{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"en":"I use it","ru":"I use it","_type":"localeString"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"_type":"localeString","en":"Selling","ru":"Продают"},"using":{"_type":"localeString","en":"Using","ru":"Используют"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"от Я до А"},"sort-rating-asc":{"_type":"localeString","en":"Rating ascending","ru":"По возрастанию рейтинга"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"ru":"По убыванию скидки","_type":"localeString","en":"Rebate descending"},"i-use-it-popover":{"en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString"},"details":{"en":"Details","ru":"Детальнее","_type":"localeString"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"vendor-verified":{"en":"Vendor verified","ru":"Поставщик потверждён","_type":"localeString"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"_type":"localeString","en":"Learn more","ru":"Узнать больше"},"categories-popover":{"en":"categories","ru":"категории","_type":"localeString"},"sort-popular-asc":{"en":"Popular ascending","ru":"По возростанию популярности","_type":"localeString"},"sort-popular-desc":{"ru":"По убыванию популярности","_type":"localeString","en":"Popular descending"},"no-results":{"_type":"localeString","en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос."},"login":{"ru":"Войти","_type":"localeString","en":"Login","de":"Einloggen"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register","de":"Registrieren"},"auth-message":{"en":"You need to register or login.","de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString"},"add-to-comparison":{"en":"Add to comparison","ru":"Добавить в сравнение","_type":"localeString"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"items-found":{"ru":"Продуктов найдено","_type":"localeString","en":"Products found"},"sort-sales-desc":{"_type":"localeString","en":"By sale","ru":"По продаже"},"sort-purchases-desc":{"_type":"localeString","en":"By purchase","ru":"По покупке"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product producer"},"products-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"en":"from","ru":"от","_type":"localeString"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"_type":"localeString","en":"Add Product","ru":"Добавить продукт"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"_type":"localeString","en":"Filter","ru":"Фильтр"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"_type":"localeString","en":"Delivery type","ru":"Тип поставки"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"en":"Configurator","ru":"Конфигуратор","_type":"localeString"},"roi-calculator-checkbox":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"apply-filter-button":{"en":"Apply filter","ru":"Применить фильтр","_type":"localeString"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"_type":"localeString","en":"Show all","ru":"Показать все"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"_type":"localeString","en":"Bonus 4 Reference","ru":"Бонус за референс"},"product-categories":{"_type":"localeString","en":"Product Categories","ru":"Категории продуктов"},"countries":{"_type":"localeString","en":"Countries","ru":"Страны"},"seller":{"en":"Seller","ru":"Продавец","_type":"localeString"},"vendors":{"en":"User products vendors","ru":"Производители продуктов пользователя","_type":"localeString"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"info-source":{"_type":"localeString","en":"Info source","ru":"Информационный ресурс"},"with-reference-checkbox":{"en":"With reference","ru":"С референсами","_type":"localeString"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"_type":"localeString","en":"Try AI (Beta)","ru":"Попробовать AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"en":"Company size","ru":"Размер компании","_type":"localeString"},"add-company":{"en":"Add company","ru":"Добавить компанию","_type":"localeString"},"add-implementation":{"en":"Add deployment","ru":"Добавить внедрение","_type":"localeString"},"sort-title-asc":{"en":"From A to Z","ru":"От А до Я","_type":"localeString"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"От Я до А"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"en":"With comments","ru":"С комментариями","_type":"localeString"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"_type":"localeString","en":"Company type","ru":"Тип компании"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"en":"Product vendor","ru":"Производитель продукта","_type":"localeString"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"_type":"localeString","en":"Stopped","ru":"Остановлено"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"body":{"en":[{"style":"normal","_key":"8bebcfb34955","markDefs":[],"children":[{"_type":"span","marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550"}],"_type":"block"}],"ru":[{"_key":"28241882db7a","markDefs":[],"children":[{"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0","_type":"span","marks":[]}],"_type":"block","style":"normal"}],"_type":"localeBlock"},"label":"catalog-products-text-block"}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"title":{"ru":"ROI4CIO: Продукты","_type":"localeString","en":"ROI4CIO: Products"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"og:title","translations":{"_type":"localeString","en":"Products","ru":"Продукты"}},{"translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"Description"},"name":"description"},{"translations":{"en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString"},"name":"og:description"},{"name":"keywords","translations":{"ru":"каталог, программное обеспечение, софт, ит услуги","_type":"localeString","en":"keyword"}},{"name":"title","translations":{"en":"Products","ru":"Продукты","_type":"localeString"}}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"airlock-web-application-firewall":{"id":1622,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Airlock.png","logo":true,"scheme":false,"title":"Airlock Web Application Firewall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"airlock-web-application-firewall","companyTitle":"Ergon Informatik AG","companyTypes":["supplier","vendor"],"companyId":4288,"companyAlias":"ergon-informatik-ag","description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance, security for online banking or protection for eCommerce: Airlock WAF will upgrade security for your internet applications – a permanent solution with a host of well thought-out functionalities.\r\nThanks to Airlock WAF, businesses can exploit the potential of the internet without jeopardizing the security and availability of their web applications and services. Each access is systematically monitored and filtered at every level. Used in conjunction with an authentication solution such as Airlock Login or IAM, Airlock WAF can force upstream user authentication and authorization. This allows a uniform, central single sign-on infrastructure. All important information is also made available via monitoring and reporting functions. Airlock WAF is the only web application security solution on the market that provides superlative end-to-end protection for complex web environments.\r\n<span style=\"font-weight: bold;\">Airlock WAF - The main features</span>\r\n<ul><li>Secure Reverse Proxy</li><li>Central Checkpoint</li><li>Filtering</li><li>API Security</li><li>Dynamic Whitelisting</li><li>Central Security Hub</li><li>High Availability and Performance</li></ul>\r\n<span style=\"font-weight: bold;\">Airlock WAF is also available as a hardware appliance</span>\r\nWith the Airlock WAF hardware appliance, setup and going live will be even easier than today. Of course, hardware appliances can be connected to build a failover cluster with active session synchronization.","shortDescription":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications, whether your objective is PCI DSS compliance, security for online banking or protection ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Airlock Web Application Firewall","keywords":"Airlock, security, with, solution, applications, hardware, will, also","description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance,","og:title":"Airlock Web Application Firewall","og:description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance,","og:image":"https://old.b4r.io/fileadmin/user_upload/Airlock.png"},"eventUrl":"","translationId":1623,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"akamai-kona-web-application-firewall":{"id":1602,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Akamai_Technologies.png","logo":true,"scheme":false,"title":"Akamai Kona Web Application Firewall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"akamai-kona-web-application-firewall","companyTitle":"Akamai Technologies","companyTypes":["supplier","vendor"],"companyId":4283,"companyAlias":"akamai-technologies","description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application attacks. Globally-distributed across the Akamai Intelligent Platform™, Kona WAF can easily scale to defend against massive application attacks. Deployed at the edge of your network rather than in a data center, Kona WAF can identify and mitigate suspicious traffic without affecting performance or availability of the origin server. Security rules for Kona WAF are continuously refined by Akamai’s Threat Intelligence Team to protect against known attacks and respond to emerging threats. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">With Kona WAF you can: </span>\r\n<ul>\r\n<li>Reduce the risk of downtime, data theft and security breaches with a WAF that can scale to protect against the largest DoS and DDoS attacks.</li>\r\n<li>Ensure high performance even during attacks thanks to Akamai’s globally architecture.</li>\r\n<li>Defending against new and emerging threats with help from Akamai’s Threat Intelligence Team.</li>\r\n<li>Minimize costs of cloud security by avoiding the need for expensive dedicated hardware.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Key capabilities of Kona WAF</span>\r\n<ul>\r\n<li>Kona WAF provides comprehensive capabilities to protect against application-layer attacks. </li>\r\n<li>Adaptive rate controls automatically protect against application-layer DDoS and other volumetric attacks by monitoring and controlling the rate of requests against applications.</li>\r\n<li>Application-layer controls offer pre-defined, configurable WAF rules that govern Request Limit Violations, Protocol Violations, HTTP Policy Violations and more.</li>\r\n<li>Network-layer controls automatically deflect network-layer DDoS attacks at the network edge and define and enforce IP whitelists and blacklists to restrict requests from certain IP addresses or geographical regions.</li>\r\n<li>Security monitor provides real-time visibility into security events and enables administrators to drill down into attack alerts.</li>\r\n<li>Logging features enable you to integrate WAF and event logs with security information and event management to increase your threat posture awareness.</li>\r\n</ul>\r\n","shortDescription":"Kona Web Application Firewall from Akamai provides an highly scalable application firewall that defends against emerging threats to web security while keeping application performance high.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Akamai Kona Web Application Firewall","keywords":"attacks, against, Kona, with, security, Akamais, protect, controls","description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application","og:title":"Akamai Kona Web Application Firewall","og:description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application","og:image":"https://old.b4r.io/fileadmin/user_upload/Akamai_Technologies.png"},"eventUrl":"","translationId":1603,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"arbor-aps":{"id":195,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Arbor_APS.jpg","logo":true,"scheme":false,"title":"Arbor APS","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"arbor-aps","companyTitle":"Arbor Networks","companyTypes":["vendor"],"companyId":2744,"companyAlias":"arbor-networks","description":"• DDoS protection from active botnets\r\n• DDoS protection from active DDoS campaigns based on IP reputation\r\n• Advanced web crawler service\r\n• GeoIP tracking\r\n• Domain and IP reputation to block threats\r\nAPS enhances your overall protection by using Cloud Signaling™ to connect local protection with cloud-based DDoS services. With Cloud Signaling, APS automatically alerts upstream service providers, such as your ISP or Arbor CloudSM, when larger attacks threaten availability. This allows for a faster time to mitigate attacks. ","shortDescription":"Arbor Networks® APS helps protect business continuity and availability from the growing constellation of DDoS attacks and other advanced threats. It provides the world’s most advanced and sophisticated attack detection and mitigation technology in an easy-to-deploy platform designed to automatically neutralize IPv4 and IPv6 attacks before they impact critical applications and services.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Arbor APS","keywords":"protection, DDoS, Cloud, attacks, Arbor, reputation, service, from","description":"• DDoS protection from active botnets\r• DDoS protection from active DDoS campaigns based on IP reputation\r• Advanced web crawler service\r• GeoIP tracking\r•","og:title":"Arbor APS","og:description":"• DDoS protection from active botnets\r• DDoS protection from active DDoS campaigns based on IP reputation\r• Advanced web crawler service\r• GeoIP tracking\r•","og:image":"https://old.b4r.io/fileadmin/user_upload/Arbor_APS.jpg"},"eventUrl":"","translationId":196,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"aws-waf":{"id":1620,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png","logo":true,"scheme":false,"title":"AWS WAF","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":7,"alias":"aws-waf","companyTitle":"Amazon Web Services","companyTypes":["supplier","vendor"],"companyId":176,"companyAlias":"amazon-web-services","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения, привести к нарушению безопасности или задействовать чрезмерное количество ресурсов. С помощью настраиваемых правил безопасности AWS WAF позволяет определить, какой трафик для данного интернет-приложения является допустимым и какой необходимо блокировать. AWS WAF можно использовать для создания пользовательских правил, блокирующих распространенные схемы атак (внедрение SQL-кода, межсайтовый скриптинг и т. п.), а также индивидуальных правил для конкретных приложений. Новые правила можно развертывать в течение нескольких минут, что позволит быстро реагировать на изменения схемы трафика. Также AWS WAF предлагает полнофункциональный API, позволяющий автоматизировать процессы создания, развертывания и обслуживания правил безопасности.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Используя сервис AWS WAF, вы платите только за то, что реально используете. Тарифы сервиса AWS WAF зависят от количества развертываемых правил и количества запросов, получаемых веб-приложением. Сервис не требует авансовых обязательств.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Выполнить развертывание AWS WAF можно либо на Amazon CloudFront в виде компонента решения CDN, либо на Application Load Balancer (ALB), расположенном перед веб-серверами или серверами источника, работающими на EC2. </span>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Преимущества</span>\r\n<span style=\"font-weight: bold;\">Усиленная защита от Интернет-атак</span>\r\nAWS WAF защищает веб-приложения от атак за счет фильтрации трафика на основании созданных вами правил. Например, можно задать фильтрацию сетевых запросов по IP-адресам, заголовкам и телам HTTP-сообщений или строкам URI, что позволяет заблокировать такие распространенные схемы атак, как внедрение SQL-кода или межсайтовый скриптинг.\r\n<span style=\"font-weight: bold;\">Интегрированная защита в ходе разработки приложения</span>\r\nКаждую из функций AWS WAF можно настроить с помощью API сервиса AWS WAF или Консоли управления AWS. Это позволит вам задать правила, повышающие уровень безопасности отдельных приложений, уже на стадии разработки. Вы сможете внедрять средства сетевой безопасности на разных этапах процесса разработки: предоставить их разработчику, изначально пишущему код, специалисту DevOps, выполняющему развертывание приложения, и экспертам в области безопасности, выполняющим аудит.\r\n<span style=\"font-weight: bold;\">Простое развертывание и обслуживание</span>\r\nРазвертывание AWS WAF выполняется легко и помогает обеспечить защиту приложений, развернутых либо на Amazon CloudFront в виде компонента решения CDN, либо на Application Load Balancer (ALB), расположенном перед вашими серверами источника. Не требуется развертывать какое-либо дополнительное программное обеспечение, необходимо лишь включить AWS WAF на соответствующем ресурсе. Правила можно задать централизованно и использовать их повторно во всех веб-приложениях, которые нужно защитить. \r\n<span style=\"font-weight: bold;\">Улучшенная возможность отслеживания интернет-трафика</span>\r\nСервис AWS WAF можно настроить только для мониторинга запросов, соответствующих критериям фильтрации. AWS WAF позволяет отслеживать интернет-трафик в режиме, близком к реальному времени, благодаря чему можно оперативно создавать новые правила или предупреждения в Amazon CloudWatch. \r\n<span style=\"font-weight: bold;\">Экономичная защита веб-приложений</span>\r\nИспользуя сервис AWS WAF, вы платите только за то, что реально используете. Сервис AWS WAF содержит индивидуальные предложения, работающие по принципу самообслуживания; его тарифы зависят от количества развертываемых правил и количества веб-запросов, получаемых веб-приложением. Минимальные платежи и авансовые обязательства отсутствуют.","shortDescription":"AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AWS WAF","keywords":"можно, правил, безопасности, количества, либо, приложений, задать, только","description":"AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения,","og:title":"AWS WAF","og:description":"AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения,","og:image":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png"},"eventUrl":"","translationId":2749,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"aws-waf-web-application-firewall":{"id":1621,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png","logo":true,"scheme":false,"title":"AWS WAF - Web Application Firewall","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":7,"alias":"aws-waf-web-application-firewall","companyTitle":"Amazon Web Services","companyTypes":["supplier","vendor"],"companyId":176,"companyAlias":"amazon-web-services","description":"AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules. You can use AWS WAF to create custom rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that are designed for your specific application. New rules can be deployed within minutes, letting you respond quickly to changing traffic patterns. Also, AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of web security rules.\r\nWith AWS WAF you pay only for what you use. AWS WAF pricing is based on how many rules you deploy and how many web requests your web application receives. There are no upfront commitments.\r\nYou can deploy AWS WAF on either Amazon CloudFront as part of your CDN solution or the Application Load Balancer (ALB) that fronts your web servers or origin servers running on EC2. \r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Benefits</span>\r\n<span style=\"font-weight: bold;\">Increased Protection Against Web Attacks</span>\r\nAWS WAF protects web applications from attacks by filtering traffic based on rules that you create. For example, you can filter web requests based on IP addresses, HTTP headers, HTTP body, or URI strings, which allows you to block common attack patterns, such as SQL injection or cross-site scripting.\r\n<span style=\"font-weight: bold;\">Security Integrated with How You Develop Applications</span>\r\nEvery feature in AWS WAF can be configured using either the AWS WAF API or the AWS Management Console. This allows you to define application-specific rules that increase web security as you develop your application. This lets you put web security at multiple points in the development chain, from the hands of the developer initially writing code, to the DevOps engineer deploying software, to the security experts conducting an audit.\r\n<span style=\"font-weight: bold;\">Ease of Deployment & Maintenance</span>\r\nAWS WAF is easy to deploy and protect application(s) deployed on either Amazon CloudFront as part of your CDN solution or the Application Load Balancer that fronts all your origin servers. There is no additional software to deploy except to enable AWS WAF on the right resource. You can centrally define your rules, and reuse them across all the web applications that you need to protect. \r\n<span style=\"font-weight: bold;\">Improved Web Traffic Visibility</span>\r\nYou can set up AWS WAF to just monitor requests that match your filter criteria. AWS WAF gives near real-time visibility into your web traffic, which you can use to create new rules or alerts in Amazon CloudWatch. \r\n<span style=\"font-weight: bold;\">Cost Effective Web Application Protection</span>\r\nWith AWS WAF you pay only for what you use. AWS WAF provides a customizable, self-service offering, and pricing is based on how many rules you deploy and how many web requests your web application receives. There are no minimum fees and no upfront commitments.","shortDescription":"AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AWS WAF - Web Application Firewall","keywords":"your, rules, that, application, security, deploy, requests, based","description":"AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules. You can use AWS WAF to","og:title":"AWS WAF - Web Application Firewall","og:description":"AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules. You can use AWS WAF to","og:image":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png"},"eventUrl":"","translationId":1621,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"axis-f":{"id":205,"logoURL":"https://old.b4r.io/fileadmin/user_upload/AXIS_F.png","logo":true,"scheme":false,"title":"AXIS F","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"axis-f","companyTitle":"Axis","companyTypes":["vendor"],"companyId":2751,"companyAlias":"axis","description":"AXIS F Series - Flexible cameras that let you see more\r\n\r\nFlexible, rugged, discreet design\r\n1-channel and 4-channel main units\r\nChoice of indoor, outdoor, standard, varifocal, pinhole, fisheye and dome sensor units\r\nWide Dynamic Range and Axis’ Zipstream technology\r\nTwo-way audio, input/output ports\r\nLocal storage, PoE, 8-28 V DC\r\nAXIS F Series\r\n\r\nDiscreet cameras for wide application\r\nAXIS F Series offers flexible, high-performance HDTV cameras for extremely discreet indoor, outdoor and in-vehicle surveillance applications. They are ideal for ATMs (automated teller machines), banks, stores, hotels, as well as rugged environments such as emergency vehicles, buses, trams and trucks.\r\n\r\nDivided concept\r\nAXIS F Series is based on a divided network camera concept, where the camera is split into a sensor unit—made up of a lens and image sensor with a cable—and a main unit, which is the body of a camera. The divided concept enables flexibility in the choice of hardware, as well as in the installation. The small sensor unit can be installed discreetly in tight places, while the long cable from the sensor unit to the main unit provides the flexibility to place the main unit where there is space. The main or sensor unit can be easily relocated or changed after the initial installation, giving users additional flexibility. \r\n\r\nWide selection\r\nAXIS F Series comprises one-channel AXIS F41 Main Unit, four-channel AXIS F34 and AXIS F44 Main Units, and AXIS F Sensor Units with different lens types, form factors and price points. The series also includes AXIS F34 Surveillance System, a complete hardware and software solution aimed at small stores and offices.\r\n\r\nWith the exception of AXIS F34 Surveillance System, AXIS F main units and sensor units are sold separately to give customers the ability to put together the hardware features that best suit the application.\r\nBuild your own camera system\r\nClick on the numbers at right to read more about the different components.\r\n\r\nMain unit\r\nThe main unit houses the processor, network, power and other connections. It determines, among other things, the video streaming performance, the image settings available (such as wide dynamic range), and analytics.\r\nOne-channel and four-channel main units are available. When there are up to four closely situated surveillance areas to be covered, the four-channel main units are cost-effective solutions as they can stream videos from four sensor units simultaneously.","shortDescription":"AXIS F Series offers flexible, high-performance HDTV cameras for extremely discreet indoor, outdoor and in-vehicle surveillance applications.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AXIS F","keywords":"AXIS, main, unit, sensor, units, Series, camera, concept","description":"AXIS F Series - Flexible cameras that let you see more\r\rFlexible, rugged, discreet design\r1-channel and 4-channel main units\rChoice of indoor, outdoor,","og:title":"AXIS F","og:description":"AXIS F Series - Flexible cameras that let you see more\r\rFlexible, rugged, discreet design\r1-channel and 4-channel main units\rChoice of indoor, outdoor,","og:image":"https://old.b4r.io/fileadmin/user_upload/AXIS_F.png"},"eventUrl":"","translationId":206,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":48,"title":"CCTV - Closed-circuit television","alias":"cctv-closed-circuit-television","description":"Видеонаблюдение (англ. Сlosed Circuit Television, CCTV — система телевидения замкнутого контура) — процесс, осуществляемый с применением оптико-электронных устройств, предназначенных для визуального контроля или автоматического анализа изображений (автоматическое распознавание лиц, государственных номеров).\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%92%D0%B8%D0%B4%D0%B5%D0%BE%D0%BD%D0%B0%D0%B1%D0%BB%D1%8E%D0%B4%D0%B5%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/video_control.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-cloudgen-firewall":{"id":1909,"logoURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda CloudGen Firewall","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-cloudgen-firewall","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, and helps organizations transform their business.\r\n<span style=\"font-weight: bold;\">From the Next Generation Firewall to a Cloud Generation Solution</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications.\r\nBarracuda CloudGen Firewall is a family of physical appliance, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control.\r\nIn addition, Barracuda CloudGen Firewalls combine highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network.\r\nBarracuda's cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<ul><li>Protection Against Advanced Threats and Zero-Hour Attacks.</li><li>Secure SD-WAN: Reduce Costs and Ensure Application Availability.</li><li>Remote VPN Access for Off-Network Users – Anytime, Anywhere.</li><li>Secure Migration to the Public Cloud and Hybrid Environments.</li><li>Secure Connectivity for IoT Devices and Industrial Control Systems.</li></ul>\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN</span>\r\nBarracuda CloudGen Firewalls include full next-generation Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n<ul><li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li><li>VPN across multiple broadband connections and MPLS replacement</li><li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li><li>Replacing network backhauling central policy enforcement architectures with direct internet breakouts</li><li>Faster access to cloud applications like Office 365 by dynamically prioritizing them over non-critical traffic</li><li>Guaranteed user access to critical applications through granular policy controls</li><li>Increased available bandwidth with built-in traffic compression and data deduplication</li><li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li></ul>\r\n<span style=\"font-weight: bold;\">Cut MPLS Costs with Bandwidth Optimization</span>\r\nIf you have branch offices and remote locations that need to run SaaS applications or connect to your network, Barracuda can dramatically reduce your WAN costs. The traditional approach of backhauling traffic to a main office via costly MPLS leased lines can’t deliver on price and performance in the cloud era.\r\nBarracuda lets you establish direct internet breakouts for optimized cloud accessibility. Our SD-WAN maintains a fully meshed VPN using less expensive broadband connections. Use the Savings Calculator to see how much your organization to save.\r\n<span style=\"font-weight: bold;\">Why Barracuda CloudGen Firewall?</span>\r\nWhen selecting security technology, it is critical that your products are supported by people who take network security as seriously as you do. Barracuda CloudGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data.","shortDescription":"Barracuda CloudGen Firewall - Go Beyond Next-Generation Firewalls to Protect Your Network in the Cloud and On-Premises","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda CloudGen Firewall","keywords":"network, Barracuda, your, with, applications, Firewall, cloud, CloudGen","description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that","og:title":"Barracuda CloudGen Firewall","og:description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that","og:image":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1910,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-email-security-gateway":{"id":115,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_Email_Security_Gateway.png","logo":true,"scheme":false,"title":"Barracuda Email Security Gateway","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-email-security-gateway","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<strong>Provides Inbound/Outbound Filtering and Data Leak Prevention</strong>\r\nThe Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks. As a complete email management solution, the Barracuda Email Security Gateway lets organizations encrypt messages and leverage the cloud to spool email if mail servers become unavailable.\r\nThe Barracuda Email Security Gateway is offered without per-user or per-feature fees, and is also available as a virtual appliance or in a public cloud environment (Amazon Web Services (AWS), Microsoft Azure, or VMware vCloud Air). For hosted email security, see Barracuda Essentials for Email Security.\r\n<strong>Protect Against Email-Borne Threats</strong>\r\nWith the Barracuda Email Security Gateway, protecting against inbound malware, spam, phishing, and Denial of Service attacks ensures that business productivity isn’t impacted by attacks through the email system. Powerful and customizable policies enable further enforcement of detailed requirements that govern inbound email messages.\r\n \r\n<strong>Stop Threats before They Hit the Network</strong>\r\nOffload CPU-intensive tasks like antivirus and DDoS filtering to the cloud reduces the processing load on the appliance and to ensure that threats never reach the network perimeter. The Barracuda Email Security Gateway is integrated with a cloud-based service that pre-filters email before delivery to the onsite Barracuda Email Security Gateway, which performs further inbound security checks and outbound filtering.\r\n \r\n<strong>Ensure Continuous Email Availability</strong>\r\nEmail is a critical vehicle in today’s business world, therefore a failure of the email server can significantly limit business operations. With the Cloud Protection Layer, bundled free of charge with the Barracuda Email Security Gateway, email is spooled for up to 96 hours, with an option to re-direct traffic to a secondary server.\r\n \r\n<strong>Protect Sensitive Data</strong>\r\nLeverage powerful encryption technology to ensure that sensitive data cannot be viewed by outside parties. Outbound filtering and quarantine capabilities certify that every outbound email complies with corporate DLP policies.\r\nSimple and easy to deploy configurations on the Barracuda Email Security Gateway guarantee that customized email protection is in place in a matter of minutes. Cloud-based centralized management enhances day-to-day workflow and is included with no additional fees.\r\nThe affordable, all-inclusive pricing model has no per-user fees, minimizing the investment in securing your email infrastructure.","shortDescription":"Barracuda Email Security Gateway - Comprehensive Protection from Email-Based Threats","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Email Security Gateway","keywords":"Email, email, Security, Barracuda, Gateway, that, with, Features","description":"Provides Inbound/Outbound Filtering and Data Leak Prevention\rThe Barracuda Email Security Gateway is an email security gateway that manages and filters all","og:title":"Barracuda Email Security Gateway","og:description":"Provides Inbound/Outbound Filtering and Data Leak Prevention\rThe Barracuda Email Security Gateway is an email security gateway that manages and filters all","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_Email_Security_Gateway.png"},"eventUrl":"","translationId":116,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":554,"title":"Messaging Security - Appliance","alias":"messaging-security-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/mail-security-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-nextgen-firewall-ngfw":{"id":1399,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_NextGen_Firewall.png","logo":true,"scheme":false,"title":"Barracuda NextGen Firewall (NGFW)","vendorVerified":0,"rating":"3.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-nextgen-firewall-ngfw","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications. The Barracuda NextGen Firewall F-Series is a family of hardware, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control. In addition, the F-Series combines highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network. The F-Series cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<span style=\"font-weight: bold;\">Security for the Cloud Era</span>\r\nSecurity paradigms are shifting—and securing your network perimeter is no longer good enough. In the cloud era, workloads happen everywhere, users are increasingly mobile, and potential attack surfaces are multiplying. Barracuda NextGen Firewall F-Series is purpose-built to deal with the challenges of securing widely distributed networks.\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN..</span>\r\nBarracuda Cloud Era Firewalls include full next gen Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n\r\n<ul>\r\n<li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li>\r\n<li>VPN across multiple broadband connections and MPLs replacement</li>\r\n<li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li>\r\n<li>Replacing network backhauling central policy enforcement architectures with direct internet break outs</li>\r\n<li>Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic</li>\r\n<li>Guaranteed users' access to critical applications through granular policy controls</li>\r\n<li>Increased available bandwidth with built-in traffic compression and data deduplication</li>\r\n<li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Why Barracuda NextGen Firewall?</span> When selecting security technology, it is critical that your products are supported by people who take your data security as seriously as you do. The Barracuda NextGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data. The Barracuda NextGen Firewall is part of a comprehensive line of data protection, network firewall, and security products and services designed for organizations seeking robust yet affordable protection from ever-increasing cyber threats. <span style=\"font-style: italic;\">Source: https://www.barracuda.com/products/nextgenfirewall_f</span>","shortDescription":"Barracuda's Next Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda NextGen Firewall (NGFW)","keywords":"network, Barracuda, your, with, Firewall, NextGen, security, access","description":"Next-Generation Firewalls for the Cloud Era\rIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have","og:title":"Barracuda NextGen Firewall (NGFW)","og:description":"Next-Generation Firewalls for the Cloud Era\rIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_NextGen_Firewall.png"},"eventUrl":"","translationId":1400,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-web-application-firewall":{"id":1309,"logoURL":"https://old.b4r.io/fileadmin/content/zavantazhennja.png","logo":true,"scheme":false,"title":"Barracuda Web Application Firewall","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-web-application-firewall","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<p>The Barracuda Web Application Firewall blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target the applications hosted on your web servers—and the sensitive or confidential data to which they have access. Constant Protection from Evolving Threats The Barracuda Web Application Firewall provides superior protection against data loss, DDoS, and all known applicationlayer attack modalities. Automatic updates provide defense against new threats as they apear. As new types of threats emerge, it will acquire new capabilities to block them. Identity and Access Management The Barracuda Web Application Firewall has strong authentication and access control capabilities that ensure security and privacy by restricting access to sensitive applications or data to authorized users. Affordable and Easy to Use Pre-built security templates and intuitive web interface provide immediate security without the need for time-consuming tuning or application learning. Integration with security vulnerability scanners and SIEM tools automates the assessment, monitoring, and mitigation process</p>","shortDescription":"Barracuda Web Application Firewall - protect websites and apps from cyber threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Web Application Firewall","keywords":"Barracuda, Application, Firewall, security, data, access, capabilities, they","description":"The Barracuda Web Application Firewall blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target the applications hosted on","og:title":"Barracuda Web Application Firewall","og:description":"The Barracuda Web Application Firewall blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target the applications hosted on","og:image":"https://old.b4r.io/fileadmin/content/zavantazhennja.png"},"eventUrl":"","translationId":1391,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-web-security-gateway":{"id":1198,"logoURL":"https://old.b4r.io/fileadmin/content/element_wsg_RGB.jpg","logo":true,"scheme":false,"title":"Barracuda Web Security Gateway","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-web-security-gateway","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<p>Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without loss of performance. Barracuda Networks Barracuda Web Security Gateway is a powerful integrated content protection and analysis solution that is applicable to all business categories. Barracuda Web Security Gateway is very easy to install, has an intuitive management and monitoring interface and is automatically updated every hour through the Barracuda Central website. To install the solution, no additional software is needed, network settings are changed, and there is no need to purchase licenses for each additional user when the system is expanded. Barracuda Web Security Gateway combines proactive, reactive and proactive protection measures, ensuring complete network security: Prevent spyware downloads. Preventing viruses loading. Blocking access to Web sites with spyware. Determining the access of spyware to the Internet. Complete removal of spyware. Blocking malicious Web sites.</p>","shortDescription":"Barracuda Web Security Gateway protect users from malware and saves bandwidth","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Web Security Gateway","keywords":"Barracuda, Gateway, spyware, Security, network, additional, solution, protection","description":"Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without","og:title":"Barracuda Web Security Gateway","og:description":"Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without","og:image":"https://old.b4r.io/fileadmin/content/element_wsg_RGB.jpg"},"eventUrl":"","translationId":1390,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":548,"title":"Web security - Appliance","alias":"web-security-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-security-hardware.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":485,"title":"Web security","alias":"web-security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web_security.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"big-ip-local-traffic-manager":{"id":201,"logoURL":"https://old.b4r.io/fileadmin/user_upload/BIG-IP_Local_Traffic_Manager.jpg","logo":true,"scheme":false,"title":"BIG-IP Local Traffic Manager","vendorVerified":0,"rating":"1.70","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":2,"alias":"big-ip-local-traffic-manager","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms the chaotic volume of network traffic into logically assembled streams of data, and then makes intelligent traffic management decisions, selecting the right destination based on server performance, security, and availability.\r\n\r\nYes, BIG-IP LTM enables sophisticated load balancing. But, that’s just the beginning.\r\nFull proxy means full power.\r\n\r\nIf you can see it, you can manipulate it.\r\n\r\nBecause BIG-IP LTM is a full proxy, you can inspect, manage, and report on application traffic entering and exiting your network. From basic load balancing to complex traffic management decisions based on client, server, or application status, BIG-IP LTM gives you granular control over app traffic.\r\n\r\nFor example, if you want to direct traffic based on the requested URL or log specific server responses to a reporting system, BIG-IP LTM has the architecture and the tools you need to do it.\r\n\r\nOperational efficiency? Check.\r\n\r\nBIG-IP LTM can optimize the speed and reliability of your applications via both network and application layers.\r\n\r\nUsing real-time protocol and traffic management decisions based on application and server conditions, extensive connection management, and TCP and content offloading, BIG-IP LTM dramatically improves page load times and the user experience.\r\n\r\nWhether it’s negotiating high-latency networks or offloading millions of connections, BIG-IP LTM can improve the performance of your infrastructure and your applications.\r\n\r\nThe SSL performance of BIG-IP LTM lets you cost-effectively protect the end-to-end user experience by encrypting everything from the client to the server. It also scales on-demand and absorbs potentially crippling DDoS attacks.\r\n\r\nOften SSL is turned on throughout the network. Thing is, most network security devices aren’t built to detect malicious traffic in layers 4–7. Separating the good and bad traffic is the first problem, taking action on the malicious traffic is the second.\r\n\r\nBIG-IP LTM includes levels of inspection necessary to block bad traffic and allow good traffic to pass through.\r\n\r\n","shortDescription":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BIG-IP Local Traffic Manager","keywords":"traffic, BIG-IP, application, network, server, your, based, management","description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms","og:title":"BIG-IP Local Traffic Manager","og:description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms","og:image":"https://old.b4r.io/fileadmin/user_upload/BIG-IP_Local_Traffic_Manager.jpg"},"eventUrl":"","translationId":202,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"cellopoint-secure-email-gateway":{"id":2104,"logoURL":"https://old.b4r.io/fileadmin/user_upload/cellopoint__logo_.png","logo":true,"scheme":false,"title":"CelloPoint Secure Email Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cellopoint-secure-email-gateway","companyTitle":"Cellopoint","companyTypes":["vendor"],"companyId":4539,"companyAlias":"cellopoint","description":"<p>Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by CelloLabs which has the capability to filter out all email threats. In addition, Cellopoint Security Gateway eliminates 99% unwanted message and provides a high-class defending capability—not only from known threats, but from those certain to evolve in the future.</p>\r\n<p><span style=\"font-weight: bold;\">Benefits:</span></p>\r\n<ul>\r\n<li>Protects against spam, viruses, spyware, and other malware</li>\r\n<li>Affordable protection is simple and reliable</li>\r\n<li>Reduces administrative overhead</li>\r\n<li>Intuitive Management GUI</li>\r\n</ul>\r\n<p><strong>Tier One: Anti-spam Protection</strong></p>\r\n<p>Anti-spam methods eliminate more than 99% of spam with a range of anti-spam technologies including:</p>\r\n<ul>\r\n<li>Denial of Service (DoS) Protection</li>\r\n<li>SMTP Rate Limit</li>\r\n<li>Bounce Back Protection</li>\r\n<li>Directory Harvest Attack (DHA) Prevention</li>\r\n<li>Sender IP Reputation Analysis</li>\r\n<li>SMTP Transaction Check</li>\r\n<li>Virus, Phishing and Spyware Scanning</li>\r\n<li>Intelligent Content Analysis (ICA)</li>\r\n<li>Heuristics Rule</li>\r\n<li>Bayesian Analysis</li>\r\n<li>Violation Check</li>\r\n</ul>\r\n<p><strong>Tier Two: Anti-Virus Filtering</strong></p>\r\n<p>A combination of multiple anti-virus engines offers an extensive real time scanning and virus definition updates. Catch a variety of known virus and phishing patterns, spyware, trojans, worms and malware threats. Easy to deploy in your existing email infrastructure.</p>\r\n<p><strong>Tier Three: Anti-APT-URL Protection</strong></p>\r\n<p>To protect against the phishing targeted attacks and malicious URL links, Cellopoint SEG will scan and block as follow:</p>\r\n<p><span style=\"font-style: italic;\">Static Black/Whitelist Database</span></p>\r\n<p>Over 2 million latest global URL black/whitelist database for quick comparison and quarantine.</p>\r\n<p><span style=\"font-style: italic;\">Dynamic URL ToC (Time of Click) Scanning</span></p>\r\n<p>To protect against the unknown, suspicious or malicious URL links, Cellopoint SEG will rewrite the links to go through CelloCloud for realtime examination. The URLs will be examined at the time when the users click them. If a link is unsafe, the users will be warned not to visit the site or informed that the site has been blocked by Cellopoint SEG.</p>\r\n<p><strong>Tier Four: Anti-APT-File Protection</strong></p>\r\n<p>To protect against the unknown, new advanced malware emails and attachment fi les, Cellopoint SEG will scan and block as follow:</p>\r\n<p><span style=\"font-style: italic;\">Dynamic Sandbox Scanning</span></p>\r\n<p>Suspicious email attachements will be sent as encrypted packages to the powerful cloud computing CelloCloud to do dynamic sandbox scanning.</p>\r\n<p><span style=\"font-style: italic;\">Full-system emulation</span></p>\r\n<p>Malware as Office and PDF files is captured and induced into a simulated operating system like Windows, Android, Mac OSX.</p>\r\n<p><span style=\"font-style: italic;\">Correlation Analysis and Threat Scores</span></p>\r\n<p>Threat Level Analysis that commands SEG to either block or release certain mails.</p>\r\n<p><span style=\"font-style: italic;\">Professional Summary Report</span></p>\r\n<p>Analysis report overview shows malicious file name, threats reputation scores, classifi cation, network activity and registry summary.</p>\r\n<p><span style=\"font-weight: bold;\">High-performance, Easy Deployment</span></p>\r\n<p>Cellopoint SEG is designed to meet the unique needs of any size of business. It offers all of the performance, flexibility, scalability, customization and end-user control features needed in deployments.</p>","shortDescription":"Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CelloPoint Secure Email Gateway","keywords":"Cellopoint, Analysis, will, Protection, threats, Tier, against, malware","description":"Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by","og:title":"CelloPoint Secure Email Gateway","og:description":"Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by","og:image":"https://old.b4r.io/fileadmin/user_upload/cellopoint__logo_.png"},"eventUrl":"","translationId":2105,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-21000-appliances":{"id":86,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Check_Point_21000.jpg","logo":true,"scheme":false,"title":"Check Point 21000 Appliances","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-21000-appliances","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"Delivers the best performance in its class\r\n\r\nUp to 44.5 Gbps of real-world firewall throughput\r\nUp to 6.9 Gbps of real-world IPS throughput\r\nSupports sub 5 micro-second low-latency transactions\r\nSupports high availability and serviceability\r\n\r\nOffers a variety of network options to work in any network environment\r\nOffers Lights-Out-Management option for remote out-of-band management\r\nEnables service without downtime thanks to hot-swap and redundant components\r\nReduces costs through security consolidation\r\n\r\nExtends easily to add more security features without adding a new appliance\r\nAvailable in four complete and Software Blade packages that meet any security need\r\nAvailable in a low-cost, high-performance package with extended memory for maximum connection capacity\r\nFeatures\r\n\r\nMaximum security and performance\r\nThe Check Point 21000 Appliances offer maximum availability of business-critical applications and the best performance available in their class.\r\n\r\nHigh port density with up to 37x1GbE ports for network segmentation\r\n110 Gbps firewall throughput and sub-5µs latency for mission-critical applications\r\nComes in compact 2-rack unit chassis\r\nComes with acceleration and clustering technologies\r\n\r\nReliability and high serviceability\r\nMeet the uncompromising high availability standards of modern data centers; the 21000 Appliances are designed to be highly serviceable, even when deployed in customer networks.\r\n\r\nHot-swappable redundant power supplies, hard disk drives and fans\r\nAn advanced Lights-Out-Management card provides out-of-band remote management to remotely diagnose, start, restart and manage the appliance from a remote location\r\n\r\nPrevent unknown threats\r\nCheck Point provides complete zero-day threat prevention and alerts when under attack. Threat Extraction delivers zero-malware documents in zero seconds. Threat Emulation inspects files for malicious content in a virtual sandbox. When Threat Emulation discovers new threats, a signature is sent to the Check Point ThreatCloud database which documents and shares information on the newly identified malware with other Check Point customers — providing immediate protection against zero-day threats.\r\n\r\n\r\nSecurity acceleration module for greater performance confidence\r\nWith the optional Security Acceleration Module, you can confidently increase firewall and VPN bandwidth through your 21000 Appliance without performance degradation. Check Point’s innovative, purpose-built SecurityCore™ technology uses parallel and security processing power to accelerate security performance.\r\n\r\nOffloads security processing from the general purpose appliance CPU\r\nAvailable as a bundle for significant savings right out of the box\r\nHigh network capacity\r\nDeploy the Check Point 21000 Appliances in any network environment.\r\n\r\nUp to 37 10/100/1000Base-T ports\r\nUp to 36 1000base-F SFP, or up to 13 10GBase-F SFP+ ports\r\nThree front-facing expansion slots\r\nUp to 1,024 VLANs for higher network segmentation\r\n\r\nPre-configured with Next Generation Software Blade packages\r\nPre-configured with Next Generation Software Blade packages The Check Point 21000 Appliances offer a complete and consolidated security solution available in five Next Generation Security Software Blade packages.\r\n\r\nNext Generation Firewall—identify and control applications by user and scan content to stop threats (included Blades: IPS and Application Control)\r\nNext Generation Secure Web Gateway—enable secure use of Web 2.0 with real-time multilayer protection against web-borne malware (included Blades: Application Control, URL Filtering, Antivirus and SmartEvent)\r\nNext Generation Data Protection—preemptively protect sensitive information from unintentional loss, educate users on proper data-handling policies and empower them to remediate incidents in real-time (included Blades: IPS, Application Control and Data-Loss Prevention).\r\nNext Generation Threat Prevention—apply multiple layers of protection to prevent sophisticated cyber-threats (included Blades: IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security)\r\nNext Generation Threat Extraction—(NGTX): advanced next-gen zero-day threat prevention, NGTP with Threat Emulation and Threat Extraction.\r\nAdditional Software Blade upgrades are available to further extend and customize protection options","shortDescription":"The 21000 Appliances are designed for data centers with the most demanding requirements for performance and high availability. They are ideal for low-latency transactions, with sub 5 micro-second latency, and they deliver excellent serviceability features for cost-efficient operation.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point 21000 Appliances","keywords":"security, Check, with, Generation, Next, Threat, Point, 21000","description":"Delivers the best performance in its class\r\rUp to 44.5 Gbps of real-world firewall throughput\rUp to 6.9 Gbps of real-world IPS throughput\rSupports sub 5","og:title":"Check Point 21000 Appliances","og:description":"Delivers the best performance in its class\r\rUp to 44.5 Gbps of real-world firewall throughput\rUp to 6.9 Gbps of real-world IPS throughput\rSupports sub 5","og:image":"https://old.b4r.io/fileadmin/user_upload/Check_Point_21000.jpg"},"eventUrl":"","translationId":86,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-600-appliance":{"id":90,"logoURL":"https://old.b4r.io/fileadmin/content/Ustroistvo_Check_Point_600.png","logo":true,"scheme":false,"title":"Check Point 600 Appliance","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-600-appliance","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"<div class=\"row rowdefault\" style=\"box-sizing: border-box; margin-left: -15px; margin-right: -15px; \">\r\n<div id=\"benefits-and-quote\" class=\"row rowdefault\" style=\"box-sizing: border-box; margin-left: -15px; margin-right: -15px; margin-top: 1.3em; \"> Benefits\r\n\r\nSecures your small business with advanced security\r\n\r\nProtects against viruses, spam, dangerous applications and malicious websites\r\nDesigned from the ground up for the needs of small businesses\r\n\r\nConnects securely to your office network from any laptop, smartphone or tablet\r\nSets up in minutes with easy and intuitive web-based management\r\nSimplifies your security management with optional Check Point SMB Managed Security Services\r\nKeeps you connected with flexibility, speed and power\r\n\r\nSupports multiple Internet access options, including Ethernet, ADSL, 3G and 4G\r\nProvides integrated wireless security with guest access\r\nDelivers market-leading speeds with 100 Mbps of real-world throughput\r\n\r\n\r\nFeatures\r\n\r\nEnterprise-caliber firewall and threat protection\r\nSmall companies shouldn’t have to settle for less security. The Check Point 600 Appliance has the industry’s highest-ranked next-generation firewall, IPS and threat prevention security technologies to deliver robust protection from modern cyber-threats. You’ll get the same level of protection enjoyed by Fortune 100 companies—at SMB prices.\r\n\r\n\r\nA comprehensive protection suite\r\nLeveraging the proven and flexible Software Blade Architecture, the 600 Appliance delivers multilayer security to the small-office environment, including:\r\n\r\nFirewall\r\nVPN\r\nAdvanced Networking & Clustering\r\nIdentity Awareness & User Awareness\r\nIPS\r\nApplication Control\r\nURL Filtering\r\nAntivirus\r\nAnti-Bot\r\nAnti-Spam and Email Security\r\n\r\nSecurity managed via the cloud\r\nWe can even help you manage your security appliance through the cloud. With Check Point Cloud-Managed Security Service, you’ll leverage Check Point’s technology leadership and 24/7 security expertise to ensure your network will be monitored and protected at all times. Learn more about the features and benefits of this service on our Check Point SMB Cloud-Managed Security Service page.\r\n\r\nFlexible network connections with high capacity\r\nThe 600 Appliance comes standard with 10 x 1Gbps Ethernet ports. For added flexibility and convenience, Check Point offers a wireless version that includes a WiFi access point (802.11b/g/n) that supports WEP, WPA and WPA2 authentication, as well as secured guest access capabilities.\r\n\r\nIntegrated ADSL modem\r\nIncluded USB and PCI Express card slots make it easy to create a redundant Internet link for maximum reliability\r\n\r\nSimple management, configuration and deployment\r\nThe Check Point 600 Appliance can be up and ready in minutes, offering hassle-free deployment to small offices with minimal IT support staff.\r\n\r\nSimple web-based local management interface\r\nFirst-time set-up wizard\r\nEasy-to-understand logs and reports for hassle-free device monitoring\r\n<div class=\"row rowdefault\" style=\"box-sizing: border-box; margin-left: -15px; margin-right: -15px; \">","shortDescription":"Small businesses need multi-layered security in a simple, affordable package. The Check Point 600 Appliance is a single, integrated device offering firewall, VPN, IPS, antivirus, application visibility and control, and URL filtering and email security, all in a quiet, compact desktop form factor.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point 600 Appliance","keywords":"with, Check, security, Point, your, Appliance, Security, protection","description":"\r Benefits\r\rSecures your small business with advanced security\r\rProtects against viruses, spam, dangerous applications and malicious websites\rDesigned","og:title":"Check Point 600 Appliance","og:description":"\r Benefits\r\rSecures your small business with advanced security\r\rProtects against viruses, spam, dangerous applications and malicious websites\rDesigned","og:image":"https://old.b4r.io/fileadmin/content/Ustroistvo_Check_Point_600.png"},"eventUrl":"","translationId":90,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-intrusion-prevention-system-software-blade":{"id":497,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Check_Point_programmnyi_bleid_IPS1.jpg","logo":true,"scheme":false,"title":"Check Point Intrusion Prevention System Software Blade","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-intrusion-prevention-system-software-blade","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. The IPS Software Blade delivers complete and proactive intrusion prevention – all with the deployment and management advantages of a unified and extensible next-generation firewall solution.\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n<ul><li>Next-generation security prevention, protection and performance</li><li>Industry-leading intrusion protection and firewall—as tested NSS Labs—delivers 1,000s of signature, behavioral and preemptive protections</li><li>Check Point is ranked #1 in Microsoft and Adobe threat coverage</li><li>Combines with best-of-breed firewall, application control, URL filtering, DLP and more on the most comprehensive, network-class next gen firewall</li><li>Unrivaled, multi-Gigabit performance in an integrated IPS</li><li>Up to 15 Gbps of IPS and 30 Gbps of firewall throughput</li><li>Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection and accelerated IPS throughput</li><li>CoreXL technology provides the most efficient and high-performance use of multi-core technologies</li><li>Lowest TCO and fastest ROI of any enterprise-class firewall solution</li><li>One-click activation of IPS and firewall protection on any Check Point gateway</li><li>Delivers unmatched extensibility and flexibility—all without adding CapEx</li><li>Integrated into Check Point Software Blade Architecture for on-demand security</li></ul>\r\nThe Check Point IPS Software Blade is delivering better security than our previous IPS software solution and at a lower cost. Check Point has designed the IPS software blade for efficient resource utilization, which improves performance, mission critical availability, and uptime.\r\n<span style=\"font-weight: bold;\">Complete Intrusion Prevention System (IPS) Functionality</span>\r\nThe Intrusion Protection System Software Blade complements firewall protection, further securing your network without degrading gateway performance.\r\n<span style=\"font-weight: bold;\">Full-featured IPS</span>\r\nThe IPS Software Blade provides a complete Intrusion Prevention System security solution, providing comprehensive network protection against malicious and unwanted network traffic, including:\r\n<ul><li>Malware attacks</li><li>Dos and DDoS attacks</li><li>Application and server vulnerabilities</li><li>Insider threats</li><li>Unwanted application traffic, including IM and P2P</li><li>Geo-protections</li></ul>\r\nGeo-protections enforce or monitor traffic based on the source or destination country. Create a geo-protection policy with exceptions to allow legitimate traffic through while blocking or monitoring traffic from unknown and untrusted sources. Monitor activity with the SmartEvent Software Blade.\r\n<span style=\"font-weight: bold;\">Trusted Security</span>\r\nReal-Time protections – The IPS Software Blade is constantly updated with new defenses against emerging threats. Many of the IPS protections are pre-emptive, providing defenses before vulnerabilities are discovered or exploits are even created.\r\nMicrosoft vulnerability coverage – Check Point is ranked #1 in Microsoft threat coverage, including preemptive protections against emerging vulnerabilities and exploits.\r\n<span style=\"font-weight: bold;\">Multi-gigabit Integrated IPS Performance</span>\r\nDelivers up to 15 Gbps of IPS throughput with the default IPS profile. The IPS Software Blade incorporates a high-speed pattern matching engine that does multi-layered, 2-tier inspection for maximum performance with thousands of protections enabled.\r\n<span style=\"font-weight: bold;\">Dynamic Threat Management</span>\r\nWith the IPS Software Blade and the SmartEvent Software Blade you gain a new, dynamic management paradigm for today’s high volume, real-time and evolving threat environment.\r\nCheck Point threat management workflows allow you to handle constant change quickly and efficiently, reducing your management overhead and allowing you to confidently and promptly deploy protections.\r\n<span style=\"font-weight: bold;\">The IPS Software Blade offers:</span>\r\n<ul><li>New protections sandbox – Build confidence in a ‘sandbox’ environment with no impact on your network.</li><li>Automatic protection activation – Activation of new protections, based on configurable parameters (performance impact, confidence index, threat severity). The difficulties of constant, individual management of thousands of protections are eliminated.</li><li>Unified Management – The IPS blade is configured and managed through a common Check Point management interface—the same one used to manage other security gateway Software Blades and Check Point dedicated IPS.</li><li>Configurable, actionable monitoring – Track events through detailed reports and logs of what is most important. The new Security Management Software Blade for IPS and Security Provisioning Software Blade simplify threat analysis and reduce operational overhead.</li><li>Business-level views – Customizable reports provide easy monitoring of critical security events associated with your business-critical systems.</li><li>Multi-dimensional sorting – Drag-and-drop columns of event data and the information will be automatically re-ordered.</li><li>Actionable event logs – Edit the associated protection, create an exception or view packet data directly from log entries.</li></ul>","shortDescription":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point Intrusion Prevention System Software Blade","keywords":"Software, Blade, Point, with, Check, protections, protection, security","description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than","og:title":"Check Point Intrusion Prevention System Software Blade","og:description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than","og:image":"https://old.b4r.io/fileadmin/user_upload/Check_Point_programmnyi_bleid_IPS1.jpg"},"eventUrl":"","translationId":497,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-next-generation-firewall-ngfw":{"id":1402,"logoURL":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png","logo":true,"scheme":false,"title":"Check Point Next Generation Firewall (NGFW)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-next-generation-firewall-ngfw","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"<span style=\"font-weight: bold; text-decoration-line: underline;\">Benefits</span> \r\n<span style=\"font-weight: bold;\">Detects and controls application usage</span>\r\n<ul> <li>Identify, allow, block or limit usage of applications, and features within them</li> <li>Enable safe Internet use while protecting against threats and malware</li> <li>Leverage the world's largest application library with more than 6,600 web 2.0 applications</li> </ul>\r\n<span style=\"font-weight: bold;\">Supports advanced identity awareness for stress-free policy enforcement</span>\r\n<ul> <li>Create granular policy definitions per user and group</li> <li>Integrate seamlessly with Active Directory</li> <li>Protect environments with social media and Internet applications</li> </ul>\r\n<span style=\"font-weight: bold;\">Provides proven gateway security in a single, dedicated appliance</span>\r\n<ul> <li>Rely on 24/7 advanced protection</li> <li>Reap the benefits of application control and intrusion protection (IPS), as well as extensibility support for additional security capabilities</li> <li>Get greater understanding into security events with integrated, easy-to-use centralized management</li> <li>Join more than 170,000 customers, including 100 percent of Fortune 100 companies</li> </ul>\r\n\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Features</span> \r\n<span style=\"font-weight: bold;\">Identity awareness</span> Great security involves limiting and tracking access to sensitive data and resources. With the Next Generation Firewall, your administrators get detailed visibility into the users, groups, applications, machines and connection types on your network so they can assign permissions to the right users and devices. The firewall makes it easy and cost-effective to enforce security policy, giving granular permission control over these entities; this results in superior protection across the entire security gateway. Seamless and agent-less integration with Active Directory provides complete user identification, enabling simple, application-based policy definition per user or group directly from the firewall. Users’ identification may be acquired in one of three simple methods:\r\n<ul> <li>Querying the Active Directory</li> <li>Through a captive portal</li> <li>Installing a one-time, thin client-side agent</li> </ul>\r\n<span style=\"font-weight: bold;\">Application control</span> \r\nEmployees are using more apps than ever, and you’re on the hook to protect them regardless of what they use. Check Point Next Generation Firewall has the industry’s largest application coverage, with more than 6,600 applications and 260,000 social network widgets included. You can create granular security policies based on users or groups to identify, block or limit usage of web applications and widgets like instant messaging, social networking, video streaming, VoIP, games and more. \r\n<span style=\"font-weight: bold;\">Logging and status</span> \r\nTo help you make sense out of your security event data, we included SmartLog, an advanced log analyzer that delivers split-second search results providing real-time visibility into billions of log records over multiple time periods and domains. \r\n<span style=\"font-weight: bold;\">Integrated security management</span> \r\nOur unified security management simplifies the monumental task of managing your security environment. You’ll see and control threats, devices and users with a highly intuitive graphical interface providing views, details and reports on your security health. Manage all your Check Point gateways and software blades from one comprehensive, centralized security dashboard. \r\n<span style=\"font-weight: bold;\">Intrusion prevention</span> \r\nNext Generation Firewall includes the Check Point IPS Software Blade, which secures your network by inspecting packets traversing through the gateway. It is a full-featured IPS, providing geo-protections and frequent, automated threat definition updates. Because the IPS is part of the integrated Software Blade Architecture, you’ll get all the deployment and management advantages of a unified and extensible solution.","shortDescription":"Check Point Next Generation Firewall identifies and controls applications by user and scans content to stop threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point Next Generation Firewall (NGFW)","keywords":"security, your, with, applications, more, than, management, Check","description":"Benefits \rDetects and controls application usage\r Identify, allow, block or limit usage of applications, and features within them Enable safe Internet use","og:title":"Check Point Next Generation Firewall (NGFW)","og:description":"Benefits \rDetects and controls application usage\r Identify, allow, block or limit usage of applications, and features within them Enable safe Internet use","og:image":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png"},"eventUrl":"","translationId":1402,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-vsec-virtual-edition":{"id":473,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Check_Point_vSEC_Virtual_Edition.jpg","logo":true,"scheme":false,"title":"Check Point vSEC Virtual Edition","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-vsec-virtual-edition","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"Secure virtual environments\r\n\r\nMulti-layered security protections for virtual environments including next-generation firewall and advanced threat prevention\r\nInspect all traffic—from inter-VM to perimeter—in the virtual network\r\nPermit secure access to remote systems and networks\r\nUnified management of virtual and physical environments\r\n\r\nConsistent security policy and uniform security management across both physical and virtual infrastructures\r\nVisibility into virtualization configuration and security changes\r\nSeparation of duties between virtualization and security teams\r\nLicensing is based on virtual cores used and supports dynamic allocation ideal for elastic workloads\r\nThanks to Check Point vSEC Virtual Edition (VE), we have a virtual security solution that fully integrates into our dynamic virtualized environment with all the performance, security and functionality we’ve expected from our physical Check Point gateways for years.\r\n\r\nFeatures\r\n\r\nFull protections with Check Point Software Blades\r\nCheck Point vSEC Virtual Edition provides the full protections of the Check Point Software Blade architecture.\r\n\r\nFirewall, IPS, Antivirus, Anti-Bot Software Blades protect services in the public cloud from unauthorized access and attacks.\r\nApplication Control Software Blade helps prevent application layer denial of service attacks and protects your cloud services.\r\nIPsec VPN Software Blade allows secure communication into cloud resources.\r\nMobile Access Software Blade allows mobile users to connect to the cloud using an SSL encrypted connection with two factor authentication and device pairing.\r\nData Loss Prevention Software Blade protects sensitive data from theft or unintentional loss.\r\nSandBlast Zero-Day Protection Blades provide the most comprehensive protection against malware and zero-day attacks.\r\nConsolidated logs and reporting for hybrid cloud environments\r\nGet visibility and enforcement across your virtual infrastructures using the Next Generation SmartEvent Software Blade. Simplify compliance and audits with unified logs and reporting.\r\nCentralized management for virtual and physical infrastructures\r\nManage vSEC VE using your existing on-premise Check Point Unified Security Management Solution. Enforce a consistent security policy for corporate assets across both virtual and physical infrastructures from a single console.\r\n","shortDescription":"The Check Point vSEC Virtual Edition gateway protects dynamic virtualized environments from internal and external threats by securing virtual machines (VMs) and applications with the full range of protections of the Check Point Software Blade architecture. Check Point’s virtualization security supports multiple hypervisors including VMware ESX, Microsoft Hyper-V and KVM.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point vSEC Virtual Edition","keywords":"virtual, security, Software, Point, Check, Blade, cloud, physical","description":"Secure virtual environments\r\rMulti-layered security protections for virtual environments including next-generation firewall and advanced threat prevention","og:title":"Check Point vSEC Virtual Edition","og:description":"Secure virtual environments\r\rMulti-layered security protections for virtual environments including next-generation firewall and advanced threat prevention","og:image":"https://old.b4r.io/fileadmin/user_upload/Check_Point_vSEC_Virtual_Edition.jpg"},"eventUrl":"","translationId":474,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-programmnyi-bleid-ips":{"id":496,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Check_Point_programmnyi_bleid_IPS1.jpg","logo":true,"scheme":false,"title":"Check Point программный блейд IPS","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-programmnyi-bleid-ips","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по сравнению с традиционными отдельными инструментами IPS. Программный блейд обеспечивает максимальную проактивную систему борьбы с вторжениями — и все это вместе с преимуществами унифицированного фаервола нового поколения.\r\n\r\n<span style=\"font-weight: bold;\">Преимущества</span>\r\n<ul><li>Новое поколение IPS — более совершенная защита, более высокая производительность</li><li>Лидер в области защиты от вторжений и среди фаерволов по данным тестов NSS Labs. Решение содержит тысячи методов сигнатурной, поведенческой и превентивной защиты.</li><li>Решения Check Point обеспечивают наибольший охват угроз для приложений Microsoft и Adobe.</li><li>Сочетание современного фаервола, контроля приложений, фильтрации URL, DLP и многого другого в самом передовом фаерволе нового поколения сетевого класса.</li><li>Исключительно высокая многогигабитная производительность</li><li>До 15 Гб/с пропускная способность IPS и до 30 Гб/с пропускная способность фаервола.</li><li>Технологии Stateful Inspection и SecureXL обеспечивают многоуровневую проверку и ускоряют пропускную способность.</li><li>Технология CoreXL обеспечивает наиболее эффективное и производительное использование многоядерных технологий.</li><li>Низкая общая стоимость владения и быстрый возврат инвестиций</li><li>Активация в один клик IPS и фаервола на любом шлюзе Check Point.</li><li>Гибкость и возможность расширения защиты без дополнительных капиталовложений.</li><li>Интеграция с архитектурой программных блейдов для выбора защиты, соответствующей требованиям бизнеса.</li></ul>\r\n<span style=\"font-weight: bold;\">Возможности</span>\r\n\r\n<ul><li>Производительная и надежная система предотвращения вторжений</li><li>Программный блейд Intrusion Protection System дополняет защиту фаервола и прочнее защищает вашу сеть без потери производительности.</li><li>Полнофункциональная IPS</li><li>Программный блейд IPS — это полноценная система защиты от вторжений, которая обеспечивает максимальную защиту от вредоносных файлов и нежелательного сетевого трафика, включая:</li><li>Вредоносные атаки</li><li>DoS- и DDoS-атаки</li><li>Уязвимости в приложениях и серверах Application and server vulnerabilities</li><li>Инсайдерские угрозы</li><li>Нежелательный трафик в приложениях, включая IM и P2P</li></ul>\r\n\r\n\r\n\r\n\r\n\r\n<span style=\"font-weight: bold;\">Геозащита</span>\r\n\r\nГеозащита отслеживает трафик на основании источника или страны назначения. Создание правил геозащиты с исключениями позволит получать легитимный трафик и блокировать или следить за трафиком из неизвестных или недоверенных источников. Мониторинг активностей помогает осуществить программный блейд SmartEvent.\r\n\r\n<span style=\"font-weight: bold;\">Высокий уровень защиты</span>\r\n\r\nЗащита в режиме реального времени — программный блейд IPS постоянно обновляет инструментарий защиты против развивающихся угроз. Многие из этих инструментов превентивные и обеспечивают защиту до того, как уязвимости будут обнаружены, а эксплойты созданы.\r\nМаксимальное покрытие угроз для приложений Microsoft — Check Point является компанией № 1 по покрытию угроз, включая превентивную защиту против развивающихся уязвимостей и эксплойтов.\r\n<span style=\"font-weight: bold;\">Встроенная система IPS</span>\r\nПрограммный блейд со встроенной системой IPS обеспечивает максимальную защиту по более низкой цене (до 50%) по сравнению с многочисленными отдельными решениями. По соотношению цены и производительности этот блейд до десяти раз превосходит другие решения. Встроенная система IPS имеет много преимуществ, которые становятся новым стандартом в отрасли, включая:\r\n\r\nУменьшение издержек за счет консолидации многочисленных независимых решений.\r\n\r\n<span style=\"font-weight: bold;\">Благодаря интеграции IPS с cуществующим фаерволом вы экономите на:</span>\r\n\r\n<ul><li>Покупке оборудования</li><li>Свободном объеме на жестких дисках</li><li>Тренингах и повседневном управлении</li><li>Местах для стоек</li><li>Прокладке кабелей</li><li>Охлаждении</li><li>Электроэнергии</li><li>Снижение задержек</li><li>Инспекция трафика производится только один раз — сразу фаерволом и IPS.</li><li>Последовательная реализация политик</li><li>Интегрированное решение обладает едиными совместными политиками безопасности.</li><li>Упрощение управления и обучения</li><li>Снижение расходов на управление и обучение.</li><li>Уменьшение ошибок.</li><li>Простое сочетание с организационной структурой IT.</li><li>Увеличение операционной эффективности и рентабельности.</li><li>Простое развертывание</li><li>Быстрое добавление защиты IPS на шлюз безопасности без лишних проверок.</li></ul>\r\n\r\n\r\n<span style=\"font-weight: bold;\">Многогигабитная производительность</span>\r\nБлейд обеспечивает пропускную способность до 15 Гб/с с установленным по умолчанию профилем IPS. Блейд содержит высокоскоростную модель, которая обеспечивает многоуровневую проверку.\r\n\r\n<span style=\"font-weight: bold;\">Проверка защищенного SSL-трафика</span>\r\nПроверяйте и делайте безопасным защищенный SSL-трафик, проходящий через шлюз безопасности. Когда трафик проходит через шлюз, тот расшифровывает трафик с помощью публичного ключа отправителя, затем проверяет и очищает, а после повторно шифрует и посылает вновь зашифрованный контент получателю. Гранулярность позволяет устанавливать исключения для инспекции SSL, чтобы не нарушить конфиденциальность и обеспечить выполнение политик безопасности. Некоторая часть зашифрованного контента может не инспектироваться — администратор может установить исключения из правил проверки. Правила определяет администратор.\r\n\r\n<span style=\"font-weight: bold;\">Динамическое управление защитой от угроз</span>\r\nС программными блейдами IPS и SmartEvent вы получаете новую динамическую возможность для борьбы с многочисленными угрозами — в том числе с развивающимися и поступающими в режиме реального времени. Механизмы управления защитой от угроз позволяют вам быстро и эффективно производить постоянные изменения, сокращая количество ошибок и позволяя внедрять защиту оперативно и конфиденциально.\r\n\r\n<span style=\"font-weight: bold;\">Программный блейд IPS предлагает:</span>\r\n\r\n<ul><li>Защита в «песочнице» — обеспечивает уверенность благодаря запуску приложений без влияния на сеть. Автоматическая активация защиты — активация новой защиты основывается на настраиваемых параметрах (воздействие на производительность, индекс доверия, тяжесть угроз). Тем самым устраняется сложность постоянного индивидуального администрирования.</li><li>Унифицированное управление — блейд IPS настраивается и управляется через стандартный интерфейс управления Check Point, который в частности используется, чтобы управлять другими шлюзами безопасности Check Point и отдельной системой IPS.</li><li>Настраиваемый мониторинг — отслеживание событий через детальные отчеты поможет узнать о самом важном. Новый программный блейд Управление безопасностью для блейдов IPS и программный блейд Security Provisioning упрощают анализ угроз и сокращают операционные ошибки.</li><li>Бизнес-уровень — настраиваемые отчеты обеспечивают простой мониторинг критических событий безопасности, которые ассоциированы с вашими критически важными системами.</li><li>Многомерная сортировка — перетащите колонку с данными о событии, и информация будет автоматически перестроена.</li><li>Применимые на практике логи событий — редактируйте связанную защиту, создавайте исключения и просматривайте пакетные данные прямо из записей логов.</li><li>Простое развертывание. Развертывание на вашем существующем фаерволе — сократите время и уменьшите издержки за счет повышения эффективности текущей инфраструктуры.</li><li>Гранулярная защита — легкие в использовании профили позволяют администраторам создавать подписи и активировать правила, которые соответствуют специфическим потребностям ваших сетевых активов.</li><li>Преднастроенные и рекомендованные профили — позволяют вам немедленно использовать профили и легко работать с ними, оптимизируя их в соответствии с требованиями производительности.</li><li>Опционально доступный режим «только обнаружение» — вся ваша защита будет работать на обнаружение, но трафик блокировать не будет, что позволит вам работать без риска сбоев.</li><li>Защита получения обновлений. Установка обновлений — это небезопасная процедура, которая подвергает вашу сеть риску атаки. Но благодаря более глубокому подходу, сочетающему надежную функциональность IPS с продуманной стратегией установки обновлений, администраторы сети могут лучше подготовиться к установкам и обезопасить сеть.</li><li>Интеграция с архитектурой программных блейдов. Программный блейд IPS интегрирован с архитектурой программных блейдов. Он может быть легко и быстро активирован на существующих шлюзах Check Point, что экономит время и сокращает издержки за счет повышения качества защитной инфраструктуры.</li></ul>\r\n\r\n\r\n\r\n\r\n","shortDescription":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по сравнению с традиционными отдельными инструментами IPS.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point программный блейд IPS","keywords":"блейд, защиты, угроз, защиту, Point, Check, обеспечивает, трафик","description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по","og:title":"Check Point программный блейд IPS","og:description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по","og:image":"https://old.b4r.io/fileadmin/user_upload/Check_Point_programmnyi_bleid_IPS1.jpg"},"eventUrl":"","translationId":2402,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-faervol-novogo-pokolenija-ngfw":{"id":1401,"logoURL":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png","logo":true,"scheme":false,"title":"Check Point Фаервол нового поколения (NGFW)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-faervol-novogo-pokolenija-ngfw","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; text-decoration-line: underline;\">Преимущества</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Контроль использования приложений</span>\r\n<ul> <li>Идентификация, разрешение, блокирование или ограничение использования приложений и функций этих приложений.</li> <li>Безопасное пользование интернетом с защитой от угроз и вредоносных программ.</li> <li>В вашем распоряжении — крупнейшая библиотека приложений с более чем 6 600 приложений.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Поддержка передового контроля над идентификацией</span>\r\n<ul> <li>Создание гранулярных политик для пользователей и групп.</li> <li>Легкая интеграция с Active Directory.</li> <li>Защита сред, в которых разрешены социальные сети и интернет-приложения.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Безопасность шлюзов в одном специальном устройстве</span>\r\n<ul> <li>Передовая защита в режиме 24/7.</li> <li>Преимущества контроля приложений и защиты от вторжений. Служба поддержки готова познакомить с дополнительными функциями безопасности.</li> <li>Глубокое понимание событий в сфере безопасности с комплексным и простым в использовании централизованным управлением.</li> <li>Более 170 тысяч покупателей, включая 100 % компаний из первой сотни компаний списка Fortune.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; text-decoration-line: underline;\">Возможности</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Контроль за идентификацией</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Чтобы безопасность была как можно более полной, нужно ограничивать доступ к важной информации и ресурсам. С Фаерволом нового поколения ваши администраторы полностью контролируют отдельных пользователей, группы пользователей, приложения, устройства и типы соединений с вашей сетью, поэтому они могут выдавать разрешение только для определенных пользователей и устройств. Фаервол — это простой и экономически эффективный способ укрепить политику безопасности, который предоставляет вам гранулярный контроль для максимальной защиты ваших шлюзов безопасности.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Интеграция с Active Directory происходит незаметно и не требует агента. Она обеспечивает полную идентификацию пользователей, которая происходит благодаря простым определениям политик для пользователей и групп непосредственно из фаервола. Идентификация пользователей может производиться одним из трех методов:</span>\r\n<ul> <li>через запрос Active Directory;</li> <li>через портал-посредник;</li> <li>через однократную установку небольшого агента.</li> </ul>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Предотвращение вторжений</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Фаервол нового поколения содержит программный блейд IPS, который защищает вашу сеть, проверяя пакеты трафика, проходящие через ваши шлюзы безопасности. Эта многофункциональная система IPS — часть архитектуры программных блейдов, поэтому вам будет легко ее внедрить, чтобы еще больше расширить ваши возможности.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Контроль приложений</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Сотрудники сегодня используют массу приложений, и вам необходимо защитить их, независимо от того, что именно они используют. Фаервол нового поколения обладает огромным охватом приложений — 6 600 приложений и 260 000 виджетов социальных сетей. Вы можете создать политики гранулярного контроля для пользователей или групп, чтобы идентифицировать, заблокировать или ограничить использование приложений и виджетов для обмена сообщениями, общения в соцсетях, просмотра видео, IP-телефонии, игр и прочего.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Единое управление</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Наша единая система управления безопасностью упрощает сложную задачу по управлению всей вашей инфраструктурой безопасности. Вы увидите и сможете контролировать угрозы, устройства, пользователей с помощью интуитивно понятного графического интерфейса, в котором наглядно представлена вся необходимая информация. Управляйте всеми вашими шлюзами безопасности и программными блейдами из одной централизованной панели управления.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Анализ логов</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Чтобы помочь вам разобраться в данных, мы добавили SmartLog — передовой анализатор логов с быстрым поиском. Он дает вам полный контроль над миллионами логов, записанных в разное время и на разных доменах.</span>","shortDescription":"Фаервол нового поколения компании Check Point контролирует использование приложений, а также сканирует данные, чтобы остановить угрозы.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point Фаервол нового поколения (NGFW)","keywords":"приложений, пользователей, безопасности, поколения, через, нового, Фаервол, ваши","description":"Преимущества\rКонтроль использования приложений\r Идентификация, разрешение, блокирование или ограничение использования приложений и функций этих приложений.","og:title":"Check Point Фаервол нового поколения (NGFW)","og:description":"Преимущества\rКонтроль использования приложений\r Идентификация, разрешение, блокирование или ограничение использования приложений и функций этих приложений.","og:image":"https://old.b4r.io/fileadmin/user_upload/checkpoint_logo.png"},"eventUrl":"","translationId":2674,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["airlock-web-application-firewall","akamai-kona-web-application-firewall","arbor-aps","aws-waf","aws-waf-web-application-firewall","axis-f","barracuda-cloudgen-firewall","barracuda-email-security-gateway","barracuda-nextgen-firewall-ngfw","barracuda-web-application-firewall","barracuda-web-security-gateway","big-ip-local-traffic-manager","cellopoint-secure-email-gateway","check-point-21000-appliances","check-point-600-appliance","check-point-intrusion-prevention-system-software-blade","check-point-next-generation-firewall-ngfw","check-point-vsec-virtual-edition","check-point-programmnyi-bleid-ips","check-point-faervol-novogo-pokolenija-ngfw"]},"links":{"first":"http://b4r_be/api/products?page=1","last":"http://b4r_be/api/products?page=5","prev":null,"next":"http://b4r_be/api/products?page=2"},"meta":{"current_page":1,"from":1,"last_page":5,"path":"http://b4r_be/api/products","per_page":20,"to":20,"total":88},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"13":{"id":13,"title":"NG Firewall"},"19":{"id":19,"title":"WAF - Web Application Firewall"},"38":{"id":38,"title":"Secure E-mail Gateway"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}