{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"en":"Offer a reference bonus","ru":"Предложить бонус за референс","_type":"localeString"},"configurator":{"en":"Configurator","ru":"Конфигуратор","_type":"localeString"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"_type":"localeString","en":"I use it","ru":"I use it"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"_type":"localeString","en":"Selling","ru":"Продают"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"en":"deployment","ru":"внедрение","_type":"localeString"},"vendor-popover":{"en":"vendor","ru":"производитель","_type":"localeString"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"_type":"localeString","en":"Rating ascending","ru":"По возрастанию рейтинга"},"sort-rating-desc":{"en":"Rating descending","ru":"По убыванию рейтинга","_type":"localeString"},"sort-discount-asc":{"en":"Rebate ascending","ru":"По возрастанию скидки","_type":"localeString"},"sort-discount-desc":{"en":"Rebate descending","ru":"По убыванию скидки","_type":"localeString"},"i-use-it-popover":{"ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier."},"details":{"en":"Details","ru":"Детальнее","_type":"localeString"},"rebate-for-poc":{"_type":"localeString","en":"Bonus 4 POC","ru":"Бонус 4 POC"},"rebate":{"_type":"localeString","en":"Bonus","ru":"Бонус"},"vendor-verified":{"_type":"localeString","en":"Vendor verified","ru":"Поставщик потверждён"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"_type":"localeString","en":"Learn more","ru":"Узнать больше"},"categories-popover":{"_type":"localeString","en":"categories","ru":"категории"},"sort-popular-asc":{"ru":"По возростанию популярности","_type":"localeString","en":"Popular ascending"},"sort-popular-desc":{"_type":"localeString","en":"Popular descending","ru":"По убыванию популярности"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"login":{"_type":"localeString","en":"Login","de":"Einloggen","ru":"Войти"},"register":{"en":"Register","de":"Registrieren","ru":"Зарегистрироваться","_type":"localeString"},"auth-message":{"en":"You need to register or login.","de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString"},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"en":"Added to comparison","ru":"Добавлено в сравнения","_type":"localeString"},"items-found":{"_type":"localeString","en":"Products found","ru":"Продуктов найдено"},"sort-sales-desc":{"en":"By sale","ru":"По продаже","_type":"localeString"},"sort-purchases-desc":{"en":"By purchase","ru":"По покупке","_type":"localeString"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product producer"},"products-fetching-error":{"en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString"}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"logout"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"en":"View","ru":"Вид","_type":"localeString"},"sort-type-label":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"_type":"localeString","en":"Follow","ru":"Следить"},"add-product":{"_type":"localeString","en":"Add Product","ru":"Добавить продукт"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"_type":"localeString","en":"Delivery type","ru":"Тип поставки"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"en":"Providers","ru":"Поставщик, производитель","_type":"localeString"},"business-tasks-field":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"problems-field":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"with-discounts-checkbox":{"_type":"localeString","en":"With discounts","ru":"Со скидками"},"expert-price-checkbox":{"en":"Configurator","ru":"Конфигуратор","_type":"localeString"},"roi-calculator-checkbox":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"apply-filter-button":{"en":"Apply filter","ru":"Применить фильтр","_type":"localeString"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"en":"With deployments","ru":"С внедрениями","_type":"localeString"},"bonus-4-reference":{"_type":"localeString","en":"Bonus 4 Reference","ru":"Бонус за референс"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"ru":"Продавец","_type":"localeString","en":"Seller"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"_type":"localeString","en":"User suppliers","ru":"Поставщики пользователя"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"branch":{"_type":"localeString","en":" Branch","ru":"Отрасль"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"info-source":{"_type":"localeString","en":"Info source","ru":"Информационный ресурс"},"with-reference-checkbox":{"ru":"С референсами","_type":"localeString","en":"With reference"},"show-deal-checkbox":{"en":"Show deal with noname","ru":"Показывать сделки с noname","_type":"localeString"},"roi-checkbox":{"en":"ROI","ru":"ROI","_type":"localeString"},"problems":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"company-size":{"_type":"localeString","en":"Company size","ru":"Размер компании"},"add-company":{"_type":"localeString","en":"Add company","ru":"Добавить компанию"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"en":"From Z to A","ru":"От Я до А","_type":"localeString"},"sellers-field":{"en":"Sellers","ru":"Поставщики, Производители","_type":"localeString"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"en":"Product vendor","ru":"Производитель продукта","_type":"localeString"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"en":"Deal closed","ru":"Сделка закрыта","_type":"localeString"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"_type":"localeString","en":"Stopped","ru":"Остановлено"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"label":"catalog-products-text-block","body":{"_type":"localeBlock","en":[{"_key":"8bebcfb34955","markDefs":[],"children":[{"marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550","_type":"span"}],"_type":"block","style":"normal"}],"ru":[{"children":[{"_type":"span","marks":[],"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0"}],"_type":"block","style":"normal","_key":"28241882db7a","markDefs":[]}]}}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"translatable_meta":[{"name":"og:title","translations":{"_type":"localeString","en":"Products","ru":"Продукты"}},{"translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"Description"},"name":"description"},{"name":"og:description","translations":{"en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString"}},{"name":"keywords","translations":{"ru":"каталог, программное обеспечение, софт, ит услуги","_type":"localeString","en":"keyword"}},{"name":"title","translations":{"_type":"localeString","en":"Products","ru":"Продукты"}}],"title":{"ru":"ROI4CIO: Продукты","_type":"localeString","en":"ROI4CIO: Products"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"allot-communications-secure-service-gateway":{"id":1277,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Allot_Communications.png","logo":true,"scheme":false,"title":"Allot Communications Secure Service Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"allot-communications-secure-service-gateway","companyTitle":"Allot Communications","companyTypes":["supplier","vendor"],"companyId":4095,"companyAlias":"allot-communications","description":"<span style=\"font-weight: bold;\">Protect network uptime and efficiency</span>\r\nAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of the world’s largest network operators. Flexible redundancy configurations plus passive bypass with automatic port failover maximize uptime and availability.\r\n\r\n<span style=\"font-weight: bold;\">Automate operations and lower TCO</span>\r\nAllot Secure Service Gateway integrates multiple functions in an Intel-based platform that protects your investment and lets you scale from 2 to 22 ports of 1GE/10GE network connectivity in a single appliance.\r\n\r\n<span style=\"font-weight: bold;\">Get the visibility you need to control application performance</span>\r\nAllot provides live traffic monitoring and usage reporting according to traffic policies that are mapped to your complex data center and cloud applications, giving you full visibility and control of application performance, web access, user quality of experience, shadow IT and web threats.\r\n\r\n<span style=\"font-weight: bold;\">Protect users from Internet threats and enforce acceptable use</span>\r\nAllot helps you embrace and maximize the business value of cloud (web) applications by detecting and blocking malware, phishing and other web threats before they harm application performance and user productivity. Allot Secure Service Gateway also detects and surgically filters DDoS and bot traffic before it affects your network.\r\n\r\n<span style=\"font-weight: bold;\">With Allot Secure Service Gateway you can:</span>\r\n<ul><li>See how well your mission-critical applications are performing and supporting user productivity</li><li>Control application performance and improve Quality of Experience according to business priorities</li><li>Keep malicious or unauthorized user/application traffic off your network</li><li>Neutralize threats and ensure ongoing performance of business applications</li><li>Enforce Acceptable Use Policy for shadow IT, BYOD, resource usage</li><li>Troubleshoot and resolve network issues in real time</li><li>Simplify and automate your operations</li><li>Reduce opex and TCO</li></ul>","shortDescription":"Allot Communications Secure Service Gateway is a Smart Way to Protect Users and Control Application Performance\r\nYour business relies on employees and customers being able to connect and work productively with mission-critical applications at all times and from any location. The performance and efficiency of your network can be easily compromised by the ever-increasing demand for LAN, WAN and Internet bandwidth driven by cloud, mobile and video applications. Moreover, the growing use of BYOD and shadow IT have opened complex attack vectors for web threats to infect user devices, get into your network, and harm business productivity and viability. Allot Secure Service Gateway combines the functionality of Allot Service Gateway with our powerful web security and DDoS protection systems, to offer a single, scalable solution that lowers the cost of supporting your evolving requirements for application and user visibility, performance, and security.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Allot Communications Secure Service Gateway","keywords":"Allot, your, performance, Service, Secure, application, Gateway, network","description":"Protect network uptime and efficiency\rAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of","og:title":"Allot Communications Secure Service Gateway","og:description":"Protect network uptime and efficiency\rAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of","og:image":"https://old.b4r.io/fileadmin/user_upload/Allot_Communications.png"},"eventUrl":"","translationId":1278,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"},{"id":325,"title":"Performance Management Software","alias":"performance-management-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/performance-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-email-security-gateway":{"id":115,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_Email_Security_Gateway.png","logo":true,"scheme":false,"title":"Barracuda Email Security Gateway","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-email-security-gateway","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<strong>Provides Inbound/Outbound Filtering and Data Leak Prevention</strong>\r\nThe Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks. As a complete email management solution, the Barracuda Email Security Gateway lets organizations encrypt messages and leverage the cloud to spool email if mail servers become unavailable.\r\nThe Barracuda Email Security Gateway is offered without per-user or per-feature fees, and is also available as a virtual appliance or in a public cloud environment (Amazon Web Services (AWS), Microsoft Azure, or VMware vCloud Air). For hosted email security, see Barracuda Essentials for Email Security.\r\n<strong>Protect Against Email-Borne Threats</strong>\r\nWith the Barracuda Email Security Gateway, protecting against inbound malware, spam, phishing, and Denial of Service attacks ensures that business productivity isn’t impacted by attacks through the email system. Powerful and customizable policies enable further enforcement of detailed requirements that govern inbound email messages.\r\n \r\n<strong>Stop Threats before They Hit the Network</strong>\r\nOffload CPU-intensive tasks like antivirus and DDoS filtering to the cloud reduces the processing load on the appliance and to ensure that threats never reach the network perimeter. The Barracuda Email Security Gateway is integrated with a cloud-based service that pre-filters email before delivery to the onsite Barracuda Email Security Gateway, which performs further inbound security checks and outbound filtering.\r\n \r\n<strong>Ensure Continuous Email Availability</strong>\r\nEmail is a critical vehicle in today’s business world, therefore a failure of the email server can significantly limit business operations. With the Cloud Protection Layer, bundled free of charge with the Barracuda Email Security Gateway, email is spooled for up to 96 hours, with an option to re-direct traffic to a secondary server.\r\n \r\n<strong>Protect Sensitive Data</strong>\r\nLeverage powerful encryption technology to ensure that sensitive data cannot be viewed by outside parties. Outbound filtering and quarantine capabilities certify that every outbound email complies with corporate DLP policies.\r\nSimple and easy to deploy configurations on the Barracuda Email Security Gateway guarantee that customized email protection is in place in a matter of minutes. Cloud-based centralized management enhances day-to-day workflow and is included with no additional fees.\r\nThe affordable, all-inclusive pricing model has no per-user fees, minimizing the investment in securing your email infrastructure.","shortDescription":"Barracuda Email Security Gateway - Comprehensive Protection from Email-Based Threats","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Email Security Gateway","keywords":"Email, email, Security, Barracuda, Gateway, that, with, Features","description":"Provides Inbound/Outbound Filtering and Data Leak Prevention\rThe Barracuda Email Security Gateway is an email security gateway that manages and filters all","og:title":"Barracuda Email Security Gateway","og:description":"Provides Inbound/Outbound Filtering and Data Leak Prevention\rThe Barracuda Email Security Gateway is an email security gateway that manages and filters all","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_Email_Security_Gateway.png"},"eventUrl":"","translationId":116,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":554,"title":"Messaging Security - Appliance","alias":"messaging-security-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/mail-security-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-phishline":{"id":1906,"logoURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda PhishLine","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-phishline","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">Defend Your Business Against Social-Engineering Attacks</span> Fight phishing and other potentially-devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing exposure. Transform employees from potential victims into a layer of defense with Barracuda PhishLine. With PhishLine, you guard against every facet of social-engineering threats with continuous simulation and training for employees. Show them the latest attack techniques, how to recognize the subtle clues and help stop email fraud, data loss, and brand damage. Embed learning into your everyday business processes with customized simulations that test and reinforce good behavior. Only PhishLine helps you defend against a range of threats with patented, highly-variable attack simulations for multiple vectors, including phishing, smishing, vishing and found physical media.\r\n<ul>\r\n<li>Easy-to-implement cloud-based solution</li>\r\n<li>Patented simulation of email, SMS, voicemail and USB attacks</li>\r\n<li>Analytics and reporting based on thousands of data points</li>\r\n<li>Automate simulation campaigns with address book integration</li>\r\n<li>Large library of SCORM-compliant courseware</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Train Employees To Recognize Phishing Emails, Voicemails, and SMS Messages</span> Guard against every facet of social-engineering threats by training your employees to identify and report them. PhishLine provides patented, highly-variable attack simulations for multiple vectors, including phishing (email), smishing (SMS), vishing (voice) and found physical media (USB/SD card). Plus, use multiple simulation templates in a single campaign, to conduct hypothesis-based A/B tests and prevent users from receiving duplicate mock phishing templates. With PhishLine, you train employees to recognize threats from multiple sources and test them the way an attacker would. <span style=\"font-weight: bold;\">Customize Training to Make it Engaging and Relevant to Your Users</span> PhishLine’s simulation and training content is easy to use and is fully customizable. You get a wide variety of materials: Choose from hundreds of easy-to-use simulation templates, landing pages, risk assessment surveys, and engaging multi-lingual training content in the online PhishLine Content Center Marketplace™. Materials can be used individually or integrated into simulated phishing and social-engineering campaigns. New simulation and training content is added daily, to reflect the most recent threats and training resources available to help protect your business. PhishLine lets you deliver training as soon as the need is identified, using a built-in workflow engine. For example, you can use a landing page for in-the-moment training when someone performs an unsafe action as part of a mock phishing campaign. You can also send training invitations to specific employees based on their past actions and risk profile. Plus, you can schedule training invitations and post on-demand training on your intranet. PhishLine makes it easy for employees to instantly report suspicious emails to your help desk or incident response team. The built-in Phish Reporting Button is a simple, powerful solution that gives you complete control over the entire process at all times. <span style=\"font-weight: bold;\">Identify Human Risk Factors in a Non-Threatening Manner</span> Do employees truly understand that information security policy they signed? Did a recent information security announcement have any impact on their perceptions of risk? Is your security awareness program addressing the real needs of employees, from their perspectives? These are some of the questions addressed by PhishLine’s Risk-Based Survey module in a thoughtful, perceptive, and non-threatening manner. These unique, qualitative, risk-assessment capabilities allow for discovery in the “voice of the employee.” Back-end analysis capabilities lead to a unique and powerful assessment tool that quantifies risk by impact and likelihood scores. You can objectively evaluate your organization’s human-risk factor based on meaningful feedback from your employees. <span style=\"font-weight: bold;\">Protect Your Business With Updated Content That Guards Against The Latest Threats</span> With PhishLine, there’s no need to recycle the same old training and testing materials. The Content Center Marketplace is constantly updated by security experts to reflect the newest threats and the training resources available to protect your business. Engage employees – and keep their interest – with a wide variety of choices and materials designed to fit your corporate culture. In addition, PhishLine provides Click Thinking™, a monthly bundle of content updates. Each update is aligned around a hot topic, and includes a new training video, email template and landing page. <span style=\"font-weight: bold; text-decoration-line: underline;\">Content</span> <span style=\"font-weight: bold;\">Hundreds of Email Lure Templates, Landing Pages and Domains</span> New content is added every day creating endless combinations of email templates, landing pages, email account senders and web server domains. As the threat landscape changes so will our tests, giving you access to the most up-to-date content. <span style=\"font-weight: bold;\">PhishLine Content Center Marketplace™</span> All content can be found in the PhishLine Content Center Marketplace, a one-stop-shop for browsing, selecting and importing the perfect content to craft your continually evolving campaigns. <span style=\"font-weight: bold;\">Customized Templates</span> Add that special touch by customizing any of the templates so your simulated attacks come from people in positions of trust, effectively testing your workforce and teaching them to be wary of threats that only your organization may have seen. <span style=\"font-weight: bold; text-decoration-line: underline;\">Testing</span> <span style=\"font-weight: bold;\">Patented Multi-Variable Attack Simulations</span> In today’s threat landscape, you can be phished from more than just email. Train your team on every facet of threat with PhishLine’s multi-variable attacks with campaigns that include Smishing (SMS/Text), Vishing (Voicemail) and Found Physical Media. This unique capability will help prevent users from receiving the same mock phishing template in a campaign and can allow for hypothesis-based testing (A/B tests). <span style=\"font-weight: bold;\">Smishing (SMS/Text)</span> Protect your user base by training them to recognize unfamiliar outgoing texts with our industry-leading smishing simulation. The innovative incoming mode allows you to email requests to text custom phone numbers as the call-to-action for otherwise innocuous emails, catching what would be a normally unknown vector before it can be used against your workforce. <span style=\"font-weight: bold;\">Vishing (Voicemail)</span> Employees get many phone calls each day, which one of those will cost the company? With PhishLine’s anti-voicemail phishing or ‘Vishing’ we provide fully customizable simulated threats that will compliment any security awareness campaign. <span style=\"font-weight: bold;\">Found Physical Media (USB/SD Card)</span> Using the same Smart Attachment technology found in our email campaigns, you can distribute files on portable drives and cards with watermarks in a variety of file formats to track who is willing to plug it into your network. The files won’t cause security problems even if non-employees find them as the content redirects users to landing pages designed to educate on the perils found in anonymous portable media. <span style=\"font-weight: bold;\">Advanced Threat Simulation Features</span> Crafting effective scenarios is paramount when developing an effective anti-spearphishing campaign especially in long-term approaches where users would start seeing repetitive emails. Prevent that by using PhishLine’s advanced threat simulation features including time stamping to create a sense of urgency prompting users to respond before they can think it through, phone home macros, DLP tagging, geo-location and more. Our patented system allows for multiple combinations of email templates, landing pages, email account senders, and web server domains within a single campaign. <span style=\"font-weight: bold; text-decoration-line: underline;\">Reporting</span> <span style=\"font-weight: bold;\">Phish Reporting Button</span> Enable easy tracking of user phishing attempts with the Phish Reporting Button, simplifying the task of reporting possible threats while tying in user reporting to your training regimen. <span style=\"font-weight: bold;\">Robust User Attributes</span> Why stop at user name and email address when you can test based on location, job function, tenure, privileged credentials, or access to sensitive networks and applications? PhishLine gives you granular control for your reports, that your mid-level marketing managers in Kansas are more likely to click a link in an email on Tuesday, as well as testing and education so your workforce isn’t inundated with emails they shouldn’t get. <span style=\"font-weight: bold;\">Extensive reporting and metrics</span> More than 16,000 data points are at your disposal with PhishLIne’s advanced metrics and reporting. Identify levels of risk at macro and micro levels within your organization to help expedite remediation while keeping your workforce at maximum efficiency by targeting training to only those who need testing at that moment. <span style=\"font-weight: bold;\">Data Loss Prevention (DLP)</span> Worried about data leaking from your organization? With PhishLine’s built-in Data Loss Prevention Activator, you can track where those PhishLine campaign emails and portable media drops go and who accesses it to know who might leak your company data as well. <span style=\"font-weight: bold;\">HTTP/SSL</span> Is your workforce leaning hard on whether there’s an encryption symbol next to the URL when they click links in their emails? With HTTPS and SSL landing pages you can collect information from your users without the possibility of people snooping that information and using it against you while convincing your users that they are safe. <span style=\"font-weight: bold; text-decoration-line: underline;\">Education</span> <span style=\"font-weight: bold;\">Program Gamification</span> Engage your users and make the cat-and-mouse aspect of security awareness fun by turning the workflow into a game with leaderboards and user leveling systems. This will help train users to spot and report threats while keeping the idea of spearphishing at the forefront of their mind. Levelized Programs Measure and communicate the success of your security awareness efforts. A leveling program gives you the ability to create a custom program based on the hallmarks of a healthy security culture: training completion, avoiding interactions with simulation messages, and reporting suspected phishing. As employees move through the program, they are presented with on-level training and simulation content that challenges their security awareness, enabling the administrator to track and report on overall program effectiveness and individual user awareness. (Available in PhishLine Concierge only.) <span style=\"font-weight: bold;\">Risk-Based Surveys</span> Should a CEO or accounts payable team get the same test as your engineer, nurse or teacher? With PhishLine you can issue risk-based surveys that provide unique insights into your user level security posture. By being better informed about your user level risk and validating it throughout the year you will maintain a security plan that mirrors your organizational objectives. <span style=\"font-weight: bold;\">Bonus Security Awareness Training Materials</span> To support your computer-based training initiatives, PhishLine provides supplementary materials such as two-minute best practice videos covering topics such as Malware Awareness and Password Security. In addition, there is an array of bonus training materials including posters, newsletters, infographics, and tip sheets. PhishLine has partnered with several reputable content vendors to augment our built-in content.","shortDescription":"Barracuda PhishLine - Fight phishing with continuous simulation and training\r\nTrain employees to understand the latest attack techniques, recognize subtle clues, and help stop email fraud, data loss","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda PhishLine","keywords":"your, training, PhishLine, that, with, security, email, employees","description":"Defend Your Business Against Social-Engineering Attacks Fight phishing and other potentially-devastating attacks that can slip through security gateways. These","og:title":"Barracuda PhishLine","og:description":"Defend Your Business Against Social-Engineering Attacks Fight phishing and other potentially-devastating attacks that can slip through security gateways. These","og:image":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1907,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-sentinel":{"id":1908,"logoURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda Sentinel","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-sentinel","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise</span> <span style=\"font-weight: bold;\">Stop Targeted Attacks Before They Reach Your Users</span> Business Email Compromise (BEC) has cost businesses $12B since 2013 plus untold additional losses from lost productivity and damage to reputation. Email impersonation attacks have tricked individuals into sending wire transfers and sensitive customer and employee information to attackers who are impersonating their CEO, boss, or trusted colleague. Barracuda Sentinel uses artificial intelligence and deep integration with Office 365 to stop these attacks before they reach your mail server, as well as detecting threats already sitting in your inbox. <span style=\"font-weight: bold; text-decoration-line: underline;\">Benefits of Barracuda Sentinel</span> <span style=\"font-weight: bold;\">Stop Email Impersonation Attacks</span> Traditional email filters sit in front of your mail server, so they don't see threats already in your inbox. Sentinel works from inside O365 and uses artificial intelligence to detect signs of spear phishing and account takeover. <span style=\"font-weight: bold;\">Protect Your Business from Account Takeover</span> Account takeover is a major new threat to business data. Sentinel detects account takeover attempts and blocks email attacks launched from compromised accounts. <span style=\"font-weight: bold;\">Protect Your Reputation and Stop Domain Fraud</span> Don't let hackers impersonate your domain to launch email attacks. Sentinel protects your brand and reputation through simplified DMARC reporting and analysis. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Identify and Secure Your Highest-Risk Individuals</span> Sentinel uses machine learning to automatically identify the people within your organization who are most likely to be targeted. <span style=\"font-weight: bold;\">Part of a Complete Email Protection Platform</span> With the Total Email Protection edition, Sentinel is combined with Barracuda Essentials and PhishLine for a complete email security, archiving, and data protection solution. <span style=\"font-weight: bold;\">Sentinel Detects Threats that Email Security Gateways Can't</span> Sentinel detects threats that traditional email security systems can't. It integrates directly with Microsoft Office 365 APIs to detect attacks coming from both internal and external sources, including threats that may already be in your inbox. It uses artificial intelligence to detect signs of malicious intent and deception within every email with virtually no I.T. administration required. <span style=\"font-weight: bold;\">Protect Your Business Against Account Takeover</span> Corporate Account Takeover presents a significant new threat to business. Hackers gain access to corporate email accounts through stolen credentials and use them to launch subsequent targeted attacks, internally and against external targets. Account takeover or attacks that originate from these accounts are almost impossible to detect since they don’t leverage impersonation techniques—they come from a legitimate account and appear to be from a trusted source. In fact, traditional email security solutions don’t even observe internal traffic and have no way of stopping an attack originating internally. Barracuda Sentinel detects both account takeover attempts and attacks launched from compromised accounts. By analyzing both historical and inbound data Sentinel is able to identify behavioral, content, and link-forwarding anomalies within your organization, and to flag and quarantine fraudulent emails. It is also able to prevent attempts to compromise employee credentials by automatically blocking targeted phishing emails that try to harvest employee passwords. <span style=\"font-weight: bold;\">Features</span> <span style=\"font-weight: bold;\">Stop Targeted Attacks with AI</span>\r\n<ul>\r\n<li>Prevent Spear Phishing</li>\r\n<li>Prevent BEC and CEO Fraud</li>\r\n<li>Detect Employee Impersonation</li>\r\n<li>Stop Zero-Day Phishing</li>\r\n<li>Detect Web Impersonation</li>\r\n<li>Stop Inbound Spoofing</li>\r\n<li>Continuous Learning</li>\r\n<li>Exportable Reports</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Stop Account Takeover with AI</span>\r\n<ul>\r\n<li>Alerting for Account Takeover</li>\r\n<li>Prevent Account Takeover Infiltration</li>\r\n<li>Detect Compromised Emails</li>\r\n<li>Delete Emails Sent Internally</li>\r\n<li>Notify External Recipients</li>\r\n<li>Lock Attackers Out of Accounts</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Domain Fraud Prevention</span>\r\n<ul>\r\n<li>Prevent Third Party Domain Spoofing</li>\r\n<li>Automated DMARC Reporting</li>\r\n<li>DMARC Aggregation and Visualization</li>\r\n<li>DKIM/SPF Configuration and Troubleshooting</li>\r\n<li>Better Email Deliverability</li>\r\n<li>Spoofed Email Reports</li>\r\n<li>Detect Misconfigured Legitimate Senders</li>\r\n<li>Protects Customer Brands</li>\r\n<li>Exportable Reports</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Flexible API-based Deployment</span>\r\n<ul>\r\n<li>Lightweight Architecture</li>\r\n<li>Instant Setup</li>\r\n<li>Works with Any Gateway</li>\r\n<li>Historical Assessment</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Phishing Simulations</span>\r\n<ul>\r\n<li>Test Employee Security Awareness</li>\r\n<li>80 Real-World Templates</li>\r\n<li>Simulate Impersonation and BEC</li>\r\n<li>AI Determines Employee Risk</li>\r\n</ul>\r\n","shortDescription":"Barracuda Sentinel is A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Sentinel","keywords":"Sentinel, from, Account, Email, your, email, attacks, Stop","description":"A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise Stop Targeted Attacks Before They Reach Your Users Business Email","og:title":"Barracuda Sentinel","og:description":"A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise Stop Targeted Attacks Before They Reach Your Users Business Email","og:image":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1911,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"cellopoint-secure-email-gateway":{"id":2104,"logoURL":"https://old.b4r.io/fileadmin/user_upload/cellopoint__logo_.png","logo":true,"scheme":false,"title":"CelloPoint Secure Email Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cellopoint-secure-email-gateway","companyTitle":"Cellopoint","companyTypes":["vendor"],"companyId":4539,"companyAlias":"cellopoint","description":"<p>Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by CelloLabs which has the capability to filter out all email threats. In addition, Cellopoint Security Gateway eliminates 99% unwanted message and provides a high-class defending capability—not only from known threats, but from those certain to evolve in the future.</p>\r\n<p><span style=\"font-weight: bold;\">Benefits:</span></p>\r\n<ul>\r\n<li>Protects against spam, viruses, spyware, and other malware</li>\r\n<li>Affordable protection is simple and reliable</li>\r\n<li>Reduces administrative overhead</li>\r\n<li>Intuitive Management GUI</li>\r\n</ul>\r\n<p><strong>Tier One: Anti-spam Protection</strong></p>\r\n<p>Anti-spam methods eliminate more than 99% of spam with a range of anti-spam technologies including:</p>\r\n<ul>\r\n<li>Denial of Service (DoS) Protection</li>\r\n<li>SMTP Rate Limit</li>\r\n<li>Bounce Back Protection</li>\r\n<li>Directory Harvest Attack (DHA) Prevention</li>\r\n<li>Sender IP Reputation Analysis</li>\r\n<li>SMTP Transaction Check</li>\r\n<li>Virus, Phishing and Spyware Scanning</li>\r\n<li>Intelligent Content Analysis (ICA)</li>\r\n<li>Heuristics Rule</li>\r\n<li>Bayesian Analysis</li>\r\n<li>Violation Check</li>\r\n</ul>\r\n<p><strong>Tier Two: Anti-Virus Filtering</strong></p>\r\n<p>A combination of multiple anti-virus engines offers an extensive real time scanning and virus definition updates. Catch a variety of known virus and phishing patterns, spyware, trojans, worms and malware threats. Easy to deploy in your existing email infrastructure.</p>\r\n<p><strong>Tier Three: Anti-APT-URL Protection</strong></p>\r\n<p>To protect against the phishing targeted attacks and malicious URL links, Cellopoint SEG will scan and block as follow:</p>\r\n<p><span style=\"font-style: italic;\">Static Black/Whitelist Database</span></p>\r\n<p>Over 2 million latest global URL black/whitelist database for quick comparison and quarantine.</p>\r\n<p><span style=\"font-style: italic;\">Dynamic URL ToC (Time of Click) Scanning</span></p>\r\n<p>To protect against the unknown, suspicious or malicious URL links, Cellopoint SEG will rewrite the links to go through CelloCloud for realtime examination. The URLs will be examined at the time when the users click them. If a link is unsafe, the users will be warned not to visit the site or informed that the site has been blocked by Cellopoint SEG.</p>\r\n<p><strong>Tier Four: Anti-APT-File Protection</strong></p>\r\n<p>To protect against the unknown, new advanced malware emails and attachment fi les, Cellopoint SEG will scan and block as follow:</p>\r\n<p><span style=\"font-style: italic;\">Dynamic Sandbox Scanning</span></p>\r\n<p>Suspicious email attachements will be sent as encrypted packages to the powerful cloud computing CelloCloud to do dynamic sandbox scanning.</p>\r\n<p><span style=\"font-style: italic;\">Full-system emulation</span></p>\r\n<p>Malware as Office and PDF files is captured and induced into a simulated operating system like Windows, Android, Mac OSX.</p>\r\n<p><span style=\"font-style: italic;\">Correlation Analysis and Threat Scores</span></p>\r\n<p>Threat Level Analysis that commands SEG to either block or release certain mails.</p>\r\n<p><span style=\"font-style: italic;\">Professional Summary Report</span></p>\r\n<p>Analysis report overview shows malicious file name, threats reputation scores, classifi cation, network activity and registry summary.</p>\r\n<p><span style=\"font-weight: bold;\">High-performance, Easy Deployment</span></p>\r\n<p>Cellopoint SEG is designed to meet the unique needs of any size of business. It offers all of the performance, flexibility, scalability, customization and end-user control features needed in deployments.</p>","shortDescription":"Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CelloPoint Secure Email Gateway","keywords":"Cellopoint, Analysis, will, Protection, threats, Tier, against, malware","description":"Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by","og:title":"CelloPoint Secure Email Gateway","og:description":"Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by","og:image":"https://old.b4r.io/fileadmin/user_upload/cellopoint__logo_.png"},"eventUrl":"","translationId":2105,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"cisco-email-security":{"id":1741,"logoURL":"https://old.b4r.io/fileadmin/user_upload/cisco_new.png","logo":true,"scheme":false,"title":"Cisco Email Security","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":273,"alias":"cisco-email-security","companyTitle":"Cisco","companyTypes":["supplier","vendor"],"companyId":170,"companyAlias":"cisco","description":"<span style=\"font-weight: bold;\">New capabilities to protect your users and brand</span>\r\nTwo new capabilities help block phishing emails from reaching your users and safeguard your company’s domain. Gain additional layers of protection against business email compromise (BEC).\r\n<span style=\"font-weight: bold;\">Cisco Advanced Phishing Protection</span>\r\n<span style=\"font-weight: bold;\">Benefits:</span>\r\n• Gain a real-time understanding of senders, learn and authenticate email identities and behavioral relationships to protect against BEC attacks\r\n• Remove malicious emails from users’ inboxes to prevent wire fraud or other advanced attacks\r\n• Get detailed visibility into email attack activity, including total messages secured and attacks prevented\r\n• Augment phishing and BEC detection and blocking capabilities offered in Cisco Email Security\r\n<span style=\"font-weight: bold;\">Cisco Domain Protection</span>\r\n<span style=\"font-weight: bold;\">Benefits:</span>\r\n• Prevent brand abuse through impersonation of your company domain\r\n• Gain visibility into your internal and third-party senders who use your domain to send email on your behalf\r\n• Automate the Domain-based Message Authentication, Reporting, and Conformance (DMARC) authentication and enforcement process to identify illegitimate senders\r\n• Block unauthorized senders and set up DMARC protection to reduce illegitimate emails from your domain\r\n• Increase outbound email marketing effectiveness\r\n<span style=\"font-weight: bold;\">Advanced email security protection</span>\r\nAttackers rely primarily on email to distribute spam, malware, and other threats. To prevent breaches, you need a powerful email security solution. Cisco Email Security is your defense against phishing, business email compromise, and ransomware. Get threat intelligence updates every three to five minutes through Cisco Talos for the most up-to-date protection. Cisco Advanced Malware Protection protects against stealthy malware in attachments, and industry-leading URL intelligence combats malicious links. Cisco Email Security also enhances Office 365 email security. Protecting outgoing email is important too. Cisco Email Security has robust data loss prevention and content encryption capabilities to safeguard sensitive information. This helps you comply with government and industry regulations.","shortDescription":"Cisco Email Security is an Secure E-mail Gateway. Stops phishing, business email compromise, ransomware, spam, and enhances Office 365 email security. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco Email Security","keywords":"email, your, Cisco, Email, Security, protection, senders, domain","description":"New capabilities to protect your users and brand\rTwo new capabilities help block phishing emails from reaching your users and safeguard your company’s","og:title":"Cisco Email Security","og:description":"New capabilities to protect your users and brand\rTwo new capabilities help block phishing emails from reaching your users and safeguard your company’s","og:image":"https://old.b4r.io/fileadmin/user_upload/cisco_new.png"},"eventUrl":"","translationId":1742,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"clearswift-secure-email-gateway":{"id":2106,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Clearswift_logo.png","logo":true,"scheme":false,"title":"Clearswift SECURE Email Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"clearswift-secure-email-gateway","companyTitle":"Clearswift","companyTypes":["vendor"],"companyId":4540,"companyAlias":"clearswift","description":"<p>The SECURE Email Gateway is available with our unique, award winning, Adaptive Redaction technology and is a core component of our Adaptive Data Loss Prevention (A-DLP) solution which enables secure collaboration by automatically removing the sensitive data and/or malicious content that breaks policy allowing the rest of the communication to continue.</p>\r\n<p><span style=\"font-weight: bold;\">Flexible deployment options – now available in the Cloud</span></p>\r\n<p>You decide how you want to buy and deploy the Clearswift SECURE Email Gateway, either as a pre-installed hardware appliance, as a software image that can be loaded on a choice of hardware platforms, or alternatively virtualized in a VMWare / HyperV environment. It is also available to be deployed in the Cloud including Amazon Web Services providing you with ultimate flexibility to suit your organization’s needs.</p>\r\n<p><span style=\"font-weight: bold;\">Encryption for maximum email security</span></p>\r\n<p>With TLS as standard, and cost options to provide either S/MIME, PGP and password protected files or Web portal-based encryption, the Email Gateway offers a variety of options to cater for customer requirements. Whichever you choose, the Gateway allows sensitive data to be delivered securely, in seconds, using the optimal format for the recipient.</p>\r\n<p><span style=\"font-weight: bold;\">World-class inbound threat protection</span></p>\r\n<p>The Clearswift SECURE Email Gateway comes with a choice of AV engines from Sophos or Kaspersky utilizing Cloud-based lookups and heuristics to supplement traditional signature downloads delivering superior virus protection.</p>","shortDescription":"Clearswift SECURE Email Gateway offers an unprecedented level of cyber-attack protection and outbound data loss prevention for secure email collaboration.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Clearswift SECURE Email Gateway","keywords":"Gateway, Email, SECURE, Clearswift, options, available, with, data","description":"The SECURE Email Gateway is available with our unique, award winning, Adaptive Redaction technology and is a core component of our Adaptive Data Loss","og:title":"Clearswift SECURE Email Gateway","og:description":"The SECURE Email Gateway is available with our unique, award winning, Adaptive Redaction technology and is a core component of our Adaptive Data Loss","og:image":"https://old.b4r.io/fileadmin/user_upload/Clearswift_logo.png"},"eventUrl":"","translationId":2107,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"f-secure-messaging-security-gateway":{"id":2110,"logoURL":"https://old.b4r.io/fileadmin/user_upload/f-secure-logo.jpg","logo":true,"scheme":false,"title":"F-Secure Messaging Security Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"f-secure-messaging-security-gateway","companyTitle":"F-Secure","companyTypes":["vendor"],"companyId":4541,"companyAlias":"f-secure","description":"<p>F-Secure Messaging Security Gateway delivers the industry’s most effective security for corporate messaging infrastructures. It is the most accurate antispam solution* along with capabilities for email firewall, antivirus, and secure messaging. Depending on company traffic type Messaging Security Gateway can remove as much as 99.5% of spam.</p>\r\n<p><span style=\"font-weight: bold;\">Key features:</span></p>\r\n<ul>\r\n<li>Secures your network against spam, phishing, viruses, virus outbreaks, denial-of-service attacks, directory harvest attacks right at the gateway.</li>\r\n<li>Machine learning technology provides highly effective spam protection and outstanding end-user quarantines, safe lists and block lists.</li>\r\n<li>Outstanding virus protection with automatic updates of virus signatures and rules.</li>\r\n<li>High-performance and scalable solution proven in the most demanding email infrastructures.</li>\r\n</ul>","shortDescription":"F-Secure Messaging Security Gateway protects your company's confidential data. Users can easily send encrypted e-mails, and the system can automatically block or encrypt a message.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F-Secure Messaging Security Gateway","keywords":"virus, spam, Messaging, Security, most, Gateway, with, email","description":"F-Secure Messaging Security Gateway delivers the industry’s most effective security for corporate messaging infrastructures. It is the most accurate","og:title":"F-Secure Messaging Security Gateway","og:description":"F-Secure Messaging Security Gateway delivers the industry’s most effective security for corporate messaging infrastructures. It is the most accurate","og:image":"https://old.b4r.io/fileadmin/user_upload/f-secure-logo.jpg"},"eventUrl":"","translationId":2111,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fireeye-email-security":{"id":2098,"logoURL":"https://old.b4r.io/fileadmin/user_upload/FireEye_Email_Security.png","logo":true,"scheme":false,"title":"FireEye Email Security","vendorVerified":0,"rating":"1.40","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":0,"alias":"fireeye-email-security","companyTitle":"FireEye","companyTypes":["supplier"],"companyId":2739,"companyAlias":"fireeye","description":"<p>FireEye Email Security delivers dynamic defense to detect attacks from the very first time they’re seen and blocks the most dangerous cyber threats including malware-laden attachments and URLs, credential phishing sites and business email compromise attacks. Email-borne cyber attacks are targeted, automated and hidden amongst millions of messages, easily morphing before signatures can be created.</p>\r\n<p>Leveraging FireEye’s extensive threat intelligence from frontline investigations and millions of sensors, FireEye Email Security prioritizes critical alerts and enables endpoint and network incident mitigation and remediation. FireEye Email Security works seamlessly with the FireEye security operations platform – FireEye Helix – providing visibility across the entire infrastructure.</p>\r\n<p><span style=\"font-weight: bold;\">Flexible deployment options</span></p>\r\n<p><span style=\"font-weight: bold;\">FireEye Email Security - Server Edition</span> is an on-premises appliance that protects against advanced email attacks. Real-time updates from the entire FireEye ecosystem combined with attribution of alerts to known threat actors provide context for prioritizing and acting on critical alerts and blocking spear-phishing emails.</p>\r\n<p>With nothing to install, <span style=\"font-weight: bold;\">FireEye Email Security - Cloud Edition</span> is ideal if you’re migrating email to the cloud. It integrates seamlessly with cloud-based email systems such as Office 365 with Exchange Online Protection to stop targeted, advanced attacks faster and more accurately than Exchange Online Protection alone.</p>\r\n<p><span style=\"font-weight: bold;\">Full stack email security solution</span></p>\r\n<p><span style=\"font-weight: bold;\">FireEye MVX engine</span></p>\r\n<p>Rapidly detects and blocks unknown malicious attacks.</p>\r\n<p><span style=\"font-weight: bold;\">Advanced URL defense</span></p>\r\n<p>Inspects URLs for links to credential-phishing sites and rewrites URLs.</p>\r\n<p><span style=\"font-weight: bold;\">Impersonation detection</span></p>\r\n<p>Stops difficult to detect malware-less attacks.</p>\r\n<p><span style=\"font-weight: bold;\">Retroactive analysis and alerting</span></p>\r\n<p>Detects and alerts on URLs that go live after email delivery</p>","shortDescription":"FireEye Email Security blocks the most dangerous cyber threats including malware-laden attachments and URLs, credential phishing sites and business email compromise attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FireEye Email Security","keywords":"FireEye, attacks, Email, email, Security, alerts, with, URLs","description":"FireEye Email Security delivers dynamic defense to detect attacks from the very first time they’re seen and blocks the most dangerous cyber threats","og:title":"FireEye Email Security","og:description":"FireEye Email Security delivers dynamic defense to detect attacks from the very first time they’re seen and blocks the most dangerous cyber threats","og:image":"https://old.b4r.io/fileadmin/user_upload/FireEye_Email_Security.png"},"eventUrl":"","translationId":2099,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forcepoint-email-security":{"id":938,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Email Security","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-email-security","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Forcepoint’s Advanced Classification Engine (ACE) is at the heart of all Forcepoint solutions. ACE identifies malicious lures, exploit kits, emerging threats, botnet communications and other advanced threat activity across the Kill Chain. This enables Forcepoint Email Security to identify the early stages of an attack. It can even identify Zero-day malware threats using powerful assessment capabilities that include fully-integrated, file behavioral sandboxing. To prepare for a malicious insider threat or the potentially successful cyberattack, it’s vital that outbound communications be monitored. This is also necessary both for data theft compliance needs as well as for business requirements. Only Forcepoint provides the technology to stop data infiltration and exfiltration with capabilities such as:\r\n<ul>\r\n<li>OCR (Optical Character Recognition) scanning to identify sensitive data hidden in images such as scanned documents or screen shots.</li>\r\n<li>Encrypted file detection to recognize custom encrypted files designed to defy identification.</li>\r\n<li>Drip data loss prevention (DLP) monitoring to identify where sensitive data is leaked in small quantities over time.</li>\r\n<li>Advanced analysis of malicious files and macros typically embedded in with MS Office files.</li>\r\n</ul>\r\nIT departments are strained to maintain current systems while supporting an increasingly mobile workforce and the demands to adopt new technologies like Office 365. Forcepoint Email Security provides industry-leading capabilities that leverage systems and other information to control communications, such as preventing total access to sensitive email attachments on vulnerable mobile devices, while permitting full access on fully-secured laptops. These inbound and outbound defenses are all supported on Office 365. The rich data collections in Forcepoint Email Security are used by a number of policies to report and identify systems that may require special IT attention. They generate a report on Indicators of Compromise to identify infected systems, and more proactive reports on suspicious behavior, including potential insider threats, such as “disgruntled employee” activity. User feedback capabilities educate employees as mistakes are made, helping them to better learn and understand safe email best practices.","shortDescription":"Forcepoint Email Security identifies targeted attacks, high-risk users and insider threats, while empowering mobile workers and the safe adoption of new technologies like Office 365 and Box Enterprise","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":19,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Email Security","keywords":"Cloud, Forcepoint, Security, email, Email, attacks, threats, advanced","description":"Forcepoint’s Advanced Classification Engine (ACE) is at the heart of all Forcepoint solutions. ACE identifies malicious lures, exploit kits, emerging","og:title":"Forcepoint Email Security","og:description":"Forcepoint’s Advanced Classification Engine (ACE) is at the heart of all Forcepoint solutions. ACE identifies malicious lures, exploit kits, emerging","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":939,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fortinet-fortimail-secure-email-gateway":{"id":1745,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Fortinet.png","logo":true,"scheme":false,"title":"Fortinet FortiMail Secure Email Gateway","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":21,"alias":"fortinet-fortimail-secure-email-gateway","companyTitle":"Fortinet","companyTypes":["vendor"],"companyId":690,"companyAlias":"fortinet","description":"Email security remains a key productivity tool for today's organizations, as well as a successful attack vector for cyber criminals. According to the Verizon 2018 Data Breach Investigations Report, 49% of malware was installed via malicious email. Gartner asserts that \"Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used.\" FortiMail Email security utilizes the latest technologies and security services from FortiGuard Labs to deliver consistently top-rated protection from common and advanced threats while integrating robust data protection capabilities to avoid data loss.\r\n<span style=\"font-weight: bold;\">FortiMail Product Details</span>\r\nOrganizations typically select FortiMail email security to shield users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more.\r\n<span style=\"font-weight: bold;\">Features and Benefits</span>\r\n<ul>\r\n<li>Top-rated Antispam and Antiphishing: Maintain productivity by shielding end users from unwanted spam and malicious phishing attacks</li>\r\n<li>Independently certified advanced threat defense: Thwart cyber criminals intent on stealing data, holding systems for ransomware, conducting fraud, and other malicious purposes</li>\r\n<li>Integrated data protection: Maintain the privacy of personal information and confidentiality of sensitive data in compliance with regulatory and corporate guidelines</li>\r\n<li>Enterprise-class management: Free staff and end users to drive the business by reducing the time spent on email administration </li>\r\n<li>High-performance mail handling: Speed the delivery of legitimate email at an affordable cost</li>\r\n</ul>\r\n","shortDescription":"FortiMail: Secure Email Gateway\r\nStop advanced email threats and prevent data loss","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fortinet FortiMail Secure Email Gateway","keywords":"email, data, from, FortiMail, security, malicious, protection, users","description":"Email security remains a key productivity tool for today's organizations, as well as a successful attack vector for cyber criminals. According to the","og:title":"Fortinet FortiMail Secure Email Gateway","og:description":"Email security remains a key productivity tool for today's organizations, as well as a successful attack vector for cyber criminals. According to the","og:image":"https://old.b4r.io/fileadmin/user_upload/Fortinet.png"},"eventUrl":"","translationId":1746,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"mcafee-email-gateway":{"id":2084,"logoURL":"https://old.b4r.io/fileadmin/content/MCAfee_Email.jpg","logo":true,"scheme":false,"title":"McAfee Email Gateway","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-email-gateway","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<p>McAfee Email Gateway consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single, easy-to-deploy and user-friendly appliance. As a comprehensive email security solution, Email Gateway can stand alone or work in tandem with McAfee SaaS Email Protection & Continuity. It eliminates ineffective piecemeal defenses, simplifies multivendor security environments, and reduces operating costs — while significantly strengthening email security. Email Gateway delivers:</p>\r\n<p><span style=\"font-weight: bold;\">Total inbound protection</span> — Email Gateway provides the most complete protection available against inbound threats. Powerful antispam scanning technologies identify and block incoming spam with over 99% accuracy. And it protects your network from viruses, malware, phishing, directory harvest, denial of service (DoS), bounceback attacks, zero-hour threats, and spam surges.</p>\r\n<p><span style=\"font-weight: bold;\">Total outbound protection</span> — Available at no extra charge are push, pull, and TLS encryption and built-in data loss prevention (DLP) capabilities that utilize the same text-matching dictionaries found in McAfee Data Loss Prevention. These DLP capabilities are fully administrable from the Email Gateway user interface or McAfee ePolicy Orchestrator (ePO). Using sophisticated content-scanning technologies, multiple encryption techniques, and granular, policy-based message handling, Email Gateway prevents outbound data loss and keeps sensitive data secure.</p>\r\n<p><span style=\"font-weight: bold;\">Simple, powerful administration from within McAfee ePO</span> — With Email Gateway, administrators can deliver superior email protection and document it with customizable, enterprise-class reporting, exportable report logs, real-time dashboards, and alerts. Email Gateway combines performance, scalability, and stability with a flexible delivery model to ensure maximum ROI.</p>\r\n<p><span style=\"font-weight: bold;\">A virtualized solution</span> — The Email Gateway appliance is also available as a virtual appliance, so you can reap the benefits of virtualization. With lower costs than a physical appliance, a virtual appliance also provides maximum flexibility, including the ability to consolidate solutions on a single server.</p>\r\n<p><span style=\"font-weight: bold;\">Enhanced security powered by McAfee Global Threat Intelligence (GTI)</span> — McAfee GTI is a comprehensive cloud-based threat intelligence service. Integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Email Gateway uses the message reputation service to identify email messages carrying malicious payloads.</p>","shortDescription":"MEG consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single, easy-to-deploy and user-friendly appliance.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Email Gateway","keywords":"Email, Gateway, McAfee, data, security, appliance, protection, email","description":"McAfee Email Gateway consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single,","og:title":"McAfee Email Gateway","og:description":"McAfee Email Gateway consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single,","og:image":"https://old.b4r.io/fileadmin/content/MCAfee_Email.jpg"},"eventUrl":"","translationId":2085,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"micro-focus-secure-gateway1":{"id":2116,"logoURL":"https://old.b4r.io/fileadmin/user_upload/micro_focus.png","logo":true,"scheme":false,"title":"Micro Focus Secure Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"micro-focus-secure-gateway1","companyTitle":"Micro Focus","companyTypes":["supplier","vendor"],"companyId":4386,"companyAlias":"micro-focus","description":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus Secure Gateway that scans the actual composition of images and videos to ensure accuracy. Its sophisticated probability engine scans incoming and outgoing images, reliably distinguishes between pornographic and non-pornographic content, and stops the inappropriate content from entering or leaving your messaging system.\r\n<span style=\"font-weight: bold;\">The Problem</span>\r\nInappropriate email communications, including pornography and other explicit content, continue to be a major problem in many organizations. This content is often found in unsolicited spam, but it is more commonly generated from employee communications, both inside and outside of the workplace. If these messages go unchecked, organizations could face a number of devastating consequences that can cost time and money:\r\n<ul> <li>Sexual harassment lawsuits</li> <li>Criminal charges</li> <li>A hostile work environment</li> <li>Reputation damage</li> </ul>\r\n<span style=\"font-weight: bold;\">The Micro Focus Solution</span>\r\nOrganizations must address this inappropriate behavior through corporate policies and through the use of technology. Secure Gateway gives you the ability to monitor and block pornographic images, which addresses the primary issue of inappropriate communications.\r\nSecure Gateway screens images before they pass through your email system and takes action when offensive material is detected. It uses sophisticated analytical processes consisting of multiple detection methods to reliably distinguish between pornographic and non-pornographic content, without having to rely on a signature database of pre-categorized content. These processes ensure that pornography is prevented from entering or leaving your messaging system.\r\n<span style=\"font-weight: bold;\">CONFIGURE IMAGE ANALYSIS AUDITING</span>\r\nFollow these instructions to set Secure Gateway into an audit mode. In audit mode, you will locate the images that are passing through your email system. You can use audit mode without interfering with the mail flow.\r\n<span style=\"font-weight: bold;\">PREREQUISITES</span>\r\nTo use Secure Gateway, you must have the following items:\r\n<ul> <li>A pre-installed Micro Focus Secure Gateway server that is configured and actively scanning email</li> <li>An Secure Gateway license key. Either a full license or trial key will work. (Contact your Micro Focus representative for your evaluation key)</li> </ul>","shortDescription":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Micro Focus Secure Gateway","keywords":"Gateway, Secure, your, images, content, Focus, Micro, that","description":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus","og:title":"Micro Focus Secure Gateway","og:description":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus","og:image":"https://old.b4r.io/fileadmin/user_upload/micro_focus.png"},"eventUrl":"","translationId":2117,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"microsoft-exchange-online-protection":{"id":1743,"logoURL":"https://old.b4r.io/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Microsoft Exchange Online Protection","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-exchange-online-protection","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"Get enterprise-class reliability and protect against spam and malware, while maintaining access to email during and after emergencies. Exchange Online Protection provides a layer of protection features that are deployed across a global network of datacenters, helping you simplify the administration of your messaging environments.\r\n<span style=\"font-weight: bold;\">Security and reliability</span>\r\nExchange Online Protection provides advanced security and reliability to help protect your information.\r\n<ul>\r\n<li>Eliminate threats before they reach the corporate firewall with multi-layered, real-time anti-spam and multi-engine anti-malware protection.</li>\r\n<li>Protect your company's IP reputation by using separate outbound delivery pools for high-risk email.</li>\r\n<li>Five financially backed SLAs attest to a high quality of service, including protection from 100% of known viruses and 99% of spam.</li>\r\n<li>Globally load-balanced network of datacenters helps to ensure a 99.999% network uptime.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Stay in control</span>\r\nMaintain control over your environment while gaining email protection from Microsoft.\r\n<ul>\r\n<li>Manage and administer from the Exchange Administration Center—a single web-based interface.</li>\r\n<li>Near real-time reporting and message trace capabilities provide insight into email environments by retrieving the status of any message that Exchange Online Protection processes.</li>\r\n<li>Active content, connection, and policy-based filtering enables compliance with corporate policies and government regulations.</li>\r\n<li>IT-level phone support 24 hours a day, 7 days a week, 365 days a year at no additional cost.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Easy to deploy and maintain</span>\r\nIt's easier than ever to protect your organization from external threats.\r\n<ul>\r\n<li>No hardware or software required to install, manage, and maintain, which minimizes up-front investment.</li>\r\n<li>Get a predictable payment schedule through a subscription-based service for customers with an on-premises email deployment. Exchange Online Protection is also included in Exchange Online and any Office 365 plan that includes Exchange Online.</li>\r\n<li>Simplify IT environments by reducing the need for in-house email security servers and applications.</li>\r\n<li>Ensure that no email is lost or bounced by automatically queuing email if the destination email server becomes unavailable for any reason.</li>\r\n<li>Get up and running quickly with a simple MX record change.</li>\r\n</ul>\r\n","shortDescription":"Microsoft Exchange Online Protection is an Secure E-mail Gateway, that protects against spam and malware and maintains access to email during and after emergencies.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Exchange Online Protection","keywords":"email, Exchange, Online, your, Protection, protection, from, with","description":"Get enterprise-class reliability and protect against spam and malware, while maintaining access to email during and after emergencies. Exchange Online","og:title":"Microsoft Exchange Online Protection","og:description":"Get enterprise-class reliability and protect against spam and malware, while maintaining access to email during and after emergencies. Exchange Online","og:image":"https://old.b4r.io/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":1744,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"mimecast-email-security":{"id":2088,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Mimecast-Logo.jpg","logo":true,"scheme":false,"title":"Mimecast Email Security","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"mimecast-email-security","companyTitle":"Mimecast","companyTypes":["vendor"],"companyId":4535,"companyAlias":"mimecast","description":"<p>Mimecast secure employee communication and reduces risk with targeted threat protection, data leak prevention and enforced security controls.The Mimecast solution helps organizations to prevent email-ransomware as well as protect systems from the data loss.Protects against social‐engineering attacks that attempt to extract money or data from your unsuspecting users.According to Mimecast’s 2018 State of Email Security Report, 90% of global organizations have seen the volume of phishing attacks increase or stay the same over the past 12 months.</p>\r\n<p><span style=\"font-weight: bold;\">Smart Email Security with Mimecast</span></p>\r\n<p><span style=\"font-weight: bold;\">URL Protection</span></p>\r\n<p>URL Protect service provides multistep detection and blocking of malicious URLs, including pre-click URL discovery, on-click inline employee education and post-click resolution and blocking of dangerous files types.</p>\r\n<p><span style=\"font-weight: bold;\">Impersonation Protection</span></p>\r\n<p>Mimecast helps to defend email impersonation through Real-time scanning of all inbound emails to detect header anomalies, domain similarity, sender spoofing and clearly marked alerts on delivered emails.</p>\r\n<p><span style=\"font-weight: bold;\">Internal Email Protection</span></p>\r\n<p>Internal Email Protect scans attachments and URLs for malware and malicious links, as well as content inspection enabled by Data Leak Prevention and it can automatically delete infected emails and attachments from employees’ inboxes.</p>\r\n<p><span style=\"font-weight: bold;\">Ransomware Protection</span></p>\r\n<p>Unlike vendors of standalone security or backup products, Mimecast tackles ransomware with a layered cyber resilience solution; bringing together protection, continuity, archiving, and recovery capabilities for your email from a single cloud solution.</p>\r\n<p><span style=\"font-weight: bold;\">Email Archiving & Continuity</span></p>\r\n<p>Mimecast ensures continuity when primary email systems are offline. Customizable thresholds let administrators monitor inbound and outbound email. Anytime, anywhere access to archive data improves employee productivity and workflow efficiency.</p>\r\n<p><span style=\"font-weight: bold;\">Attachment Protect</span></p>\r\n<p>Attachment Protect service provides multiple layers of defense against potentially malicious email attachments, balancing speed of delivery with detection efficacy.The ability to convert Office and PDF files to a safe file format for immediate delivery to employees.</p>","shortDescription":"Mimecast secure employee communication and reduces risk with targeted threat protection, data leak prevention and enforced security controls.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Mimecast Email Security","keywords":"Mimecast, Email, email, data, Protection, from, Protect, with","description":"Mimecast secure employee communication and reduces risk with targeted threat protection, data leak prevention and enforced security controls.The Mimecast","og:title":"Mimecast Email Security","og:description":"Mimecast secure employee communication and reduces risk with targeted threat protection, data leak prevention and enforced security controls.The Mimecast","og:image":"https://old.b4r.io/fileadmin/user_upload/Mimecast-Logo.jpg"},"eventUrl":"","translationId":2089,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"proofpoint-email-protection":{"id":349,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Proofpoint_Email_Protection.png","logo":true,"scheme":false,"title":"Proofpoint Email Protection","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"proofpoint-email-protection","companyTitle":"Proofpoint","companyTypes":["vendor"],"companyId":2817,"companyAlias":"proofpoint","description":"<p><span style=\"font-weight: bold;\">Protection against BUSINESS EMAIL COMPROMISE (BEC)</span></p>\r\n<p>Dynamically classify impostor email (BEC) other threats that don't involve malware. These low volume, hard-to-detect threats have cost businesses more than $2.3 billion and cannot be detected by solutions that detect only malware. We detect and classify impostor email through a combination of authentication (DMARC), pre-defined rules, and dynamic classification. Our technology actively assesses the reputation of the sender for accurate protection without additional administration overhead.</p>\r\n<p>We analyze:</p>\r\n<ul>\r\n<li>Sender-recipient relationship</li>\r\n<li>Domain reputation</li>\r\n<li>Email headers and envelope attributes</li>\r\n<li>Email content</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Granular filtering and control</span></p>\r\n<p>Email Protection can control all aspects of inbound and outbound email. Our policy engine gives you complete flexibility. Custom rules support global, group and user-level controls to meet the needs of even the most complex enterprise. Individual quarantines enable you to separate email types to allow your people to access their email digest and quarantine while keeping malicious emails away. Quarantines include:</p>\r\n<ul>\r\n<li>Spam</li>\r\n<li>Impostor</li>\r\n<li>Bulk</li>\r\n<li>Phishing</li>\r\n<li>Malware</li>\r\n<li>Adult</li>\r\n<li>Low Priority</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Detailed visibility</span></p>\r\n<p>Email Protection gives you a wealth of data and search tools. Our advanced message tracing features a high-performance search engine to help you quickly pinpoint hard-to-find log data based on dozens of search criteria. With more than 60 real-time reports for detailed visibility into mail flow and trends, Email Protection provides the data that can help address issues and trends as they emerge. <span style=\"font-weight: bold;\">Give your people self-service control over their email preferences such as:</span></p>\r\n<ul>\r\n<li>Quarantines</li>\r\n<li>Safe and block lists</li>\r\n<li>Bulk mail delivery</li>\r\n</ul>\r\n<p>These services are also easy to brand, providing familiarity for users who access these tools. And with support for numerous languages, you can deploy them globally. More than 90% of targeted attacks start with email, and these security threats are always evolving. Proofpoint Email Protection provides multiple layers of security to stop malware and non-malware threats, such as email fraud. It can control all aspects of inbound and outbound email to detect and block threats, and prevent confidential information from getting into the wrong hands.</p>\r\n<p><span style=\"font-weight: bold;\">Features and Benefits</span></p>\r\n<ul>\r\n<li>Advanced Email Filtering, Control and Visibility. Email Protection allows you to set up robust policies as a first step in routing email to users. You can create detailed firewall rules based on your needs. Even set up policies for anti-virus. We also leverage user bulk mail actions to improve accuracy of future detection and classification. With a wealth of data and search tools, you can ensure your organization's email is protected.</li>\r\n<li>Impostor Email Threat Protection. Imposter attacks are hard to detect. Our Stateful Composite Scoring Service (SCSS) is a machine learning approach that searches specifically for these email threats. It uses what’s known about your unique environment, along with data from all Proofpoint customers, to more effectively detect and block email fraud. </li>\r\n<li>Internal Mail Defense. As organization move to cloud-based email services, compromised accounts are on the rise. Internal Mail Defense can automatically scan all internal email traffic, providing a multilayered approach to looking for such things as spam, malware or phishing attacks being sent via compromised accounts. It removes these emails and provides reporting to shows which accounts have been compromised.</li>\r\n<li>Email Continuity. Email downtime can be a significant hit to worker productivity. Enterprise Continuity ensures email is always available, even if your company email is down. It provides full access to users—via Outlook integration, a web portal or native mobile support. And it automatically activates in an outage, with fully automated recovery. </li>\r\n</ul>","shortDescription":"Proofpoint Email Protection stops malware and non-malware threats such as impostor email (also known as business email compromise, or BEC). ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Proofpoint Email Protection","keywords":"email, Email, Protection, data, search, that, control, rules","description":"Protection against BUSINESS EMAIL COMPROMISE (BEC)\rDynamically classify impostor email (BEC) other threats that don't involve malware. These low volume,","og:title":"Proofpoint Email Protection","og:description":"Protection against BUSINESS EMAIL COMPROMISE (BEC)\rDynamically classify impostor email (BEC) other threats that don't involve malware. These low volume,","og:image":"https://old.b4r.io/fileadmin/user_upload/Proofpoint_Email_Protection.png"},"eventUrl":"","translationId":350,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"retarus-e-mail-security":{"id":2096,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Retarus_logo.png","logo":true,"scheme":false,"title":"RETARUS E-Mail Security","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"retarus-e-mail-security","companyTitle":"Retarus","companyTypes":["vendor"],"companyId":4538,"companyAlias":"retarus","description":"<p>Retarus Email Security останавливает вредоносные программы, такие как вирусы, спам, фишинговые электронные письма, вымогатели и другие цифровые угрозы. Службы безопасности электронной почты Retarus Cloud могут быть настроены в соответствии с требованиями безопасности вашего бизнеса.</p>\r\n<p>Вам нужна расширенная защита с помощью Retarus Advanced Threat Protection? Это защита от современных угроз, социальной инженерии и фишинговых атак, которые нарушают традиционные механизмы безопасности. Чтобы успешно защищать эти умные атаки, компаниям нужна как минимум умная защита. Retarus Advanced Threat Protection включает четыре антивирусных сканера, включая сканирование с отложенной доставкой, изолированную программную среду, защиту от мошенничества CxO.</p>\r\n<p>С запатентованной технологией Retarus Patient Zero Detection от Retarus теперь возможно обнаруживать вредоносные программы в уже доставленных письмах и предупреждать получателя, как только шаблоны станут доступны.</p>\r\n<p>Инновационный дизайн Retarus Queueless Design анализирует входящие электронные письма без буферизации - электронные письма доставляются без задержек благодаря минимальной пропускной способности. Для максимальной безопасности антивирусные сканеры Retarus и методы фильтрации постоянно обновляются и постоянно оптимизируются.</p>","shortDescription":"Retarus Email Security - ПО против вредоносных программ, таких как вирусы, спам, фишинговые электронные письма, вымогатели и другие цифровые угрозы.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"RETARUS E-Mail Security","keywords":"Retarus, безопасности, письма, электронные, защита, Threat, Protection, Security","description":"Retarus Email Security останавливает вредоносные программы, такие как вирусы, спам, фишинговые электронные письма, вымогатели и другие цифровые угрозы. Службы","og:title":"RETARUS E-Mail Security","og:description":"Retarus Email Security останавливает вредоносные программы, такие как вирусы, спам, фишинговые электронные письма, вымогатели и другие цифровые угрозы. Службы","og:image":"https://old.b4r.io/fileadmin/user_upload/Retarus_logo.png"},"eventUrl":"","translationId":2907,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"retaurus-e-mail-security":{"id":2097,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Retarus_logo.png","logo":true,"scheme":false,"title":"Retaurus E-Mail Security","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"retaurus-e-mail-security","companyTitle":"Retarus","companyTypes":["vendor"],"companyId":4538,"companyAlias":"retarus","description":"<p>Retarus Email Security stops malware such as viruses, spam, phishing emails, ransomware and other digital threats. Retarus Cloud Email Security Services can be customized to meet the security needs of your business.</p>\r\n<p>Do you need extended protection with Retarus Advanced Threat Protection? Protect against advanced threats and social engineering and phishing attacks that disrupt traditional security mechanisms. To defend these smart attacks successfully, companies need at least as smart protection. Retarus Advanced Threat Protection includes four virus scanners including Deferred Delivery Scan, Sandboxing, Time-of-Click Protection and CxO Fraud Protection.</p>\r\n<p>Brand new malicious programs can not be stopped even by the best virus filters at first because the patterns are not yet known at the beginning. With Retarus' patent-pending Patient Zero Detection technology, it is now possible to detect malware in emails that have already been delivered and alert the recipient as soon as the patterns are available. Analysts strongly recommend the use of so-called post-delivery protection mechanisms.</p>\r\n<p>The innovative Retarus Queueless Design analyzes incoming e-mails without buffering - e-mails arrive without delays thanks to minimal throughput times. For maximum security, Retarus virus scanners and filter methods are constantly updated and continuously optimized.</p>","shortDescription":"Retarus E-Mail Security is a cloud-based enterprise messaging platform delivers seamless and secure email, fax, SMS and EDI services for businesses.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Retaurus E-Mail Security","keywords":"Retarus, Protection, virus, protection, security, Security, malware, Threat","description":"Retarus Email Security stops malware such as viruses, spam, phishing emails, ransomware and other digital threats. Retarus Cloud Email Security Services can be","og:title":"Retaurus E-Mail Security","og:description":"Retarus Email Security stops malware such as viruses, spam, phishing emails, ransomware and other digital threats. Retarus Cloud Email Security Services can be","og:image":"https://old.b4r.io/fileadmin/user_upload/Retarus_logo.png"},"eventUrl":"","translationId":2097,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"sendio-email-security-gateway":{"id":2112,"logoURL":"https://old.b4r.io/fileadmin/user_upload/sendio__logo_.png","logo":true,"scheme":false,"title":"Sendio Email Security Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sendio-email-security-gateway","companyTitle":"Sendio","companyTypes":["vendor"],"companyId":4542,"companyAlias":"sendio","description":"<p>If dealing with spam has become a full-time job then it’s time to reclaim your inbox with Sendio’s Email Security Gateway. Relying on a system of malware flters and reputation scoring technologies over content fltering, Sendio allows you to eliminate the spam from your inbox without the headache of false positives and lost mail. If you’re looking for a safe, secure and spotless inbox, we can help. With our exclusive Server Recon technology and a suite of best-of-breed security tools, our Email Security Gateway will make sure that you’re getting the email that’s important to you, and nothing else.</p>\r\n<p><span style=\"font-weight: bold;\">Server Recon</span></p>\r\n<p>Our “SMTP-layer Challenge Response Technology” is not a form of content fltering. Instead, our Server Recon technology is a real time representation of a server’s response. Server Recon develops a reputation score on the fly and will re-score the server every 30 days to make sure the score is up to date.</p>\r\n<p><span style=\"font-weight: bold;\">IP Reputation</span></p>\r\n<p>IP Reputation flters are a better way of understanding an email than content checks as there are more important criteria when checking for spam than whether an email “looks like spam.” When coupled with our Server Recon technology, our IP reputation check provides a powerful flter that stops the vast majority of SPAM in its tracks.</p>\r\n<p><span style=\"font-weight: bold;\">Anti-Virus Protection</span></p>\r\n<p>Sendio utilizes multiple AV technologies to inspect email for malicious content. Defnitionbased and Pattern Matching AV engines block known threats and zero-day threats.</p>\r\n<p><span style=\"font-weight: bold;\">Hardened Linux OS Kernel</span></p>\r\n<p>Our Appliance, whether virtual or physical, is based on a hardened Linux operating system that has been stripped down to remove functionality not required in a security product, and locked down to ensure that the OS isn’t vulnerable to security threats.</p>\r\n<p><span style=\"font-weight: bold;\">TLS Encryption</span></p>\r\n<p>Our encryption is server-to-server, which means that every message you send is safe from the moment it leaves our server to moment it’s delivered to the recipient’s email server.</p>\r\n<p><span style=\"font-weight: bold;\">Email Spooling</span></p>\r\n<p>If your servers go down, emails will often be hard-bounced and never resent. We spool your emails for up to 28 days, double the time our competitors do, to make sure your emails are there when you come back online. Whether you’re experiencing a server emergency or routine maintenance, we’ll make sure you get every message you need.</p>\r\n<p><span style=\"font-weight: bold;\">Continuity</span></p>\r\n<p>Continuity is your actual ability to view the spooled email. We’ll make sure that you have access to your emails for one month after they’re sent. The time these emails are held for can also be modifed or even done away with completely for our customers with compliancy issues.</p>\r\n<p><span style=\"font-weight: bold;\">Anti-Spoofng</span></p>\r\n<p>Utilizing SPF and DKIM, Sendio verifes the host server against expectedIP range and validates domain name identity.</p>\r\n<p><span style=\"text-decoration: underline;\"><span style=\"font-weight: bold;\">User Benefts:</span></span></p>\r\n<p><span style=\"font-weight: bold;\">Remove Spam and Malicious Messages.</span> Virtually eliminates the bulk messages, spam mail and threat of email-borne malware without our multiple tiers of security. Our Email Security Gateway will keep you safe and eliminate the hundreds of spam messages that flood your inbox every day.</p>\r\n<p><span style=\"font-weight: bold;\">Zero Impact.</span> Our Email Security Gateway represents a zero impact challenge response system. Meaning that you get the security of a challenge response system with no impact to either you or the sender. Because this system is machine to machine, it’s completely invisible to both parties.</p>\r\n<p><span style=\"font-weight: bold;\">Disaster Recovery.</span> Your email is always safe, even if your server goes down, giving you peace of mind and, more importantly, email continuity.</p>\r\n<p><span style=\"font-weight: bold;\">Minimized Content Filtering Eliminates False Positives.</span> By not relying heavily on content fltering, we have eliminated the possibility of false positives. Our exclusive, multi-tiered security solution combines several different flters together, giving you the power of a content fltered spam solution without the worry of false positives.</p>\r\n<p><span style=\"font-weight: bold;\">Fully Upgradable.</span> Choose to add Opt-Inbox, Sendio’s flagship solution at any time. Upgrade in just a few minutes and you’ll have the most comprehensive and accurate messaging security and productivity solution available today.</p>\r\n<p>For many companies, the nearly 200 spam received every day can cost countless employee hours. Too many email users are wasting hours every day, sifting through mountains of spam and junk mail just to make sure that real conversations aren’t lost. Unfortunately content flters can cause important emails to go unnoticed, and no flter at all can open your business up to phishing attempts, malware and email-borne viruses.</p>\r\n<p>At Sendio, our Email Security Gateway uses a powerful combination of minimal content fltering, IP reputation and our proprietary Server Recon technology to ensure that your inbox isn’t flled up with junk and malicious mail. By not relying heavily on content fltering, we have eliminated the possibility of false positives. Meaning that we’ll block the spam and malicious mail, without ever losing an important email of yours.</p>","shortDescription":"Sendio Email Security Gateway’s behavioral system eliminates spam at the head of the security stack, greatly reducing the strain on network resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Sendio Email Security Gateway","keywords":"that, your, email, spam, content, Email, with, security","description":"If dealing with spam has become a full-time job then it’s time to reclaim your inbox with Sendio’s Email Security Gateway. Relying on a system of","og:title":"Sendio Email Security Gateway","og:description":"If dealing with spam has become a full-time job then it’s time to reclaim your inbox with Sendio’s Email Security Gateway. Relying on a system of","og:image":"https://old.b4r.io/fileadmin/user_upload/sendio__logo_.png"},"eventUrl":"","translationId":2113,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"sonicwall-email-security":{"id":1747,"logoURL":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png","logo":true,"scheme":false,"title":"SonicWall Email Security","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sonicwall-email-security","companyTitle":"SonicWall","companyTypes":["supplier","vendor"],"companyId":4104,"companyAlias":"sonicwall","description":"SonicWall Email Security appliances are ideal for organizations that need a dedicated on-premises solution. The hardened Linux-based appliance defends against advanced email-borne threats such as ransomware, zero-day threats, spear phishing and business email compromise. Our multi-layered solution provides comprehensive inbound and outbound protection, and is available in a range of hardware appliance options that scales up to 10,000 users per appliance.\r\n<strong>GET COMPREHENSIVE INBOUND AND OUTBOUND PROTECTION</strong>\r\nSonicWall Email Security appliances deliver a multi-layered protection against advanced email-borne threats from a hardened Linux based system. Stop advanced threats before they reach your inbox Protect against email fraud and targeted phishing attacks Get up-to-date security with real-time threat intelligence Enable email data loss prevention & compliance Ease management and reporting.\r\n<strong>ADVANCED THREAT PROTECTION</strong>\r\nProtect against emerging zero-day attacks and ransomware with the Capture Advanced Threat Protection service. Our cloud-based sandboxing technology scans a broad range of email attachment types and performs dynamic URL analysis to detect advanced threats, analyze them in a multi-engine sandbox and block threats before they reach your inbox.\r\n<strong>PROTECT AGAINST SOPHISTICATED PHISHING ATTACKS</strong>\r\nSonicWall's anti-phishing technology uses a combination of methodologies such as machine learning, heuristics, reputation and content analysis to stop sophisticated phishing attacks. The solution also includes powerful email authentication standards - SPF, DKIM and DMARC - to stop spoofing attacks, business email compromise and email fraud.\r\n<strong>STAY UPDATED WITH REAL-TIME THREAT INTELLIGENCE</strong>\r\nReceive real-time threat intelligence from SonicWall Capture Labs and ensure delivery of good email. Capture Labs collects and analyzes information from industry threat lists, performs rigorous testing and evaluation of millions of emails every day, and establishes reputation scores for senders and content, identifying new threats as they occur.\r\n<strong>BLOCK MALWARE WITH MULTI-AV SCANNING</strong>\r\nEnsure your anti-spyware and anti-virus is up to date, with SonicWall cloud anti-virus and anti-virus signatures from industry partners. SonicWall uses predictive and responsive technologies to protect organizations from virus infections before signature updates are available.\r\n<strong>ENFORCE STRONG DATA LOSS PREVENTION AND COMPLIANCE</strong>\r\nComply with regulatory mandates using advanced compliance scanning, management and, optionally, email encryption, to prevent confidential data leaks and regulatory violations. The SonicWall Email Compliance and Encryption subscription services provide integrated, policy-enforced and on-demand email encryption. With this service, policies may be configured to scan outbound email content and attachments for sensitive data.\r\n<strong>EASY-TO-USE SECURITY</strong>\r\nAchieve simple email management with a customizable, at-a-glance dashboard. Multi-tenancy support allows large enterprise and managed service provider deployments with multiple departments or customers to establish organizational units with one or multiple domains. The deployment may be centrally managed, but still allows a given organizational unit to have its own users, sub-administrators, policy rules, junk boxes and more.","shortDescription":"SonicWall Email Security is a Secure E-mail Gateway ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SonicWall Email Security","keywords":"email, SonicWall, threats, with, advanced, from, against, attacks","description":"SonicWall Email Security appliances are ideal for organizations that need a dedicated on-premises solution. The hardened Linux-based appliance defends against","og:title":"SonicWall Email Security","og:description":"SonicWall Email Security appliances are ideal for organizations that need a dedicated on-premises solution. The hardened Linux-based appliance defends against","og:image":"https://old.b4r.io/fileadmin/user_upload/SonicWall.png"},"eventUrl":"","translationId":1748,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["allot-communications-secure-service-gateway","barracuda-email-security-gateway","barracuda-phishline","barracuda-sentinel","cellopoint-secure-email-gateway","cisco-email-security","clearswift-secure-email-gateway","f-secure-messaging-security-gateway","fireeye-email-security","forcepoint-email-security","fortinet-fortimail-secure-email-gateway","mcafee-email-gateway","micro-focus-secure-gateway1","microsoft-exchange-online-protection","mimecast-email-security","proofpoint-email-protection","retarus-e-mail-security","retaurus-e-mail-security","sendio-email-security-gateway","sonicwall-email-security"]},"links":{"first":"http://b4r_be/api/products?page=1","last":"http://b4r_be/api/products?page=2","prev":null,"next":"http://b4r_be/api/products?page=2"},"meta":{"current_page":1,"from":1,"last_page":2,"path":"http://b4r_be/api/products","per_page":20,"to":20,"total":29},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"38":{"id":38,"title":"Secure E-mail Gateway"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}