{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"_type":"localeString","en":"Offer a reference bonus","ru":"Предложить бонус за референс"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"supplier-popover":{"en":"supplier","ru":"поставщик","_type":"localeString"},"implementation-popover":{"_type":"localeString","en":"deployment","ru":"внедрение"},"vendor-popover":{"en":"vendor","ru":"производитель","_type":"localeString"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"ru":"По убыванию скидки","_type":"localeString","en":"Rebate descending"},"i-use-it-popover":{"en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString"},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"rebate-for-poc":{"ru":"Бонус 4 POC","_type":"localeString","en":"Bonus 4 POC"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"vendor-verified":{"ru":"Поставщик потверждён","_type":"localeString","en":"Vendor verified"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"en":"Learn more","ru":"Узнать больше","_type":"localeString"},"categories-popover":{"ru":"категории","_type":"localeString","en":"categories"},"sort-popular-asc":{"ru":"По возростанию популярности","_type":"localeString","en":"Popular ascending"},"sort-popular-desc":{"_type":"localeString","en":"Popular descending","ru":"По убыванию популярности"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"login":{"ru":"Войти","_type":"localeString","en":"Login","de":"Einloggen"},"register":{"en":"Register","de":"Registrieren","ru":"Зарегистрироваться","_type":"localeString"},"auth-message":{"de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You need to register or login."},"add-to-comparison":{"_type":"localeString","en":"Add to comparison","ru":"Добавить в сравнение"},"added-to-comparison":{"en":"Added to comparison","ru":"Добавлено в сравнения","_type":"localeString"},"items-found":{"_type":"localeString","en":"Products found","ru":"Продуктов найдено"},"sort-sales-desc":{"_type":"localeString","en":"By sale","ru":"По продаже"},"sort-purchases-desc":{"en":"By purchase","ru":"По покупке","_type":"localeString"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product producer"},"products-fetching-error":{"_type":"localeString","en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу."}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"en":"logout","ru":"Выйти","_type":"localeString"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"_type":"localeString","en":"Requests","de":"References","ru":"Мои запросы"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My Profile","ru":"Мои Данные"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"_type":"localeString","en":"from","ru":"от"},"to":{"_type":"localeString","en":"to","ru":"до"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"category":{"_type":"localeString","en":"Category","ru":"Категория"},"follow":{"en":"Follow","ru":"Следить","_type":"localeString"},"add-product":{"en":"Add Product","ru":"Добавить продукт","_type":"localeString"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"_type":"localeString","en":"Filter","ru":"Фильтр"},"clear-button":{"_type":"localeString","en":"Сlear","ru":"Очистить"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"en":"Providers","ru":"Поставщик, производитель","_type":"localeString"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"with-discounts-checkbox":{"_type":"localeString","en":"With discounts","ru":"Со скидками"},"expert-price-checkbox":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"roi-calculator-checkbox":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"apply-filter-button":{"_type":"localeString","en":"Apply filter","ru":"Применить фильтр"},"sorting-toggle":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"show-all-button":{"en":"Show all","ru":"Показать все","_type":"localeString"},"suggest-product-button":{"en":"Suggest product","ru":"Предложить продукт","_type":"localeString"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"_type":"localeString","en":"Countries","ru":"Страны"},"seller":{"_type":"localeString","en":"Seller","ru":"Продавец"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"en":"User suppliers","ru":"Поставщики пользователя","_type":"localeString"},"business-process":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"business-objectives":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"branch":{"_type":"localeString","en":" Branch","ru":"Отрасль"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"_type":"localeString","en":"With reference","ru":"С референсами"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"en":"ROI","ru":"ROI","_type":"localeString"},"problems":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"find":{"_type":"localeString","en":"Find","ru":"Выполнить поиск"},"deal-date":{"_type":"localeString","en":"Date","ru":"Дата"},"try-button":{"en":"Try AI (Beta)","ru":"Попробовать AI (Beta)","_type":"localeString"},"hide":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"company-size":{"_type":"localeString","en":"Company size","ru":"Размер компании"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"en":"Sellers","ru":"Поставщики, Производители","_type":"localeString"},"supply-types":{"en":"Supply type","ru":"Тип поставки","_type":"localeString"},"with-comments-checkbox":{"_type":"localeString","en":"With comments","ru":"С комментариями"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"_type":"localeString","en":"Partners","ru":" Партнеры"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"_type":"localeString","en":"Product vendor","ru":"Производитель продукта"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"_type":"localeString","en":"Deal in progress","ru":"Сделка в процессе"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"competencies":{"en":"Competencies","ru":"Компетенции","_type":"localeString"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"label":"catalog-products-text-block","body":{"ru":[{"_key":"28241882db7a","markDefs":[],"children":[{"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0","_type":"span","marks":[]}],"_type":"block","style":"normal"}],"_type":"localeBlock","en":[{"children":[{"_key":"8bebcfb349550","_type":"span","marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies."}],"_type":"block","style":"normal","_key":"8bebcfb34955","markDefs":[]}]}}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"title":{"ru":"ROI4CIO: Продукты","_type":"localeString","en":"ROI4CIO: Products"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Продукты","_type":"localeString","en":"Products"}},{"translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"Description"},"name":"description"},{"name":"og:description","translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI"}},{"name":"keywords","translations":{"_type":"localeString","en":"keyword","ru":"каталог, программное обеспечение, софт, ит услуги"}},{"translations":{"_type":"localeString","en":"Products","ru":"Продукты"},"name":"title"}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"barracuda-phishline":{"id":1906,"logoURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda PhishLine","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-phishline","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">Defend Your Business Against Social-Engineering Attacks</span> Fight phishing and other potentially-devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing exposure. Transform employees from potential victims into a layer of defense with Barracuda PhishLine. With PhishLine, you guard against every facet of social-engineering threats with continuous simulation and training for employees. Show them the latest attack techniques, how to recognize the subtle clues and help stop email fraud, data loss, and brand damage. Embed learning into your everyday business processes with customized simulations that test and reinforce good behavior. Only PhishLine helps you defend against a range of threats with patented, highly-variable attack simulations for multiple vectors, including phishing, smishing, vishing and found physical media.\r\n<ul>\r\n<li>Easy-to-implement cloud-based solution</li>\r\n<li>Patented simulation of email, SMS, voicemail and USB attacks</li>\r\n<li>Analytics and reporting based on thousands of data points</li>\r\n<li>Automate simulation campaigns with address book integration</li>\r\n<li>Large library of SCORM-compliant courseware</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Train Employees To Recognize Phishing Emails, Voicemails, and SMS Messages</span> Guard against every facet of social-engineering threats by training your employees to identify and report them. PhishLine provides patented, highly-variable attack simulations for multiple vectors, including phishing (email), smishing (SMS), vishing (voice) and found physical media (USB/SD card). Plus, use multiple simulation templates in a single campaign, to conduct hypothesis-based A/B tests and prevent users from receiving duplicate mock phishing templates. With PhishLine, you train employees to recognize threats from multiple sources and test them the way an attacker would. <span style=\"font-weight: bold;\">Customize Training to Make it Engaging and Relevant to Your Users</span> PhishLine’s simulation and training content is easy to use and is fully customizable. You get a wide variety of materials: Choose from hundreds of easy-to-use simulation templates, landing pages, risk assessment surveys, and engaging multi-lingual training content in the online PhishLine Content Center Marketplace™. Materials can be used individually or integrated into simulated phishing and social-engineering campaigns. New simulation and training content is added daily, to reflect the most recent threats and training resources available to help protect your business. PhishLine lets you deliver training as soon as the need is identified, using a built-in workflow engine. For example, you can use a landing page for in-the-moment training when someone performs an unsafe action as part of a mock phishing campaign. You can also send training invitations to specific employees based on their past actions and risk profile. Plus, you can schedule training invitations and post on-demand training on your intranet. PhishLine makes it easy for employees to instantly report suspicious emails to your help desk or incident response team. The built-in Phish Reporting Button is a simple, powerful solution that gives you complete control over the entire process at all times. <span style=\"font-weight: bold;\">Identify Human Risk Factors in a Non-Threatening Manner</span> Do employees truly understand that information security policy they signed? Did a recent information security announcement have any impact on their perceptions of risk? Is your security awareness program addressing the real needs of employees, from their perspectives? These are some of the questions addressed by PhishLine’s Risk-Based Survey module in a thoughtful, perceptive, and non-threatening manner. These unique, qualitative, risk-assessment capabilities allow for discovery in the “voice of the employee.” Back-end analysis capabilities lead to a unique and powerful assessment tool that quantifies risk by impact and likelihood scores. You can objectively evaluate your organization’s human-risk factor based on meaningful feedback from your employees. <span style=\"font-weight: bold;\">Protect Your Business With Updated Content That Guards Against The Latest Threats</span> With PhishLine, there’s no need to recycle the same old training and testing materials. The Content Center Marketplace is constantly updated by security experts to reflect the newest threats and the training resources available to protect your business. Engage employees – and keep their interest – with a wide variety of choices and materials designed to fit your corporate culture. In addition, PhishLine provides Click Thinking™, a monthly bundle of content updates. Each update is aligned around a hot topic, and includes a new training video, email template and landing page. <span style=\"font-weight: bold; text-decoration-line: underline;\">Content</span> <span style=\"font-weight: bold;\">Hundreds of Email Lure Templates, Landing Pages and Domains</span> New content is added every day creating endless combinations of email templates, landing pages, email account senders and web server domains. As the threat landscape changes so will our tests, giving you access to the most up-to-date content. <span style=\"font-weight: bold;\">PhishLine Content Center Marketplace™</span> All content can be found in the PhishLine Content Center Marketplace, a one-stop-shop for browsing, selecting and importing the perfect content to craft your continually evolving campaigns. <span style=\"font-weight: bold;\">Customized Templates</span> Add that special touch by customizing any of the templates so your simulated attacks come from people in positions of trust, effectively testing your workforce and teaching them to be wary of threats that only your organization may have seen. <span style=\"font-weight: bold; text-decoration-line: underline;\">Testing</span> <span style=\"font-weight: bold;\">Patented Multi-Variable Attack Simulations</span> In today’s threat landscape, you can be phished from more than just email. Train your team on every facet of threat with PhishLine’s multi-variable attacks with campaigns that include Smishing (SMS/Text), Vishing (Voicemail) and Found Physical Media. This unique capability will help prevent users from receiving the same mock phishing template in a campaign and can allow for hypothesis-based testing (A/B tests). <span style=\"font-weight: bold;\">Smishing (SMS/Text)</span> Protect your user base by training them to recognize unfamiliar outgoing texts with our industry-leading smishing simulation. The innovative incoming mode allows you to email requests to text custom phone numbers as the call-to-action for otherwise innocuous emails, catching what would be a normally unknown vector before it can be used against your workforce. <span style=\"font-weight: bold;\">Vishing (Voicemail)</span> Employees get many phone calls each day, which one of those will cost the company? With PhishLine’s anti-voicemail phishing or ‘Vishing’ we provide fully customizable simulated threats that will compliment any security awareness campaign. <span style=\"font-weight: bold;\">Found Physical Media (USB/SD Card)</span> Using the same Smart Attachment technology found in our email campaigns, you can distribute files on portable drives and cards with watermarks in a variety of file formats to track who is willing to plug it into your network. The files won’t cause security problems even if non-employees find them as the content redirects users to landing pages designed to educate on the perils found in anonymous portable media. <span style=\"font-weight: bold;\">Advanced Threat Simulation Features</span> Crafting effective scenarios is paramount when developing an effective anti-spearphishing campaign especially in long-term approaches where users would start seeing repetitive emails. Prevent that by using PhishLine’s advanced threat simulation features including time stamping to create a sense of urgency prompting users to respond before they can think it through, phone home macros, DLP tagging, geo-location and more. Our patented system allows for multiple combinations of email templates, landing pages, email account senders, and web server domains within a single campaign. <span style=\"font-weight: bold; text-decoration-line: underline;\">Reporting</span> <span style=\"font-weight: bold;\">Phish Reporting Button</span> Enable easy tracking of user phishing attempts with the Phish Reporting Button, simplifying the task of reporting possible threats while tying in user reporting to your training regimen. <span style=\"font-weight: bold;\">Robust User Attributes</span> Why stop at user name and email address when you can test based on location, job function, tenure, privileged credentials, or access to sensitive networks and applications? PhishLine gives you granular control for your reports, that your mid-level marketing managers in Kansas are more likely to click a link in an email on Tuesday, as well as testing and education so your workforce isn’t inundated with emails they shouldn’t get. <span style=\"font-weight: bold;\">Extensive reporting and metrics</span> More than 16,000 data points are at your disposal with PhishLIne’s advanced metrics and reporting. Identify levels of risk at macro and micro levels within your organization to help expedite remediation while keeping your workforce at maximum efficiency by targeting training to only those who need testing at that moment. <span style=\"font-weight: bold;\">Data Loss Prevention (DLP)</span> Worried about data leaking from your organization? With PhishLine’s built-in Data Loss Prevention Activator, you can track where those PhishLine campaign emails and portable media drops go and who accesses it to know who might leak your company data as well. <span style=\"font-weight: bold;\">HTTP/SSL</span> Is your workforce leaning hard on whether there’s an encryption symbol next to the URL when they click links in their emails? With HTTPS and SSL landing pages you can collect information from your users without the possibility of people snooping that information and using it against you while convincing your users that they are safe. <span style=\"font-weight: bold; text-decoration-line: underline;\">Education</span> <span style=\"font-weight: bold;\">Program Gamification</span> Engage your users and make the cat-and-mouse aspect of security awareness fun by turning the workflow into a game with leaderboards and user leveling systems. This will help train users to spot and report threats while keeping the idea of spearphishing at the forefront of their mind. Levelized Programs Measure and communicate the success of your security awareness efforts. A leveling program gives you the ability to create a custom program based on the hallmarks of a healthy security culture: training completion, avoiding interactions with simulation messages, and reporting suspected phishing. As employees move through the program, they are presented with on-level training and simulation content that challenges their security awareness, enabling the administrator to track and report on overall program effectiveness and individual user awareness. (Available in PhishLine Concierge only.) <span style=\"font-weight: bold;\">Risk-Based Surveys</span> Should a CEO or accounts payable team get the same test as your engineer, nurse or teacher? With PhishLine you can issue risk-based surveys that provide unique insights into your user level security posture. By being better informed about your user level risk and validating it throughout the year you will maintain a security plan that mirrors your organizational objectives. <span style=\"font-weight: bold;\">Bonus Security Awareness Training Materials</span> To support your computer-based training initiatives, PhishLine provides supplementary materials such as two-minute best practice videos covering topics such as Malware Awareness and Password Security. In addition, there is an array of bonus training materials including posters, newsletters, infographics, and tip sheets. PhishLine has partnered with several reputable content vendors to augment our built-in content.","shortDescription":"Barracuda PhishLine - Fight phishing with continuous simulation and training\r\nTrain employees to understand the latest attack techniques, recognize subtle clues, and help stop email fraud, data loss","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda PhishLine","keywords":"your, training, PhishLine, that, with, security, email, employees","description":"Defend Your Business Against Social-Engineering Attacks Fight phishing and other potentially-devastating attacks that can slip through security gateways. These","og:title":"Barracuda PhishLine","og:description":"Defend Your Business Against Social-Engineering Attacks Fight phishing and other potentially-devastating attacks that can slip through security gateways. These","og:image":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1907,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-sentinel":{"id":1908,"logoURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda Sentinel","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-sentinel","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise</span> <span style=\"font-weight: bold;\">Stop Targeted Attacks Before They Reach Your Users</span> Business Email Compromise (BEC) has cost businesses $12B since 2013 plus untold additional losses from lost productivity and damage to reputation. Email impersonation attacks have tricked individuals into sending wire transfers and sensitive customer and employee information to attackers who are impersonating their CEO, boss, or trusted colleague. Barracuda Sentinel uses artificial intelligence and deep integration with Office 365 to stop these attacks before they reach your mail server, as well as detecting threats already sitting in your inbox. <span style=\"font-weight: bold; text-decoration-line: underline;\">Benefits of Barracuda Sentinel</span> <span style=\"font-weight: bold;\">Stop Email Impersonation Attacks</span> Traditional email filters sit in front of your mail server, so they don't see threats already in your inbox. Sentinel works from inside O365 and uses artificial intelligence to detect signs of spear phishing and account takeover. <span style=\"font-weight: bold;\">Protect Your Business from Account Takeover</span> Account takeover is a major new threat to business data. Sentinel detects account takeover attempts and blocks email attacks launched from compromised accounts. <span style=\"font-weight: bold;\">Protect Your Reputation and Stop Domain Fraud</span> Don't let hackers impersonate your domain to launch email attacks. Sentinel protects your brand and reputation through simplified DMARC reporting and analysis. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Identify and Secure Your Highest-Risk Individuals</span> Sentinel uses machine learning to automatically identify the people within your organization who are most likely to be targeted. <span style=\"font-weight: bold;\">Part of a Complete Email Protection Platform</span> With the Total Email Protection edition, Sentinel is combined with Barracuda Essentials and PhishLine for a complete email security, archiving, and data protection solution. <span style=\"font-weight: bold;\">Sentinel Detects Threats that Email Security Gateways Can't</span> Sentinel detects threats that traditional email security systems can't. It integrates directly with Microsoft Office 365 APIs to detect attacks coming from both internal and external sources, including threats that may already be in your inbox. It uses artificial intelligence to detect signs of malicious intent and deception within every email with virtually no I.T. administration required. <span style=\"font-weight: bold;\">Protect Your Business Against Account Takeover</span> Corporate Account Takeover presents a significant new threat to business. Hackers gain access to corporate email accounts through stolen credentials and use them to launch subsequent targeted attacks, internally and against external targets. Account takeover or attacks that originate from these accounts are almost impossible to detect since they don’t leverage impersonation techniques—they come from a legitimate account and appear to be from a trusted source. In fact, traditional email security solutions don’t even observe internal traffic and have no way of stopping an attack originating internally. Barracuda Sentinel detects both account takeover attempts and attacks launched from compromised accounts. By analyzing both historical and inbound data Sentinel is able to identify behavioral, content, and link-forwarding anomalies within your organization, and to flag and quarantine fraudulent emails. It is also able to prevent attempts to compromise employee credentials by automatically blocking targeted phishing emails that try to harvest employee passwords. <span style=\"font-weight: bold;\">Features</span> <span style=\"font-weight: bold;\">Stop Targeted Attacks with AI</span>\r\n<ul>\r\n<li>Prevent Spear Phishing</li>\r\n<li>Prevent BEC and CEO Fraud</li>\r\n<li>Detect Employee Impersonation</li>\r\n<li>Stop Zero-Day Phishing</li>\r\n<li>Detect Web Impersonation</li>\r\n<li>Stop Inbound Spoofing</li>\r\n<li>Continuous Learning</li>\r\n<li>Exportable Reports</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Stop Account Takeover with AI</span>\r\n<ul>\r\n<li>Alerting for Account Takeover</li>\r\n<li>Prevent Account Takeover Infiltration</li>\r\n<li>Detect Compromised Emails</li>\r\n<li>Delete Emails Sent Internally</li>\r\n<li>Notify External Recipients</li>\r\n<li>Lock Attackers Out of Accounts</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Domain Fraud Prevention</span>\r\n<ul>\r\n<li>Prevent Third Party Domain Spoofing</li>\r\n<li>Automated DMARC Reporting</li>\r\n<li>DMARC Aggregation and Visualization</li>\r\n<li>DKIM/SPF Configuration and Troubleshooting</li>\r\n<li>Better Email Deliverability</li>\r\n<li>Spoofed Email Reports</li>\r\n<li>Detect Misconfigured Legitimate Senders</li>\r\n<li>Protects Customer Brands</li>\r\n<li>Exportable Reports</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Flexible API-based Deployment</span>\r\n<ul>\r\n<li>Lightweight Architecture</li>\r\n<li>Instant Setup</li>\r\n<li>Works with Any Gateway</li>\r\n<li>Historical Assessment</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Phishing Simulations</span>\r\n<ul>\r\n<li>Test Employee Security Awareness</li>\r\n<li>80 Real-World Templates</li>\r\n<li>Simulate Impersonation and BEC</li>\r\n<li>AI Determines Employee Risk</li>\r\n</ul>\r\n","shortDescription":"Barracuda Sentinel is A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Sentinel","keywords":"Sentinel, from, Account, Email, your, email, attacks, Stop","description":"A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise Stop Targeted Attacks Before They Reach Your Users Business Email","og:title":"Barracuda Sentinel","og:description":"A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise Stop Targeted Attacks Before They Reach Your Users Business Email","og:image":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1911,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-web-security-gateway":{"id":1198,"logoURL":"https://old.b4r.io/fileadmin/content/element_wsg_RGB.jpg","logo":true,"scheme":false,"title":"Barracuda Web Security Gateway","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-web-security-gateway","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<p>Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without loss of performance. Barracuda Networks Barracuda Web Security Gateway is a powerful integrated content protection and analysis solution that is applicable to all business categories. Barracuda Web Security Gateway is very easy to install, has an intuitive management and monitoring interface and is automatically updated every hour through the Barracuda Central website. To install the solution, no additional software is needed, network settings are changed, and there is no need to purchase licenses for each additional user when the system is expanded. Barracuda Web Security Gateway combines proactive, reactive and proactive protection measures, ensuring complete network security: Prevent spyware downloads. Preventing viruses loading. Blocking access to Web sites with spyware. Determining the access of spyware to the Internet. Complete removal of spyware. Blocking malicious Web sites.</p>","shortDescription":"Barracuda Web Security Gateway protect users from malware and saves bandwidth","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Web Security Gateway","keywords":"Barracuda, Gateway, spyware, Security, network, additional, solution, protection","description":"Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without","og:title":"Barracuda Web Security Gateway","og:description":"Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without","og:image":"https://old.b4r.io/fileadmin/content/element_wsg_RGB.jpg"},"eventUrl":"","translationId":1390,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":548,"title":"Web security - Appliance","alias":"web-security-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-security-hardware.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":485,"title":"Web security","alias":"web-security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web_security.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"kaspersky-total-security":{"id":618,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Kaspersky_Total_Security.png","logo":true,"scheme":false,"title":"Kaspersky Total Security","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":172,"alias":"kaspersky-total-security","companyTitle":"Kaspersky Lab","companyTypes":["vendor"],"companyId":173,"companyAlias":"kaspersky-lab","description":"Keeps you safe from viruses, attacks, fraud, spyware, cybercrime and more\r\nSecures PC, Mac, Android, iPhone and iPad – with just one product & one license\r\nProtects you privacy & personal data – against phishing, tracking & spying\r\nAutomatically adds extra security when you are online shopping or banking\r\nSecurely stores website & account passwords – for easy access from all your devices\r\nRange of functions depends on the type of device being used\r\n\r\nAnti-malware\r\nInstallation Assistant\r\nTwo-Way Firewall\r\nPrivate Browsing\r\nSecure Connection\r\nSafer Networking\r\nApplication Control\r\nNew! Software Cleaner\r\nImproved Safe Money\r\nSafe surfing\r\nSystem Watcher & Anti-Blocker\r\nNetwork Attack Blocker\r\nImproved! Anti-Banner\r\nAnti-Spam\r\nAdvanced Anti-Phishing\r\nWebcam Protection\r\nSecure Keyboard\r\nOn-Screen Keyboard\r\nPrivacy Protection\r\nKaspersky Password Manager - Premium\r\nBackup, Encryption & File Shredder\r\nOnline backup\r\nKaspersky Safe Kids – Premium\r\nMulti-Device Security\r\nAnti-Theft\r\nSimplified Web Management\r\nSoftware Update\r\nSafety checks\r\nAutomatic Exploit Prevention\r\nFREE, Automatic Updates\r\nSecurity Optimized for Performance\r\nTechnical support\r\n SECURITY – Keeps you safe from viruses, spyware & more You depend on your computers, tablets and phones for so many things – so you need to protect them all against the very latest digital dangers. Our award-winning, cloud-assisted security helps you protect against infections & attacks, blocks banners & spam, keeps software up-to-date and warns you about dangerous websites – before they’re clicked.\r\n PC, MAC & MOBILE – One license protects your multiple devices Every device you use could be compromising your security – so you need to secure them all… PC, Mac, iPhone, iPad and Android. With just one product – and only one license – we help you to protect all of your computers and mobile devices… plus you can lock, wipe & locate missing Android phones & tablets\r\n PRIVACY – Protects your privacy and personal information Because all your devices are capable of storing a lot of sensitive, personal information – that can be valuable to criminals – you need to make sure snoopers and phishers can’t steal any confidential data. We’ll help you guard your personal data, prevent online activities being monitored, block unauthorized webcam use and protect data when any of your devices connects to a public network.\r\n MONEY – Adds extra security for online shopping and banking Online shopping and banking are everyday activities for most people – but you need to make sure you aren’t caught off guard by online thieves. Our unique security technology – Safe Money – helps you to protect your money and account details… to help prevent theft.\r\n PASSWORDS – Securely stores all passwords for quick & easy access We all know that using complex, unique passwords – for every website and online account – helps to keep us secure… but remembering all those passwords can be quite a task. Now, there’s no need to remember every complex password for every website and account. Each user only needs to remember their one master password – and they can access all their individual passwords from their PC, Mac, Android phone & tablet, iPhone and iPad.\r\n FILES – Safeguards precious files, photos, music & memories Nobody wants to lose irreplaceable files, photos or memories… or suffer a security breach if any sensitive data finds its way into the wrong hands. We’ll help you to create backup copies of all your precious photos, music and files. In addition, data encryption helps to ensure confidential files can’t be read if they’re accessed by criminals or unauthorized users.\r\n PERFORMANCE – Lets devices keep performing as they’re designed to Security shouldn’t slow you down. That’s why you need rigorous security that won’t impact the performance of your computers, tablets and phones. Our protection technologies work ‘behind the scenes’ – and that means your computers and mobile devices can help you to keep up with your busy life.\r\n SIMPLICITY – Simplifies family security with easy, online control Nobody wants to waste time getting to grips with complex security. If your family’s security software is difficult to set up and run, it could even leave their computers and mobile devices with serious security gaps. By giving you a free My Kaspersky account, we make it easy for you to manage your family’s security – across all their computers, tablets & phones – from anywhere that you can get online. You can check each device’s security & license status and adjust key security settings – plus access special offers and download free Kaspersky Lab products. My Kaspersky also gives you easy access to technical support.\r\n","shortDescription":"Our Ultimate security, Kaspersky Total Security helps you do more to ensure all your devices are protected so you can surf, shop & socialize more safely. Our award-winning security helps you to safeguard your privacy, money, photos, files and precious memories from today’s online dangers – and Kaspersky Safe Kids gives you new ways to secure your kids’ digital lives… on their PCs, Mac computers, iPhones, iPads and Android phones & tablets.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Kaspersky Total Security","keywords":"your, security, devices, online, need, computers, data, Kaspersky","description":"Keeps you safe from viruses, attacks, fraud, spyware, cybercrime and more\rSecures PC, Mac, Android, iPhone and iPad – with just one product & one license","og:title":"Kaspersky Total Security","og:description":"Keeps you safe from viruses, attacks, fraud, spyware, cybercrime and more\rSecures PC, Mac, Android, iPhone and iPad – with just one product & one license","og:image":"https://old.b4r.io/fileadmin/user_upload/Kaspersky_Total_Security.png"},"eventUrl":"","translationId":619,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":43,"title":"Data Encryption","alias":"data-encryption","description":"Шифрова́ние — обратимое преобразование информации в целях сокрытия от неавторизованных лиц, с предоставлением, в это же время, авторизованным пользователям доступа к ней. Главным образом, шифрование служит задачей соблюдения конфиденциальности передаваемой информации. Важной особенностью любого алгоритма шифрования является использование ключа, который утверждает выбор конкретного преобразования из совокупности возможных для данного алгоритма[1][2].\r\n\r\nПользователи являются авторизованными, если они обладают определенным аутентичным ключом. Вся сложность и, собственно, задача шифрования состоит в том, как именно реализован этот процесс[1].\r\n\r\nВ целом, шифрование состоит из двух составляющих — зашифрование и расшифрование.\r\n\r\nС помощью шифрования обеспечиваются три состояния безопасности информации[1]:\r\n\r\nКонфиденциальность.\r\nШифрование используется для скрытия информации от неавторизованных пользователей при передаче или при хранении.\r\nЦелостность.\r\nШифрование используется для предотвращения изменения информации при передаче или хранении.\r\nИдентифицируемость.\r\nШифрование используется для аутентификации источника информации и предотвращения отказа отправителя информации от того факта, что данные были отправлены именно им.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-encryption.png"},{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"mcafee-web-gateway":{"id":431,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Web_Gateway.jpg","logo":true,"scheme":false,"title":"McAfee Web Gateway","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-web-gateway","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost of remediation and minimize the chance of data loss in an attack. Sharing web threat information can make other security tools more intelligent. None of this should disrupt the productivity of a large workforce.\r\n\r\nGateway technology for the world’s most demanding IT environments\r\n\r\nBest-in-class threat prevention\r\nProtect against highly sophisticated malware and targeted attacks that evade URL filtering and antivirus signatures. This secure web gateway provides industry-leading, proactive detection of zero-day malware with full coverage of web traffic, including SSL.\r\n\r\nThreat information sharing\r\nMcAfee Web Gateway is integrated with the Security Connected platform to enable more effective threat detection, reduce incident response times, and improve operational efficiency. Learn about key integration points, McAfee Advanced Threat Defense and McAfee Threat Intelligence Exchange.\r\n\r\nPowerful rules-based policy engine\r\nTake action on any element of the web request-response cycle, allowing limitless flexibility and web security crafted for your organization.","shortDescription":"McAfee Web Gateway delivers high-performance web security through an on-premises appliance that can be deployed both as dedicated hardware and a virtual machine. McAfee Web Gateway is part of the McAfee Web Protection solution alongside McAfee Web Gateway Cloud Service, available together to provide optimal protection for users everywhere.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Web Gateway","keywords":"McAfee, threat, Threat, Gateway, malware, security, more, information","description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost","og:title":"McAfee Web Gateway","og:description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Web_Gateway.jpg"},"eventUrl":"","translationId":432,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"usergate-proxy-firewall":{"id":303,"logoURL":"https://old.b4r.io/fileadmin/user_upload/UserGate_Proxy___Firewall.png","logo":true,"scheme":false,"title":"UserGate Proxy & Firewall","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"usergate-proxy-firewall","companyTitle":"Entensys","companyTypes":["vendor"],"companyId":2811,"companyAlias":"entensys","description":"Control Internet Access. Protect from Advanced Threats.\r\nUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe.\r\n\r\nNetwork Firewall, IDPS, and Router\r\nEnforce uninterrupted connectivity, network access controls, and regulate Internet traffic.\r\nKeep viruses, worms, Trojans, and spyware from infesting your network.\r\nGuarantee the bandwidth levels required to serve business-critical applications.\r\nMonitoring User Internet Activity\r\n\r\nControl access to websites and enforce any reasonable corporate policy.\r\nLink the headquarters to remote users and branch offices through a Secure VPN connection\r\nProduct Overview\r\nUserGate Proxy & Firewall is an all-in-one gateway security solution combining a network firewall, router, gateway antivirus, intrusion detection and prevention (IDPS), VPN server, web filtering, reporting and statistics and other important functions. It allows you to manage network traffic, optimize bandwidth, and provide Internet access control.\r\n\r\nHow does it work?\r\nUserGate Proxy & Firewall can be installed on any Windows-based machine and works as a web security gateway. It provides Internet access sharing, web security, and traffic management. UserGate works basing on user account and applicable policies. The product lets administrators control traffic flow and trace web pages visited by employees. Numerous policies can be used to grant or restrict access to specific website categories, control downloads or application use, set traffic quotas, and keep detailed statistics.\r\n","shortDescription":"UserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"UserGate Proxy & Firewall","keywords":"access, Internet, Firewall, UserGate, traffic, network, Proxy, security","description":"Control Internet Access. Protect from Advanced Threats.\rUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous","og:title":"UserGate Proxy & Firewall","og:description":"Control Internet Access. Protect from Advanced Threats.\rUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous","og:image":"https://old.b4r.io/fileadmin/user_upload/UserGate_Proxy___Firewall.png"},"eventUrl":"","translationId":304,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"websense-web-security-gateway-wsg":{"id":1525,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Websense Web Security Gateway (WSG)","vendorVerified":0,"rating":"3.30","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":45,"alias":"websense-web-security-gateway-wsg","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web 2.0. </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Решение выполняет функции сканирующего прокси-сервера для анализа web- и SSL-трафика на наличие современных угроз безопасности. Кроме того, решение включает в себя службы web-репутации и </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">полный набор URL-категорий безопасности: бот-сети, шпионские программы, фишинг и мошенничество, перехватчики клавиатуры, вредоносные web-сайты, потенциально нежелательные программы.</span>\r\n<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \"></span> ","shortDescription":"Программа анализирует web-трафик в реальном времени, защищая работу c интернет-ресурсами и с современными порталами Web 2.0. Решение выполняет функции сканирующего прокси-сервера","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Websense Web Security Gateway (WSG)","keywords":"программы, безопасности, себя, включает, решение, Кроме, того, web-репутации","description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web","og:title":"Websense Web Security Gateway (WSG)","og:description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":2729,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["barracuda-phishline","barracuda-sentinel","barracuda-web-security-gateway","kaspersky-total-security","mcafee-web-gateway","usergate-proxy-firewall","websense-web-security-gateway-wsg"]},"links":{"first":"http://b4r_be/api/products?page=1","last":"http://b4r_be/api/products?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://b4r_be/api/products","per_page":20,"to":7,"total":7},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}