integration, that doesn't slow down your website </li><li>Fraud prevention at early stages of attempted execution </li><li>Secure banking solution with advanced fraud detection techniques</li><li>Top-tier functionality and incident reporting features </li><li>API for integration with your fraud monitoring systems </li><li>Analytics and consulting by Group-IB experts</li></ul>\r\nSecure Bank controls risks related to <span style=\"white-space:pre\">\t</span>the weakest link in banking cyber security — your clients.\r\n\r\nWhile your customers do not need to <span style=\"white-space:pre\">\t</span>install any software, Secure Bank offers financial fraud prevention and detection, guarding them against:\r\n<ul><li>Malicious injections in Internet payment systems</li><li>Phishing attacks, social engineering attacks</li><li>Unsanctioned remote connection and e‑banking transactions</li><li>Malicious code for online banking fraud that involves making automatic payments or using false account details</li><li>Employing zero-day vulnerabilities to <span style=\"white-space: pre;\">\t</span>run malicious software and intrusions</li></ul>\r\n<span style=\"font-weight: bold;\">How Secure Bank ensures online banking safety</span>\r\n<ul><li>Secure Bank mitigates online banking risks for your customers, running alongside existing IT systems. No need to <span style=\"white-space: pre;\">\t</span>have it installed on your customers’ devices.</li><li>The script does not slow down the operation of your website.</li><li>Secure Bank takes a proactive stand to ensure fraud prevention and detection, screening operations for any sign of malicious activities.</li><li>Collected information goes from your bank’s IT systems to Secure Bank.</li><li>No personal data are collected, transmitted or stored.</li><li>Group-IB experts are up-to-date with the latest cyber threats to the banking industry in order to properly break down and rate the collected data.</li></ul>\r\nSecure Bank sends immediate notifications of online fraud or suspicious e‑banking transactions, allowing you to offset their consequences. Secure Bank can be integrated with your organization’s anti-fraud software and existing IT infrastructure to ensure an even faster response to online banking frauds.","shortDescription":"Innovative solution for secure online payments\r\nFinancial fraud prevention and detection to better protect your customers\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Group-IB Secure Bank","keywords":"Secure, your, Bank, banking, fraud, online, with, software","description":"Quick and straightforward integration, that doesn't slow down your website Fraud prevention at early stages of attempted execution Secure banking","og:title":"Group-IB Secure Bank","og:description":"Quick and straightforward integration, that doesn't slow down your website Fraud prevention at early stages of attempted execution Secure banking","og:image":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Secure_Bank.png"},"eventUrl":"","translationId":1185,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"},{"id":52,"title":"SaaS - software as a service","alias":"saas-software-as-a-service","description":"SaaS (англ. software as a service — программное обеспечение как услуга; также англ. software on demand — программное обеспечение по требованию) — одна из форм облачных вычислений, модель обслуживания, при которой подписчикам предоставляется готовое прикладное программное обеспечение, полностью обслуживаемое провайдером. Поставщик в этой модели самостоятельно управляет приложением, предоставляя заказчикам доступ к функциям с клиентских устройств, как правило через мобильное приложение или веб-браузер.\r\n\r\nОсновное преимущество модели SaaS для потребителя услуги состоит в отсутствии затрат, связанных с установкой, обновлением и поддержкой работоспособности оборудования и работающего на нём программного обеспечения.\r\n\r\nВ модели SaaS:\r\n\r\nприложение приспособлено для удаленного использования;\r\nодним приложением пользуется несколько клиентов (приложение коммунально);\r\nоплата взимается либо в виде ежемесячной абонентской платы, либо на основе объёма операций;\r\nтехническая поддержка приложения включена в оплату;\r\nмодернизация и обновление приложения происходит оперативно и прозрачно для клиентов.\r\nКак и во всех формах облачных вычислений, заказчики платят не за владение программным обеспечением как таковым, а за его аренду (то есть за его использование через мобильное приложение или веб-интерфейс). Таким образом, в отличие от классической схемы лицензирования программного обеспечения, заказчик несет сравнительно небольшие периодические затраты, и ему не требуется инвестировать значительные средства в приобретение прикладной программы и необходимых программно-платформенных и аппаратных средств для его развёртывания, а затем поддерживать его работоспособность. Схема периодической оплаты предполагает, что если необходимость в программном обеспечении временно отсутствует, то заказчик может приостановить его использование и заморозить выплаты разработчику.\r\n\r\nС точки зрения разработчика некоторого проприетарного программного обеспечения модель SaaS позволяет эффективно бороться с нелицензионным использованием программного обеспечения, поскольку программное обеспечение как таковое не попадает к конечным заказчикам. Кроме того, концепция SaaS часто позволяет уменьшить затраты на развёртывание и внедрение систем технической и консультационной поддержки продукта, хотя и не исключает их полностью.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SaaS","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/cloud_computing2__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"group-ib-secure-portal":{"id":1186,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Secure_Portal.png","logo":true,"scheme":false,"title":"Group-IB Secure Portal","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"group-ib-secure-portal","companyTitle":"Group-IB","companyTypes":["supplier","vendor"],"companyId":4067,"companyAlias":"group-ib","description":"<ul><li>Prevent personal information leakage and bank card data theft </li><li>Detect purchases paid by stolen cards or comparative advertisement misleading customers, and other fraud </li><li>Develop a unique fingerprint for each user in real-time</li><li>No installation or investments in IT infrastructure required </li><li>Real time API for integration with fraud monitoring systems Analytical support and consulting by Group-IB specialists</li></ul>\r\n<span style=\"font-weight: bold;\">What is Secure Portal</span>\r\n<ul><li>Secure Portal enables businesses to control risks related to the weakest link in the Internet business security chain – website users. Secure Portal detects fraud preparation and attempts in real-time without installation of any additional software on client devices to identify the following groups of threats:</li><li>Unsanctioned access and use of sensitive or confidential information</li><li>Bank card data collection and stolen card use</li><li>Phishing attacks, social engineering attack methods</li><li>Unsanctioned remote connection to a consumer’s device using their indicators to conduct transactions on his/her behalf</li><li>New types of fraud committed on the client side</li></ul>\r\n<span style=\"font-weight: bold;\">Secure Portal benefits</span>\r\n<ul><li>E-commerce</li><li>Reduce the number of account credentials stolen by cyber criminals</li><li>Reduce financial loss caused by rivals’ launching comparative advertising on online store pages</li><li>Reduce the number of chargebacks from stolen bank cards being used</li><li>Corporate portals</li><li>Prevention of confidential data leakage</li><li>Block unsanctioned access to confidential information</li><li>Prevent financial and reputational losses</li><li>Paid subscription services</li><li>Protect revenues from joint use of paid subscriptions</li><li>Prevention of stolen website authorization data use</li><li>Reduction in chargebacks by preventing the use of compromised credit cards</li></ul>\r\n","shortDescription":"Personal data security and fraud protection for your customers\r\nAn innovative solution for websites, e‑commerce platforms, and paid subscription services","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Group-IB Secure Portal","keywords":"stolen, Secure, Portal, data, confidential, fraud, cards, card","description":"Prevent personal information leakage and bank card data theft Detect purchases paid by stolen cards or comparative advertisement misleading customers, and","og:title":"Group-IB Secure Portal","og:description":"Prevent personal information leakage and bank card data theft Detect purchases paid by stolen cards or comparative advertisement misleading customers, and","og:image":"https://old.b4r.io/fileadmin/user_upload/Group-IB_Secure_Portal.png"},"eventUrl":"","translationId":1187,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"hideez-key-hk":{"id":1200,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Hideez.jpg","logo":true,"scheme":false,"title":"Hideez Key (HK)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"hideez-key-hk","companyTitle":"Hideez","companyTypes":["supplier","vendor"],"companyId":4073,"companyAlias":"hideez","description":"<span style=\"font-weight: bold;\">Hideez Key — Your Only Digital Key</span>\r\nHideez Key will become a daily companion to your computer, smartphone and tablet\r\nForget having to type passwords for apps, websites and services. Hideez Key will do it for you while\r\nsimply laying in your pocket. Your computer will ask for password if somebody tries accessing it\r\nwhile you are away and will wake automatically and log you in when you come back. You phone\r\nwon’t ask for passcode anymore, yet it will be securely protected from a stranger. Hideez Key can\r\nalso be used to open your home, garage and office doors as a single digital key using 125 kHz RFID\r\nfrequency (Em-Marine and HID compatible).\r\n<span style=\"font-weight: bold;\">Store Your Passwords in Your Pocket</span>\r\nStill spending time and effort to recall that important password? Hideez Key stores up to 1000\r\npasswords for your social networks, emails, cloud services and applications. Just press the button on\r\nyour Hideez Key or a hotkey on the keyboard of your computer to input your password\r\nautomatically. Try it, it looks like magic!\r\n<span style=\"font-weight: bold;\">Enjoy Convenient and Reliable Internet-Security</span>\r\nHave you considered that by using a ‘simple’ password for email, banking account or social network\r\nyou are risking your money and relations with the other people? Hideez Key allows using\r\ncomplicated passwords of any preferred length, which are difficult to brute force. And the good\r\nnews are that you don’t have to input these passwords from your keyboard all the time. Your\r\npasswords aren’t stored on your computer as well, so a hacker cannot intercept them from your\r\nphone, browser or a hard drive.\r\nYou might also consider using your Hideez Key as a second factor in two-factor authentication and to\r\ngenerate one time passwords for various applications.\r\n<span style=\"font-weight: bold;\">Let Your Smartphone Remind You When You Are About to Lose Something</span>\r\nPlace your Hideez Key in your bag and your smartphone will notify you when the signal is about to\r\nfade away together with your belongings. Even if that happens, you will be able to quickly locate\r\nyour Hideez Key (and the bag in which it is placed) on the digital map.\r\n<span style=\"font-weight: bold;\">Ready for the Internet of Things</span>\r\nMore connected devices are appearing every day. Hideez Key supports over the air updates and you\r\nwill be able to easily integrate it with your future devices and services.\r\n<span style=\"font-weight: bold;\">Remote Activation</span>\r\nWant to take a selfie with a friend or start recording a conversation without touching your\r\nsmartphone? Just press the multifunctional button on your Hideez Key and it will do the rest. Need\r\nan urgent help? Program the multifunctional button on your Hideez Key as your panic button to\r\nactivate alarm scenario on your smartphone. For example: your smartphone will send a message\r\nwith your current location to several trusted contacts from your address book. You can program any\r\nother alarm scenario with your Hideez Key.\r\n<span style=\"font-weight: bold;\">Opening Doors and Locks</span>\r\nHideez Key comes equipped with an RFID module, so it can be used as your RFID token for a modern\r\ndoor equipped with an RFID lock. You can copy the RFID credentials to your Hideez Key from your\r\nexisting RFID key or access card or ask your local access service provider to do this for you, or you\r\ncan add your Hideez Key to the access registry on your smart lock.\r\n<span style=\"font-weight: bold;\">Key Features</span>\r\n● Identify users to information systems.\r\n● Automatic locking/unlocking of the computer, tablet or smartphone.\r\n● External hardware password manager with automated password input that works for\r\napplications as well as for websites.\r\n● Theft alarm for valuables like wallet, purse or keychain.\r\n● Remote control for an user computer or smartphone using device button.\r\n● More useful features to be delivered wirelessly via over the air updates.\r\n<span style=\"font-weight: bold;\">The use of Hideez Key reduces human factor influence on Enterprise information security field. In</span>\r\n<span style=\"font-weight: bold;\">particular:</span>\r\n● To solve weak password problem\r\n● Employees don’t have to remember passwords.\r\n● Automatically lock PCs or apps when an user is away.\r\n● To turn on 2FA on public or corporate resources without complicating the routine users\r\nwork.\r\n● To provide Two-hardware factor authentication for users. To authorize, the user need two\r\ndevices: his/her PC and the Hideez Key.\r\n<span style=\"font-weight: bold;\">An appropriate control service Hideez Enterprise Server features:</span>\r\n● Eliminates control traffic between Hideez Keys and extranet. All the traffic routes are inside\r\nan enterprise perimeter.\r\n● Basic LDAP integration (e.g Active Directory)\r\n● End-to-end encrypted information channel between the control server and Hideez Key\r\nkeyfobs. Nobody can intercept user passwords.\r\n● Administrator can change, add and delete credentials in users keyfobs remotely.\r\n● Strong passwords and with the limited expiration term without user inconvenience.\r\n● Strong authorization by changing passwords to keys, which are unknown for users.\r\n<span style=\"font-weight: bold;\">Minimum system requirements</span>\r\nBluetooth 4.0, Windows 7 (an additional USB Bluetooth adapter is needed), Windows 8.1 +, MacOS\r\n10,11+, Android 4.4 or newer, iOS 9.3+.\r\n<span style=\"font-weight: bold;\">Specifications</span>\r\nModel: Hideez Key 1 (ST 101)\r\nProcessor: Nordic nRF51822\r\nRFID Module: ATMEL T5577\r\nRFID Standards: eM-Marin and HID on 125 kHz\r\nConnectivity: Bluetooth 4.0 and higher\r\nPower: CR2032 battery, up to 6 months in active mode.\r\nUser memory: 74 Kb\r\nLED Indicators: red and green\r\nButtons: 1 multi-functional button\r\nColor: black\r\nWeight: 9 grams (package weight is 44 grams)\r\nDimensions: 32,5 x 32,5 x 9 mm\r\nWarranty: 12 months\r\n<span style=\"font-weight: bold;\">What Is In the Box?</span>\r\n● Hideez Key\r\n● Quick Start Manual\r\n● Keychain\r\n● CR2032 battery (installed inside your Hideez Key)\r\n● Spare CR2032 battery\r\n● Hideez Safe application for Windows and Android is available for free from\r\nhttp://hideez.com\r\n","shortDescription":"Hideez Key is a universal identifier and storage of user credentials","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":0,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Hideez Key (HK)","keywords":"your, device, Hideez, when, from, user, this, Safe","description":"Hideez Key — Your Only Digital Key\rHideez Key will become a daily companion to your computer, smartphone and tablet\rForget having to type passwords for apps,","og:title":"Hideez Key (HK)","og:description":"Hideez Key — Your Only Digital Key\rHideez Key will become a daily companion to your computer, smartphone and tablet\rForget having to type passwords for apps,","og:image":"https://old.b4r.io/fileadmin/user_upload/Hideez.jpg"},"eventUrl":"","translationId":1201,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":10000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the client data to the vendor to get a device (one or more) for testing","categories":[{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"infowatch-traffic-monitor":{"id":236,"logoURL":"https://old.b4r.io/fileadmin/user_upload/InfoWatch_Traffic_Monitor.jpg","logo":true,"scheme":false,"title":"InfoWatch Traffic Monitor","vendorVerified":0,"rating":"2.60","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":6,"alias":"infowatch-traffic-monitor","companyTitle":"InfoWatch","companyTypes":["supplier","vendor"],"companyId":1793,"companyAlias":"infowatch","description":"InfoWatch Traffic Monitor Key Features\r\npreventing the leakage of personally identifiable information and customer data bases\r\nprotection against leaks of sensitive data\r\nintellectual property protection\r\nidentifying intruders, disloyal employees, persons engaged in espionage, conspiracies, sabotage\r\ninvestigation of information security incidents\r\n\r\nInfoWatch Traffic Monitor:\r\ndetects any clients' personally identifiable information or any information for insurance claims and contracts sent to an external email address. The security officer or an authorized person will promptly receive information about the incident.\r\n","shortDescription":"InfoWatch Traffic Monitor is a comprehensive solution for data protection, loss prevention and monitoring the transmission of sensitive information outside a company, as well as for the protection of the company from internal threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"InfoWatch Traffic Monitor","keywords":"information, InfoWatch, Monitor, Traffic, data, security, protection, personally","description":"InfoWatch Traffic Monitor Key Features\rpreventing the leakage of personally identifiable information and customer data bases\rprotection against leaks of","og:title":"InfoWatch Traffic Monitor","og:description":"InfoWatch Traffic Monitor Key Features\rpreventing the leakage of personally identifiable information and customer data bases\rprotection against leaks of","og:image":"https://old.b4r.io/fileadmin/user_upload/InfoWatch_Traffic_Monitor.jpg"},"eventUrl":"","translationId":237,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"mcafee-endpoint-protection-advanced-suite":{"id":834,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Protection_-_Advanced_Suite.jpg","logo":true,"scheme":false,"title":"McAfee Endpoint Protection — Advanced Suite","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-endpoint-protection-advanced-suite","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"Обеспечение всесторонней защиты конечных точек\r\nВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от вредоносных программ в режиме реального времени позволяют блокировать вирусы, троянских коней, червей, рекламные, шпионские и другие потенциально нежелательные программы.\r\nОбеспечение безопасности и нормативно-правового соответствия систем\r\nИспользование централизованного механизма управления и аудита на основе политик позволяет повысить надежность защиты.\r\nОбеспечение комплексного контроля над устройствами\r\nМониторинг и ограничение копирования данных на съемные устройства и носители позволяет упреждать утечки данных и обеспечивать сохранность конфиденциальной информации.\r\nСкорость и легкость развертывания\r\nНаличие единой консоли централизованного управления позволяет устанавливать средства защиты за считанные минуты всего несколькими щелчками мышью, а также обеспечивать более подробный сбор информации о происходящем и более эффективный контроль над средствами защиты и мерами обеспечения нормативно-правового соответствия.\r\nОптимизация процессов управления защитой конечных точек\r\n\r\nБлокирование угроз «нулевого дня»\r\nИнтегрированная в данное решение технология McAfee Host Intrusion Prevention for Desktop обеспечивает защиту от новых уязвимостей и сокращает необходимость срочной установки исправлений.\r\nКонтроль за использованием сети Интернет\r\nАдминистраторы могут ограничивать доступ пользователей, находящихся в корпоративной сети и вне ее, к веб-сайтам неуместного содержания и запрещать запуск нежелательных программ на системах путем блокирования приложений.\r\nАвтоматизация выполнения требований политик\r\nMcAfee Policy Auditor позволяет интегрировать отчеты о соответствии требованиям стандартов HIPAA, PCI и других нормативно-правовых документов.\r\n\r\nТребования к системе\r\nКомплект McAfee Endpoint Protection — Advanced Suite поддерживается в операционных системах Windows и Mac.","shortDescription":"Комплексная система упреждающей защиты, позволяющая блокировать вредоносные программы и угрозы «нулевого дня»\r\nКомплект McAfee Endpoint Protection — Advanced Suite обеспечивает защиту систем Windows, Mac и Linux, находящихся внутри вашей сети и за пределами.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Endpoint Protection — Advanced Suite","keywords":"защиты, McAfee, позволяет, сети, управления, Обеспечение, политик, точек","description":"Обеспечение всесторонней защиты конечных точек\rВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от","og:title":"McAfee Endpoint Protection — Advanced Suite","og:description":"Обеспечение всесторонней защиты конечных точек\rВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Protection_-_Advanced_Suite.jpg"},"eventUrl":"","translationId":2519,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"searchinform-information-security-perimeter":{"id":344,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SearchInform_Information_Security_Perimeter.png","logo":true,"scheme":false,"title":"SearchInform Information Security Perimeter","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"searchinform-information-security-perimeter","companyTitle":"SearchInform","companyTypes":["vendor"],"companyId":2814,"companyAlias":"searchinform","description":"SearchInform Information Security Perimeter\r\n\r\n<span style=\"font-weight: bold;\">Omni-Channel Protection</span>\r\nPlace all information flows under control\r\nCapture and analyze the contents of all communications and transmitted files\r\nDefine and enforce consistent security policies throughout your ecosystem\r\nGet alerts about breaches of the security policies\r\nInvestigate and prevent the breaches with the help of retrospective analysis capabilities\r\nThe system operates at two levels: controls the data outgoing to the Internet and monitors the events on work stations, including the laptops used outside of corporate network, when employees go on business trips or work from home.\r\n\r\n<span style=\"font-weight: bold;\">Monitoring</span>\r\nEmail communications\r\nVoice and text messages as well as files (sent via Skype, Viber, ICQ, and others)\r\nData transferred to/from cloud storage services\r\nPosts and comments on web forums and blogs\r\nExternal devices (flash drives, hard drives, CDs and others)\r\nDocuments sent to printers\r\nThe system performs real-time inspection of all information flows and alerts about suspicious events. SISP stores all captured data and lets you reconstruct details should an investigation be required.\r\n\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\nMitigate the risks pertaining to data leaks\r\nManage employee loyalty and positive attitude\r\nPrevent fraud, kickbacks, sabotage and other harmful activities\r\nEncourage adherence to code of conduct\r\nImprove productivity\r\nControl corporate expenses\r\nSimplify hardware and software inventory tracking\r\nSISP is used by over 1650 companies in Russia, Ukraine, Belarus, Kazakhstan, Jordan, and Poland. Find out more about how our solution works.","shortDescription":"SearchInform Information Security Perimeter is an Omni-Channel Protection. \r\nThe system operates at two levels: controls the data outgoing to the Internet and monitors the events on work stations, including the laptops used outside of corporate network, when employees go on business trips or work from home.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SearchInform Information Security Perimeter","keywords":"data, about, system, drives, breaches, SISP, policies, alerts","description":"SearchInform Information Security Perimeter\r\rOmni-Channel Protection\rPlace all information flows under control\rCapture and analyze the contents of all","og:title":"SearchInform Information Security Perimeter","og:description":"SearchInform Information Security Perimeter\r\rOmni-Channel Protection\rPlace all information flows under control\rCapture and analyze the contents of all","og:image":"https://old.b4r.io/fileadmin/user_upload/SearchInform_Information_Security_Perimeter.png"},"eventUrl":"","translationId":344,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"securetower":{"id":490,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SecureTower.jpg","logo":true,"scheme":false,"title":"SecureTower","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"securetower","companyTitle":"Falcongaze","companyTypes":["supplier","vendor"],"companyId":2942,"companyAlias":"falcongaze","description":"SecureTower multifunctional tools allow to control data flows of a company and prevent theft of confidential data and accidental data leaks. It is possible due to monitoring the maximum possible number of channels of business communication. It is worth noting that SecureTower can operate in passive and active protection modes, if necessary, blocking the sending and placing messages that contain critical information into quarantine.\r\n\r\nNot only is capable integrated approach in SecureTower of data leak prevention but also helps to improve the working process. The means of employee activities control will help you to improve staff performance, simplify target setting and assist to HR managers.\r\n\r\nThe SecureTower system comprises the functionality of employee monitoring software, which includes capturing of network traffic, performance tracking, working time control, correspondence interception, including e-mail and instant messengers.\r\n\r\nWhat is more, SecureTower generates graphical statistical reports based on the intercepted data where detailed information is represented on what applications have been used by employees during working day, what documents have been sent (and it is possible to instantly open and view a particular document), how many web sites have been visited and how much time has been spent there. In addition, SecureTower automatically takes desktop screenshots at a predetermined interval of time, allowing you to objectively evaluate all processes in the company.\r\n\r\nSecureTower is a software solution that allows to investigate incidents in retrospective and prevent them in advance.\r\n\r\nControlled data:\r\n\r\ne-mail messages sent via POP3, SMTP, IMAP and MAPI protocols (MS Outlook, Thunderbird, The Bat!), MS Exchange Server, IBM Lotus Notes/Domino, Kerio Connect, Sendmail, hMailServer and other mail servers;\r\nweb traffic including e-mail messages of external mail clients (such as gmail.com, yahoo.com, hotmail.com, etc.), forum messages and posts, traffic in social networks and other web services;\r\ne-mail messages sent and received via cloud service Microsoft Office 365;\r\nconversations in instant messengers using OSCAR (ICQ/AIM), XMPP (Jabber) (Miranda, Google Talk, QIP Infium, PSI), YIM (Yahoo! Messenger), SIP, as well as text and voice messages in Skype, Viber, MS Lync;\r\nfiles transferred via FTP, FTPS, HTTP and HTTPS protocols, in instant messengers, as well as mail attachments;\r\nHTTP and HTTPS traffic sent via ICAP protocol from corporate proxy server;\r\nSSL traffic transmitted over encrypted protocols (including HTTPS, FTPS, with encrypted SSL for POP3, SMTP and messengers etc.);\r\nMS SQL Server, Oracle, PostgreSQL, SQLite and MySQL database contents;\r\ndata transferred to external devices (USB storage devices, WiFi-and GPRS modems, external hard drives etc.);\r\ninformation sent to network drives of computers and terminal servers;\r\ndocuments printed out;\r\nthe registration of keystrokes on the keyboard (keylogger);\r\nIP telephony (text and voice messages on the protocol SIP);\r\ntextual and numerical information that is copied to clipboard;\r\nremote recording from microphones, built-in or connected to workstations;\r\ncontrol of information in images.","shortDescription":"SecureTower is the software created especially for solving information security issues and control of work processes.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SecureTower","keywords":"SecureTower, data, messages, traffic, information, sent, been, messengers","description":"SecureTower multifunctional tools allow to control data flows of a company and prevent theft of confidential data and accidental data leaks. It is possible due","og:title":"SecureTower","og:description":"SecureTower multifunctional tools allow to control data flows of a company and prevent theft of confidential data and accidental data leaks. It is possible due","og:image":"https://old.b4r.io/fileadmin/user_upload/SecureTower.jpg"},"eventUrl":"","translationId":491,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":150,"title":"Workforce Performance Management","alias":"workforce-performance-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/employee-performance-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"symantec-data-loss-prevention":{"id":376,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Symantec_Data_Loss_Prevention.jpg","logo":true,"scheme":false,"title":"Symantec Data Loss Prevention","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":11,"alias":"symantec-data-loss-prevention","companyTitle":"Symantec","companyTypes":["vendor"],"companyId":175,"companyAlias":"symantec","description":"<span style=\"font-weight: bold;\">Extend Data Loss Prevention to the Cloud</span>\r\nDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access security broker (CASB) capabilities from Symantec CloudSOC.\r\nExtend your DLP coverage and get direct visibility of content in over sixty cloud apps - including Office 365, Box, Dropbox, Google Apps or Salesforce\r\nLeverage full CASB capabilities so you can continuously monitor content additions, changes, and access rights in cloud apps\r\nLeverage existing DLP policies and workflows for cloud apps so you don’t have to rewrite your finely-tuned rule sets\r\n\r\n<span style=\"font-weight: bold;\">Discover Where Sensitive Data Is Stored Across Your Infrastructure</span>\r\nDescribed Content Matching looks for matches on regular expressions or patterns, e.g., “block if we see a credit card pattern”\r\nExact Data Matching identifies sensitive data directly in your database, e.g., “block exfiltration of any customer name and their associated bank account number”\r\nIndexed Document Matching applies a “full file fingerprint” to identify confidential information in unstructured data including Microsoft Office documents; PDF files; as well as binary files such as JPEGs, CAD designs, and multimedia files\r\nVector Machine Learning automatically learns and identifies the layout of sensitive document types such as financial documents, source code, etc.\r\nFile Type Detection recognizes more than 330 different file types including email, graphics and encapsulated formats, and can also recognize virtually any custom file type\r\n\r\n<span style=\"font-weight: bold;\">Monitor and Protect Sensitive Data On Mobile Devices, On-Premise, and In the Cloud</span>\r\nKeep data safe on Windows and Mac endpoints by performing local scanning and real-time monitoring\r\nMonitor confidential data that is being downloaded, copied or transmitted to or from laptops and desktops, including through email or cloud storage\r\nExtend data loss prevention monitoring and protection to iOS and Android devices, whether corporate-owned or user-owned\r\nFind and protect confidential unstructured data by scanning network file shares, databases, and other enterprise data repositories\r\nMonitor and protect data in motion, including sensitive data sent via email, web and a wide range of network protocols\r\n\r\n<span style=\"font-weight: bold;\">Define and Enforce Policies Consistently Across Your Environment</span>\r\nUse a single web-based console to define data loss policies, review and remediate incidents, and perform system administration across all of your endpoints, mobile devices, cloud-based services, and on-premise network and storage systems\r\nTake advantage of more than 60 pre-built policy templates and a convenient policy builder to get your Symantec Data Loss Prevention solution up and running quickly\r\nUse robust workflow and remediation capabilities to streamline and automate incident response processes\r\nApply business intelligence to your Symantec Data Loss Prevention efforts with a sophisticated analytics tool that provides advanced reporting and ad-hoc analysis capabilities","shortDescription":"Discover, monitor and protect your sensitive data with the industry’s leading data loss prevention solution.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Symantec Data Loss Prevention","keywords":"data, Data, your, cloud, Symantec, Loss, including, Prevention","description":"Extend Data Loss Prevention to the Cloud\rDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access","og:title":"Symantec Data Loss Prevention","og:description":"Extend Data Loss Prevention to the Cloud\rDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access","og:image":"https://old.b4r.io/fileadmin/user_upload/Symantec_Data_Loss_Prevention.jpg"},"eventUrl":"","translationId":377,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["cyberark-sensitive-information-management-solution","datadvantage","devicelock-endpoint-dlp-suite","digital-guardian-data-protection-platform","forcepoint-advanced-malware-detection-forcepoint-email-security-cloud-forcepoint-web-security-cloud","forcepoint-casb-cloud-access-security-broker","forcepoint-data-security","forcepoint-dlp","forcepoint-email-security-cloud-forcepoint-web-security-cloud","forcepoint-url-filtering","forcepoint-web-security-cloud-formerly-triton-ap-web-cloud","forcepoint-web-security-cloud-ranee-triton-ap-web-cloud","group-ib-secure-bank","group-ib-secure-portal","hideez-key-hk","infowatch-traffic-monitor","mcafee-endpoint-protection-advanced-suite","searchinform-information-security-perimeter","securetower","symantec-data-loss-prevention"]},"links":{"first":"http://b4r_be/api/products?page=1","last":"http://b4r_be/api/products?page=2","prev":null,"next":"http://b4r_be/api/products?page=2"},"meta":{"current_page":1,"from":1,"last_page":2,"path":"http://b4r_be/api/products","per_page":20,"to":20,"total":25},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}