{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"en":"Offer a reference bonus","ru":"Предложить бонус за референс","_type":"localeString"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"en":"I use it","ru":"I use it","_type":"localeString"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"en":"Using","ru":"Используют","_type":"localeString"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"vendor-popover":{"_type":"localeString","en":"vendor","ru":"производитель"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"en":"Rating descending","ru":"По убыванию рейтинга","_type":"localeString"},"sort-discount-asc":{"_type":"localeString","en":"Rebate ascending","ru":"По возрастанию скидки"},"sort-discount-desc":{"ru":"По убыванию скидки","_type":"localeString","en":"Rebate descending"},"i-use-it-popover":{"ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier."},"details":{"_type":"localeString","en":"Details","ru":"Детальнее"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"vendor-verified":{"en":"Vendor verified","ru":"Поставщик потверждён","_type":"localeString"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"categories-popover":{"en":"categories","ru":"категории","_type":"localeString"},"sort-popular-asc":{"en":"Popular ascending","ru":"По возростанию популярности","_type":"localeString"},"sort-popular-desc":{"ru":"По убыванию популярности","_type":"localeString","en":"Popular descending"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"login":{"de":"Einloggen","ru":"Войти","_type":"localeString","en":"Login"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register","de":"Registrieren"},"auth-message":{"_type":"localeString","en":"You need to register or login.","de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти."},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"en":"Added to comparison","ru":"Добавлено в сравнения","_type":"localeString"},"items-found":{"_type":"localeString","en":"Products found","ru":"Продуктов найдено"},"sort-sales-desc":{"ru":"По продаже","_type":"localeString","en":"By sale"},"sort-purchases-desc":{"ru":"По покупке","_type":"localeString","en":"By purchase"},"product-supplier":{"en":"Product supplier","ru":"Поставщик продукта","_type":"localeString"},"product-vendor":{"_type":"localeString","en":"Product producer","ru":"Производитель продукта"},"products-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"_type":"localeString","en":"logout","ru":"Выйти"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My Profile","ru":"Мои Данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"_type":"localeString","en":"from","ru":"от"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"en":"View","ru":"Вид","_type":"localeString"},"sort-type-label":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"category":{"_type":"localeString","en":"Category","ru":"Категория"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"_type":"localeString","en":"Filter","ru":"Фильтр"},"clear-button":{"en":"Сlear","ru":"Очистить","_type":"localeString"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"en":"product categories","ru":"категориz продуктаhjle","_type":"localeString"},"providers-field":{"en":"Providers","ru":"Поставщик, производитель","_type":"localeString"},"business-tasks-field":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"en":"Configurator","ru":"Конфигуратор","_type":"localeString"},"roi-calculator-checkbox":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"apply-filter-button":{"en":"Apply filter","ru":"Применить фильтр","_type":"localeString"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"en":"Suggest product","ru":"Предложить продукт","_type":"localeString"},"with-projects-label":{"_type":"localeString","en":"With deployments","ru":"С внедрениями"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"ru":"Продавец","_type":"localeString","en":"Seller"},"vendors":{"_type":"localeString","en":"User products vendors","ru":"Производители продуктов пользователя"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"en":"Info source","ru":"Информационный ресурс","_type":"localeString"},"with-reference-checkbox":{"en":"With reference","ru":"С референсами","_type":"localeString"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"_type":"localeString","en":"Date","ru":"Дата"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"_type":"localeString","en":"Add company","ru":"Добавить компанию"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"en":"From Z to A","ru":"От Я до А","_type":"localeString"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"en":"Supply type","ru":"Тип поставки","_type":"localeString"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"user":{"en":"User","ru":"Пользователь","_type":"localeString"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"en":"Customers","ru":"Покупатели","_type":"localeString"},"product-supplier":{"en":"Product supplier","ru":"Поставщик продукта","_type":"localeString"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"en":"Deployment date","ru":"Дата внедрения","_type":"localeString"},"canceled":{"_type":"localeString","en":"Canceled","ru":"Отменено"},"deal-canceled":{"en":"Deal canceled","ru":"Сделка отменена","_type":"localeString"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"en":"Competencies","ru":"Компетенции","_type":"localeString"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"label":"catalog-products-text-block","body":{"ru":[{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0"}],"_type":"block","style":"normal","_key":"28241882db7a"}],"_type":"localeBlock","en":[{"children":[{"_key":"8bebcfb349550","_type":"span","marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies."}],"_type":"block","style":"normal","_key":"8bebcfb34955","markDefs":[]}]}}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"title":{"en":"ROI4CIO: Products","ru":"ROI4CIO: Продукты","_type":"localeString"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Продукты","_type":"localeString","en":"Products"}},{"name":"description","translations":{"_type":"localeString","en":"Description","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI"}},{"translations":{"en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString"},"name":"og:description"},{"name":"keywords","translations":{"en":"keyword","ru":"каталог, программное обеспечение, софт, ит услуги","_type":"localeString"}},{"name":"title","translations":{"_type":"localeString","en":"Products","ru":"Продукты"}}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"0304-ru":{"id":2146,"logoURL":"https://old.b4r.io/fileadmin/content/52513949_359460381565551_242826709202632704_n_01.jpg","logo":true,"scheme":false,"title":"0403 eng","vendorVerified":1,"rating":"4.20","implementationsCount":19,"suppliersCount":0,"supplierPartnersCount":5,"alias":"0304-ru","companyTitle":"ROI4CIO","companyTypes":["supplier","vendor"],"companyId":4231,"companyAlias":"roi4cio","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":6,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"0403 eng","keywords":"","description":"","og:title":"0403 eng","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/52513949_359460381565551_242826709202632704_n_01.jpg"},"eventUrl":"","translationId":2145,"dealDetails":{"avgPartnerDiscount":67,"dealProtection":1,"avgDealSize":50000,"dealSizeCurrency":"","avgDealClosing":4},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":51,"title":"PaaS - Platform as a service","alias":"paas-platform-as-a-service","description":"Platform as a Service (PaaS, «платформа как услуга») — модель предоставления облачных вычислений, при которой потребитель получает доступ к использованию информационно-технологических платформ: операционных систем, систем управления базами данных, связующему программному обеспечению, средствам разработки и тестирования, размещённым у облачного провайдера. В этой модели вся информационно-технологическая инфраструктура, включая вычислительные сети, серверы, системы хранения, целиком управляется провайдером, провайдером же определяется набор доступных для потребителей видов платформ и набор управляемых параметров платформ, а потребителю предоставляется возможность использовать платформы, создавать их виртуальные экземпляры, устанавливать, разрабатывать, тестировать, эксплуатировать на них прикладное программное обеспечение, при этом динамически изменяя количество потребляемых вычислительных ресурсов.\r\n\r\nПровайдер облачной платформы может взимать плату с потребителей в зависимости от уровня потребления, тарификация возможна по времени работы приложений потребителя, по объёму обрабатываемых данных и количеству транзакций над ними, по сетевому трафику. Провайдеры облачных платформ достигают экономического эффекта за счёт использования виртуализации и экономии на масштабах, когда из множества потребителей в одно и то же время лишь часть из них активно использует вычислительные ресурсы, потребители — за счёт отказа от капитальных вложений в инфраструктуру и платформы, рассчитанных под пиковую мощность и непрофильных затрат на непосредственное обслуживание всего комплекса.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Platform_as_a_service","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PaaS__1_.png"},{"id":54,"title":"MDM - master data management","alias":"mdm-master-data-management","description":"Управление основными данными, управление мастер-данными (англ. Master Data Management, MDM) — совокупность процессов и инструментов для постоянного определения и управления основными данными компании (в том числе справочными). Можно встретить и другое название — управление справочными данными (англ. Reference Data Management, RDM).\r\n\r\nМастер-данные — это данные с важнейшей для ведения бизнеса информацией: о клиентах, продуктах, услугах, персонале, технологиях, материалах и так далее. Они относительно редко изменяются и не являются транзакционными.\r\n\r\nЦель управления основными данными — удостовериться в отсутствии повторяющихся, неполных, противоречивых данных в различных областях деятельности организации. Пример некачественного управления основными данными — это работа банка с клиентом, который уже использует кредитный продукт, однако по-прежнему получает предложения взять такой кредит. Причина неправильного поведения — отсутствие актуальных данных о клиенте в отделе по работе с клиентами.\r\n\r\nПодходом управления основными данными предусматриваются такие процессы как сбор, накопление, очистка данных, их сопоставление, консолидация, проверка качества и распространение данных в организации, обеспечение их последующей согласованности и контроль использования в различных операционных и аналитических приложениях.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D0%BE%D1%81%D0%BD%D0%BE%D0%B2%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/MDM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"0abcd":{"id":2244,"logoURL":"https://old.b4r.io/fileadmin/user_upload/9631386584_f8ab2bf216_b.jpg","logo":true,"scheme":false,"title":"0aбвг","vendorVerified":0,"rating":"3.20","implementationsCount":5,"suppliersCount":0,"supplierPartnersCount":1,"alias":"0abcd","companyTitle":"IT Service +","companyTypes":["supplier","vendor"],"companyId":3328,"companyAlias":"it-servis","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":0,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"0aбвг","keywords":"","description":"","og:title":"0aбвг","og:description":"","og:image":"https://old.b4r.io/fileadmin/user_upload/9631386584_f8ab2bf216_b.jpg"},"eventUrl":"https://calendly.com/anastasia-filatova19/product-consultation","translationId":2245,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":3,"title":"CRM"}],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"11a11":{"id":2141,"logoURL":"https://old.b4r.io/fileadmin/content/_DAsmZ4eKBM_01.jpeg","logo":true,"scheme":false,"title":"11a11","vendorVerified":0,"rating":"3.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":5,"alias":"11a11","companyTitle":"ROI4CIO","companyTypes":["supplier","vendor"],"companyId":4231,"companyAlias":"roi4cio","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":17,"sellingCount":11,"discontinued":0,"rebateForPoc":50,"rebate":100,"seo":{"title":"11a11","keywords":"","description":"","og:title":"11a11","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/_DAsmZ4eKBM_01.jpeg"},"eventUrl":"","translationId":2141,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":4,"title":"Data center","alias":"data-center","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/COD_-_Centr_obrabotki_dannykh.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"1it-service-product":{"id":2217,"logoURL":"https://old.b4r.io/fileadmin/user_upload/1_1.jpg","logo":true,"scheme":false,"title":"1IT service product","vendorVerified":1,"rating":"3.70","implementationsCount":5,"suppliersCount":0,"supplierPartnersCount":1,"alias":"1it-service-product","companyTitle":"IT Service +","companyTypes":["supplier","vendor"],"companyId":3328,"companyAlias":"it-servis","description":"<p style=\"margin: 0.5em 0px; color: #222222; font-family: sans-serif;\">The \"way\" originates from the <em>samurai</em> moral values, most commonly stressing some combination of sincerity, frugality, loyalty, <span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a title=\"Martial arts\" href=\"https://en.wikipedia.org/wiki/Martial_arts\">martial arts</a></span> mastery, and honour until death. Born from <span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a title=\"Edo neo-Confucianism\" href=\"https://en.wikipedia.org/wiki/Edo_neo-Confucianism\">Neo-Confucianism</a></span> during times of peace in the <span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a title=\"Edo period\" href=\"https://en.wikipedia.org/wiki/Edo_period\">Edo period</a></span> (1600–1878) and following <span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a title=\"Confucius\" href=\"https://en.wikipedia.org/wiki/Confucius\">Confucian</a></span> texts, while also being influenced by <span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a title=\"Shinto\" href=\"https://en.wikipedia.org/wiki/Shinto\">Shinto</a></span> and <span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a class=\"mw-redirect\" title=\"Zen Buddhism\" href=\"https://en.wikipedia.org/wiki/Zen_Buddhism\">Zen Buddhism</a></span>, allowing the violent existence of the <em>samurai</em> to be tempered by wisdom, patience and serenity. <em>Bushidō</em> developed between the 16th and 20th centuries, debated by pundits who believed they were building on a legacy dating back to the 10th century, although some scholars have noted that the term <em>bushidō</em> itself is \"rarely attested in pre-modern literature\".<sup id=\"cite_ref-3\" class=\"reference\" style=\"line-height: 1; unicode-bidi: isolate; white-space: nowrap; font-size: 11.2px;\"><span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a href=\"https://en.wikipedia.org/wiki/Bushido#cite_note-3\">[3]</a></span></sup></p>\r\n<p style=\"margin: 0.5em 0px; color: #222222; font-family: sans-serif;\">Under the <span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a title=\"Tokugawa shogunate\" href=\"https://en.wikipedia.org/wiki/Tokugawa_shogunate\">Tokugawa shogunate</a></span>, some aspects of warrior values became formalized into Japanese feudal law.<sup id=\"cite_ref-4\" class=\"reference\" style=\"line-height: 1; unicode-bidi: isolate; white-space: nowrap; font-size: 11.2px;\"><span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a href=\"https://en.wikipedia.org/wiki/Bushido#cite_note-4\">[4]</a></span></sup></p>\r\n<p style=\"margin: 0.5em 0px; color: #222222; font-family: sans-serif;\">The word <em>bushidō</em> was first used in Japan during the 17th century in <span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a title=\"Kōyō Gunkan\" href=\"https://en.wikipedia.org/wiki/K%C5%8Dy%C5%8D_Gunkan\">Kōyō Gunkan</a></span>,<sup id=\"cite_ref-5\" class=\"reference\" style=\"line-height: 1; unicode-bidi: isolate; white-space: nowrap; font-size: 11.2px;\"><span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a href=\"https://en.wikipedia.org/wiki/Bushido#cite_note-5\">[5]</a></span></sup><sup id=\"cite_ref-6\" class=\"reference\" style=\"line-height: 1; unicode-bidi: isolate; white-space: nowrap; font-size: 11.2px;\"><span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a href=\"https://en.wikipedia.org/wiki/Bushido#cite_note-6\">[6]</a></span></sup><sup id=\"cite_ref-7\" class=\"reference\" style=\"line-height: 1; unicode-bidi: isolate; white-space: nowrap; font-size: 11.2px;\"><span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a href=\"https://en.wikipedia.org/wiki/Bushido#cite_note-7\">[7]</a></span></sup> but did not come into common usage until after the 1899 publication of <span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a title=\"Nitobe Inazō\" href=\"https://en.wikipedia.org/wiki/Nitobe_Inaz%C5%8D\">Nitobe Inazō</a></span>'s <em><span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a title=\"Bushido: The Soul of Japan\" href=\"https://en.wikipedia.org/wiki/Bushido:_The_Soul_of_Japan\">Bushido: The Soul of Japan</a></span></em>.<sup id=\"cite_ref-8\" class=\"reference\" style=\"line-height: 1; unicode-bidi: isolate; white-space: nowrap; font-size: 11.2px;\"><span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a href=\"https://en.wikipedia.org/wiki/Bushido#cite_note-8\">[8]</a></span></sup> In <em>Bushido</em> (1899), Nitobe wrote:</p>\r\n<blockquote style=\"margin-bottom: 0; margin-top: 0;\">\r\n<p> </p>\r\n<p> </p>\r\n<p style=\"margin: 0.5em 0px;\">Bushidō, then, is the code of moral principles which the <span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a title=\"Samurai\" href=\"https://en.wikipedia.org/wiki/Samurai\">samurai</a></span> were required or instructed to observe ... More frequently it is a code unuttered and unwritten ... It was an organic growth of decades and centuries of military career. In order to become a samurai this code has to be mastered.<sup id=\"cite_ref-9\" class=\"reference\" style=\"line-height: 1; unicode-bidi: isolate; white-space: nowrap; font-size: 11.2px;\"><span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a href=\"https://en.wikipedia.org/wiki/Bushido#cite_note-9\">[9]</a></span></sup></p>\r\n<p> </p>\r\n</blockquote>\r\n<p style=\"margin: 0.5em 0px; color: #222222; font-family: sans-serif;\">Nitobe was the first to document Japanese chivalry in this way. In <em>Feudal and Modern Japan</em> (1896), historian Arthur May Knapp wrote:</p>\r\n<blockquote style=\"margin-bottom: 0; margin-top: 0;\">\r\n<p> </p>\r\n<p> </p>\r\n<p style=\"margin: 0.5em 0px;\">The samurai of thirty years ago had behind him a thousand years of training in the law of honor, obedience, duty, and self-sacrifice ... It was not needed to create or establish them. As a child he had but to be instructed, as indeed he was from his earliest years, in the etiquette of <span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a title=\"Self-immolation\" href=\"https://en.wikipedia.org/wiki/Self-immolation\">self-immolation</a></span>.<sup id=\"cite_ref-10\" class=\"reference\" style=\"line-height: 1; unicode-bidi: isolate; white-space: nowrap; font-size: 11.2px;\"><span style=\"text-decoration-line: none; color: #0b0080; background: none;\"><a href=\"https://en.wikipedia.org/wiki/Bushido#cite_note-10\">[10]</a></span></sup></p>\r\n<p> </p>\r\n</blockquote>","shortDescription":"Bushidō (武士道, \"the way of warriors\") is a Japanese collective term for the many codes of honour and ideals that dictated the samurai way of life, loosely analogous to the European concept of chivalry","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":7,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"1IT service product","keywords":"","description":"<p style=\"margin: 0.5em 0px; color: #222222; font-family: sans-serif;\">The \"way\" originates from the <em>samurai</em> moral values, most commonly stressing some combination of sincerity, frugality, loyalty, <span style=\"text-decoration-line: non","og:title":"1IT service product","og:description":"<p style=\"margin: 0.5em 0px; color: #222222; font-family: sans-serif;\">The \"way\" originates from the <em>samurai</em> moral values, most commonly stressing some combination of sincerity, frugality, loyalty, <span style=\"text-decoration-line: non","og:image":"https://old.b4r.io/fileadmin/user_upload/1_1.jpg"},"eventUrl":"","translationId":2218,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":40000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Japan enjoyed a period of relative peace from 1600 to the mid-19th century. During this period, the samurai class played a central role in the policing and administration of the country.","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"autodesk-revit":{"id":1413,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Autodesk_Revit.png","logo":true,"scheme":false,"title":"Autodesk Revit","vendorVerified":0,"rating":"3.80","implementationsCount":5,"suppliersCount":0,"supplierPartnersCount":70,"alias":"autodesk-revit","companyTitle":"Autodesk","companyTypes":["vendor"],"companyId":180,"companyAlias":"autodesk","description":"<p><span style=\"font-weight: bold;\">What does Revit do?</span> Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage buildings and infrastructure. Revit supports a multidiscipline design process for collaborative design.</p>\r\n<ul>\r\n<li>Design. Model building components, analyze and simulate systems and structures, and iterate designs. Generate documentation from Revit models.</li>\r\n<li>Collaborate. Multiple project contributors can access centrally shared models. This results in better coordination, which helps reduce clashes and rework.</li>\r\n<li>Visualize. Communicate design intent more effectively to project owners and team members by using models to create high-impact 3D visuals.</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">One multidiscipline BIM platform</span> Revit has features for all disciplines involved in a building project. When architects, engineers, and construction professionals work on one unified platform, the risk of data translation errors can be reduced and the design process can be more predictable. <span style=\"font-weight: bold;\">Interoperability</span> Revit helps you work with members of an extended project team. It imports, exports, and links your data with commonly used formats, including IFC, DWG™ and DGN. <span style=\"font-weight: bold;\">Tools created expressly for your discipline</span> Whether you’re an architect; a mechanical, electrical, or plumbing (MEP) engineer; a structural engineer; or a construction professional, Revit offers BIM features specifically designed for you. <span style=\"font-weight: bold;\">For architects</span> Use Revit to take an idea from conceptual design to construction documentation within a single software environment. Optimize building performance and create stunning visualizations. <span style=\"font-weight: bold;\">For structural engineers</span> Use tools specific to structural design to create intelligent structure models in coordination with other building components. Evaluate how well they conform to building and safety regulations. <span style=\"font-weight: bold;\">For MEP engineers</span> Design MEP building systems with greater accuracy and in better coordination with architectural and structural components, using the coordinated and consistent information inherent in the intelligent model. <span style=\"font-weight: bold;\">For construction professionals</span> Evaluate constructability and design intent before construction begins. Gain a better understanding of the means, methods, and materials, and how they all come together. <span style=\"font-weight: bold;\">Connect teams with Collaboration for Revit</span> Extend Revit worksharing to project teams in almost any location with this service, which lets multiple users co-author Revit models in the cloud. Increase communication, centralize efforts of distributed teams, and let entire teams take part in the BIM process. <span style=\"font-weight: bold;\">Better team communication</span> Use real-time chat within project models. Know who’s working in the model and what they’re doing. <span style=\"font-weight: bold;\">Extended team integration</span> Subscribe to Collaboration for Revit and receive a subscription to BIM 360 Team, an integrated, cloud-based web service that provides centralized team access to project data. <span style=\"font-weight: bold;\">Access more projects</span> Extend your reach and participate in projects or joint venture partnerships, wherever they’re located. <span style=\"font-weight: bold;\">Better allocate team talents and resources</span> Assign the best team members with the strongest skill sets. Let designers work on multiple projects based in different locations at the same time. <span style=\"font-weight: bold;\">Minimize in-person meetings or co-location of teams</span> Help lower travel expenses and support greater work-life balance for team members. Visualization and rendering. Show how your product will look with visualization and rendering tools.</p>","shortDescription":"Revit® software for BIM (Building Information Modeling) includes features for architectural design, MEP and structural engineering, and construction.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":16,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Autodesk Revit","keywords":"Revit, with, team, design, project, building, models, teams","description":"What does Revit do? Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage","og:title":"Autodesk Revit","og:description":"What does Revit do? Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage","og:image":"https://old.b4r.io/fileadmin/user_upload/Autodesk_Revit.png"},"eventUrl":"","translationId":1414,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":17,"title":"CAD for architecture and construction - Computer-Aided Design"}],"testingArea":"","categories":[{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/CAD__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-nextgen-firewall-ngfw":{"id":1399,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_NextGen_Firewall.png","logo":true,"scheme":false,"title":"Barracuda NextGen Firewall (NGFW)","vendorVerified":0,"rating":"3.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-nextgen-firewall-ngfw","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications. The Barracuda NextGen Firewall F-Series is a family of hardware, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control. In addition, the F-Series combines highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network. The F-Series cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<span style=\"font-weight: bold;\">Security for the Cloud Era</span>\r\nSecurity paradigms are shifting—and securing your network perimeter is no longer good enough. In the cloud era, workloads happen everywhere, users are increasingly mobile, and potential attack surfaces are multiplying. Barracuda NextGen Firewall F-Series is purpose-built to deal with the challenges of securing widely distributed networks.\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN..</span>\r\nBarracuda Cloud Era Firewalls include full next gen Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n\r\n<ul>\r\n<li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li>\r\n<li>VPN across multiple broadband connections and MPLs replacement</li>\r\n<li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li>\r\n<li>Replacing network backhauling central policy enforcement architectures with direct internet break outs</li>\r\n<li>Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic</li>\r\n<li>Guaranteed users' access to critical applications through granular policy controls</li>\r\n<li>Increased available bandwidth with built-in traffic compression and data deduplication</li>\r\n<li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Why Barracuda NextGen Firewall?</span> When selecting security technology, it is critical that your products are supported by people who take your data security as seriously as you do. The Barracuda NextGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data. The Barracuda NextGen Firewall is part of a comprehensive line of data protection, network firewall, and security products and services designed for organizations seeking robust yet affordable protection from ever-increasing cyber threats. <span style=\"font-style: italic;\">Source: https://www.barracuda.com/products/nextgenfirewall_f</span>","shortDescription":"Barracuda's Next Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda NextGen Firewall (NGFW)","keywords":"network, Barracuda, your, with, Firewall, NextGen, security, access","description":"Next-Generation Firewalls for the Cloud Era\rIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have","og:title":"Barracuda NextGen Firewall (NGFW)","og:description":"Next-Generation Firewalls for the Cloud Era\rIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_NextGen_Firewall.png"},"eventUrl":"","translationId":1400,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forcepoint-ngfw":{"id":952,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint NGFW","vendorVerified":1,"rating":"3.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-ngfw","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":" \r\nAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network expenses as much as 50%, slash downtime and reduce IT risk\r\n<span style=\"font-weight: bold;\">The Forcepoint Advantage</span>\r\nBoost business productivity and cut the cost of providing safe, reliable access to applications and data, with secure SD-WAN built right in.\r\n<span style=\"font-weight: bold;\">High Availability</span>\r\nSlash network downtime and keep your business running with uniquely efficient resilience integrated at all levels: firewalls, network and management.\r\n<span style=\"font-weight: bold;\">Unrivaled Security</span>\r\nProtect data and apps throughout your data centers, edge, SD-WANs and cloud – with VPNs, IPS, anti-evasion, encrypted inspection, anti-malware, proxies and more.\r\n<span style=\"font-weight: bold;\">Massive Scalability</span>\r\nSmoothly scale your security as your physical and virtual networks grow, without rip-and-replace upgrades or patchworks of tools.\r\n<span style=\"font-weight: bold;\">Centralized Manageability</span>\r\nDeploy firewalls, VPNs, IPS, SD-WAN fast, across many different environments – and keep them running smoothly.\r\n<span style=\"font-weight: bold;\">360° Visibility</span>\r\nGain immediate insights into what is happening across your network to accelerate incident response and streamline audit best practices.\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n<span style=\"text-decoration-line: underline;\">Forcepoint NGFW Appliances</span> All Forcepoint NGFWs are built on a common software core to provide unified operation and high performance across all forms of appliances – physical, virtual, cloud. Physical – desktop, ruggedized and rack-mounted models; customizable network interfaces; firewall throughput from 1.5-120 Gbps Virtual – available for KVM and VMware ESXi Cloud – available for Amazon Web Services (AWS), Microsoft Azure (coming soon). Find out about the certifications that the Forcepoint NGFW appliances meet.\r\n<span style=\"text-decoration-line: underline;\">NSS Labs Recommended</span> In NSS Labs’ most recent report on Next Generation Firewall (NGFW) overall security effectiveness, Forcepoint NGFW achieved the highest rating of all 11 products tested. NSS Labs latest tests prove that Forcepoint NGFW offers the leading combination of enterprise security and low cost.","shortDescription":"With Forcepoint NGFW, you can deploy and manage thousands of firewalls, IPSs, VPNs and SD-WANs – in minutes, all from a single console.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":15,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint NGFW","keywords":"Forcepoint, NGFW, your, network, security, that, data, with","description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network","og:title":"Forcepoint NGFW","og:description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":953,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forcepoint-url-filtering":{"id":1614,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint URL Filtering","vendorVerified":0,"rating":"3.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-url-filtering","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">With more than 120 security and filtering categories, </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">hundreds of Web application and protocol controls, and 60-plus </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">reports with customization and role-based access, Forcepoint URL </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Filtering is an easy to deploy and transparent filter and security </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">solution that avoids the complexity of a proxy gateway.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Forcepoint URL Filtering’s intuitive management and reporting </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">is accessed via the unified TRITON Architecture user interface, </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">simplifying provisioning and enabling role-based reporting. It </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">includes more than 60 pre-defined reports, many easily customizable </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">reports and administrative alerts. The TRITON architecture supports </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">expansion to Email, Data, Mobile security products and more.</span>","shortDescription":"The Forcepoint URL Filtering solution blocks Web threats to reduce malware infections, decrease help desk incidents and free up valuable IT resources.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":8,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint URL Filtering","keywords":"Forcepoint, more, TRITON, security, than, role-based, unified, reporting","description":"With more than 120 security and filtering categories, hundreds of Web application and protocol controls, and 60-plus reports with customization and","og:title":"Forcepoint URL Filtering","og:description":"With more than 120 security and filtering categories, hundreds of Web application and protocol controls, and 60-plus reports with customization and","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1588,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"friday222":{"id":2144,"logoURL":"https://old.b4r.io/fileadmin/content/static-assets-upload7085378747376289676.jpg","logo":true,"scheme":false,"title":"Friday222","vendorVerified":0,"rating":"4.20","implementationsCount":3,"suppliersCount":0,"supplierPartnersCount":5,"alias":"friday222","companyTitle":"ROI4CIO","companyTypes":["supplier","vendor"],"companyId":4231,"companyAlias":"roi4cio","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":18,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Friday222","keywords":"","description":"","og:title":"Friday222","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/static-assets-upload7085378747376289676.jpg"},"eventUrl":"","translationId":2144,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":36,"title":"Endpoint Security"}],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"hideez-key-hk":{"id":1200,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Hideez.jpg","logo":true,"scheme":false,"title":"Hideez Key (HK)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"hideez-key-hk","companyTitle":"Hideez","companyTypes":["supplier","vendor"],"companyId":4073,"companyAlias":"hideez","description":"<span style=\"font-weight: bold;\">Hideez Key — Your Only Digital Key</span>\r\nHideez Key will become a daily companion to your computer, smartphone and tablet\r\nForget having to type passwords for apps, websites and services. Hideez Key will do it for you while\r\nsimply laying in your pocket. Your computer will ask for password if somebody tries accessing it\r\nwhile you are away and will wake automatically and log you in when you come back. You phone\r\nwon’t ask for passcode anymore, yet it will be securely protected from a stranger. Hideez Key can\r\nalso be used to open your home, garage and office doors as a single digital key using 125 kHz RFID\r\nfrequency (Em-Marine and HID compatible).\r\n<span style=\"font-weight: bold;\">Store Your Passwords in Your Pocket</span>\r\nStill spending time and effort to recall that important password? Hideez Key stores up to 1000\r\npasswords for your social networks, emails, cloud services and applications. Just press the button on\r\nyour Hideez Key or a hotkey on the keyboard of your computer to input your password\r\nautomatically. Try it, it looks like magic!\r\n<span style=\"font-weight: bold;\">Enjoy Convenient and Reliable Internet-Security</span>\r\nHave you considered that by using a ‘simple’ password for email, banking account or social network\r\nyou are risking your money and relations with the other people? Hideez Key allows using\r\ncomplicated passwords of any preferred length, which are difficult to brute force. And the good\r\nnews are that you don’t have to input these passwords from your keyboard all the time. Your\r\npasswords aren’t stored on your computer as well, so a hacker cannot intercept them from your\r\nphone, browser or a hard drive.\r\nYou might also consider using your Hideez Key as a second factor in two-factor authentication and to\r\ngenerate one time passwords for various applications.\r\n<span style=\"font-weight: bold;\">Let Your Smartphone Remind You When You Are About to Lose Something</span>\r\nPlace your Hideez Key in your bag and your smartphone will notify you when the signal is about to\r\nfade away together with your belongings. Even if that happens, you will be able to quickly locate\r\nyour Hideez Key (and the bag in which it is placed) on the digital map.\r\n<span style=\"font-weight: bold;\">Ready for the Internet of Things</span>\r\nMore connected devices are appearing every day. Hideez Key supports over the air updates and you\r\nwill be able to easily integrate it with your future devices and services.\r\n<span style=\"font-weight: bold;\">Remote Activation</span>\r\nWant to take a selfie with a friend or start recording a conversation without touching your\r\nsmartphone? Just press the multifunctional button on your Hideez Key and it will do the rest. Need\r\nan urgent help? Program the multifunctional button on your Hideez Key as your panic button to\r\nactivate alarm scenario on your smartphone. For example: your smartphone will send a message\r\nwith your current location to several trusted contacts from your address book. You can program any\r\nother alarm scenario with your Hideez Key.\r\n<span style=\"font-weight: bold;\">Opening Doors and Locks</span>\r\nHideez Key comes equipped with an RFID module, so it can be used as your RFID token for a modern\r\ndoor equipped with an RFID lock. You can copy the RFID credentials to your Hideez Key from your\r\nexisting RFID key or access card or ask your local access service provider to do this for you, or you\r\ncan add your Hideez Key to the access registry on your smart lock.\r\n<span style=\"font-weight: bold;\">Key Features</span>\r\n● Identify users to information systems.\r\n● Automatic locking/unlocking of the computer, tablet or smartphone.\r\n● External hardware password manager with automated password input that works for\r\napplications as well as for websites.\r\n● Theft alarm for valuables like wallet, purse or keychain.\r\n● Remote control for an user computer or smartphone using device button.\r\n● More useful features to be delivered wirelessly via over the air updates.\r\n<span style=\"font-weight: bold;\">The use of Hideez Key reduces human factor influence on Enterprise information security field. In</span>\r\n<span style=\"font-weight: bold;\">particular:</span>\r\n● To solve weak password problem\r\n● Employees don’t have to remember passwords.\r\n● Automatically lock PCs or apps when an user is away.\r\n● To turn on 2FA on public or corporate resources without complicating the routine users\r\nwork.\r\n● To provide Two-hardware factor authentication for users. To authorize, the user need two\r\ndevices: his/her PC and the Hideez Key.\r\n<span style=\"font-weight: bold;\">An appropriate control service Hideez Enterprise Server features:</span>\r\n● Eliminates control traffic between Hideez Keys and extranet. All the traffic routes are inside\r\nan enterprise perimeter.\r\n● Basic LDAP integration (e.g Active Directory)\r\n● End-to-end encrypted information channel between the control server and Hideez Key\r\nkeyfobs. Nobody can intercept user passwords.\r\n● Administrator can change, add and delete credentials in users keyfobs remotely.\r\n● Strong passwords and with the limited expiration term without user inconvenience.\r\n● Strong authorization by changing passwords to keys, which are unknown for users.\r\n<span style=\"font-weight: bold;\">Minimum system requirements</span>\r\nBluetooth 4.0, Windows 7 (an additional USB Bluetooth adapter is needed), Windows 8.1 +, MacOS\r\n10,11+, Android 4.4 or newer, iOS 9.3+.\r\n<span style=\"font-weight: bold;\">Specifications</span>\r\nModel: Hideez Key 1 (ST 101)\r\nProcessor: Nordic nRF51822\r\nRFID Module: ATMEL T5577\r\nRFID Standards: eM-Marin and HID on 125 kHz\r\nConnectivity: Bluetooth 4.0 and higher\r\nPower: CR2032 battery, up to 6 months in active mode.\r\nUser memory: 74 Kb\r\nLED Indicators: red and green\r\nButtons: 1 multi-functional button\r\nColor: black\r\nWeight: 9 grams (package weight is 44 grams)\r\nDimensions: 32,5 x 32,5 x 9 mm\r\nWarranty: 12 months\r\n<span style=\"font-weight: bold;\">What Is In the Box?</span>\r\n● Hideez Key\r\n● Quick Start Manual\r\n● Keychain\r\n● CR2032 battery (installed inside your Hideez Key)\r\n● Spare CR2032 battery\r\n● Hideez Safe application for Windows and Android is available for free from\r\nhttp://hideez.com\r\n","shortDescription":"Hideez Key is a universal identifier and storage of user credentials","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":0,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Hideez Key (HK)","keywords":"your, device, Hideez, when, from, user, this, Safe","description":"Hideez Key — Your Only Digital Key\rHideez Key will become a daily companion to your computer, smartphone and tablet\rForget having to type passwords for apps,","og:title":"Hideez Key (HK)","og:description":"Hideez Key — Your Only Digital Key\rHideez Key will become a daily companion to your computer, smartphone and tablet\rForget having to type passwords for apps,","og:image":"https://old.b4r.io/fileadmin/user_upload/Hideez.jpg"},"eventUrl":"","translationId":1201,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":10000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the client data to the vendor to get a device (one or more) for testing","categories":[{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"it-serv-111-ijun":{"id":2260,"logoURL":"https://old.b4r.io/fileadmin/user_upload/2x04_Evil_Spirits_in_Heavenly_Places_14.jpg","logo":true,"scheme":false,"title":"IT ser 111 june","vendorVerified":0,"rating":"2.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"it-serv-111-ijun","companyTitle":"IT Service +","companyTypes":["supplier","vendor"],"companyId":3328,"companyAlias":"it-servis","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IT ser 111 june","keywords":"","description":"","og:title":"IT ser 111 june","og:description":"","og:image":"https://old.b4r.io/fileadmin/user_upload/2x04_Evil_Spirits_in_Heavenly_Places_14.jpg"},"eventUrl":"","translationId":2261,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":4,"title":"Data center","alias":"data-center","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/COD_-_Centr_obrabotki_dannykh.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"microsoft-office-365":{"id":64,"logoURL":"https://old.b4r.io/fileadmin/content/Microsoft_Office_365.png","logo":true,"scheme":false,"title":"Microsoft Office 365","vendorVerified":0,"rating":"4.00","implementationsCount":6,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-office-365","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p><span style=\"color: #252525; font-family: sans-serif; font-size: 14px;\">Office 365 is the brand name Microsoft uses for a group of software and services subscriptions, which together provide productivity software and related services to subscribers. For consumers, the service allows the use of Microsoft Office apps on Windows and macOS, provides storage space on Microsoft's cloud storage service OneDrive, and grants 60 Skype minutes per month. For business users, Office 365 offers plans providing e-mail and social networking services through hosted versions of Exchange Server, Skype for Business Server, SharePoint and Office Online, integration with Yammer, as well as access to the Microsoft Office software.</span></p>","shortDescription":"Microsoft Office 365 is a group of software and services subscriptions, which together provide productivity software and related services to subscribers.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":20,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Office 365","keywords":"Office, Microsoft, software, services, storage, Server, Skype, service","description":"Office 365 is the brand name Microsoft uses for a group of software and services subscriptions, which together provide productivity software and related","og:title":"Microsoft Office 365","og:description":"Office 365 is the brand name Microsoft uses for a group of software and services subscriptions, which together provide productivity software and related","og:image":"https://old.b4r.io/fileadmin/content/Microsoft_Office_365.png"},"eventUrl":"","translationId":99,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":281,"title":"Authoring and Publishing Software","alias":"","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/design-graphics-multimedia.png"},{"id":180,"title":"Office Suites","alias":"office-suites","description":"Офисные приложения — набор приложений, предназначенных для обработки электронной документации на персональном компьютере. Компоненты офисных пакетов распространяются, как правило, только вместе, имеют схожий интерфейс и хорошо взаимодействуют друг с другом.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9E%D1%84%D0%B8%D1%81%D0%BD%D1%8B%D0%B9_%D0%BF%D0%B0%D0%BA%D0%B5%D1%82","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/office-packages.png"},{"id":52,"title":"SaaS - software as a service","alias":"saas-software-as-a-service","description":"SaaS (англ. software as a service — программное обеспечение как услуга; также англ. software on demand — программное обеспечение по требованию) — одна из форм облачных вычислений, модель обслуживания, при которой подписчикам предоставляется готовое прикладное программное обеспечение, полностью обслуживаемое провайдером. Поставщик в этой модели самостоятельно управляет приложением, предоставляя заказчикам доступ к функциям с клиентских устройств, как правило через мобильное приложение или веб-браузер.\r\n\r\nОсновное преимущество модели SaaS для потребителя услуги состоит в отсутствии затрат, связанных с установкой, обновлением и поддержкой работоспособности оборудования и работающего на нём программного обеспечения.\r\n\r\nВ модели SaaS:\r\n\r\nприложение приспособлено для удаленного использования;\r\nодним приложением пользуется несколько клиентов (приложение коммунально);\r\nоплата взимается либо в виде ежемесячной абонентской платы, либо на основе объёма операций;\r\nтехническая поддержка приложения включена в оплату;\r\nмодернизация и обновление приложения происходит оперативно и прозрачно для клиентов.\r\nКак и во всех формах облачных вычислений, заказчики платят не за владение программным обеспечением как таковым, а за его аренду (то есть за его использование через мобильное приложение или веб-интерфейс). Таким образом, в отличие от классической схемы лицензирования программного обеспечения, заказчик несет сравнительно небольшие периодические затраты, и ему не требуется инвестировать значительные средства в приобретение прикладной программы и необходимых программно-платформенных и аппаратных средств для его развёртывания, а затем поддерживать его работоспособность. Схема периодической оплаты предполагает, что если необходимость в программном обеспечении временно отсутствует, то заказчик может приостановить его использование и заморозить выплаты разработчику.\r\n\r\nС точки зрения разработчика некоторого проприетарного программного обеспечения модель SaaS позволяет эффективно бороться с нелицензионным использованием программного обеспечения, поскольку программное обеспечение как таковое не попадает к конечным заказчикам. Кроме того, концепция SaaS часто позволяет уменьшить затраты на развёртывание и внедрение систем технической и консультационной поддержки продукта, хотя и не исключает их полностью.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SaaS","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/cloud_computing2__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"roi-i-cena":{"id":2252,"logoURL":"https://old.b4r.io/fileadmin/user_upload/63380ded05b85939ff20b2927eb2e23b_z.jpg","logo":true,"scheme":false,"title":"ROI and price","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"roi-i-cena","companyTitle":"IT Service +","companyTypes":["supplier","vendor"],"companyId":3328,"companyAlias":"it-servis","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ROI and price","keywords":"","description":"","og:title":"ROI and price","og:description":"","og:image":"https://old.b4r.io/fileadmin/user_upload/63380ded05b85939ff20b2927eb2e23b_z.jpg"},"eventUrl":"","translationId":2253,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"cena":{"id":2254,"logoURL":"https://old.b4r.io/fileadmin/user_upload/1374819980_www.radionetplus.ru-805.jpg","logo":true,"scheme":false,"title":"ROI3","vendorVerified":0,"rating":"2.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"cena","companyTitle":"IT Service +","companyTypes":["supplier","vendor"],"companyId":3328,"companyAlias":"it-servis","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ROI3","keywords":"","description":"","og:title":"ROI3","og:description":"","og:image":"https://old.b4r.io/fileadmin/user_upload/1374819980_www.radionetplus.ru-805.jpg"},"eventUrl":"","translationId":2255,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":205,"title":"NAC - Network Access Control","alias":"nac-network-access-control","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NAC.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"software-development":{"id":1987,"logoURL":"https://old.b4r.io/fileadmin/content/software_development_390387_01.png","logo":true,"scheme":false,"title":"Software development","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"software-development","companyTitle":"Ukrainian developers","companyTypes":["supplier","vendor"],"companyId":4486,"companyAlias":"ukrainskie-razrabotchiki","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":4,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Software development","keywords":"development, Software","description":"","og:title":"Software development","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/software_development_390387_01.png"},"eventUrl":"","translationId":1987,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":601,"title":"Custom Software Development","alias":"","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/custom-software-development.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"trapx-deceptiongrid-platform1":{"id":1724,"logoURL":"https://old.b4r.io/fileadmin/user_upload/TrapX_DeceptionGrid_platform.png","logo":true,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":9,"suppliersCount":0,"supplierPartnersCount":1,"alias":"trapx-deceptiongrid-platform1","companyTitle":"TrapX","companyTypes":["supplier","vendor"],"companyId":3890,"companyAlias":"trapx","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The Deception Product of Choice</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Console with Attack Visualization</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attacker ID</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Automated Provisioning</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Deception Tokens</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Active Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Medium Interaction Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Industry Templates</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">FullOS Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">High Interaction (Full Operating System) Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.</span>\r\n","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:image":"https://old.b4r.io/fileadmin/user_upload/TrapX_DeceptionGrid_platform.png"},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":28,"title":"Deception Techniques and Honeypots"}],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["0304-ru","0abcd","11a11","1it-service-product","autodesk-revit","barracuda-nextgen-firewall-ngfw","forcepoint-ngfw","forcepoint-url-filtering","friday222","hideez-key-hk","it-serv-111-ijun","microsoft-office-365","roi-i-cena","cena","software-development","trapx-deceptiongrid-platform1"]},"links":{"first":"http://b4r_be/api/products?page=1","last":"http://b4r_be/api/products?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://b4r_be/api/products","per_page":20,"to":16,"total":16},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"3":{"id":3,"title":"CRM"},"13":{"id":13,"title":"NG Firewall"},"17":{"id":17,"title":"CAD for architecture and construction - Computer-Aided Design"},"28":{"id":28,"title":"Deception Techniques and Honeypots"},"36":{"id":36,"title":"Endpoint Security"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}