{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"en":"Offer a reference bonus","ru":"Предложить бонус за референс","_type":"localeString"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"i-sell-it":{"_type":"localeString","en":"I sell it","ru":"I sell it"},"i-use-it":{"_type":"localeString","en":"I use it","ru":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"_type":"localeString","en":"Selling","ru":"Продают"},"using":{"_type":"localeString","en":"Using","ru":"Используют"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"supplier-popover":{"en":"supplier","ru":"поставщик","_type":"localeString"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"en":"Rating ascending","ru":"По возрастанию рейтинга","_type":"localeString"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"en":"Rebate descending","ru":"По убыванию скидки","_type":"localeString"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"rebate-for-poc":{"ru":"Бонус 4 POC","_type":"localeString","en":"Bonus 4 POC"},"rebate":{"_type":"localeString","en":"Bonus","ru":"Бонус"},"vendor-verified":{"ru":"Поставщик потверждён","_type":"localeString","en":"Vendor verified"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"categories-popover":{"en":"categories","ru":"категории","_type":"localeString"},"sort-popular-asc":{"en":"Popular ascending","ru":"По возростанию популярности","_type":"localeString"},"sort-popular-desc":{"en":"Popular descending","ru":"По убыванию популярности","_type":"localeString"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"login":{"de":"Einloggen","ru":"Войти","_type":"localeString","en":"Login"},"register":{"en":"Register","de":"Registrieren","ru":"Зарегистрироваться","_type":"localeString"},"auth-message":{"en":"You need to register or login.","de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString"},"add-to-comparison":{"en":"Add to comparison","ru":"Добавить в сравнение","_type":"localeString"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"items-found":{"en":"Products found","ru":"Продуктов найдено","_type":"localeString"},"sort-sales-desc":{"_type":"localeString","en":"By sale","ru":"По продаже"},"sort-purchases-desc":{"ru":"По покупке","_type":"localeString","en":"By purchase"},"product-supplier":{"en":"Product supplier","ru":"Поставщик продукта","_type":"localeString"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product producer"},"products-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"_type":"localeString","en":"from","ru":"от"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"en":"View","ru":"Вид","_type":"localeString"},"sort-type-label":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"_type":"localeString","en":"Follow","ru":"Следить"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"_type":"localeString","en":"Filter","ru":"Фильтр"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"en":"Delivery type","ru":"Тип поставки","_type":"localeString"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"problems-field":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"_type":"localeString","en":"Apply filter","ru":"Применить фильтр"},"sorting-toggle":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"_type":"localeString","en":"Suggest product","ru":"Предложить продукт"},"with-projects-label":{"_type":"localeString","en":"With deployments","ru":"С внедрениями"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"_type":"localeString","en":"Product Categories","ru":"Категории продуктов"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"_type":"localeString","en":"Seller","ru":"Продавец"},"vendors":{"_type":"localeString","en":"User products vendors","ru":"Производители продуктов пользователя"},"suppliers":{"en":"User suppliers","ru":"Поставщики пользователя","_type":"localeString"},"business-process":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"_type":"localeString","en":"With reference","ru":"С референсами"},"show-deal-checkbox":{"en":"Show deal with noname","ru":"Показывать сделки с noname","_type":"localeString"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"_type":"localeString","en":"Find","ru":"Выполнить поиск"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"en":"Add deployment","ru":"Добавить внедрение","_type":"localeString"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"_type":"localeString","en":"Sellers","ru":"Поставщики, Производители"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"_type":"localeString","en":"With comments","ru":"С комментариями"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"user":{"en":"User","ru":"Пользователь","_type":"localeString"},"company-type":{"en":"Company type","ru":"Тип компании","_type":"localeString"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"_type":"localeString","en":"Customers","ru":"Покупатели"},"product-supplier":{"en":"Product supplier","ru":"Поставщик продукта","_type":"localeString"},"product-vendor":{"_type":"localeString","en":"Product vendor","ru":"Производитель продукта"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"en":"Deal canceled","ru":"Сделка отменена","_type":"localeString"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"_type":"localeString","en":"Competencies","ru":"Компетенции"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"label":"catalog-products-text-block","body":{"_type":"localeBlock","en":[{"_key":"8bebcfb34955","markDefs":[],"children":[{"_type":"span","marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550"}],"_type":"block","style":"normal"}],"ru":[{"style":"normal","_key":"28241882db7a","markDefs":[],"children":[{"marks":[],"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0","_type":"span"}],"_type":"block"}]}}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"title":{"ru":"ROI4CIO: Продукты","_type":"localeString","en":"ROI4CIO: Products"},"meta":[{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"og:title","translations":{"_type":"localeString","en":"Products","ru":"Продукты"}},{"translations":{"_type":"localeString","en":"Description","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI"},"name":"description"},{"translations":{"_type":"localeString","en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI"},"name":"og:description"},{"name":"keywords","translations":{"ru":"каталог, программное обеспечение, софт, ит услуги","_type":"localeString","en":"keyword"}},{"translations":{"en":"Products","ru":"Продукты","_type":"localeString"},"name":"title"}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"arbor-aps":{"id":195,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Arbor_APS.jpg","logo":true,"scheme":false,"title":"Arbor APS","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"arbor-aps","companyTitle":"Arbor Networks","companyTypes":["vendor"],"companyId":2744,"companyAlias":"arbor-networks","description":"• DDoS protection from active botnets\r\n• DDoS protection from active DDoS campaigns based on IP reputation\r\n• Advanced web crawler service\r\n• GeoIP tracking\r\n• Domain and IP reputation to block threats\r\nAPS enhances your overall protection by using Cloud Signaling™ to connect local protection with cloud-based DDoS services. With Cloud Signaling, APS automatically alerts upstream service providers, such as your ISP or Arbor CloudSM, when larger attacks threaten availability. This allows for a faster time to mitigate attacks. ","shortDescription":"Arbor Networks® APS helps protect business continuity and availability from the growing constellation of DDoS attacks and other advanced threats. It provides the world’s most advanced and sophisticated attack detection and mitigation technology in an easy-to-deploy platform designed to automatically neutralize IPv4 and IPv6 attacks before they impact critical applications and services.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Arbor APS","keywords":"protection, DDoS, Cloud, attacks, Arbor, reputation, service, from","description":"• DDoS protection from active botnets\r• DDoS protection from active DDoS campaigns based on IP reputation\r• Advanced web crawler service\r• GeoIP tracking\r•","og:title":"Arbor APS","og:description":"• DDoS protection from active botnets\r• DDoS protection from active DDoS campaigns based on IP reputation\r• Advanced web crawler service\r• GeoIP tracking\r•","og:image":"https://old.b4r.io/fileadmin/user_upload/Arbor_APS.jpg"},"eventUrl":"","translationId":196,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"big-ip-local-traffic-manager":{"id":201,"logoURL":"https://old.b4r.io/fileadmin/user_upload/BIG-IP_Local_Traffic_Manager.jpg","logo":true,"scheme":false,"title":"BIG-IP Local Traffic Manager","vendorVerified":0,"rating":"1.70","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":2,"alias":"big-ip-local-traffic-manager","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms the chaotic volume of network traffic into logically assembled streams of data, and then makes intelligent traffic management decisions, selecting the right destination based on server performance, security, and availability.\r\n\r\nYes, BIG-IP LTM enables sophisticated load balancing. But, that’s just the beginning.\r\nFull proxy means full power.\r\n\r\nIf you can see it, you can manipulate it.\r\n\r\nBecause BIG-IP LTM is a full proxy, you can inspect, manage, and report on application traffic entering and exiting your network. From basic load balancing to complex traffic management decisions based on client, server, or application status, BIG-IP LTM gives you granular control over app traffic.\r\n\r\nFor example, if you want to direct traffic based on the requested URL or log specific server responses to a reporting system, BIG-IP LTM has the architecture and the tools you need to do it.\r\n\r\nOperational efficiency? Check.\r\n\r\nBIG-IP LTM can optimize the speed and reliability of your applications via both network and application layers.\r\n\r\nUsing real-time protocol and traffic management decisions based on application and server conditions, extensive connection management, and TCP and content offloading, BIG-IP LTM dramatically improves page load times and the user experience.\r\n\r\nWhether it’s negotiating high-latency networks or offloading millions of connections, BIG-IP LTM can improve the performance of your infrastructure and your applications.\r\n\r\nThe SSL performance of BIG-IP LTM lets you cost-effectively protect the end-to-end user experience by encrypting everything from the client to the server. It also scales on-demand and absorbs potentially crippling DDoS attacks.\r\n\r\nOften SSL is turned on throughout the network. Thing is, most network security devices aren’t built to detect malicious traffic in layers 4–7. Separating the good and bad traffic is the first problem, taking action on the malicious traffic is the second.\r\n\r\nBIG-IP LTM includes levels of inspection necessary to block bad traffic and allow good traffic to pass through.\r\n\r\n","shortDescription":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BIG-IP Local Traffic Manager","keywords":"traffic, BIG-IP, application, network, server, your, based, management","description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms","og:title":"BIG-IP Local Traffic Manager","og:description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms","og:image":"https://old.b4r.io/fileadmin/user_upload/BIG-IP_Local_Traffic_Manager.jpg"},"eventUrl":"","translationId":202,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-21000-appliances":{"id":86,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Check_Point_21000.jpg","logo":true,"scheme":false,"title":"Check Point 21000 Appliances","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-21000-appliances","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"Delivers the best performance in its class\r\n\r\nUp to 44.5 Gbps of real-world firewall throughput\r\nUp to 6.9 Gbps of real-world IPS throughput\r\nSupports sub 5 micro-second low-latency transactions\r\nSupports high availability and serviceability\r\n\r\nOffers a variety of network options to work in any network environment\r\nOffers Lights-Out-Management option for remote out-of-band management\r\nEnables service without downtime thanks to hot-swap and redundant components\r\nReduces costs through security consolidation\r\n\r\nExtends easily to add more security features without adding a new appliance\r\nAvailable in four complete and Software Blade packages that meet any security need\r\nAvailable in a low-cost, high-performance package with extended memory for maximum connection capacity\r\nFeatures\r\n\r\nMaximum security and performance\r\nThe Check Point 21000 Appliances offer maximum availability of business-critical applications and the best performance available in their class.\r\n\r\nHigh port density with up to 37x1GbE ports for network segmentation\r\n110 Gbps firewall throughput and sub-5µs latency for mission-critical applications\r\nComes in compact 2-rack unit chassis\r\nComes with acceleration and clustering technologies\r\n\r\nReliability and high serviceability\r\nMeet the uncompromising high availability standards of modern data centers; the 21000 Appliances are designed to be highly serviceable, even when deployed in customer networks.\r\n\r\nHot-swappable redundant power supplies, hard disk drives and fans\r\nAn advanced Lights-Out-Management card provides out-of-band remote management to remotely diagnose, start, restart and manage the appliance from a remote location\r\n\r\nPrevent unknown threats\r\nCheck Point provides complete zero-day threat prevention and alerts when under attack. Threat Extraction delivers zero-malware documents in zero seconds. Threat Emulation inspects files for malicious content in a virtual sandbox. When Threat Emulation discovers new threats, a signature is sent to the Check Point ThreatCloud database which documents and shares information on the newly identified malware with other Check Point customers — providing immediate protection against zero-day threats.\r\n\r\n\r\nSecurity acceleration module for greater performance confidence\r\nWith the optional Security Acceleration Module, you can confidently increase firewall and VPN bandwidth through your 21000 Appliance without performance degradation. Check Point’s innovative, purpose-built SecurityCore™ technology uses parallel and security processing power to accelerate security performance.\r\n\r\nOffloads security processing from the general purpose appliance CPU\r\nAvailable as a bundle for significant savings right out of the box\r\nHigh network capacity\r\nDeploy the Check Point 21000 Appliances in any network environment.\r\n\r\nUp to 37 10/100/1000Base-T ports\r\nUp to 36 1000base-F SFP, or up to 13 10GBase-F SFP+ ports\r\nThree front-facing expansion slots\r\nUp to 1,024 VLANs for higher network segmentation\r\n\r\nPre-configured with Next Generation Software Blade packages\r\nPre-configured with Next Generation Software Blade packages The Check Point 21000 Appliances offer a complete and consolidated security solution available in five Next Generation Security Software Blade packages.\r\n\r\nNext Generation Firewall—identify and control applications by user and scan content to stop threats (included Blades: IPS and Application Control)\r\nNext Generation Secure Web Gateway—enable secure use of Web 2.0 with real-time multilayer protection against web-borne malware (included Blades: Application Control, URL Filtering, Antivirus and SmartEvent)\r\nNext Generation Data Protection—preemptively protect sensitive information from unintentional loss, educate users on proper data-handling policies and empower them to remediate incidents in real-time (included Blades: IPS, Application Control and Data-Loss Prevention).\r\nNext Generation Threat Prevention—apply multiple layers of protection to prevent sophisticated cyber-threats (included Blades: IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security)\r\nNext Generation Threat Extraction—(NGTX): advanced next-gen zero-day threat prevention, NGTP with Threat Emulation and Threat Extraction.\r\nAdditional Software Blade upgrades are available to further extend and customize protection options","shortDescription":"The 21000 Appliances are designed for data centers with the most demanding requirements for performance and high availability. They are ideal for low-latency transactions, with sub 5 micro-second latency, and they deliver excellent serviceability features for cost-efficient operation.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point 21000 Appliances","keywords":"security, Check, with, Generation, Next, Threat, Point, 21000","description":"Delivers the best performance in its class\r\rUp to 44.5 Gbps of real-world firewall throughput\rUp to 6.9 Gbps of real-world IPS throughput\rSupports sub 5","og:title":"Check Point 21000 Appliances","og:description":"Delivers the best performance in its class\r\rUp to 44.5 Gbps of real-world firewall throughput\rUp to 6.9 Gbps of real-world IPS throughput\rSupports sub 5","og:image":"https://old.b4r.io/fileadmin/user_upload/Check_Point_21000.jpg"},"eventUrl":"","translationId":86,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-600-appliance":{"id":90,"logoURL":"https://old.b4r.io/fileadmin/content/Ustroistvo_Check_Point_600.png","logo":true,"scheme":false,"title":"Check Point 600 Appliance","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-600-appliance","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"<div class=\"row rowdefault\" style=\"box-sizing: border-box; margin-left: -15px; margin-right: -15px; \">\r\n<div id=\"benefits-and-quote\" class=\"row rowdefault\" style=\"box-sizing: border-box; margin-left: -15px; margin-right: -15px; margin-top: 1.3em; \"> Benefits\r\n\r\nSecures your small business with advanced security\r\n\r\nProtects against viruses, spam, dangerous applications and malicious websites\r\nDesigned from the ground up for the needs of small businesses\r\n\r\nConnects securely to your office network from any laptop, smartphone or tablet\r\nSets up in minutes with easy and intuitive web-based management\r\nSimplifies your security management with optional Check Point SMB Managed Security Services\r\nKeeps you connected with flexibility, speed and power\r\n\r\nSupports multiple Internet access options, including Ethernet, ADSL, 3G and 4G\r\nProvides integrated wireless security with guest access\r\nDelivers market-leading speeds with 100 Mbps of real-world throughput\r\n\r\n\r\nFeatures\r\n\r\nEnterprise-caliber firewall and threat protection\r\nSmall companies shouldn’t have to settle for less security. The Check Point 600 Appliance has the industry’s highest-ranked next-generation firewall, IPS and threat prevention security technologies to deliver robust protection from modern cyber-threats. You’ll get the same level of protection enjoyed by Fortune 100 companies—at SMB prices.\r\n\r\n\r\nA comprehensive protection suite\r\nLeveraging the proven and flexible Software Blade Architecture, the 600 Appliance delivers multilayer security to the small-office environment, including:\r\n\r\nFirewall\r\nVPN\r\nAdvanced Networking & Clustering\r\nIdentity Awareness & User Awareness\r\nIPS\r\nApplication Control\r\nURL Filtering\r\nAntivirus\r\nAnti-Bot\r\nAnti-Spam and Email Security\r\n\r\nSecurity managed via the cloud\r\nWe can even help you manage your security appliance through the cloud. With Check Point Cloud-Managed Security Service, you’ll leverage Check Point’s technology leadership and 24/7 security expertise to ensure your network will be monitored and protected at all times. Learn more about the features and benefits of this service on our Check Point SMB Cloud-Managed Security Service page.\r\n\r\nFlexible network connections with high capacity\r\nThe 600 Appliance comes standard with 10 x 1Gbps Ethernet ports. For added flexibility and convenience, Check Point offers a wireless version that includes a WiFi access point (802.11b/g/n) that supports WEP, WPA and WPA2 authentication, as well as secured guest access capabilities.\r\n\r\nIntegrated ADSL modem\r\nIncluded USB and PCI Express card slots make it easy to create a redundant Internet link for maximum reliability\r\n\r\nSimple management, configuration and deployment\r\nThe Check Point 600 Appliance can be up and ready in minutes, offering hassle-free deployment to small offices with minimal IT support staff.\r\n\r\nSimple web-based local management interface\r\nFirst-time set-up wizard\r\nEasy-to-understand logs and reports for hassle-free device monitoring\r\n<div class=\"row rowdefault\" style=\"box-sizing: border-box; margin-left: -15px; margin-right: -15px; \">","shortDescription":"Small businesses need multi-layered security in a simple, affordable package. The Check Point 600 Appliance is a single, integrated device offering firewall, VPN, IPS, antivirus, application visibility and control, and URL filtering and email security, all in a quiet, compact desktop form factor.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point 600 Appliance","keywords":"with, Check, security, Point, your, Appliance, Security, protection","description":"\r Benefits\r\rSecures your small business with advanced security\r\rProtects against viruses, spam, dangerous applications and malicious websites\rDesigned","og:title":"Check Point 600 Appliance","og:description":"\r Benefits\r\rSecures your small business with advanced security\r\rProtects against viruses, spam, dangerous applications and malicious websites\rDesigned","og:image":"https://old.b4r.io/fileadmin/content/Ustroistvo_Check_Point_600.png"},"eventUrl":"","translationId":90,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-intrusion-prevention-system-software-blade":{"id":497,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Check_Point_programmnyi_bleid_IPS1.jpg","logo":true,"scheme":false,"title":"Check Point Intrusion Prevention System Software Blade","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-intrusion-prevention-system-software-blade","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. The IPS Software Blade delivers complete and proactive intrusion prevention – all with the deployment and management advantages of a unified and extensible next-generation firewall solution.\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n<ul><li>Next-generation security prevention, protection and performance</li><li>Industry-leading intrusion protection and firewall—as tested NSS Labs—delivers 1,000s of signature, behavioral and preemptive protections</li><li>Check Point is ranked #1 in Microsoft and Adobe threat coverage</li><li>Combines with best-of-breed firewall, application control, URL filtering, DLP and more on the most comprehensive, network-class next gen firewall</li><li>Unrivaled, multi-Gigabit performance in an integrated IPS</li><li>Up to 15 Gbps of IPS and 30 Gbps of firewall throughput</li><li>Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection and accelerated IPS throughput</li><li>CoreXL technology provides the most efficient and high-performance use of multi-core technologies</li><li>Lowest TCO and fastest ROI of any enterprise-class firewall solution</li><li>One-click activation of IPS and firewall protection on any Check Point gateway</li><li>Delivers unmatched extensibility and flexibility—all without adding CapEx</li><li>Integrated into Check Point Software Blade Architecture for on-demand security</li></ul>\r\nThe Check Point IPS Software Blade is delivering better security than our previous IPS software solution and at a lower cost. Check Point has designed the IPS software blade for efficient resource utilization, which improves performance, mission critical availability, and uptime.\r\n<span style=\"font-weight: bold;\">Complete Intrusion Prevention System (IPS) Functionality</span>\r\nThe Intrusion Protection System Software Blade complements firewall protection, further securing your network without degrading gateway performance.\r\n<span style=\"font-weight: bold;\">Full-featured IPS</span>\r\nThe IPS Software Blade provides a complete Intrusion Prevention System security solution, providing comprehensive network protection against malicious and unwanted network traffic, including:\r\n<ul><li>Malware attacks</li><li>Dos and DDoS attacks</li><li>Application and server vulnerabilities</li><li>Insider threats</li><li>Unwanted application traffic, including IM and P2P</li><li>Geo-protections</li></ul>\r\nGeo-protections enforce or monitor traffic based on the source or destination country. Create a geo-protection policy with exceptions to allow legitimate traffic through while blocking or monitoring traffic from unknown and untrusted sources. Monitor activity with the SmartEvent Software Blade.\r\n<span style=\"font-weight: bold;\">Trusted Security</span>\r\nReal-Time protections – The IPS Software Blade is constantly updated with new defenses against emerging threats. Many of the IPS protections are pre-emptive, providing defenses before vulnerabilities are discovered or exploits are even created.\r\nMicrosoft vulnerability coverage – Check Point is ranked #1 in Microsoft threat coverage, including preemptive protections against emerging vulnerabilities and exploits.\r\n<span style=\"font-weight: bold;\">Multi-gigabit Integrated IPS Performance</span>\r\nDelivers up to 15 Gbps of IPS throughput with the default IPS profile. The IPS Software Blade incorporates a high-speed pattern matching engine that does multi-layered, 2-tier inspection for maximum performance with thousands of protections enabled.\r\n<span style=\"font-weight: bold;\">Dynamic Threat Management</span>\r\nWith the IPS Software Blade and the SmartEvent Software Blade you gain a new, dynamic management paradigm for today’s high volume, real-time and evolving threat environment.\r\nCheck Point threat management workflows allow you to handle constant change quickly and efficiently, reducing your management overhead and allowing you to confidently and promptly deploy protections.\r\n<span style=\"font-weight: bold;\">The IPS Software Blade offers:</span>\r\n<ul><li>New protections sandbox – Build confidence in a ‘sandbox’ environment with no impact on your network.</li><li>Automatic protection activation – Activation of new protections, based on configurable parameters (performance impact, confidence index, threat severity). The difficulties of constant, individual management of thousands of protections are eliminated.</li><li>Unified Management – The IPS blade is configured and managed through a common Check Point management interface—the same one used to manage other security gateway Software Blades and Check Point dedicated IPS.</li><li>Configurable, actionable monitoring – Track events through detailed reports and logs of what is most important. The new Security Management Software Blade for IPS and Security Provisioning Software Blade simplify threat analysis and reduce operational overhead.</li><li>Business-level views – Customizable reports provide easy monitoring of critical security events associated with your business-critical systems.</li><li>Multi-dimensional sorting – Drag-and-drop columns of event data and the information will be automatically re-ordered.</li><li>Actionable event logs – Edit the associated protection, create an exception or view packet data directly from log entries.</li></ul>","shortDescription":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point Intrusion Prevention System Software Blade","keywords":"Software, Blade, Point, with, Check, protections, protection, security","description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than","og:title":"Check Point Intrusion Prevention System Software Blade","og:description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than","og:image":"https://old.b4r.io/fileadmin/user_upload/Check_Point_programmnyi_bleid_IPS1.jpg"},"eventUrl":"","translationId":497,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-vsec-virtual-edition":{"id":473,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Check_Point_vSEC_Virtual_Edition.jpg","logo":true,"scheme":false,"title":"Check Point vSEC Virtual Edition","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-vsec-virtual-edition","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"Secure virtual environments\r\n\r\nMulti-layered security protections for virtual environments including next-generation firewall and advanced threat prevention\r\nInspect all traffic—from inter-VM to perimeter—in the virtual network\r\nPermit secure access to remote systems and networks\r\nUnified management of virtual and physical environments\r\n\r\nConsistent security policy and uniform security management across both physical and virtual infrastructures\r\nVisibility into virtualization configuration and security changes\r\nSeparation of duties between virtualization and security teams\r\nLicensing is based on virtual cores used and supports dynamic allocation ideal for elastic workloads\r\nThanks to Check Point vSEC Virtual Edition (VE), we have a virtual security solution that fully integrates into our dynamic virtualized environment with all the performance, security and functionality we’ve expected from our physical Check Point gateways for years.\r\n\r\nFeatures\r\n\r\nFull protections with Check Point Software Blades\r\nCheck Point vSEC Virtual Edition provides the full protections of the Check Point Software Blade architecture.\r\n\r\nFirewall, IPS, Antivirus, Anti-Bot Software Blades protect services in the public cloud from unauthorized access and attacks.\r\nApplication Control Software Blade helps prevent application layer denial of service attacks and protects your cloud services.\r\nIPsec VPN Software Blade allows secure communication into cloud resources.\r\nMobile Access Software Blade allows mobile users to connect to the cloud using an SSL encrypted connection with two factor authentication and device pairing.\r\nData Loss Prevention Software Blade protects sensitive data from theft or unintentional loss.\r\nSandBlast Zero-Day Protection Blades provide the most comprehensive protection against malware and zero-day attacks.\r\nConsolidated logs and reporting for hybrid cloud environments\r\nGet visibility and enforcement across your virtual infrastructures using the Next Generation SmartEvent Software Blade. Simplify compliance and audits with unified logs and reporting.\r\nCentralized management for virtual and physical infrastructures\r\nManage vSEC VE using your existing on-premise Check Point Unified Security Management Solution. Enforce a consistent security policy for corporate assets across both virtual and physical infrastructures from a single console.\r\n","shortDescription":"The Check Point vSEC Virtual Edition gateway protects dynamic virtualized environments from internal and external threats by securing virtual machines (VMs) and applications with the full range of protections of the Check Point Software Blade architecture. Check Point’s virtualization security supports multiple hypervisors including VMware ESX, Microsoft Hyper-V and KVM.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point vSEC Virtual Edition","keywords":"virtual, security, Software, Point, Check, Blade, cloud, physical","description":"Secure virtual environments\r\rMulti-layered security protections for virtual environments including next-generation firewall and advanced threat prevention","og:title":"Check Point vSEC Virtual Edition","og:description":"Secure virtual environments\r\rMulti-layered security protections for virtual environments including next-generation firewall and advanced threat prevention","og:image":"https://old.b4r.io/fileadmin/user_upload/Check_Point_vSEC_Virtual_Edition.jpg"},"eventUrl":"","translationId":474,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-programmnyi-bleid-ips":{"id":496,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Check_Point_programmnyi_bleid_IPS1.jpg","logo":true,"scheme":false,"title":"Check Point программный блейд IPS","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-programmnyi-bleid-ips","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по сравнению с традиционными отдельными инструментами IPS. Программный блейд обеспечивает максимальную проактивную систему борьбы с вторжениями — и все это вместе с преимуществами унифицированного фаервола нового поколения.\r\n\r\n<span style=\"font-weight: bold;\">Преимущества</span>\r\n<ul><li>Новое поколение IPS — более совершенная защита, более высокая производительность</li><li>Лидер в области защиты от вторжений и среди фаерволов по данным тестов NSS Labs. Решение содержит тысячи методов сигнатурной, поведенческой и превентивной защиты.</li><li>Решения Check Point обеспечивают наибольший охват угроз для приложений Microsoft и Adobe.</li><li>Сочетание современного фаервола, контроля приложений, фильтрации URL, DLP и многого другого в самом передовом фаерволе нового поколения сетевого класса.</li><li>Исключительно высокая многогигабитная производительность</li><li>До 15 Гб/с пропускная способность IPS и до 30 Гб/с пропускная способность фаервола.</li><li>Технологии Stateful Inspection и SecureXL обеспечивают многоуровневую проверку и ускоряют пропускную способность.</li><li>Технология CoreXL обеспечивает наиболее эффективное и производительное использование многоядерных технологий.</li><li>Низкая общая стоимость владения и быстрый возврат инвестиций</li><li>Активация в один клик IPS и фаервола на любом шлюзе Check Point.</li><li>Гибкость и возможность расширения защиты без дополнительных капиталовложений.</li><li>Интеграция с архитектурой программных блейдов для выбора защиты, соответствующей требованиям бизнеса.</li></ul>\r\n<span style=\"font-weight: bold;\">Возможности</span>\r\n\r\n<ul><li>Производительная и надежная система предотвращения вторжений</li><li>Программный блейд Intrusion Protection System дополняет защиту фаервола и прочнее защищает вашу сеть без потери производительности.</li><li>Полнофункциональная IPS</li><li>Программный блейд IPS — это полноценная система защиты от вторжений, которая обеспечивает максимальную защиту от вредоносных файлов и нежелательного сетевого трафика, включая:</li><li>Вредоносные атаки</li><li>DoS- и DDoS-атаки</li><li>Уязвимости в приложениях и серверах Application and server vulnerabilities</li><li>Инсайдерские угрозы</li><li>Нежелательный трафик в приложениях, включая IM и P2P</li></ul>\r\n\r\n\r\n\r\n\r\n\r\n<span style=\"font-weight: bold;\">Геозащита</span>\r\n\r\nГеозащита отслеживает трафик на основании источника или страны назначения. Создание правил геозащиты с исключениями позволит получать легитимный трафик и блокировать или следить за трафиком из неизвестных или недоверенных источников. Мониторинг активностей помогает осуществить программный блейд SmartEvent.\r\n\r\n<span style=\"font-weight: bold;\">Высокий уровень защиты</span>\r\n\r\nЗащита в режиме реального времени — программный блейд IPS постоянно обновляет инструментарий защиты против развивающихся угроз. Многие из этих инструментов превентивные и обеспечивают защиту до того, как уязвимости будут обнаружены, а эксплойты созданы.\r\nМаксимальное покрытие угроз для приложений Microsoft — Check Point является компанией № 1 по покрытию угроз, включая превентивную защиту против развивающихся уязвимостей и эксплойтов.\r\n<span style=\"font-weight: bold;\">Встроенная система IPS</span>\r\nПрограммный блейд со встроенной системой IPS обеспечивает максимальную защиту по более низкой цене (до 50%) по сравнению с многочисленными отдельными решениями. По соотношению цены и производительности этот блейд до десяти раз превосходит другие решения. Встроенная система IPS имеет много преимуществ, которые становятся новым стандартом в отрасли, включая:\r\n\r\nУменьшение издержек за счет консолидации многочисленных независимых решений.\r\n\r\n<span style=\"font-weight: bold;\">Благодаря интеграции IPS с cуществующим фаерволом вы экономите на:</span>\r\n\r\n<ul><li>Покупке оборудования</li><li>Свободном объеме на жестких дисках</li><li>Тренингах и повседневном управлении</li><li>Местах для стоек</li><li>Прокладке кабелей</li><li>Охлаждении</li><li>Электроэнергии</li><li>Снижение задержек</li><li>Инспекция трафика производится только один раз — сразу фаерволом и IPS.</li><li>Последовательная реализация политик</li><li>Интегрированное решение обладает едиными совместными политиками безопасности.</li><li>Упрощение управления и обучения</li><li>Снижение расходов на управление и обучение.</li><li>Уменьшение ошибок.</li><li>Простое сочетание с организационной структурой IT.</li><li>Увеличение операционной эффективности и рентабельности.</li><li>Простое развертывание</li><li>Быстрое добавление защиты IPS на шлюз безопасности без лишних проверок.</li></ul>\r\n\r\n\r\n<span style=\"font-weight: bold;\">Многогигабитная производительность</span>\r\nБлейд обеспечивает пропускную способность до 15 Гб/с с установленным по умолчанию профилем IPS. Блейд содержит высокоскоростную модель, которая обеспечивает многоуровневую проверку.\r\n\r\n<span style=\"font-weight: bold;\">Проверка защищенного SSL-трафика</span>\r\nПроверяйте и делайте безопасным защищенный SSL-трафик, проходящий через шлюз безопасности. Когда трафик проходит через шлюз, тот расшифровывает трафик с помощью публичного ключа отправителя, затем проверяет и очищает, а после повторно шифрует и посылает вновь зашифрованный контент получателю. Гранулярность позволяет устанавливать исключения для инспекции SSL, чтобы не нарушить конфиденциальность и обеспечить выполнение политик безопасности. Некоторая часть зашифрованного контента может не инспектироваться — администратор может установить исключения из правил проверки. Правила определяет администратор.\r\n\r\n<span style=\"font-weight: bold;\">Динамическое управление защитой от угроз</span>\r\nС программными блейдами IPS и SmartEvent вы получаете новую динамическую возможность для борьбы с многочисленными угрозами — в том числе с развивающимися и поступающими в режиме реального времени. Механизмы управления защитой от угроз позволяют вам быстро и эффективно производить постоянные изменения, сокращая количество ошибок и позволяя внедрять защиту оперативно и конфиденциально.\r\n\r\n<span style=\"font-weight: bold;\">Программный блейд IPS предлагает:</span>\r\n\r\n<ul><li>Защита в «песочнице» — обеспечивает уверенность благодаря запуску приложений без влияния на сеть. Автоматическая активация защиты — активация новой защиты основывается на настраиваемых параметрах (воздействие на производительность, индекс доверия, тяжесть угроз). Тем самым устраняется сложность постоянного индивидуального администрирования.</li><li>Унифицированное управление — блейд IPS настраивается и управляется через стандартный интерфейс управления Check Point, который в частности используется, чтобы управлять другими шлюзами безопасности Check Point и отдельной системой IPS.</li><li>Настраиваемый мониторинг — отслеживание событий через детальные отчеты поможет узнать о самом важном. Новый программный блейд Управление безопасностью для блейдов IPS и программный блейд Security Provisioning упрощают анализ угроз и сокращают операционные ошибки.</li><li>Бизнес-уровень — настраиваемые отчеты обеспечивают простой мониторинг критических событий безопасности, которые ассоциированы с вашими критически важными системами.</li><li>Многомерная сортировка — перетащите колонку с данными о событии, и информация будет автоматически перестроена.</li><li>Применимые на практике логи событий — редактируйте связанную защиту, создавайте исключения и просматривайте пакетные данные прямо из записей логов.</li><li>Простое развертывание. Развертывание на вашем существующем фаерволе — сократите время и уменьшите издержки за счет повышения эффективности текущей инфраструктуры.</li><li>Гранулярная защита — легкие в использовании профили позволяют администраторам создавать подписи и активировать правила, которые соответствуют специфическим потребностям ваших сетевых активов.</li><li>Преднастроенные и рекомендованные профили — позволяют вам немедленно использовать профили и легко работать с ними, оптимизируя их в соответствии с требованиями производительности.</li><li>Опционально доступный режим «только обнаружение» — вся ваша защита будет работать на обнаружение, но трафик блокировать не будет, что позволит вам работать без риска сбоев.</li><li>Защита получения обновлений. Установка обновлений — это небезопасная процедура, которая подвергает вашу сеть риску атаки. Но благодаря более глубокому подходу, сочетающему надежную функциональность IPS с продуманной стратегией установки обновлений, администраторы сети могут лучше подготовиться к установкам и обезопасить сеть.</li><li>Интеграция с архитектурой программных блейдов. Программный блейд IPS интегрирован с архитектурой программных блейдов. Он может быть легко и быстро активирован на существующих шлюзах Check Point, что экономит время и сокращает издержки за счет повышения качества защитной инфраструктуры.</li></ul>\r\n\r\n\r\n\r\n\r\n","shortDescription":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по сравнению с традиционными отдельными инструментами IPS.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point программный блейд IPS","keywords":"блейд, защиты, угроз, защиту, Point, Check, обеспечивает, трафик","description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по","og:title":"Check Point программный блейд IPS","og:description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по","og:image":"https://old.b4r.io/fileadmin/user_upload/Check_Point_programmnyi_bleid_IPS1.jpg"},"eventUrl":"","translationId":2402,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"defensepro":{"id":197,"logoURL":"https://old.b4r.io/fileadmin/user_upload/DefenseProx420.jpg","logo":true,"scheme":false,"title":"DefensePro","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"defensepro","companyTitle":"radware","companyTypes":["vendor"],"companyId":2746,"companyAlias":"radware","description":"DefensePro provides world-class DDoS protection including distributed denial of service (DDoS) attack mitigation and SSL-based DDoS attacks to fully protect applications and networks against known and emerging network security threats such denial of service attacks, DDoS attacks, Internet pipe saturation, attacks on login pages, attacks behind CDNs, and SSL-based flood attacks with:\r\n\r\nDDoS Protection With Dedicated Hardware That Protects Without Impacting Legitimate Traffic\r\n\r\nDefensePro uses a dedicated hardware platform based on Radware's OnDemand Switch supporting network throughputs up to 160Gbps. It embeds two unique and dedicated hardware components: a DoS Mitigation Engine (DME) to prevent high volume denial of service attacks and DDoS attacks, flood attacks, without impacting legitimate traffic, and a StringMatch Engine (SME) to accelerate signature detection.\r\n\r\nCentralized Attack DDoS Prevention Management, Monitoring and Reporting\r\n\r\nAPSolute Vision is a DDoS prevention solution that offers a centralized attack management, monitoring and reporting solution across multiple DefensePro devices and locations. It provides the user real-time DDoS protection with identification, prioritization and response to policy breaches, cyber-attacks and insider threats.\r\n\r\nComplete Set of Security DDoS Attack Defense Mechanisms\r\n\r\nDDoS attack defense mechanisms include Intrusion Prevention System (IPS), Network Behavioral Analysis (NBA), anti-DDoS/Denial-of-Service (DoS) Protection, Reputation Engine and SSL Attack Protection. These DDoS attack defense mechanisms employ multiple detection & mitigation modules including adaptive behavioral analysis and challenge response technologies in addition to signature detection.\r\n\r\nThe Accuracy of Inline, and the Scalability of Out of Path\r\n\r\nDefensePro DDoS protection and DDoS prevention devices can be deployed inline or out-of-path (OOP) in a scrubbing center to provide the highest mitigation accuracy within the shortest time.\r\n\r\nRead more about DefensePro's deployment models.\r\nBased on standard signature detection technology to prevent the known application vulnerabilities, DefensePro DDoS protection consists of patent protected behavioral based real-time signatures technology that detects and mitigates emerging network attacks in real time such as zero-minute attacks, DoS/DDoS attacks and application misuse attacks ― all without the need for human intervention and without blocking legitimate user traffic making it one of the top DDoS prevention solution.s\r\n\r\nDefensePro DDoS protection is a core part of Radware's next generation Attack Mitigation System (AMS) a set of patented technologies designed for the most advanced internet-borne cyber-attacks. AMS extends the "network" of attack detection and mitigation capabilities beyond the data center for:\r\n\r\nCloud- hosted business services and applications\r\n\r\nTools, servers and applications need protection within a virtualized environment\r\n\r\nMobile work force increasingly depend on remote access to internal business applications and SaaS\r\n\r\nAdvanced detection and mitigation techniques need to be ported to tomorrows open network fabrics\r\n","shortDescription":"DefensePro provides world-class DDoS protection including distributed denial of service (DDoS) attack mitigation and SSL-based DDoS attacks to fully protect applications and networks against known and emerging network security threats such denial of service attacks, DDoS attacks, Internet pipe saturation, attacks on login pages, attacks behind CDNs, and SSL-based flood attacks","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DefensePro","keywords":"DDoS, attacks, DefensePro, protection, detection, network, mitigation, attack","description":"DefensePro provides world-class DDoS protection including distributed denial of service (DDoS) attack mitigation and SSL-based DDoS attacks to fully protect","og:title":"DefensePro","og:description":"DefensePro provides world-class DDoS protection including distributed denial of service (DDoS) attack mitigation and SSL-based DDoS attacks to fully protect","og:image":"https://old.b4r.io/fileadmin/user_upload/DefenseProx420.jpg"},"eventUrl":"","translationId":198,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fortigate":{"id":174,"logoURL":"https://old.b4r.io/fileadmin/user_upload/FortiGate.jpg","logo":true,"scheme":false,"title":"FortiGate","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":21,"alias":"fortigate","companyTitle":"Fortinet","companyTypes":["vendor"],"companyId":690,"companyAlias":"fortinet","description":"<span style=\"box-sizing: border-box; font-family: ptsans; font-size: medium; color: rgb(98, 98, 98); \">FortiGate® - network security platform provides unmatched performance and protection while simplifying the network infrastructure. </span>\r\n<span style=\"color: rgb(98, 98, 98); font-family: ptsans; font-size: medium; \">FortiGate-20 - for small businesses and offices</span>\r\n<span style=\"color: rgb(98, 98, 98); font-family: ptsans; font-size: medium; \">FortiGate-5000 - for very large enterprises and service providers.</span>\r\n<span style=\"color: rgb(98, 98, 98); font-family: ptsans; font-size: medium; \">Our award-winning network security appliances provide one platform for end-to-end security across your entire network. FortiGate next gen firewalls are optimized for internal segmentation, perimeter, cloud, data center, distributed, and small business deployments. Simplify your security posture with one security solution across your physical, virtual, and cloud deployments.</span>","shortDescription":"FortiGate is a Top-rated security—NSS Labs “Recommended”\r\nComprehensive security in one, simplified solution\r\nFlexible deployment options fit your unique requirements","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FortiGate","keywords":"security, network, your, FortiGate, deployments, small, platform, across","description":"FortiGate® - network security platform provides unmatched performance and protection while simplifying the network infrastructure. \rFortiGate-20 - for small","og:title":"FortiGate","og:description":"FortiGate® - network security platform provides unmatched performance and protection while simplifying the network infrastructure. \rFortiGate-20 - for small","og:image":"https://old.b4r.io/fileadmin/user_upload/FortiGate.jpg"},"eventUrl":"","translationId":175,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":536,"title":"WAN optimization - appliance","alias":"wan-optimization-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/wan-optimization-appliance.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"imperva-incapsula":{"id":1581,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IMPERVA_Incapsula.png","logo":true,"scheme":false,"title":"Imperva Incapsula","vendorVerified":0,"rating":"1.70","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":2,"alias":"imperva-incapsula","companyTitle":"Imperva","companyTypes":["vendor"],"companyId":207,"companyAlias":"imperva","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula can protect your organization against any DDoS threat.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">WEBSITE PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Always-on DDoS protection that automatically detects and mitigates attacks targeting websites and web applications.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Website Protection is an optional DDoS mitigation service that can be added to any Website Security subscription.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">INFRASTRUCTURE PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">On-demand or always-on protection against DDoS attacks that directly target your network infrastructure.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Infrastructure Protection can be used to defend entire subnets.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">NAME SERVER PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Always-on DDoS protection for your Name Server (NS) that protects DNS servers against network and application layer assaults.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Name Server Protection also accelerates DNS responses.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">ALL-INCLUSIVE DDOS PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula DDoS protection supports Unicast and Anycast technologies to power a many-to-many defense methodology. This automatically detects and mitigates attacks exploiting application and server vulnerabilities, hit-and-run events and large botnets.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">10-SECOND MITIGATION SLA</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">When DDoS strikes, it takes target services moments to go down and hours to recover. Incapsula is the only service to offer a SLA-backed guarantee to detect and block all attacks in under 10 seconds.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">HIGH-CAPACITY NETWORK</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our high-capacity global network holds over (Terabits per second) of on-demand scrubbing capacity and can process 30 billion attack packets per second. Incapsula network has successfully defended clients against some of the largest attacks on record.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">ATTACK VISIBILITY</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula shows you attacks as they are happening and gives you actionable insight into Layer 7 attacks. Incapsula security dashboard lets you quickly analyze attacks and lets you adjust security policies on-the-fly to stop web application attacks.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">BLOCK ANY TYPE OF DDOS ATTACK</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula proxies all web requests to block DDoS attacks from being relayed to client origin servers. Incapsula detects and mitigates any type of attack, including:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<ul><li>TCP SYN+ACK</li><li>TCP FIN</li><li>TCP RESET</li><li>TCP ACK</li><li>TCP ACK+PSH</li><li>TCP Fragment</li><li>UDP</li><li>Slowloris</li><li>Spoofing</li><li>ICMP</li><li>IGMP</li><li>HTTP Flood</li><li>Brute Force</li><li>Connection Flood</li><li>DNS Flood</li><li>NXDomain</li><li>Mixed SYN + UDP or ICMP + UDP Flood</li><li>Ping of Death</li><li>Smurf</li><li>Reflected ICMP & UDP</li><li>As well as other attacks</li></ul>","shortDescription":"Incapsula is guaranteed to mitigate any DDoS attack in under 10 seconds, regardless of its size and without getting in the way of legitimate traffic. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":10,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Imperva Incapsula","keywords":"attacks, Incapsula, DDoS, against, network, PROTECTION, protection, that","description":"Incapsula can protect your organization against any DDoS threat.\rWEBSITE PROTECTION\rAlways-on DDoS protection that automatically detects and mitigates attacks","og:title":"Imperva Incapsula","og:description":"Incapsula can protect your organization against any DDoS threat.\rWEBSITE PROTECTION\rAlways-on DDoS protection that automatically detects and mitigates attacks","og:image":"https://old.b4r.io/fileadmin/user_upload/IMPERVA_Incapsula.png"},"eventUrl":"","translationId":1446,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"instart-logic-visionary-web-application-firewall-and-ddos":{"id":1615,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Instart_Logic.jpg","logo":true,"scheme":false,"title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"instart-logic-visionary-web-application-firewall-and-ddos","companyTitle":"Instart Logic","companyTypes":["supplier","vendor"],"companyId":4285,"companyAlias":"instart-logic","description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of attacks including OWASP Top 10 vulnerabilities:\r\n<ul><li>Cross-Site Scripting</li><li>SQL injection</li><li>Slow HTTP DoS</li><li>Cross-Site Request Forgery</li></ul>\r\nInstart Logic also offers comprehensive distributed denial of service (DDOS) attack protection using our globally distributed platform to absorb and mitigate attacks. As an internet-scale service provider, our global-ready infrastructure ensures a best-in-class protection for your online presence.","shortDescription":"Instart Logic’s globally distributed carrier-grade security applications use artificial intelligence and machine learning to protect cloud, web and mobile applications from the threat","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","keywords":"attacks, Instart, distributed, DDOS, Visionary, Logic, service, protection","description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of","og:title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","og:description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of","og:image":"https://old.b4r.io/fileadmin/user_upload/Instart_Logic.jpg"},"eventUrl":"","translationId":1616,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"juniper-networks-idp-series":{"id":499,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg","logo":true,"scheme":false,"title":"Juniper Networks IDP Series","vendorVerified":0,"rating":"1.80","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-networks-idp-series","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"<span style=\"font-weight: bold;\">Stateful signature</span>\r\nThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.\r\n<span style=\"font-weight: bold;\">Protocol anomaly</span>\r\nThe IDP rulebase attack objects detect protocol usages that violate published RFCs. This method protects your network from undiscovered vulnerabilities.\r\n<span style=\"font-weight: bold;\">Traffic anomaly</span>\r\nThe Traffic Anomalies rulebase uses heuristic rules to detect unexpected traffic patterns that might indicate reconnaissance or attacks. This method blocks distributed denial-of-service (DDoS) attacks and prevents reconnaissance activities.\r\n<span style=\"font-weight: bold;\">Backdoor</span>\r\nThe Backdoor rulebase uses heuristic-based anomalous traffic patterns and packet analysis to detect Trojans and rootkits. These methods prevent proliferation of malware in case other security measures have been compromised.\r\n<span style=\"font-weight: bold;\">IP spoofing</span>\r\nThe IDP appliance checks the validity of allowed addresses inside and outside the network, permitting only authentic traffic and blocking traffic with a disguised source.\r\n<span style=\"font-weight: bold;\">Layer 2 attacks</span>\r\nThe IDP appliance prevents Layer 2 attacks using rules for Address Resolution Protocol (ARP) tables, fragment handling, connection timeouts, and byte/length thresholds for packets. These methods prevent a compromised host from polluting an internal network using methods such as ARP cache poisoning.\r\n<span style=\"font-weight: bold;\">Denial of service (DoS)</span>\r\nThe SYN Protector rulebase provides two, alternative methods to prevent SYN-flood attacks.\r\n<span style=\"font-weight: bold;\">Network honeypot</span>\r\nThe IDP appliance impersonates vulnerable ports so you can track attacker reconnaissance activity.","shortDescription":"Juniper Networks IDP Series Intrusion Detection and Prevention Appliances.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Series","keywords":"attacks, rulebase, traffic, methods, method, detect, network, reconnaissance","description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.","og:title":"Juniper Networks IDP Series","og:description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.","og:image":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg"},"eventUrl":"","translationId":499,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"juniper-networks-idp-serii":{"id":498,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg","logo":true,"scheme":false,"title":"Juniper Networks IDP Серии","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-networks-idp-serii","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием безопасности сети.","shortDescription":"Juniper Networks IDP Серии - межсетевой экран.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Серии","keywords":"сети, минимизация, ущерб, причинен, временных, материальных, поддержанием, безопасности","description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием","og:title":"Juniper Networks IDP Серии","og:description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием","og:image":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg"},"eventUrl":"","translationId":2404,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"nsfocus-web-application-firewall-waf":{"id":1618,"logoURL":"https://old.b4r.io/fileadmin/user_upload/NSFOCUS.jpeg","logo":true,"scheme":false,"title":"NSFOCUS Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nsfocus-web-application-firewall-waf","companyTitle":"NSFOCUS","companyTypes":["supplier","vendor"],"companyId":4287,"companyAlias":"nsfocus","description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web application layer. It also includes up to 1 Gbps of DDoS protection from other volumetric and application layer attacks, including TCP flood and HTTP/S GET/ POST floods. Additionally, if deployed in conjunction with a higher capacity NSFOCUS ADS Series Anti-DDoS appliance, the WAF can direct flows in real-time to the ADS to keep your servers running under the most extreme conditions.\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Features and Benefits</span>\r\n<span style=\"font-weight: bold;\">Prevent Theft of Critical Data</span>\r\nData breaches are extremely complex and surprisingly frequent. The NSFOCUS WAF offers powerful protection against web attacks with a complete set of signatures for web vulnerabilities and the ability to detect unauthorized file uploads. WAF enforces access control policy from layer 4 through layer 7, to prevent access to data without proper authorization. In the later phases of an attack, WAF provides outbound data leakage detection, including illegal file download detection, web shell prevention, and filtering of sensitive information (such as credit card numbers and social security numbers).\r\n<span style=\"font-weight: bold;\">Ensure Website Availability</span>\r\nThe NSFOCUS WAF offers a built-in anti-DDoS module to protect against TCP flood attacks, HTTP/S GET/POST flood attacks and slow rate attacks up to 1Gbps. The WAF employs access rate thresholding, IP reputation and algorithm-based protection mechanisms. Coupled with the NSFOCUS ADS anti-DDoS product line, higher rate DDoS attacks can be thwarted.\r\n<span style=\"font-weight: bold;\">Close the PCI DSS Compliance Gap</span>\r\nThe NSFOCUS WAF provides reports for PCI audits as well as suggestions for policy tuning and configuration in order to help ensure compliance with PCI DSS. Protections like the cookie security feature within the WAF protects against cookie tampering and cookie poisoning in compliance with section 6.5.10 in the new PCI 3.2 standard.\r\n","shortDescription":"The WAF serves as an essential part of any defense-in-depth security architecture by providing advanced inspection and specialized security for the web application layer. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"NSFOCUS Web Application Firewall (WAF)","keywords":"attacks, NSFOCUS, with, security, layer, access, against, rate","description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web","og:title":"NSFOCUS Web Application Firewall (WAF)","og:description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web","og:image":"https://old.b4r.io/fileadmin/user_upload/NSFOCUS.jpeg"},"eventUrl":"","translationId":1619,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"pa-500-next-generation-firewall":{"id":185,"logoURL":"https://old.b4r.io/fileadmin/user_upload/PA-500_next-generation_firewall.png","logo":true,"scheme":false,"title":"PA-500 next-generation firewall","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":5,"alias":"pa-500-next-generation-firewall","companyTitle":"Palo Alto Networks","companyTypes":["vendor"],"companyId":2061,"companyAlias":"palo-alto-networks","description":"Key Security Features:\r\nClassifies all applications, on all ports, all the time\r\n• Identifies the application, regardless of port, encryption (SSL\r\nor SSH), or evasive technique employed.\r\n• Uses the application, not the port, as the basis for all\r\nof your safe enablement policy decisions: allow, deny,\r\nschedule, inspect and apply traffic-shaping.\r\n• Categorizes unidentified applications for policy control,\r\nthreat forensics or App-ID™ development.\r\nEnforces security policies for any user, at any location\r\n• Deploys consistent policies to local and remote users\r\nrunning on the Windows®, Mac® OS X®, Linux®, Android®,\r\nor Apple® iOS platforms.\r\n• Enables agentless integration with Microsoft® Active\r\nDirectory® and Terminal Services, LDAP, Novell®\r\neDirectory™ and Citrix®.\r\n• Easily integrates your firewall policies with 802.1X wireless,\r\nproxies, NAC solutions, and any other source of user\r\nidentity information.\r\nPrevents known and unknown threats\r\n• Blocks a range of known threats, including exploits,\r\nmalware and spyware, across all ports, regardless of\r\ncommon threat-evasion tactics employed.\r\n• Limits the unauthorized transfer of files and sensitive data,\r\nand safely enables non-work-related web surfing.\r\n• Identifies unknown malware, analyzes it based on\r\nhundreds of malicious behaviors, and then automatically\r\ncreates and delivers protection.\r\n\r\nThe controlling element of the PA-500 is PAN-OS®,\r\na security-specific operating system that natively\r\nclassifies all traffic, inclusive of applications, threats\r\nand content, and then ties that traffic to the user, regardless\r\nof location or device type. The application, content,\r\nand user – in other words, the business elements that\r\nrun your business –mare then used as the basis of\r\nyour security policies, resulting in an improved security\r\nposture and a reduction in incident response time. ","shortDescription":"Palo Alto Networks® PA-500 is a next-generation firewall appliance for enterprise branch offices and midsize businesses.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"PA-500 next-generation firewall","keywords":"user, your, policies, then, that, security, regardless, application","description":"Key Security Features:\rClassifies all applications, on all ports, all the time\r• Identifies the application, regardless of port, encryption (SSL\ror SSH), or","og:title":"PA-500 next-generation firewall","og:description":"Key Security Features:\rClassifies all applications, on all ports, all the time\r• Identifies the application, regardless of port, encryption (SSL\ror SSH), or","og:image":"https://old.b4r.io/fileadmin/user_upload/PA-500_next-generation_firewall.png"},"eventUrl":"","translationId":186,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"},{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"sophos-utm":{"id":251,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Sophos_UTM.gif","logo":true,"scheme":false,"title":"Sophos UTM","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"sophos-utm","companyTitle":"Sophos","companyTypes":["vendor"],"companyId":2791,"companyAlias":"sophos","description":"Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks. And clear, detailed reports will give you the insight you need to improve your network performance and protection.\r\nHighlights\r\nÌ Every feature available on every appliance\r\nÌ Firewall, VPN, ATP, IPS, email, web filtering and app control\r\nÌ Hardware, virtualized, software or cloudbased appliance\r\nÌ Intuitive browserbased interface\r\nÌ Built-in reporting on all models\r\nÌ Two-factor authentication with one-time password (OTP) in many areas\r\nÌ Integrated wireless controller\r\n\r\nConsolidated network security platform—no compromise\r\nProtect your network using multi-layered proven protection technologies including\r\nAdvanced Threat Protection (ATP), IPS, VPN, email and web filtering combined with the\r\nindustry’s simplest admin interface. We’ve engineered our software and hardware to give\r\nyou the throughput speeds you need. And, you can choose the level of protection you need\r\nwith modular subscriptions as every feature is available on every appliance.\r\nAll the Next-Gen Firewall features you need\r\nWe’ll give you complete control to block, allow, shape and prioritize applications. Our Deep\r\nLayer-7 inspection (Next-Generation Firewall) ensures true application identification and has\r\nregular automatic updates. And you’ll get feedback on unclassified applications too.\r\nIntuitive management and detailed reporting\r\nYou’ll know what’s happening with your users and you’ll have complete control over all the\r\nfeatures you need, with none of the complexity. Easily build policies while getting detailed\r\nreal-time and historical data with our on-box reporting, helping you to fix problems fast. And\r\nour Free Sophos UTM Manager lets you centrally administer several appliances through a\r\nsingle login.\r\nConnect remote offices with easy VPN and Wi-Fi\r\nSophos RED (Remote Ethernet Device) provides secure remote access to your off-site\r\nlocations. It’s the first security gateway that requires no technical skills at the remote site.\r\nOnce installed, it forwards traffic to the UTM for complete security. Sophos UTM also works\r\nas a wireless controller; access points are automatically set up and receive complete UTM\r\nprotection.","shortDescription":"Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Sophos UTM","keywords":"with, security, need, your, Sophos, control, protection, appliance","description":"Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular","og:title":"Sophos UTM","og:description":"Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular","og:image":"https://old.b4r.io/fileadmin/user_upload/Sophos_UTM.gif"},"eventUrl":"","translationId":252,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"ustroistvo-check-point-21000":{"id":78,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Check_Point_21000.jpg","logo":true,"scheme":false,"title":"Устройство Check Point 21000","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"ustroistvo-check-point-21000","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"<h2 style=\"box-sizing: border-box; font-family: DIN-light, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-weight: 500; line-height: 1.1; color: #333333; margin-top: 19px; margin-bottom: 2em; font-size: 1.4em;\">Устройства 21000 созданы для дата-центров, которые предъявляют повышенные требования к производительности и доступности. Они идеальны для транзакций с небольшой задержкой (не более 5 микросекунд) и обеспечивают превосходную надежность для проведения эффективных по цене операций.</h2>\r\nНаивысшая производительность в своем классе\r\n\r\nДо 44.5 Гб/с пропускная способность фаеврвола.\r\nДо 6.9 Гб/с пропускная способность IPS.\r\nПоддержка транзакций с низкой задержкой (5 микросекунд).\r\nПостоянная доступность и надежность в эксплуатации\r\n\r\nМножество сетевых возможностей в любой среде.\r\nФункция удаленного управления Lights Out Managment.\r\nРабота без сбоев благодаря возможности горячей замены и дублирования компонентов.\r\nСнижение издержек за счет укрепления безопасности\r\n\r\nВозможность расширить функционал защиты покупки дополнительного оборудования.\r\nУстройства входят в четыре пакета программных блейдов, которые соответствуют любым требованиям в области безопасности.\r\nДоступны в недорогой, но производительной комплектации с возможностью увеличения объема памяти для поддержки максимального числа соединений.\r\nВозможности\r\nМаксимальная защита и производительность\r\nУстройства 21000 обеспечивают постоянную доступность критически важных для бизнеса приложений и лучшую производительность в своем классе.\r\n\r\nВысокая плотность портов — поддержка до 37×1 GbE портов для сетевой сегментации.\r\nПропускная способность фаервола 110 Гб/с и задержка 5 микросекунд для работы критически важных приложений.\r\nКомпактное шасси высотой 2 юнита.\r\nСодержат технологии ускорения и кластеризации.\r\nМодуль ускорения защиты для увеличения производительности\r\nС дополнительным модулем Security Acceleration вы можете уверенно увеличить пропускную способность фаервола и VPN на вашем устройстве 21000 без потери производительности. Инновационная специализированная технология SecurityCore™ работает параллельно и использует мощную систему обработки данных, чтобы увеличить производительность.\r\n\r\nПомогает разгрузить процесс обработки данных, который обычно выполняется на одном центральном процессоре главного устройства.\r\nИзначально доступен в качестве узла сети, что существенно экономит ресурсы.\r\nПрочность и надежность в эксплуатации\r\nУстройства 21000 соответствуют высоким стандартам надежности, предъявляемым к оборудованию в дата-центрах. Они созданы, чтобы бесперебойно работать даже в сетях, разворачиваемых на стороне покупателя.\r\n\r\nБлоки питания, жесткие диски и вентиляторы дублированы и поддерживают режим горячей замены.\r\nКарта расширения Lights Out Management обеспечивает удаленное управление и диагностику. Запуск, перезагрузка и управление устройством также могут осуществляться удаленно.\r\nРабота в любой среде\r\nУстройства Check Point 21000 могут быть развернуты в любой сети.\r\n\r\nДо 37 10/100/1000Base-T портов\r\nДо 36 1000base-F SFP или до 13 10GBase-F SFP+ портов\r\nТри слота расширения на передней панели.\r\nДо 1,024 VLAN для эффективной сегментации сети.\r\nПредупреждает неизвестные угрозы\r\nРешения Check Point предупреждают атаки нулевого дня и высылают уведомления о начале атаки. Извлечение угроз практически моментально изолирует документы от вредоносных программ. Эмуляция угроз позволяет проверить файлы в виртуальной «песочнице». Если Эмуляция угроз обнаруживает новые угрозы, сигнатуры отправляются в базу данных Check Point ThreatCloud, с помощью которой информация о новых угрозах распространяется среди клиентов Check Point. Это обеспечивает скорейшую реакцию на атаки нулевого дня.\r\n\r\nПредварительно настроены\r\nПредлагаются несколько предварительно настроенных комплектаций устройств 21000, обеспечивающих всестороннюю и прочную защиту в рамках одного из пяти наборов программных блейдов нового поколения.\r\n\r\nФаервол нового поколения — определяет и контролирует приложения, запускаемые пользователями, и проверяет контент, чтобы остановить угрозы (включает блейды: IPS и Контроль приложений).\r\nШлюз нового поколения для защиты доступа к Интернет ресурсам — обеспечивает безопасное использование приложений Веб 2.0 c многоуровневой защитой от вредоносных программ, распространяемых в интернете (включает блейды: Контроль приложений, Фильтрация URL, Антивирус и SmartEvent).\r\nЗащита данных нового поколения — превентивно защищает важные данные от непредумышленной потери, обучает пользователей правилам безопасности и наделяет их правами самостоятельно устранять инцидент в режиме реального времени (включает блейды: IPS, Контроль приложений и DLP).\r\nПредотвращение атак нового поколения — предоставляет многоуровневую защиту от сложных киберугроз (включает блейды: IPS, Контроль приложений, Антивирус, Антибот, Фильтрация URL и Защита электронной почты).\r\nИзвлечение угроз нового поколения — передовая защита от атак нулевого дня, которая содержит Эмуляцию угроз и Извлечение угроз.\r\nДоступны также другие программные блейды, которые позволяют расширить возможности вашей системы безопасности.","shortDescription":"Устройства 21000 созданы для дата-центров, которые предъявляют повышенные требования к производительности и доступности. Они идеальны для транзакций с небольшой задержкой (не более 5 микросекунд)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Устройство Check Point 21000","keywords":"21000, приложений, угроз, поколения, нового, Point, блейды, Check","description":"Устройства 21000 созданы для дата-центров, которые предъявляют повышенные требования к производительности и доступности. Они идеальны для транзакций","og:title":"Устройство Check Point 21000","og:description":"Устройства 21000 созданы для дата-центров, которые предъявляют повышенные требования к производительности и доступности. Они идеальны для транзакций","og:image":"https://old.b4r.io/fileadmin/user_upload/Check_Point_21000.jpg"},"eventUrl":"","translationId":2336,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"ustroistvo-check-point-600":{"id":77,"logoURL":"https://old.b4r.io/fileadmin/content/Ustroistvo_Check_Point_600.png","logo":true,"scheme":false,"title":"Устройство Check Point 600","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"ustroistvo-check-point-600","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"<p style=\"margin-bottom:0cm; margin-bottom:.0001pt; text-indent: 1.0cm; line-height:normal\"><span style=\"font-family: Verdana, sans-serif; \">Устройство Check Point 600 — это комплексный продукт, который содержит фаервол, VPN, IPS, антивирус, обзор и контроль приложений, фильтрацию URL и защиту электронной переписки. А еще это настольное устройство — тихое и компактное.</span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom:.0001pt; line-height: normal\"><b><span style=\"font-family: Verdana, sans-serif; \" lang=\"EN-US\"> </span></b><b>Защита корпоративного уровня для малого бизнеса</b></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom:.0001pt; line-height: normal\"><span style=\"font-family: Verdana, sans-serif; \"></span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:.75pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Защищает от вирусов, спама, опасных приложений и сайтов.</span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom: .0001pt; line-height:normal\"><span style=\"font-family: Verdana, sans-serif; \"> </span><b>Создано на основе потребностей малого бизнеса</b></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom:.0001pt; line-height: normal\"><span style=\"font-family: Verdana, sans-serif; \"></span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:.75pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Безопасное соединение с офисной сетью с любого ноутбука, смартфона или планшета.</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:.75pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Установка за считанные минуты, простое и интуитивно понятное управление.</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:.75pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Упрощает управление безопасностью с помощью опционально доступных сервисов для среднего и малого бизнеса.</span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom: .0001pt; line-height:normal\"><span style=\"font-family: Verdana, sans-serif; \"> </span><b>Обладает гибкостью, скоростью и мощностью</b></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom:.0001pt; line-height: normal\"><span style=\"font-family: Verdana, sans-serif; \"></span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:.75pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Многочисленные способы доступа к интернету, включая Ethernet, ADSL, 3G и 4G.</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:.75pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Комплексная защита беспроводного соединения с гостевым доступом.</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:.75pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Поддерживает высочайшую скорость — пропускная способность до 100 Мбит/с.</span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom: .0001pt; line-height:normal\"><span style=\"font-family: Verdana, sans-serif; \"> </span><span style=\"font-family: Verdana, sans-serif; \" lang=\"EN-US\"></span></p>\r\n<p style=\"margin-top:.75pt; margin-right:0cm; margin-bottom:0cm; margin-left:0cm; margin-bottom:.0001pt; line-height:normal\"><b><span style=\"font-family:"Helvetica","sans-serif"\">Возможности</span></b></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom: .0001pt; line-height:normal\"><span style=\"font-family: Verdana, sans-serif; \"> <b>Межсетевой экран и защита от атак корпоративного уровня</b></span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom: .0001pt; line-height:normal\"><span style=\"font-family: Verdana, sans-serif; \">Если компания небольшая, это не значит, что ей нужна меньшая защита. Устройство Check Point 600 содержит признанный в отрасли фаервол нового поколения, IPS и систему предотвращения угроз. Эти технологии обеспечивают надежную защиту от современных киберугроз. Вы получите тот же уровень защиты, который получают компании из списка Fortune, но по гораздо более низкой цене.</span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom: .0001pt; line-height:normal\"><span style=\"font-family: Verdana, sans-serif; \"> <b>Гибкое соединение с сетью с многочисленными возможностями</b></span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom:.0001pt; line-height: normal\"><span style=\"font-family: Verdana, sans-serif; \"> </span> Стандартно устройство 600 поставляется с 10 портами Ethernet со скоростью передачи данных до 1 Гбит/с. Еще больше гибкости и удобства вы найдете в беспроводной версии, которая содержит точку доступа Wi-Fi (802.11b/g/n), поддерживающую аутентификацию WEP, WPA и WPA2 и функцию защиты гостевого доступа.</p>\r\n<p style=\"margin-bottom:0cm; margin-bottom: .0001pt; line-height:normal\"><span style=\"font-family: Verdana, sans-serif; \" lang=\"EN-US\"></span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:-22.5pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Встроенный ADSL-модем.</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:-22.5pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Содержит слоты USB и PCI Express, что упрощает создание дополнительной связи с интернетом для дополнительного уровня надежности.</span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom: .0001pt; line-height:normal\"><b>Пакет продуктов для всеобъемлющей защиты</b><span style=\"font-family: Verdana, sans-serif; \"></span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom:.0001pt; line-height: normal\"><span style=\"font-family: Verdana, sans-serif; \"> </span>Использующее возможности архитектуры программных блейдов, устройство 600 обеспечивает многоуровневую защиту для малого бизнеса и содержит:</p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:-11.25pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height: normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Фаервол</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:-11.25pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height: normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">VPN</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:-11.25pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height: normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Программный блейд Advanced Networking & Clustering</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:-11.25pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height: normal\"><span style=\"font-size: 10pt; font-family: Symbol; \" lang=\"EN-US\">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Программный</span><span style=\"font-family: Verdana, sans-serif; \"> </span><span style=\"font-family: Verdana, sans-serif; \">блейд</span><span style=\"font-family: Verdana, sans-serif; \" lang=\"EN-US\"> Identity Awareness & User Awareness</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:-11.25pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height: normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">IPS</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:-11.25pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height: normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Контроль приложений</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:-11.25pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height: normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Фильтрацию URL</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:-11.25pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height: normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Антивирус</span></p>\r\n<p style=\"margin-top:0cm; margin-right:0cm; margin-bottom:0cm; margin-left:-11.25pt; margin-bottom:.0001pt; text-indent:-18.0pt; line-height: normal\"><span style=\"font-size: 10pt; font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Антиспам и защиту электронной переписки</span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom: .0001pt; line-height:normal\"><span style=\"font-family: Verdana, sans-serif; \"> </span><b><span style=\"font-family: "Helvetica","sans-serif"; color:#333333\">Простое управление, настройка и развертывание</span></b><span style=\"font-family: Verdana, sans-serif; \"></span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom:.0001pt; line-height: normal\">Устройство Check Point 600 может быть установлено и готово к работе за считанные минуты. Развертывание не вызывает трудностей и требует минимальной поддержки специалистов IT-службы.</p>\r\n<p style=\"margin-bottom:0cm; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Простой веб-интерфейс для управления устройством.</span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom: .0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Мастер установки, помогающий на первых этапах.</span></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"><span style=\"font-family: Symbol; \">·<span style=\"font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman"; \"> </span></span><span style=\"font-family: Verdana, sans-serif; \">Несложные для восприятия отчеты и запись логов упрощают мониторинг устройства.</span></p>\r\n<div class=\"row rowdefault\" style=\"box-sizing: border-box; margin-left: -15px; margin-right: -15px; \">\r\n<div id=\"benefits-and-quote\" class=\"row rowdefault\" style=\"box-sizing: border-box; margin-left: -15px; margin-right: -15px; margin-top: 1.3em; \"><p style=\"line-height:normal\"></p>\r\n<p style=\"margin-bottom:0cm; margin-bottom:.0001pt; text-indent:-18.0pt; line-height:normal\"></p>","shortDescription":"Устройство Check Point 600 — это комплексный продукт, который содержит фаервол, VPN, IPS, антивирус, обзор и контроль приложений, фильтрацию URL и защиту электронной переписки. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Устройство Check Point 600","keywords":"Check, Point, бизнеса, Устройство, доступа, уровня, малого, приложений","description":"Устройство Check Point 600 — это комплексный продукт, который содержит фаервол, VPN, IPS, антивирус, обзор и контроль приложений, фильтрацию URL","og:title":"Устройство Check Point 600","og:description":"Устройство Check Point 600 — это комплексный продукт, который содержит фаервол, VPN, IPS, антивирус, обзор и контроль приложений, фильтрацию URL","og:image":"https://old.b4r.io/fileadmin/content/Ustroistvo_Check_Point_600.png"},"eventUrl":"","translationId":2335,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["arbor-aps","big-ip-local-traffic-manager","check-point-21000-appliances","check-point-600-appliance","check-point-intrusion-prevention-system-software-blade","check-point-vsec-virtual-edition","check-point-programmnyi-bleid-ips","defensepro","fortigate","imperva-incapsula","instart-logic-visionary-web-application-firewall-and-ddos","juniper-networks-idp-series","juniper-networks-idp-serii","nsfocus-web-application-firewall-waf","pa-500-next-generation-firewall","sophos-utm","ustroistvo-check-point-21000","ustroistvo-check-point-600"]},"links":{"first":"http://b4r_be/api/products?page=1","last":"http://b4r_be/api/products?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://b4r_be/api/products","per_page":20,"to":18,"total":18},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"19":{"id":19,"title":"WAF - Web Application Firewall"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}