{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"i-sell-it":{"en":"I sell it","ru":"I sell it","_type":"localeString"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"_type":"localeString","en":"Selling","ru":"Продают"},"using":{"en":"Using","ru":"Используют","_type":"localeString"},"sort-title-asc":{"en":"From A to Z","ru":"От А до Я","_type":"localeString"},"supplier-popover":{"en":"supplier","ru":"поставщик","_type":"localeString"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"от Я до А"},"sort-rating-asc":{"_type":"localeString","en":"Rating ascending","ru":"По возрастанию рейтинга"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"_type":"localeString","en":"Rebate ascending","ru":"По возрастанию скидки"},"sort-discount-desc":{"ru":"По убыванию скидки","_type":"localeString","en":"Rebate descending"},"i-use-it-popover":{"en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString"},"details":{"en":"Details","ru":"Детальнее","_type":"localeString"},"rebate-for-poc":{"_type":"localeString","en":"Bonus 4 POC","ru":"Бонус 4 POC"},"rebate":{"_type":"localeString","en":"Bonus","ru":"Бонус"},"vendor-verified":{"ru":"Поставщик потверждён","_type":"localeString","en":"Vendor verified"},"program-sends-data":{"en":"Program sends data","_type":"localeString"},"learn-more-btn":{"_type":"localeString","en":"Learn more","ru":"Узнать больше"},"categories-popover":{"ru":"категории","_type":"localeString","en":"categories"},"sort-popular-asc":{"ru":"По возростанию популярности","_type":"localeString","en":"Popular ascending"},"sort-popular-desc":{"ru":"По убыванию популярности","_type":"localeString","en":"Popular descending"},"no-results":{"_type":"localeString","en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос."},"login":{"_type":"localeString","en":"Login","de":"Einloggen","ru":"Войти"},"register":{"de":"Registrieren","ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You need to register or login.","de":"Sie müssen sich registrieren oder anmelden"},"add-to-comparison":{"en":"Add to comparison","ru":"Добавить в сравнение","_type":"localeString"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"items-found":{"_type":"localeString","en":"Products found","ru":"Продуктов найдено"},"sort-sales-desc":{"_type":"localeString","en":"By sale","ru":"По продаже"},"sort-purchases-desc":{"en":"By purchase","ru":"По покупке","_type":"localeString"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"_type":"localeString","en":"Product producer","ru":"Производитель продукта"},"products-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"_type":"localeString","en":"Sign out","ru":"Выйти"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"_type":"localeString","en":"Company name","ru":"Компания"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"category":{"en":"Category","ru":"Категория","_type":"localeString"},"follow":{"en":"Follow","ru":"Следить","_type":"localeString"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"en":"Сlear","ru":"Очистить","_type":"localeString"},"delivery-type-field":{"_type":"localeString","en":"Delivery type","ru":"Тип поставки"},"product-categories-field":{"_type":"localeString","en":"product categories","ru":"категориz продуктаhjle"},"providers-field":{"en":"Providers","ru":"Поставщик, производитель","_type":"localeString"},"business-tasks-field":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"_type":"localeString","en":"With discounts","ru":"Со скидками"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"apply-filter-button":{"en":"Apply filter","ru":"Применить фильтр","_type":"localeString"},"sorting-toggle":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"show-all-button":{"_type":"localeString","en":"Show all","ru":"Показать все"},"suggest-product-button":{"en":"Suggest product","ru":"Предложить продукт","_type":"localeString"},"with-projects-label":{"_type":"localeString","en":"With deployments","ru":"С внедрениями"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"en":"Product Categories","ru":"Категории продуктов","_type":"localeString"},"countries":{"en":"Countries","ru":"Страны","_type":"localeString"},"seller":{"ru":"Продавец","_type":"localeString","en":"Seller"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"ru":"С референсами","_type":"localeString","en":"With reference"},"show-deal-checkbox":{"en":"Show deal with noname","ru":"Показывать сделки с noname","_type":"localeString"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"_type":"localeString","en":"Date","ru":"Дата"},"try-button":{"en":"Try AI (Beta)","ru":"Попробовать AI (Beta)","_type":"localeString"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"_type":"localeString","en":"Sellers","ru":"Поставщики, Производители"},"supply-types":{"en":"Supply type","ru":"Тип поставки","_type":"localeString"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"en":"Company type","ru":"Тип компании","_type":"localeString"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"en":"Product vendor","ru":"Производитель продукта","_type":"localeString"},"implementation-date":{"_type":"localeString","en":"Deployment date","ru":"Дата внедрения"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"_type":"localeString","en":"Deal in progress","ru":"Сделка в процессе"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"_type":"localeString","en":"Finished","ru":"Завершено"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"en":"Competencies","ru":"Компетенции","_type":"localeString"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"label":"catalog-products-text-block","body":{"ru":[{"children":[{"_type":"span","marks":[],"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0"}],"_type":"block","style":"normal","_key":"28241882db7a","markDefs":[]}],"_type":"localeBlock","en":[{"children":[{"_type":"span","marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550"}],"_type":"block","style":"normal","_key":"8bebcfb34955","markDefs":[]}]}}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"translatable_meta":[{"name":"og:title","translations":{"en":"Products","ru":"Продукты","_type":"localeString"}},{"name":"description","translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"Description"}},{"name":"og:description","translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI"}},{"translations":{"_type":"localeString","en":"keyword","ru":"каталог, программное обеспечение, софт, ит услуги"},"name":"keywords"},{"name":"title","translations":{"_type":"localeString","en":"Products","ru":"Продукты"}}],"title":{"ru":"ROI4CIO: Продукты","_type":"localeString","en":"ROI4CIO: Products"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"788871":{"id":2187,"logoURL":"https://old.b4r.io/fileadmin/content/449942.483xp_01.jpg","logo":true,"scheme":false,"title":"78887(1)","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"788871","companyTitle":"IT Service +","companyTypes":["supplier","vendor"],"companyId":3328,"companyAlias":"it-servis","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"78887(1)","keywords":"","description":"","og:title":"78887(1)","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/449942.483xp_01.jpg"},"eventUrl":"","translationId":2957,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":88,"title":"78887"}],"testingArea":"","categories":[{"id":820,"title":"Marketing Automation","alias":"marketing-automation","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/marketing-automation.png"},{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"788872":{"id":2188,"logoURL":"https://old.b4r.io/fileadmin/content/123-box.ru_2017-01-08_08-27-17.jpeg","logo":true,"scheme":false,"title":"78887(2)","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"788872","companyTitle":"IT Service +","companyTypes":["supplier","vendor"],"companyId":3328,"companyAlias":"it-servis","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"78887(2)","keywords":"","description":"","og:title":"78887(2)","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/123-box.ru_2017-01-08_08-27-17.jpeg"},"eventUrl":"","translationId":2958,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":88,"title":"78887"}],"testingArea":"","categories":[{"id":820,"title":"Marketing Automation","alias":"marketing-automation","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/marketing-automation.png"},{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"78887-eng-1":{"id":2189,"logoURL":"https://old.b4r.io/fileadmin/content/57119661_2169959166427823_6130691976791588864_n_01.jpg","logo":true,"scheme":false,"title":"78887 eng (1)","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":1,"alias":"78887-eng-1","companyTitle":"IT Service +","companyTypes":["supplier","vendor"],"companyId":3328,"companyAlias":"it-servis","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"78887 eng (1)","keywords":"","description":"","og:title":"78887 eng (1)","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/57119661_2169959166427823_6130691976791588864_n_01.jpg"},"eventUrl":"","translationId":2189,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":88,"title":"78887"}],"testingArea":"","categories":[{"id":820,"title":"Marketing Automation","alias":"marketing-automation","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/marketing-automation.png"},{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"78887-eng-2":{"id":2190,"logoURL":"https://old.b4r.io/fileadmin/content/46303506_364255470804619_7291620468288056499_n_02.jpg","logo":true,"scheme":false,"title":"78887 eng (2)","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"78887-eng-2","companyTitle":"IT Service +","companyTypes":["supplier","vendor"],"companyId":3328,"companyAlias":"it-servis","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"78887 eng (2)","keywords":"","description":"","og:title":"78887 eng (2)","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/46303506_364255470804619_7291620468288056499_n_02.jpg"},"eventUrl":"","translationId":2190,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":88,"title":"78887"}],"testingArea":"","categories":[{"id":820,"title":"Marketing Automation","alias":"marketing-automation","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/marketing-automation.png"},{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"a10-thunderrtps":{"id":1273,"logoURL":"https://old.b4r.io/fileadmin/user_upload/A10_THUNDER_R_TPS1.jpg","logo":true,"scheme":false,"title":"A10 THUNDER®TPS","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"a10-thunderrtps","companyTitle":"A10","companyTypes":["supplier","vendor"],"companyId":4094,"companyAlias":"a10","description":"<span style=\"font-weight: bold;\">SURGICAL MULTI-VECTOR DDOS PROTECTION</span>\r\nMitigate volumetric, protocol, resource, application and IoT-based DDoS attacks while protecting legitimate users.\r\n\r\n<span style=\"font-weight: bold;\">POWERFUL & EFFICIENT</span>\r\nLower TCO with industry-best 300 Gbps at 440 Mpps. FPGA-based acceleration mitigates without burdening CPUs.\r\n\r\n<span style=\"font-weight: bold;\">AUTOMATED THREAT MITIGATION</span>\r\nRespond faster and minimize manual changes with automated mitigation and escalation based on 28 behavioral indicators.\r\n\r\n<span style=\"font-weight: bold;\">PRECISE DETECTION</span>\r\nSwiftly detect attacks with in-line or flow-based methods, or integrate third party detection with open APIs.\r\n\r\n<span style=\"font-weight: bold;\">HYBRID DDOS PROTECTION</span>\r\nOn-premise protection integrates with Verisign’s cloud-based DDoS Protection Services.\r\n\r\n<span style=\"font-weight: bold;\">FLEXIBLE MANAGEMENT</span>\r\nUse 100 percent API coverage for SecOps, on-box GUI, CLI, or to manage multiple TPS devices via aGalaxy.\r\n\r\n<span style=\"font-weight: bold;\">THREAT INTELLIGENCE SERVICE</span>\r\nLeverage more than three dozen intelligence sources to block malicious traffic. Included with A10 support.\r\n\r\n<span style=\"font-weight: bold;\">24-7 ATTACK SUPPORT</span>\r\nSpin up 24-7 DDoS attack support from the A10 DDoS Security Incident Response Team (DSIRT). Included with A10 support.\r\n\r\n<span style=\"font-weight: bold;\">REACTIVE MODE</span>\r\nLarger networks benefit from on-demand mitigation, which is triggered manually or via flow-based analytical systems. Thunder TPS fits any network configuration with integrated BGP and other routing protocols support.\r\n\r\n<span style=\"font-weight: bold;\">PROACTIVE MODE</span>\r\nProactive mode provides continuous, comprehensive detection and faster mitigation. Deployable in asymmetric or symmetric configurations, this mode is most useful for real-time environments where the user experience is critical.\r\n\r\n<span style=\"font-weight: bold;\">OUT-OF-BAND (TAP) MODE</span>\r\nThe out-of-band mode is used when packet-based DDoS detection and monitoring is required.\r\n","shortDescription":"A10 THUNDER®TPS - DDOS DETECTION & MITIGATION\r\nThe world’s highest-performance DDoS protection solution, the A10 Thunder TPS™ (Threat Protection System) detects and mitigates megabit to terabit DDoS attacks at the network edge.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"A10 THUNDER®TPS","keywords":"with, DDoS, support, mode, detection, MODE, mitigation, 24-7","description":"SURGICAL MULTI-VECTOR DDOS PROTECTION\rMitigate volumetric, protocol, resource, application and IoT-based DDoS attacks while protecting legitimate users.\r","og:title":"A10 THUNDER®TPS","og:description":"SURGICAL MULTI-VECTOR DDOS PROTECTION\rMitigate volumetric, protocol, resource, application and IoT-based DDoS attacks while protecting legitimate users.\r","og:image":"https://old.b4r.io/fileadmin/user_upload/A10_THUNDER_R_TPS1.jpg"},"eventUrl":"","translationId":1274,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"acalvio-shadowplex":{"id":1652,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Acalvio.png","logo":true,"scheme":false,"title":"Acalvio Shadowplex","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"acalvio-shadowplex","companyTitle":"Acalvio","companyTypes":["supplier","vendor"],"companyId":4303,"companyAlias":"acalvio","description":"ShadowPlex Autonomous Deception\r\n<ul>\r\n<li>Accurate Detection</li>\r\n<li>Timely Detection</li>\r\n<li>Cost-Effective Detection</li>\r\n</ul>\r\nShadowPlex is designed for Enterprise IT, IoT and ICS environments and based on patented innovations. <span style=\"font-weight: bold;\">Deception Farms</span> Deception-farms is a seminal innovation that delivers scale and adaptability. Sensors are placed in the network segments. All decoys are born and live in a centralized virtual server farm. They are projected onto the network, thus optimizing resource consumption and delivers flexibility. <span style=\"font-weight: bold;\">Fluid Deception</span> Fluid Deception is a patented technology that achieves resource efficiency by just in time decoy creation, minimizing costs, maximizing effectiveness. No longer do you have to choose between emulation and full host decoys. <span style=\"font-weight: bold;\">Security Ecosystem Integrations</span> ShadowPlex provides comprehensive API support allowing Deception campaigns to be orchestrated from other environments. This also facilitates integration with 3rd party security tools such as:\r\n<ul>\r\n<li>Threat Intelligence</li>\r\n<li>IT Change Management platforms</li>\r\n<li>SOAR (Security Orchestration and Response)</li>\r\n<li>SIEM</li>\r\n<li>Perimeter Defense</li>\r\n<li>NAC (Network Access Control)</li>\r\n<li>Vulnerability Managers</li>\r\n<li>SSO, Identity Management, Privileged User Management Systems</li>\r\n<li>EDR, End-point</li>\r\n</ul>\r\n","shortDescription":"ShadowPlex is an Autonomous, Enterprise-Scale Distributed Deception Platform (DDP)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Acalvio Shadowplex","keywords":"Deception, Detection, Management, ShadowPlex, that, delivers, network, Fluid","description":"ShadowPlex Autonomous Deception\r\rAccurate Detection\rTimely Detection\rCost-Effective Detection\r\rShadowPlex is designed for Enterprise IT, IoT and ICS","og:title":"Acalvio Shadowplex","og:description":"ShadowPlex Autonomous Deception\r\rAccurate Detection\rTimely Detection\rCost-Effective Detection\r\rShadowPlex is designed for Enterprise IT, IoT and ICS","og:image":"https://old.b4r.io/fileadmin/user_upload/Acalvio.png"},"eventUrl":"","translationId":1653,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":28,"title":"Deception Techniques and Honeypots"}],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"acunetix-vulnerability-scanner":{"id":1681,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Acunetix_Vulnerability_Scanner.png","logo":true,"scheme":false,"title":"Acunetix Vulnerability Scanner","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"acunetix-vulnerability-scanner","companyTitle":"Acunetix","companyTypes":["vendor"],"companyId":3850,"companyAlias":"acunetix","description":"With the uptake of cloud computing and advancements in browser technology, web applications have become a core component of business processes, and a lucrative target for hackers. Organizations must make web application security not only a priority, but a fundamental requirement. Enter Acunetix Vulnerability Scanner! <span style=\"font-weight: bold;\">A Firewall is not enough</span> Firewalls, SSL and hardened networks are futile against web application hacking. Web attacks are carried out over HTTP and HTTPS; the same protocols that are used to deliver content to legitimate users. Web applications are often tailor-made and tested less than off-the-shelf-software; the repercussions of a web attack are often worse than traditional network-based attacks.\r\n<ul>\r\n<li>Detects over 4500 web application vulnerabilities.</li>\r\n<li>Scan open-source software and custom-built applications.</li>\r\n<li>Detects Critical Vulnerabilities with 100% Accuracy.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Technology Leader in Automated Web Application Security</span> Acunetix are the pioneers in automated web application security testing with innovative technologies including:\r\n<ul>\r\n<li>DeepScan Technology – for crawling of AJAX-heavy client-side Single Page Applications (SPAs).</li>\r\n<li>Industry’s most advanced SQL Injection and Cross-site Scripting testing – includes advanced detection of DOM-based XSS.</li>\r\n<li>AcuSensor Technology – Combines black box scanning techniques with feedback from its sensors placed inside source code.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Fast, Accurate, Easy to Use</span> Multi-threaded, lightning fast crawler and scanner that can crawl hundreds of thousands of pages without interruptions.\r\n<ul>\r\n<li>Highest detection of WordPress vulnerabilities – scans WordPress installations for over 1200 known vulnerabilities in WordPress’ core, themes and plugins.</li>\r\n<li>An easy to use Login Sequence Recorder that allows the automatic scanning of complex password protected areas.</li>\r\n<li>Review vulnerability data with built-in vulnerability management. Easily generate a wide variety of technical and compliance reports.</li>\r\n</ul>\r\n","shortDescription":"Acunetix Web Vulnerability Scanner Audits Your Web Security ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Acunetix Vulnerability Scanner","keywords":"application, with, that, WordPress, Acunetix, vulnerabilities, over, Technology","description":"With the uptake of cloud computing and advancements in browser technology, web applications have become a core component of business processes, and a lucrative","og:title":"Acunetix Vulnerability Scanner","og:description":"With the uptake of cloud computing and advancements in browser technology, web applications have become a core component of business processes, and a lucrative","og:image":"https://old.b4r.io/fileadmin/user_upload/Acunetix_Vulnerability_Scanner.png"},"eventUrl":"","translationId":1683,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":32,"title":"Web Application Vulnerability Scanner"}],"testingArea":"","categories":[{"id":793,"title":"Web Application Vulnerability Scanner","alias":"web-application-vulnerability-scanner","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-application-vulnerability-scanner.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"airlock-web-application-firewall":{"id":1622,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Airlock.png","logo":true,"scheme":false,"title":"Airlock Web Application Firewall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"airlock-web-application-firewall","companyTitle":"Ergon Informatik AG","companyTypes":["supplier","vendor"],"companyId":4288,"companyAlias":"ergon-informatik-ag","description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance, security for online banking or protection for eCommerce: Airlock WAF will upgrade security for your internet applications – a permanent solution with a host of well thought-out functionalities.\r\nThanks to Airlock WAF, businesses can exploit the potential of the internet without jeopardizing the security and availability of their web applications and services. Each access is systematically monitored and filtered at every level. Used in conjunction with an authentication solution such as Airlock Login or IAM, Airlock WAF can force upstream user authentication and authorization. This allows a uniform, central single sign-on infrastructure. All important information is also made available via monitoring and reporting functions. Airlock WAF is the only web application security solution on the market that provides superlative end-to-end protection for complex web environments.\r\n<span style=\"font-weight: bold;\">Airlock WAF - The main features</span>\r\n<ul><li>Secure Reverse Proxy</li><li>Central Checkpoint</li><li>Filtering</li><li>API Security</li><li>Dynamic Whitelisting</li><li>Central Security Hub</li><li>High Availability and Performance</li></ul>\r\n<span style=\"font-weight: bold;\">Airlock WAF is also available as a hardware appliance</span>\r\nWith the Airlock WAF hardware appliance, setup and going live will be even easier than today. Of course, hardware appliances can be connected to build a failover cluster with active session synchronization.","shortDescription":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications, whether your objective is PCI DSS compliance, security for online banking or protection ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Airlock Web Application Firewall","keywords":"Airlock, security, with, solution, applications, hardware, will, also","description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance,","og:title":"Airlock Web Application Firewall","og:description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance,","og:image":"https://old.b4r.io/fileadmin/user_upload/Airlock.png"},"eventUrl":"","translationId":1623,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"akamai-kona-web-application-firewall":{"id":1602,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Akamai_Technologies.png","logo":true,"scheme":false,"title":"Akamai Kona Web Application Firewall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"akamai-kona-web-application-firewall","companyTitle":"Akamai Technologies","companyTypes":["supplier","vendor"],"companyId":4283,"companyAlias":"akamai-technologies","description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application attacks. Globally-distributed across the Akamai Intelligent Platform™, Kona WAF can easily scale to defend against massive application attacks. Deployed at the edge of your network rather than in a data center, Kona WAF can identify and mitigate suspicious traffic without affecting performance or availability of the origin server. Security rules for Kona WAF are continuously refined by Akamai’s Threat Intelligence Team to protect against known attacks and respond to emerging threats. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">With Kona WAF you can: </span>\r\n<ul>\r\n<li>Reduce the risk of downtime, data theft and security breaches with a WAF that can scale to protect against the largest DoS and DDoS attacks.</li>\r\n<li>Ensure high performance even during attacks thanks to Akamai’s globally architecture.</li>\r\n<li>Defending against new and emerging threats with help from Akamai’s Threat Intelligence Team.</li>\r\n<li>Minimize costs of cloud security by avoiding the need for expensive dedicated hardware.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Key capabilities of Kona WAF</span>\r\n<ul>\r\n<li>Kona WAF provides comprehensive capabilities to protect against application-layer attacks. </li>\r\n<li>Adaptive rate controls automatically protect against application-layer DDoS and other volumetric attacks by monitoring and controlling the rate of requests against applications.</li>\r\n<li>Application-layer controls offer pre-defined, configurable WAF rules that govern Request Limit Violations, Protocol Violations, HTTP Policy Violations and more.</li>\r\n<li>Network-layer controls automatically deflect network-layer DDoS attacks at the network edge and define and enforce IP whitelists and blacklists to restrict requests from certain IP addresses or geographical regions.</li>\r\n<li>Security monitor provides real-time visibility into security events and enables administrators to drill down into attack alerts.</li>\r\n<li>Logging features enable you to integrate WAF and event logs with security information and event management to increase your threat posture awareness.</li>\r\n</ul>\r\n","shortDescription":"Kona Web Application Firewall from Akamai provides an highly scalable application firewall that defends against emerging threats to web security while keeping application performance high.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Akamai Kona Web Application Firewall","keywords":"attacks, against, Kona, with, security, Akamais, protect, controls","description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application","og:title":"Akamai Kona Web Application Firewall","og:description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application","og:image":"https://old.b4r.io/fileadmin/user_upload/Akamai_Technologies.png"},"eventUrl":"","translationId":1603,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"alienvault-unified-security-managementtm":{"id":331,"logoURL":"https://old.b4r.io/fileadmin/content/csm_AlienVault_Unified_Security_Management_TM__857060bc6c.png","logo":true,"scheme":false,"title":"AlienVault Unified Security Management™","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"alienvault-unified-security-managementtm","companyTitle":"Alien Vault","companyTypes":["vendor"],"companyId":2737,"companyAlias":"alien-vault","description":"<span style=\"font-weight: bold;\">Функции:</span>\r\n\r\nединый мониторинг безопасности\r\nпростое управление безопасностью и отчетность\r\nнепрерывный мониторинг угроз\r\nбыстрое внедрение\r\nмногочисленные функции безопасности в единой консоли\r\n<span style=\"font-weight: bold;\">5 важнейших функций безопасности:</span>\r\n1) Поиск активов – поиск всех активов в сети до совершения вредоносных действий\r\n2) Мониторинг действий – определение подозрительных действий и потенциально взломанных систем\r\n3) Vulnerability Assessment – определяет уязвимые места в сети\r\n4) SIEM – корреляция и анализ данных о событиях безопасности в сети\r\n5) Обнаружение угроз – обнаружение вредоносного трафика в сети\r\n\r\n\r\n<span style=\"font-weight: bold;\">AlienVault USM предоставляет:</span>\r\n\r\nуправление логами\r\nпродвинутую систему обнаружения угроз с более чем 2000 встроенных правил корреляции, устраняющие необходимость написания и разработки собственных правил\r\nбазу угроз (Threat Intelligence) от лаборатории AlienVault Labs, которая отвечает на критические вопросы об угрозах в сети, таких как “кто”, “что”, “зачем”, и “как”\r\n150 + отчетов на соответствие и выявленные угрозы для прохождения аудиторских проверок\r\nподдержку на соответствие требованиям PCI, HIPAA, GPG13, & SOX\r\n","shortDescription":"The AlienVault Unified Security Management (USM) platform provides five essential security capabilities in a single console, giving you everything you need to manage both compliance and threats. \r\n\r\nThe AlienVault Unified Security Management (USM) platform provides five essential security capabilities in a single console, giving you everything you need to manage both compliance and threats. Understanding the sensitive nature of IT environments, we include active, passive and host-based technologies so that you can match the requirements of your particular environment.\r\n\r\nAsset Discovery\r\nFind all assets on your network before a bad actor does\r\n\r\nActive Network Scanning\r\nPassive Network Monitoring\r\nAsset Inventory\r\nSoftware Inventory\r\nAsset Discovery\r\n\r\nVulnerability Assessment\r\nIdentify systems on your network that are vulnerable to exploits\r\n\r\nNetwork Vulnerability Testing\r\nContinuous Vulnerability Monitoring\r\nVulnerability Assessment\r\n\r\nIntrusion Detection\r\nDetect malicious traffic on your network\r\n\r\nNetwork IDS\r\nHost IDS\r\nFile Integrity Monitoring (FIM)\r\nThreat Detection\r\n\r\nBehavioral Monitoring\r\nIdentify suspicious behavior and potentially compromised systems\r\n\r\nNetflow Analysis\r\nService Availability Monitoring\r\nFull packet capture\r\nBehavioral Monitoring\r\n\r\nSIEM\r\nCorrelate and analyze security event data from across your network\r\n\r\nLog Management\r\nEvent Correlation\r\nIncident Response","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AlienVault Unified Security Management™","keywords":"сети, угроз, безопасности, AlienVault, действий, соответствие, правил, мониторинг","description":"Функции:\r\rединый мониторинг безопасности\rпростое управление безопасностью и отчетность\rнепрерывный мониторинг угроз\rбыстрое внедрение\rмногочисленные функции","og:title":"AlienVault Unified Security Management™","og:description":"Функции:\r\rединый мониторинг безопасности\rпростое управление безопасностью и отчетность\rнепрерывный мониторинг угроз\rбыстрое внедрение\rмногочисленные функции","og:image":"https://old.b4r.io/fileadmin/content/csm_AlienVault_Unified_Security_Management_TM__857060bc6c.png"},"eventUrl":"","translationId":332,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"},{"id":79,"title":"VM - Vulnerability management","alias":"vm-vulnerability-management","description":"Система управления уязвимостями выполняет проактивное сканирование IT-инфраструктуры на наличие неверных конфигураций, слабых мест, вредоносных компонентов и предоставляет рекомендации по устранению существующих рисков.\r\n \r\nТакая система анализирует все компоненты инфраструктуры, включая сети, операционные системы, базы данных и web-приложения. По итогам проверки приложение осуществляет приоритезацию обнаруженных угроз и генерирует руководства, как снизить каждую из них. \r\n ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/VM.png"},{"id":377,"title":"IT Asset Management","alias":"it-asset-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/it-asset-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"allot-communications-secure-service-gateway":{"id":1277,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Allot_Communications.png","logo":true,"scheme":false,"title":"Allot Communications Secure Service Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"allot-communications-secure-service-gateway","companyTitle":"Allot Communications","companyTypes":["supplier","vendor"],"companyId":4095,"companyAlias":"allot-communications","description":"<span style=\"font-weight: bold;\">Protect network uptime and efficiency</span>\r\nAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of the world’s largest network operators. Flexible redundancy configurations plus passive bypass with automatic port failover maximize uptime and availability.\r\n\r\n<span style=\"font-weight: bold;\">Automate operations and lower TCO</span>\r\nAllot Secure Service Gateway integrates multiple functions in an Intel-based platform that protects your investment and lets you scale from 2 to 22 ports of 1GE/10GE network connectivity in a single appliance.\r\n\r\n<span style=\"font-weight: bold;\">Get the visibility you need to control application performance</span>\r\nAllot provides live traffic monitoring and usage reporting according to traffic policies that are mapped to your complex data center and cloud applications, giving you full visibility and control of application performance, web access, user quality of experience, shadow IT and web threats.\r\n\r\n<span style=\"font-weight: bold;\">Protect users from Internet threats and enforce acceptable use</span>\r\nAllot helps you embrace and maximize the business value of cloud (web) applications by detecting and blocking malware, phishing and other web threats before they harm application performance and user productivity. Allot Secure Service Gateway also detects and surgically filters DDoS and bot traffic before it affects your network.\r\n\r\n<span style=\"font-weight: bold;\">With Allot Secure Service Gateway you can:</span>\r\n<ul><li>See how well your mission-critical applications are performing and supporting user productivity</li><li>Control application performance and improve Quality of Experience according to business priorities</li><li>Keep malicious or unauthorized user/application traffic off your network</li><li>Neutralize threats and ensure ongoing performance of business applications</li><li>Enforce Acceptable Use Policy for shadow IT, BYOD, resource usage</li><li>Troubleshoot and resolve network issues in real time</li><li>Simplify and automate your operations</li><li>Reduce opex and TCO</li></ul>","shortDescription":"Allot Communications Secure Service Gateway is a Smart Way to Protect Users and Control Application Performance\r\nYour business relies on employees and customers being able to connect and work productively with mission-critical applications at all times and from any location. The performance and efficiency of your network can be easily compromised by the ever-increasing demand for LAN, WAN and Internet bandwidth driven by cloud, mobile and video applications. Moreover, the growing use of BYOD and shadow IT have opened complex attack vectors for web threats to infect user devices, get into your network, and harm business productivity and viability. Allot Secure Service Gateway combines the functionality of Allot Service Gateway with our powerful web security and DDoS protection systems, to offer a single, scalable solution that lowers the cost of supporting your evolving requirements for application and user visibility, performance, and security.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Allot Communications Secure Service Gateway","keywords":"Allot, your, performance, Service, Secure, application, Gateway, network","description":"Protect network uptime and efficiency\rAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of","og:title":"Allot Communications Secure Service Gateway","og:description":"Protect network uptime and efficiency\rAllot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of","og:image":"https://old.b4r.io/fileadmin/user_upload/Allot_Communications.png"},"eventUrl":"","translationId":1278,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"},{"id":325,"title":"Performance Management Software","alias":"performance-management-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/performance-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"amazon-pinpoint":{"id":1229,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png","logo":true,"scheme":false,"title":"Amazon Pinpoint","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":7,"alias":"amazon-pinpoint","companyTitle":"Amazon Web Services","companyTypes":["supplier","vendor"],"companyId":176,"companyAlias":"amazon-web-services","description":"Amazon Pinpoint makes it easy to engage your customers by tracking the ways in which they interact with your applications. You can then use this information to create segments based on customer attributes and behaviors, and to communicate with those customers using the channels they prefer, including email, SMS and mobile push. Once the customer conversation has begun, Amazon Pinpoint collects metrics that help you better understand the impact of your communications. You can use these insights to improve the effectiveness of your future campaigns. With Amazon Pinpoint, you pay only for what you use. There are no upfront contract negotiations, no fixed charges, and no minimum usage fees. Our competitive pricing model lets you start small and scale up as your needs increase. <span style=\"font-weight: bold; font-style: italic;\">Amazon Pinpoint Benefits</span> <span style=\"font-weight: bold;\">Powerful Segmentation</span> <span style=\"font-weight: bold;\">Powerful Application Analytics</span> Collect information about the users of your applications by integrating the AWS Mobile SDK into your application. Amazon Pinpoint will gather information about the ways in which your customers use your applications, as well as information about the devices they use, and any custom attributes that you define. <span style=\"font-weight: bold;\">Powerful Segmentation</span> <span style=\"font-weight: bold;\">Global Reach</span> Send messages to customers using the communication channels they prefer. You can send email to prospective customers, and send push notifications directly to users of your mobile applications. You can also send text messages to customers in over 200 countries around the world, from Afghanistan to Zimbabwe. <span style=\"font-weight: bold;\">Actionable Insights</span> <span style=\"font-weight: bold;\">Highly Reliable</span> Amazon Pinpoint runs on the highly reliable Amazon Web Services infrastructure. Multiple datacenters and redundant systems ensure the highest levels of availability. <span style=\"font-weight: bold;\">Multi-Channel Execution</span> <span style=\"font-weight: bold;\">Cost-Effective</span> Pay as you go, and pay only for what you use. There are no upfront fees, no fixed expenses, and no minimum charges. Target 1,000 customers, track 100 million app events, and send 1 million push notifications per month for free.","shortDescription":"Amazon Pinpoint - engage in meaningful conversations with your users using email, SMS, and mobile push","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":19,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon Pinpoint","keywords":"your, Amazon, customers, Pinpoint, they, applications, send, information","description":"Amazon Pinpoint makes it easy to engage your customers by tracking the ways in which they interact with your applications. You can then use this information to","og:title":"Amazon Pinpoint","og:description":"Amazon Pinpoint makes it easy to engage your customers by tracking the ways in which they interact with your applications. You can then use this information to","og:image":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png"},"eventUrl":"","translationId":1230,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"anti-fraud-diamantr":{"id":1460,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Omilia.png","logo":true,"scheme":false,"title":"Anti-Fraud - DiaManT®","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"anti-fraud-diamantr","companyTitle":"Omilia","companyTypes":["supplier","vendor"],"companyId":3998,"companyAlias":"omilia-conversational-intelligence","description":"<span style=\"font-weight: bold;\">Возможности предотвращения мошенничества</span>\r\nМеханизмы предотвращения мошенничества встроены в приложение для разговоров на естественном языке, что означает, что DiaManT® может опросить вызывающего абонента дополнительные вопросы безопасности, в дополнение к биометрической оценке голоса, а также проанализировать различные характеристики вызова / сеанса.\r\n<ul><li>Вызов анализа аудио и телефонии</li><li>Перекрестные проверки геолокации</li><li>Анализ и анализ МО</li><li>Анализ типа устройства</li><li>Профилирование и подсчет кредитных карт</li><li>Поддержка белого и черного списка звонков </li></ul>\r\n\r\nОбъединение DiaManT® Anti-Fraud с использованием технологии deepVB®\r\n<span style=\"font-weight: bold;\">DiaManT® Anti-Fraud и deepVB® дополняют друг друга:</span>\r\ndeepVB® предназначен для проверки подлинности и обнаружения мошенников с преимуществами лучшего клиентского опыта, повышения производительности и снижения стоимости работы агента и снижения риска мошенничества.\r\nDiaManT® Anti-Fraud предназначен для обнаружения мошенничества для снижения риска мошенничества.","shortDescription":"Механизмы борьбы с мошенничеством DiaManT® обеспечивают возможности для активного сквозного предотвращения мошенничества на 360° замкнутого цикла Anti-Fraud и самообслуживания.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Anti-Fraud - DiaManT®","keywords":"DiaManT®, мошенничества, Anti-Fraud, снижения, deepVB®, обнаружения, предназначен, проверки","description":"Возможности предотвращения мошенничества\rМеханизмы предотвращения мошенничества встроены в приложение для разговоров на естественном языке, что означает, что","og:title":"Anti-Fraud - DiaManT®","og:description":"Возможности предотвращения мошенничества\rМеханизмы предотвращения мошенничества встроены в приложение для разговоров на естественном языке, что означает, что","og:image":"https://old.b4r.io/fileadmin/user_upload/Omilia.png"},"eventUrl":"","translationId":2684,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":750,"title":"Biometric Identification","alias":"biometric-identification","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/biometric-identification.png"},{"id":752,"title":"Voice Recognition","alias":"voice-recognition","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/speech-recognition.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"appspider":{"id":1673,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Rapid7_Appspider.png","logo":true,"scheme":false,"title":"AppSpider","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"appspider","companyTitle":"Rapid7","companyTypes":["vendor"],"companyId":210,"companyAlias":"rapid7","description":"While today’s malicious attackers pursue a variety of goals, they share a preferred channel of attack—the millions of custom web, mobile, and cloud applications companies deploy to serve their customers. AppSpider dynamically assesses these applications for vulnerabilities across all modern technologies, provides tools that speed remediation and monitors applications for changes. Keep your applications safe and secure—now and moving forward. KNOW YOUR WEAK POINTS AppSpider automatically finds vulnerabilities across a wide range of applications— from the relatively simple to the most complex—and it includes unique capabilities and integrations that enable teams to automate more of the security testing program across the entire software development lifecycle (SDLC), from creation through production. Coverage is the first step to scanner accuracy. Scanners were originally built with a crawl and attack architecture, but crawling doesn’t work for web services and other dynamic technologies. AppSpider can still crawl traditional name=value pair formats like HTML, but it also has a Universal Translator that can interpret the new technologies being used in today’s web and mobile applications (AJAX, GWT, REST, JSON, etc.). With AppSpider, you can: • Close the coverage gap with our Universal Translator • Intelligently simulate real-world attacks • Continuously monitor your applications • Stay authenticated for deep assessment AppSpider includes interactive actionable reports that prioritize the highest risk and streamline remediation efforts by enabling users to quickly get to and analyze the data that matters most. With one click, you can drill deep into a vulnerability to get more information and replay attacks in real-time. Sifting through pages and pages of vulnerabilities in a PDF report takes too much time. AppSpider provides interactive, actionable reports that behave like web pages with an intuitive organization and links for deeper analysis. The analysis doesn’t have to be tedious: Findings are organized and consolidated by attack types (XSS, SQLi, etc.), and with one click, you can drill deep into a vulnerability to get more information. AppSpider’s sophisticated reports reduce remediation time and streamline communication with developers. With AppSpider, you can: • Conduct deeper analysis with interactive reports • Quickly replay web attacks • Categorize applications for easy reporting In order to improve your overall security posture, you need a high-level view of your application security program that enables you to see where things stand. AppSpider enables centralized control, automation, and interoperability over all aspects of your enterprise web application security program, including continuous scanning configuration, user permissions, scheduling, and monitoring. In addition, AppSpider includes trends and analyze data to help collaborate with all stakeholders toward improved security posture. Time is critical when remediating vulnerabilities. Using innovative automated rule generation, AppSpider’s defensive capabilities help security professionals patch web application vulnerabilities almost immediately—in a matter of minutes, instead of days or weeks. Without the need to build a custom rule for a web application firewall (WAF) or intrusion prevention system (IPS), or the need to deliver a source code patch, our software allows you the time to identify the root cause of the problem and fix it in the code. With AppSpider, you can: • Manage and control application security programs • Automate targeted virtual patching • Meet compliance requirements • Integrate into your DevSecOps workflow","shortDescription":"AppSpider automatically finds vulnerabilities across a wide range of applications— from the relatively simple to the most complex—and it includes unique capabilities and integrations","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AppSpider","keywords":"AppSpider, applications, security, with, that, your, vulnerabilities, application","description":"While today’s malicious attackers pursue a variety of goals, they share a preferred channel of attack—the millions of custom web, mobile, and cloud","og:title":"AppSpider","og:description":"While today’s malicious attackers pursue a variety of goals, they share a preferred channel of attack—the millions of custom web, mobile, and cloud","og:image":"https://old.b4r.io/fileadmin/user_upload/Rapid7_Appspider.png"},"eventUrl":"","translationId":1674,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":32,"title":"Web Application Vulnerability Scanner"}],"testingArea":"","categories":[{"id":793,"title":"Web Application Vulnerability Scanner","alias":"web-application-vulnerability-scanner","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-application-vulnerability-scanner.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"aruba-360-secure-fabric":{"id":1048,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Aruba_360_Secure_Fabric.jpg","logo":true,"scheme":false,"title":"Aruba 360 Secure Fabric","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"aruba-360-secure-fabric","companyTitle":"Aruba, a Hewlett Packard Enterprise Company","companyTypes":["vendor"],"companyId":3914,"companyAlias":"aruba-a-hewlett-packard-enterprise-company","description":"<span style=\"font-weight: bold;\">There are 3 elements to this fabric:</span>\r\n• Aruba Security Software: Proactive network access control and policy management, and industry-leading UEBA for any network\r\n• Aruba Secure Core: Analytics-ready network infrastructure with embedded security\r\n• A best-in-class security ecosystem\r\nAruba IntroSpect’s User and Entity Behavior Analytics (UEBA) detects attacks by spotting small changes in behavior that often are indicative of exploits that have evaded traditional security monitoring and analytics. Today’s attacks can be comprised of many smaller actions that occur over long periods of time. These types of attacks are also notoriously difficult to detect because they can involve compromised users and hosts where cyber criminals have evaded perimeter defenses using legitimate credentials to access corporate resources. Phishing scams, social engineering and malware are just a few of the popular techniques by which these criminals acquire employee corporate credentials. IntroSpect uses machine-learned intelligence and automates the detection of these attacks by giving security and network operations early visibility. Supervised and unsupervised machine learning models process large amounts of data in order to establish a baseline of typical IT activity for a user, device or system. Deviations from these baselines are often the first indication that an attack is underway.\r\nBoth ClearPass and Introspect serve as Aruba’s security software solution and can be applied individually or in tandem to any network across campus, distributed enterprise, cloud, and IoT edge environments. While overlaying Aruba’s Secure Core, ClearPass and Introspect provide unmatched analytics-driven protection against today’s changing threat landscape.\r\nStarting with core security capabilities embedded in the foundation of all of Aruba’s Wi-Fi access points (APs), switches, routers, and controllers, Aruba builds on this foundation by integrating IntroSpect machine learning-based attack detection with access control systems like Aruba ClearPass in an open, multi-vendor platform. With the Aruba 360 Secure Fabric, security teams can now develop a seamless path from user and device discovery and access, to analytics-driven attack detection and response – based on policies set by the organization.\r\nIT disaggregation means organizations not only need a secure network foundation, but also visibility and control of the users and devices connected to the network. ClearPass allows the enterprise to cover the entire set of access control use cases from wired to wireless, guest, BYOD onboarding and policy-based remediation and attack response.","shortDescription":"Aruba is now changing the paradigm with the Aruba 360 Secure Fabric, an enterprise security framework that gives security and IT teams an integrated way to gain back visibility and control. It allows you to detect gestating attacks with machinelearned intelligence, and proactively respond to these advanced cyberattacks across any infrastructure – with the enterprise scale to protect millions of users and devices and secure vast amounts of distributed data.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Aruba 360 Secure Fabric","keywords":"security, network, access, Aruba, ClearPass, Secure, attacks, control","description":"There are 3 elements to this fabric:\r• Aruba Security Software: Proactive network access control and policy management, and industry-leading UEBA for any","og:title":"Aruba 360 Secure Fabric","og:description":"There are 3 elements to this fabric:\r• Aruba Security Software: Proactive network access control and policy management, and industry-leading UEBA for any","og:image":"https://old.b4r.io/fileadmin/user_upload/Aruba_360_Secure_Fabric.jpg"},"eventUrl":"","translationId":1049,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"attivo-networks-threatdefend-platformtm":{"id":1638,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Attivo_Networks.png","logo":true,"scheme":false,"title":"Attivo Networks ThreatDefend Platform™","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"attivo-networks-threatdefend-platformtm","companyTitle":"Attivo Networks","companyTypes":["supplier","vendor"],"companyId":4298,"companyAlias":"attivo-networks","description":"Threat Deception Technology to Detect Threats Early, Accurately & Efficiently The ThreatDefend Deception Platform is a modular solution comprised of Attivo BOTsink® engagement servers, decoys, and deceptions, the ThreatStrikeTM endpoint deception suite, ThreatPathTM for attack path visibility, ThreatOpsTM incident response orchestration playbooks, and the Attivo Central Manager (ACM), which together create a comprehensive early detection and active defense against cyber threats. <span style=\"font-weight: bold;\">WHY CUSTOMERS CHOOSE THREAT DECEPTION</span>\r\n<ul>\r\n<li>EARLY WARNING SYSTEM</li>\r\n<li>ACTIONABLE ALERTS</li>\r\n<li>EASY TO DEPLOY</li>\r\n<li>LOW MAINTENANCE</li>\r\n<li>STRENGTHENS DEFENSES</li>\r\n</ul>\r\nDETECT KNOW & UNKNOWN ATTACKS Not reliant on signatures or pattern matching, the Attivo ThreatDefend solution accurately detects in-network reconnaissance, credential theft, Man-in-the-Middle attacks, and lateral movement of threats that other security controls miss. EARLY & ACCURATE DETECTION Threat deception provides early detection of external, insider, and 3rd party attacks. Achieve real-time threat detection of reconnaissance and credential theft activities as attackers are deceived into engaging with decoys, deception lures, and bait designed to entice hackers into revealing themselves. NO ALERT FATIGUE FROM FALSE POSITIVES High-fidelity alerts are raised based upon attacker decoy engagement or deception credential reuse. Each alert is substantiated with rich threat intelligence and is actionable, removing false positive and noisy alerts that distract from the prompt incident response of real threats. NOT RESOURCE INTENSIVE Easy to deploy and operate, the Attivo solution is design to be low maintenance. Deployment is in hours and doesn’t require highly skilled employees or in-depth resources for ongoing operations. Machine learning, automated analysis, and incident response empower quick remediation. CAMOUFLAGE Realistic deception is key to deceiving attackers into engaging. Dynamic deception provides authenticity and deception campaigns for self-learning deployment and refresh. <span style=\"font-weight: bold;\">Authenticity</span>\r\n<ul>\r\n<li>Customized using real OS and services to production assets</li>\r\n<li>Credential validation with Active Directory</li>\r\n<li>High-interaction engagement</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Machine-Learning</span>\r\n<ul>\r\n<li>Self-learning of the environment generates deception campaigns</li>\r\n<li>Campaigns can be deployed on demand for environment refresh</li>\r\n<li>Allows automated refresh to spin up deception or avoid fingerprinting</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Easy Operations</span>\r\n<ul>\r\n<li>Simplify deployment with automated campaign proposals</li>\r\n<li>Easy operations with automated refresh</li>\r\n<li>Choice of on demand or automated campaign deployment</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">FEATURES</span> ThreatDefend is a comprehensive, scalable detection platform designed for the early detection of external threat actors and insiders (employees, suppliers, contractors) and for accelerating incident response. IN-NETWORK THREAT DETECTION Early endpoint, network, application, and data post-compromise threat detection. ATTACK SURFACE SCALABILITY Deception for evolving attack surface: data centers, cloud, user networks, remote office, specialty networks. EASY DEPLOYMENT & OPERATIONS Flexible deployment options and machine-learning for ongoing campaign authenticity and refresh. SUBSTANTIATED ALERTS & FORENSICS Actionable alerts from attacker engagement or credential reuse. Full forensics for actionable response. ATTACK ANALYSIS Automated attack analysis and correlation improves time-to-remediation. THREAT INTELLIGENCE High interaction attacker engagement and DecoyDocs produce threat, adversary, and counterintelligence. ACCELERATED INCIDENT RESPONSE Extensive 3rd party automations accelerate incident response to block, isolate, and threat hunt. ATTACK PATH VULNERABILITY ASSESSMENT Understand attack path vulnerabilities based on exposed credentials and misconfigurations. VISIBILITY & ATTACK MAPS Topographical maps for network visualization and time-lapsed attack replay.","shortDescription":"ThreatDefend Platform™ is Deception Technology for early post-compromise threat detection and accelerated incident response.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Attivo Networks ThreatDefend Platform™","keywords":"deception, threat, response, detection, engagement, Attivo, attack, refresh","description":"Threat Deception Technology to Detect Threats Early, Accurately & Efficiently The ThreatDefend Deception Platform is a modular solution comprised of Attivo","og:title":"Attivo Networks ThreatDefend Platform™","og:description":"Threat Deception Technology to Detect Threats Early, Accurately & Efficiently The ThreatDefend Deception Platform is a modular solution comprised of Attivo","og:image":"https://old.b4r.io/fileadmin/user_upload/Attivo_Networks.png"},"eventUrl":"","translationId":1639,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":28,"title":"Deception Techniques and Honeypots"}],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"avanpost-idm":{"id":1105,"logoURL":"https://old.b4r.io/fileadmin/user_upload/avanpost.jpg","logo":true,"scheme":false,"title":"Avanpost IDM","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"avanpost-idm","companyTitle":"Avanpost","companyTypes":["supplier","vendor"],"companyId":4014,"companyAlias":"avanpost","description":"<span style=\"font-weight: bold;\">Управление жизненным циклом учетных записей</span>\r\n\r\nУправление учетными записями пользователей информационных систем - это рутинная каждодневная работа ИТ-администраторов, которые вынуждены тратить много времени на такие операции, как их создание, изменение свойств, блокировку и разблокировку. При этом от корректного управления напрямую зависит защищенность информационных систем и обрабатываемой в них информации. В частности, так называемые «мертвые души», являющиеся серьезным риском несанкционированного доступа к системам - это результат отсутствия своевременной блокировки учетной записи при увольнении сотрудника. Поэтому автоматизация и контроль данных процессов - одна из важнейших задач управления доступом к информационным ресурсам.\r\n\r\n<ul><li>Создание, блокировка, разблокировка и удаление учетных записей на основании кадровых событий и заявок</li><li>Быстрая синхронизация изменений свойств из источников данных в учетные записи пользователей</li><li>Гибкая настройка автоматической обработки разных кадровых событий для разных групп работников</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Кадровые политики</span>\r\n\r\nПроцессы предоставления, изменения и отзыва доступа могут отличаться в зависимости от уровня организационной иерархии, времени работы в организации, географического местоположения филиала или подразделения и т.д. Для того, чтобы обеспечить особенности данных процессов в организации, Avanpost IDM позволяет настраивать кадровые политики в зависимости от различных условий и признаков, которые могут быть определены на основании персональной информации пользователя. Например, при увольнении рядового сотрудника, его учетная запись блокируется автоматически с отзывом всех полномочий в день увольнения. Но при увольнении топ-менеджера отзыв прав доступа происходит через согласование руководителя организации с целью возможности продления соответствующих полномочий на некоторое время после увольнения для передачи дел другому сотруднику.\r\n\r\n<span style=\"font-weight: bold;\">Множество источников, объединение данных</span>\r\n\r\nОдной из ключевых возможностей Avanpost IDM является одновременное взаимодействие с несколькими доверенными источниками информации по пользователям и управление ей на основании настраиваемых правил и политик. При этом источники информации могут быть как независимыми с точки зрения данных пользователя, так и пересекающимися, т.е. с дублируемой информацией. В этом случае в службе синхронизации с кадровыми источниками Avanpost IDM настраивается их приоритезация на уровне данных (какие типы данных и в каком источнике являются более достоверными для их загрузки и обновления в Avanpost IDM).\r\n\r\n<span style=\"font-weight: bold;\">Управление доступом</span>\r\n\r\nУправление доступом к информационным ресурсам современной организации является сложным многообразием различных процессов, таких как управление ролевой моделью, предоставление доступа при приеме на работу и отзыв при увольнении, согласование заявок на доступ и их исполнение, аудит прав доступа и расследование инцидентов. От эффективности данных процессов зависит не только защищенность корпоративной информации, но и производительность работы сотрудников, а в ряде случае и контрагентов. Чтобы обеспечить компромисс между безопасностью и эффективностью бизнес-процессов необходимо организовать единый центр управления данными процессами с максимальным сокращением числа ручных операций и минимизации человеческого фактора при принятии решений.\r\n\r\n<ul><li>Ролевая модель позволяет определить учетные записи и права доступа, предоставляемые по умолчанию или по запросу для разных групп пользователей, определяемых на основании организационно- штатной структуры</li><li>При изменении признаков пользователей (изменение подразделения, должности) доступы пользователя могут изменяться как автоматически, так и с подтверждением через заявку</li><li>Правила разграничения полномочий (SOD) позволяют контролировать совмещение критичных функций пользователем</li><li>Управление интегрированными системами</li></ul>\r\n<span style=\"font-weight: bold;\">Role Manager</span>\r\n\r\nAvanpost Role Manager – уникальный инструмент входящий в состав Avanpost IDM, предназначенный для автоматизации создания ролевой модели на предприятии любого масштаба. Если ранее «ручное» создание ролевой модели занимало несколько месяцев, то автоматизированный механизм аналитического построения ролей делает это за несколько часов.\r\nAvanpost Role Manager сравнивает существующие наборы прав пользователей по принципу похожести и нахождения сотрудников на одинаковых должностях, даже если они будут отличаться в названии. По результатам сравнения он предлагает предварительную ролевую модель с возможностью ручного редактирования до необходимого результата. Полученный финальный вариант можно автоматически загрузить в Avanpost IDM и запустить систему в промышленную эксплуатацию.\r\n\r\n<span style=\"font-weight: bold;\">История ролей</span>\r\n\r\nAvanpost IDM хранит максимальное количество исторических данных по изменению доступа к информационным ресурсам. Такая информация имеет огромное значения для проведения ретроспективного анализа при расследовании возможных инцидентов информационной безопасности. В Avanpost IDM хранится вся информации по изменению перечня ролей в контексте конкретного пользователя, включая их назначение и отзыв с указанием даты, времени и источника соответствующей задачи (ручное изменение, кадровое событие или заявка). Данная информация доступна для просмотра как через консоль администратора, так и в виде настраиваемых отчетов.\r\n\r\n<span style=\"font-weight: bold;\">Централизованный аудит и контроль соответствия</span>\r\n\r\nЧтобы обеспечить эффективную работу процессов по управлению доступом, недостаточно просто автоматизировать операции по согласованию и предоставлению прав. Администраторы корпоративных систем всегда будут обладать достаточными полномочиями, позволяющими внести изменения в матрицу доступа в обход автоматизированных процессов. Поэтому для минимизации таких рисков обязательно должны присутствовать процессы аудита и контроля соответствия. При этом данные процессы также должны быть автоматизированы, потому что ручное сравнение реальных полномочий пользователей с разрешенными потребует огромных трудозатрат и не сможет обеспечить актуальность полученных результатов.\r\n\r\n\r\n<ul><li>Все изменения прав доступа хранятся в одном месте, что позволяет получить информацию как о текущем доступе пользователя, так и произвести ретроспективный анализ.</li><li>Постоянная сверка прав и атрибутов учетных записей позволяет выявить несанкционированные изменения, сделанные в обход IDM</li><li>При выявлении несоответствий доступна возможность автоматического исправления, отправки прямого уведомления администраторам или отправки события в SIEM</li></ul>\r\n</p>\r\n<span style=\"font-weight: bold;\">Работа с отчетами</span>\r\n\r\nAvanpost IDM имеет в своем составе графический конструктор для построения отчетных форм и генерации соответствующих отчетов. При этом хранение в Avanpost IDM полной информации как по текущим правам доступа, так и в ретроспективе, позволяет получить в виде отчетов все данные, касающиеся пользовательского доступа, в различных срезах. Для максимального удобства бизнес-пользователей модуль отчетности имеет web-интерфейс и позволяет создавать отчеты в различных форматах, в том числе rtf, pdf и xls, а также настраивать расписание их генерации и отправлять полученные результаты на email.\r\n\r\n<span style=\"font-weight: bold;\">Устранение конфликтов и журнал аудита</span>\r\n\r\nВ архитектуре Avanpost IDM предусмотрен модуль аудита, который в онлайн-режиме осуществляет сверку существующих учетных записей и прав доступа в целевых системах с теми данными, которые присутствуют в его базе данных. Если в результате сверки обнаружены расхождения, это показатель несанкционированного изменения перечня учетных записей или их полномочий и свойств в целевых систем в обход IDM. По результатам обнаружения таких расхождений генерируются соответствующие события безопасности, которые отображаются в журнале аудита в консоли администратора, при этом администратору безопасности отправляется уведомление на email. Интерфейс журнала аудита позволяет не только просмотреть обнаруженные несоответствия, а также исправить их непосредственно из данной консоли.\r\n<span style=\"font-weight: bold;\">Сервис самообслуживания пользователей</span>\r\n\r\nРабота пользователей с заявками на доступ, включая операции по их созданию, согласованию и исполнению, является регулярной и чаще всего касается среднего менеджмента. Ведь создание и согласование заявок, как правило, осуществляют руководители подразделений, являющиеся либо непосредственными начальниками получателей доступа, либо бизнес-владельцами систем и ролей. Поэтому обеспечение удобства их работы и максимальная оптимизация этих рутинных операций является важнейшей задачей в контексте пользовательских процессов по управлению доступом. Для реализации такого юзабилити-подхода бизнес-пользователям доступен сервис самообслуживания, реализованный в виде web-приложения, в котором они могут просмотреть всю информацию по личному доступу, инициировать запрос на новые полномочия, а также участвовать в процессах доступных им согласований.\r\n\r\n\r\n<ul><li>Пользователи могут создавать заявки на получение дополнительных доступов, изменение статусов учетных записей, корректировку атрибутов своей карточки.</li><li>Руководители имеют возможность просмотра доступа и создания заявок на своих подчиненных</li><li>Функционал изменения паролей позволяет пользователям управлять своими паролями через единый интерфейс во всех интегрированных системах</li><li>Развитый движок workflow позволяет настраивать самые сложные процессы согласования, реализовывать сквозные бизнес процессы со смежными системами</li></ul>\r\n</p>\r\n<span style=\"font-weight: bold;\">Редактор БП</span>\r\n\r\nЧтобы гибко и удобно настраивать процессы согласования доступа, в состав модулей Avanpost IDM входит редактор бизнес-процессов, реализованный в виде графического конструктора. Данный редактор имеет дружелюбный web-интерфейс и максимально учитывает особенности согласования доступа в различных организациях. Процесс в редакторе представляет собой схему, состоящую из набираемых из предустановленного списка различных условий и действий, настраиваемых и соединяемых между собой с помощью графического интерфейса. Гибкая настройка позволяет осуществлять как последовательные, так и параллельные согласования, с возможностью тайминга, эскалации, замещения или делегирования. При этом вычисление согласующих лиц осуществляется с помощью специальных функций, позволяющих учесть все уникальные условия и признаки, такие как географическое местоположение, вид ресурса или роли, уровень организационной иерархии и т.п. Процессы согласования могут настраиваться на различные типы заявок, например, как запрос новой роли, отзыв роли, блокировка и разблокировка учетной записи, изменение личных данных, ресертификация доступа при смене должности.\r\n\r\n<span style=\"font-weight: bold;\">Управление паролями</span>\r\n\r\nНа ряду с управлением учетными записями и полномочиями управление паролями является основным процессом, необходимым для противодействия несанкционированного доступа к корпоративным ресурсам. Парольные политики должны быть достаточными для того, чтобы минимизировать соответствующий риск. Но в то же время они не должны доставлять больших неудобств пользователю, т.е. фактически должен быть достигнут некий компромисс между удобством и безопасностью. В Avanpost IDM cоздание учетной записи пользователя сопровождается автоматической генерацией пароля согласно заданной политике, при этом пароль безопасно доставляется пользователю, например, с помощью корпоративной почты на его личный почтовый ящик или SMS.\r\n\r\n\r\n<ul><li>Интеграция с Active Directory позволяет синхронизировать доменный пароль пользователя во все системы.</li><li>Пользователь может задать общий пароль для всех систем одновременно, или управлять паролями для каждой учетной записи отдельно</li><li>Парольные политики позволяют определить сложность пароля, количество повторений и интервалы смены вне зависимости от наличия этих функций в управляемой системе</li><li>Пароль, сгенерированный при создании учетной записи может быть доставлен пользователю</li></ul>\r\n</p>\r\n<span style=\"font-weight: bold;\">Парольные политики</span>\r\n\r\nAvanpost IDM позволяет настроить парольные политики для каждого целевого ресурса в отдельности. Помимо классических признаков, таких как длина пароля и алфавит, можно настроить и более сложные, например, максимальное и минимальное время действия пароля, длина истории паролей и минимальное количество изменяемых символов. Многообразие настроек парольных политик обеспечивает в том числе соответствие требованиям Приказов № 17 и 21 ФСТЭК России. Обеспечение и контроль данных политик осуществляется при создании учетной записи, истечению срока действия пароля и его смене через консоль администратора или личный кабинет пользователя.\r\n","shortDescription":"Avanpost IDM - система управления учетными записями и правами доступа пользователей к корпоративным ресурсам организации\r\n\r\nВ 60 раз быстрее исполняются заявки\r\nЗа 5 минут создается новая учетная запись пользователя\r\nНа 40% меньше нагрузка на администраторов почтовой системы","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avanpost IDM","keywords":"доступа, Avanpost, данных, позволяет, пользователя, записи, этом, прав","description":"Управление жизненным циклом учетных записей\r\rУправление учетными записями пользователей информационных систем - это рутинная каждодневная работа","og:title":"Avanpost IDM","og:description":"Управление жизненным циклом учетных записей\r\rУправление учетными записями пользователей информационных систем - это рутинная каждодневная работа","og:image":"https://old.b4r.io/fileadmin/user_upload/avanpost.jpg"},"eventUrl":"","translationId":2650,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"avast-business-antivirus-pro-plus":{"id":1289,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Avast_Business_Antivirus_Pro_Plus.jpg","logo":true,"scheme":false,"title":"Avast Business Antivirus Pro Plus","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"avast-business-antivirus-pro-plus","companyTitle":"Avast","companyTypes":["supplier","vendor"],"companyId":4099,"companyAlias":"avast","description":"<span style=\"font-weight: bold;\">The ultimate security for your business</span>\r\nIntellectual property, customer data, your business strategy; you have everything to protect, and we have the all-in-one solution ready to protect it. Make the most of our award-winning antivirus enhanced with server, email, and VPN protection for complete security, even on the go.\r\n\r\n<span style=\"font-weight: bold;\">Your business can’t afford to stay defenseless</span>\r\nWith over 4,000 attacks a day, it’s only a matter of time until your business becomes a target. Fight back with the best — Avast Business Antivirus Pro Plus offers exceptional protection with a 100% malware detection rate.\r\n\r\n<span style=\"font-weight: bold;\">Light on resources, heavy on threats</span>\r\nThe best antivirus should work as hard as you do. Avast performs lightning-fast analyses of unknown files in the Cloud, for a lightweight solution that won’t slow down your employees or your business.\r\n\r\n<span style=\"font-weight: bold;\">Keep spies and snoops off your webcam</span>\r\nCan hackers really hijack your webcam? Yes — until now. Webcam Shield makes anything and anyone get your permission before they can use it so nobody takes a peek unless you say so. You can even disable your camera for good — and enable it again.\r\n\r\n<span style=\"font-weight: bold;\">Full identity protection with an easy-to-use VPN</span>\r\nSecure your employees’ ability to work safely on public Wi-Fi. Avast Business Antivirus Pro Plus comes with an easy-to-use VPN, so you can keep all your business communication — including employee and customer data, private.\r\n\r\n<span style=\"font-weight: bold;\">Don’t let weak points in your security become points of attack</span>\r\nComplete data protection takes more than keeping your PCs malware-free. Stop cybercriminals using vulnerabilities in out-of-date software to access your network, safely delete confidential documents so they can’t be recovered, and protect inboxes and sharepoints from infection.\r\n\r\n<span style=\"font-weight: bold;\">Everything you need to protect your business</span>\r\nAvast Business Antivirus Pro Plus combines powerful data, identity, and server protection with the award-winning features of Avast Business Antivirus. Take a look.\r\n\r\n<span style=\"font-weight: bold;\">Antivirus</span>\r\nActively scans files, URLs, and email attachments to protect your business from malware, spyware, ransomware and more.\r\n\r\n<span style=\"font-weight: bold;\">File Shield</span>\r\nAutomatically scans files that are opened on a PC to make sure they’re malware-free, without slowing users down or getting in their way.\r\n\r\n<span style=\"font-weight: bold;\">Web Shield</span>\r\nEnsures every website visited is trustworthy by checking the URL and website certificate, before any risky connections are made to your network.\r\n\r\n<span style=\"font-weight: bold;\">Email Shield</span>\r\nOpen every email and download every attachment confidently. We’ll check both incoming and outgoing emails to ensure they’re completely malware-free.\r\n\r\n<span style=\"font-weight: bold;\">Behavior Shield</span>\r\nDeeply-rooted malware can hide inside your running programs. Behavior Shield monitors them all for any suspicious activity to shut down attacks.\r\n\r\n<span style=\"font-weight: bold;\">CyberCapture</span>\r\nWhen an unrecognized file is downloaded onto one of your PCs, a copy will be sent to our experts at the Avast Threat Labs to identify if it's safe or not.\r\n\r\n<span style=\"font-weight: bold;\">Software Defender</span>\r\nDon’t waste time updating application after application. Let Software Defender update your software automatically.\r\n\r\n<span style=\"font-weight: bold;\">Passwords</span>\r\nDefend employees’ login details with a secure master password. Comes with a browser add-on for easy and secure auto-filling of online login forums.\r\n\r\n<span style=\"font-weight: bold;\">SecureLine VPN</span>\r\nMake every connection private no matter what network or WiFi your employees use to prevent their identities, or your data, from being seen and stolen online.\r\n\r\n<span style=\"font-weight: bold;\">Webcam Shield</span>\r\nStop webcam spying for good. Now apps have to ask you for permission to use your webcam, so you always know who’s watching.","shortDescription":"Avast Business Antivirus Pro Plus - everything your business needs in one package. Leave nothing to chance with powerful antivirus, data, and identity protection.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avast Business Antivirus Pro Plus","keywords":"your, business, with, Avast, Shield, Antivirus, protection, protect","description":"The ultimate security for your business\rIntellectual property, customer data, your business strategy; you have everything to protect, and we have the","og:title":"Avast Business Antivirus Pro Plus","og:description":"The ultimate security for your business\rIntellectual property, customer data, your business strategy; you have everything to protect, and we have the","og:image":"https://old.b4r.io/fileadmin/user_upload/Avast_Business_Antivirus_Pro_Plus.jpg"},"eventUrl":"","translationId":1290,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":5,"title":"EndPoint Security"}],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"avira-antivirus-pro-business-edition":{"id":1297,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Avira_GmbH___Co._KG.jpg","logo":true,"scheme":false,"title":"Avira Antivirus Pro - Business Edition","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"avira-antivirus-pro-business-edition","companyTitle":"Avira GmbH & Co. KG","companyTypes":["supplier","vendor"],"companyId":4103,"companyAlias":"avira-gmbh-co-kg","description":"<span style=\"font-weight: bold;\">Antivirus Protection</span>\r\n\r\n<span style=\"font-weight: bold;\">Real-Time Threat Prevention</span>\r\nSignature-based detection, heuristic analysis and cloud-based scanning offer you complete protection from malware.\r\n\r\n<span style=\"font-weight: bold;\">Enhanced Network Drive Protection</span>\r\nAntivirus Pro prevents malware from being stored or spread via your internal network or a shared cloud storage solution.\r\n\r\n<span style=\"font-weight: bold;\">Advanced Web Protection</span>\r\nPhishing scams, infected websites, drive-by downloads… Antivirus Pro ensures employees never land on harmful websites.\r\n\r\n<span style=\"font-weight: bold;\">Email Protection</span>\r\nAntivirus Pro scans locally installed email clients so that employees neither receive malware nor spread it to colleagues, customers or patients.\r\n\r\n<span style=\"font-weight: bold;\">Management Console</span>\r\n\r\n<span style=\"font-weight: bold;\">Centralized Management</span>\r\nAll Avira-secured devices can effortlessly be managed from an intuitive an online dashboard.\r\n<span style=\"font-weight: bold;\">Mobile Device Management</span>\r\nSmartphones equipped with an Avira mobile app can be tracked from the dashboard, while antitheft safeguards can be triggered remotely.\r\n<span style=\"font-weight: bold;\">System Information</span>\r\nThe dashboard offers you helpful information on PC components, hard drive partitions and available disk space of your corporate devices.\r\n\r\n<span style=\"font-weight: bold;\">Features</span>\r\n\r\n<span style=\"font-weight: bold;\">Antivirus Scanner</span>\r\nAward-winning protection from malware (viruses, Trojans, worms, etc.)\r\n<span style=\"font-weight: bold;\">Protection Cloud Technology</span>\r\nScans unknown files in real time for malware and exploits.\r\n<span style=\"font-weight: bold;\">Smart A.I.</span>\r\nUnique, deep-learning algorithms protect you from the latest threats.\r\n<span style=\"font-weight: bold;\">Anti-ransomware</span>\r\nIdentifies, blocks, and removes ransomware before it encrypts your files.\r\n<span style=\"font-weight: bold;\">Email Protection</span>\r\nProtects your unsecured, non-encrypted email traffic.\r\n<span style=\"font-weight: bold;\">Avira Intelligent Repair System</span>\r\nBest-in-class technology that repairs damage caused by malware to your files.\r\n<span style=\"font-weight: bold;\">Self-Defense</span>\r\nPrevents malware from altering or even disabling your antivirus protection.\r\n<span style=\"font-weight: bold;\">Device control</span>\r\nThwarts malware intrusions by scanning removable devices connected to your USB ports\r\n\r\n<span style=\"font-weight: bold;\">System Requirements</span>\r\nYou really don’t need much! Here are the essentials:\r\n<ul><li>A PC running Windows 7 or higher (with Service Pack 1 and the latest updates)</li><li>Or a Mac running OSX 10.11 (El Capitan) or higher.</li><li>2 GB of RAM, over 2 GB of hard disk space, and an internet connection</li><li>Android: Android 4.0.3 or later</li></ul>","shortDescription":"Avira Antivirus Pro - Business Edition\r\nSimple yet sophisticated security – ideal for small and midsize businesses.\r\n- Powerful plug and play protection\r\n- Resource-light with zero maintenance costs\r\n- Runs on both Windows and macOS\r\n- Manage your customers remotely using premium on premise and cloud management consoles.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avira Antivirus Pro - Business Edition","keywords":"malware, from, your, Antivirus, Protection, protection, System, devices","description":"Antivirus Protection\r\rReal-Time Threat Prevention\rSignature-based detection, heuristic analysis and cloud-based scanning offer you complete protection from","og:title":"Avira Antivirus Pro - Business Edition","og:description":"Antivirus Protection\r\rReal-Time Threat Prevention\rSignature-based detection, heuristic analysis and cloud-based scanning offer you complete protection from","og:image":"https://old.b4r.io/fileadmin/user_upload/Avira_GmbH___Co._KG.jpg"},"eventUrl":"","translationId":1298,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"aws-waf":{"id":1620,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png","logo":true,"scheme":false,"title":"AWS WAF","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":7,"alias":"aws-waf","companyTitle":"Amazon Web Services","companyTypes":["supplier","vendor"],"companyId":176,"companyAlias":"amazon-web-services","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения, привести к нарушению безопасности или задействовать чрезмерное количество ресурсов. С помощью настраиваемых правил безопасности AWS WAF позволяет определить, какой трафик для данного интернет-приложения является допустимым и какой необходимо блокировать. AWS WAF можно использовать для создания пользовательских правил, блокирующих распространенные схемы атак (внедрение SQL-кода, межсайтовый скриптинг и т. п.), а также индивидуальных правил для конкретных приложений. Новые правила можно развертывать в течение нескольких минут, что позволит быстро реагировать на изменения схемы трафика. Также AWS WAF предлагает полнофункциональный API, позволяющий автоматизировать процессы создания, развертывания и обслуживания правил безопасности.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Используя сервис AWS WAF, вы платите только за то, что реально используете. Тарифы сервиса AWS WAF зависят от количества развертываемых правил и количества запросов, получаемых веб-приложением. Сервис не требует авансовых обязательств.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Выполнить развертывание AWS WAF можно либо на Amazon CloudFront в виде компонента решения CDN, либо на Application Load Balancer (ALB), расположенном перед веб-серверами или серверами источника, работающими на EC2. </span>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Преимущества</span>\r\n<span style=\"font-weight: bold;\">Усиленная защита от Интернет-атак</span>\r\nAWS WAF защищает веб-приложения от атак за счет фильтрации трафика на основании созданных вами правил. Например, можно задать фильтрацию сетевых запросов по IP-адресам, заголовкам и телам HTTP-сообщений или строкам URI, что позволяет заблокировать такие распространенные схемы атак, как внедрение SQL-кода или межсайтовый скриптинг.\r\n<span style=\"font-weight: bold;\">Интегрированная защита в ходе разработки приложения</span>\r\nКаждую из функций AWS WAF можно настроить с помощью API сервиса AWS WAF или Консоли управления AWS. Это позволит вам задать правила, повышающие уровень безопасности отдельных приложений, уже на стадии разработки. Вы сможете внедрять средства сетевой безопасности на разных этапах процесса разработки: предоставить их разработчику, изначально пишущему код, специалисту DevOps, выполняющему развертывание приложения, и экспертам в области безопасности, выполняющим аудит.\r\n<span style=\"font-weight: bold;\">Простое развертывание и обслуживание</span>\r\nРазвертывание AWS WAF выполняется легко и помогает обеспечить защиту приложений, развернутых либо на Amazon CloudFront в виде компонента решения CDN, либо на Application Load Balancer (ALB), расположенном перед вашими серверами источника. Не требуется развертывать какое-либо дополнительное программное обеспечение, необходимо лишь включить AWS WAF на соответствующем ресурсе. Правила можно задать централизованно и использовать их повторно во всех веб-приложениях, которые нужно защитить. \r\n<span style=\"font-weight: bold;\">Улучшенная возможность отслеживания интернет-трафика</span>\r\nСервис AWS WAF можно настроить только для мониторинга запросов, соответствующих критериям фильтрации. AWS WAF позволяет отслеживать интернет-трафик в режиме, близком к реальному времени, благодаря чему можно оперативно создавать новые правила или предупреждения в Amazon CloudWatch. \r\n<span style=\"font-weight: bold;\">Экономичная защита веб-приложений</span>\r\nИспользуя сервис AWS WAF, вы платите только за то, что реально используете. Сервис AWS WAF содержит индивидуальные предложения, работающие по принципу самообслуживания; его тарифы зависят от количества развертываемых правил и количества веб-запросов, получаемых веб-приложением. Минимальные платежи и авансовые обязательства отсутствуют.","shortDescription":"AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AWS WAF","keywords":"можно, правил, безопасности, количества, либо, приложений, задать, только","description":"AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения,","og:title":"AWS WAF","og:description":"AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения,","og:image":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png"},"eventUrl":"","translationId":2748,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["78887-eng-1","78887-eng-2","788871","788872","a10-thunderrtps","acalvio-shadowplex","acunetix-vulnerability-scanner","airlock-web-application-firewall","akamai-kona-web-application-firewall","alienvault-unified-security-managementtm","allot-communications-secure-service-gateway","amazon-pinpoint","anti-fraud-diamantr","appspider","aruba-360-secure-fabric","attivo-networks-threatdefend-platformtm","avanpost-idm","avast-business-antivirus-pro-plus","avira-antivirus-pro-business-edition","aws-waf"]},"links":{"first":"http://b4r_be/api/products?page=1","last":"http://b4r_be/api/products?page=13","prev":null,"next":"http://b4r_be/api/products?page=2"},"meta":{"current_page":1,"from":1,"last_page":13,"path":"http://b4r_be/api/products","per_page":20,"to":20,"total":253},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"5":{"id":5,"title":"EndPoint Security"},"19":{"id":19,"title":"WAF - Web Application Firewall"},"28":{"id":28,"title":"Deception Techniques and Honeypots"},"32":{"id":32,"title":"Web Application Vulnerability Scanner"},"88":{"id":88,"title":"78887"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}