{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"en":"Offer a reference bonus","ru":"Предложить бонус за референс","_type":"localeString"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"_type":"localeString","en":"Selling","ru":"Продают"},"using":{"_type":"localeString","en":"Using","ru":"Используют"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"vendor-popover":{"_type":"localeString","en":"vendor","ru":"производитель"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"_type":"localeString","en":"Rating descending","ru":"По убыванию рейтинга"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"ru":"По убыванию скидки","_type":"localeString","en":"Rebate descending"},"i-use-it-popover":{"ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"vendor-verified":{"ru":"Поставщик потверждён","_type":"localeString","en":"Vendor verified"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"_type":"localeString","en":"Learn more","ru":"Узнать больше"},"categories-popover":{"ru":"категории","_type":"localeString","en":"categories"},"sort-popular-asc":{"ru":"По возростанию популярности","_type":"localeString","en":"Popular ascending"},"sort-popular-desc":{"en":"Popular descending","ru":"По убыванию популярности","_type":"localeString"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"login":{"de":"Einloggen","ru":"Войти","_type":"localeString","en":"Login"},"register":{"_type":"localeString","en":"Register","de":"Registrieren","ru":"Зарегистрироваться"},"auth-message":{"de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You need to register or login."},"add-to-comparison":{"_type":"localeString","en":"Add to comparison","ru":"Добавить в сравнение"},"added-to-comparison":{"_type":"localeString","en":"Added to comparison","ru":"Добавлено в сравнения"},"items-found":{"en":"Products found","ru":"Продуктов найдено","_type":"localeString"},"sort-sales-desc":{"ru":"По продаже","_type":"localeString","en":"By sale"},"sort-purchases-desc":{"ru":"По покупке","_type":"localeString","en":"By purchase"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product producer"},"products-fetching-error":{"_type":"localeString","en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу."}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"ru":"Выйти","_type":"localeString","en":"logout"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"en":"Calculate ROI and price","_type":"localeString"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"category":{"_type":"localeString","en":"Category","ru":"Категория"},"follow":{"_type":"localeString","en":"Follow","ru":"Следить"},"add-product":{"_type":"localeString","en":"Add Product","ru":"Добавить продукт"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"_type":"localeString","en":"Filter","ru":"Фильтр"},"clear-button":{"en":"Сlear","ru":"Очистить","_type":"localeString"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"_type":"localeString","en":"product categories","ru":"категориz продуктаhjle"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"problems-field":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"roi-calculator-checkbox":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"apply-filter-button":{"en":"Apply filter","ru":"Применить фильтр","_type":"localeString"},"sorting-toggle":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"_type":"localeString","en":"Countries","ru":"Страны"},"seller":{"en":"Seller","ru":"Продавец","_type":"localeString"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"_type":"localeString","en":"User suppliers","ru":"Поставщики пользователя"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"en":" Branch","ru":"Отрасль","_type":"localeString"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"info-source":{"en":"Info source","ru":"Информационный ресурс","_type":"localeString"},"with-reference-checkbox":{"_type":"localeString","en":"With reference","ru":"С референсами"},"show-deal-checkbox":{"_type":"localeString","en":"Show deal with noname","ru":"Показывать сделки с noname"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"find":{"en":"Find","ru":"Выполнить поиск","_type":"localeString"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"_type":"localeString","en":"Try AI (Beta)","ru":"Попробовать AI (Beta)"},"hide":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"company-size":{"_type":"localeString","en":"Company size","ru":"Размер компании"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"en":"From A to Z","ru":"От А до Я","_type":"localeString"},"sort-title-desc":{"en":"From Z to A","ru":"От Я до А","_type":"localeString"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"user":{"en":"User","ru":"Пользователь","_type":"localeString"},"company-type":{"_type":"localeString","en":"Company type","ru":"Тип компании"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"en":"Customers","ru":"Покупатели","_type":"localeString"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"en":"Deal canceled","ru":"Сделка отменена","_type":"localeString"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"_type":"localeString","en":"Deal in progress","ru":"Сделка в процессе"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"en":"Finished","ru":"Завершено","_type":"localeString"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"label":"catalog-products-text-block","body":{"en":[{"markDefs":[],"children":[{"marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550","_type":"span"}],"_type":"block","style":"normal","_key":"8bebcfb34955"}],"ru":[{"_key":"28241882db7a","markDefs":[],"children":[{"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0","_type":"span","marks":[]}],"_type":"block","style":"normal"}],"_type":"localeBlock"}}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"translatable_meta":[{"name":"og:title","translations":{"en":"Products","ru":"Продукты","_type":"localeString"}},{"translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"Description"},"name":"description"},{"translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI"},"name":"og:description"},{"translations":{"en":"keyword","ru":"каталог, программное обеспечение, софт, ит услуги","_type":"localeString"},"name":"keywords"},{"name":"title","translations":{"ru":"Продукты","_type":"localeString","en":"Products"}}],"title":{"ru":"ROI4CIO: Продукты","_type":"localeString","en":"ROI4CIO: Products"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"acronis-backup":{"id":2070,"logoURL":"https://old.b4r.io/fileadmin/user_upload/acronis-backup-12-logo.png","logo":true,"scheme":false,"title":"Acronis Backup","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"acronis-backup","companyTitle":"Acronis","companyTypes":["vendor"],"companyId":2820,"companyAlias":"acronis","description":"<p>Acronis Backup is a fast, scalable and reliable backup solution for files, applications, and complete systems.</p>\r\n<p>Acronis Backup is highly customizable, allowing you to set up whatever type of backup solution you need, including on-location, cloud-based or hybrid.</p>\r\n<p>The company can back up data from servers, mobile devices, cloud platforms and virtual machines. Acronis is also flexible in its backup options, allowing you to back up to a different cloud storage platform, if you prefer.</p>\r\n<p>You can set up quick incremental and differential backups of your servers with options to back up your network on local, remote and cloud locations. All the while, the data deduplication feature ensures that your backup doesn't consist of copies, which keeps storage requirements more manageable. In addition, you can encrypt your backups with three options: 128-bit, 192-bit and 256-bit AES cipher encryption. This means that you can store your archived backups off-site without fear of the data being stolen.</p>\r\n<p>Acronis includes several features for protecting and backing up your virtual environment. It integrates with the most popular and used virtual platforms, including VMWare vSphere, Microsoft Hyper-V, Citrix XenServer, Linux KVM and Oracle VM Server.</p>\r\n<p>One of the best features of Acronis Backup Advanced is the instant recovery, or recovery in place. This recovery feature launches the backed-up data onto a virtual server so that users can still access the data while you work to restore the original server. There is virtually no downtime.</p>\r\n<p>In addition, the disk-imaging restoration allows you to store entire disks to dissimilar hardware on a granular level. This allows you to convert backups of physical servers to virtual machines (physical to virtual) and convert work in progress from those virtual machines back to bare metal (virtual to physical) and even dissimilar hardware.</p>\r\n<p>You can implement backup and recoveries from anywhere in the world, as long as you are on a computer with an internet connection. When you combine this with the wake-on-LAN feature, you can essentially access any computer connected to your network and run backups without physically accessing the computers.</p>","shortDescription":"Acronis Backup is a fast, scalable and reliable backup solution for files, applications, and complete systems.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Acronis Backup","keywords":"virtual, your, Acronis, backup, with, data, backups, Backup","description":"Acronis Backup is a fast, scalable and reliable backup solution for files, applications, and complete systems.\rAcronis Backup is highly customizable, allowing","og:title":"Acronis Backup","og:description":"Acronis Backup is a fast, scalable and reliable backup solution for files, applications, and complete systems.\rAcronis Backup is highly customizable, allowing","og:image":"https://old.b4r.io/fileadmin/user_upload/acronis-backup-12-logo.png"},"eventUrl":"","translationId":2071,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":71,"title":"Backup and Recovery"}],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Резервное копирование (англ. backup) — процесс создания копии данных на носителе (жёстком диске, дискете и т. д.), предназначенном для восстановления данных в оригинальном или новом месте их расположения в случае их повреждения или разрушения.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A0%D0%B5%D0%B7%D0%B5%D1%80%D0%B2%D0%BD%D0%BE%D0%B5_%D0%BA%D0%BE%D0%BF%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_protection__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"acronis-backup-advanced-for-windows-server":{"id":356,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Acronis_Backup_Advanced_for_Windows_Server.jpg","logo":true,"scheme":false,"title":"Acronis Backup Advanced for Windows Server","vendorVerified":0,"rating":"0.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"acronis-backup-advanced-for-windows-server","companyTitle":"Acronis","companyTypes":["vendor"],"companyId":2820,"companyAlias":"acronis","description":"Backup and Protect Your Windows Server Environment\r\nAcronis Backup Advanced for Windows Server is the best-in-class solution for protecting your Windows® environment.\r\nPowered by Acronis AnyData Technology, this solution can back up your entire Windows server in a single pass, delivering dramatically faster protection and the most flexible, reliable recovery available.\r\nNow you can quickly and easily restore individual files/folders, application data, or an entire server—all from the same backup. Acronis Backup Advanced also offers the flexibility of restoring your server to its original location, to entirely new, dissimilar hardware, or to a virtual machine.\r\n\r\n<span style=\"font-weight: bold; \">Key Features</span>\r\nUniversal Restore\r\nIncluded with all Acronis backup solutions, this unique data recovery technology gives you the convenient ability to instantly restore backups to any machine, regardless of platform. Now you can restore files, configurations, applications, or an entire system to the same hardware, to different hardware, or to a virtual server—all with a few simple clicks! \r\nFull Image Backups\r\nBlock-level, image-based backups capture all application and operating system data in one efficient step. Unlike other backup solutions, Acronis Backup Advanced automatically skips unused data blocks to provide faster results with less storage requirements.\r\nEfficient Incremental Backups\r\nIncremental backups identify only the changes made since the last backup, significantly reducing backup time and any impact on network bandwidth or backup storage.\r\nFlexible Recovery\r\nQuickly restore only what you need! Recover granular files, folders, volumes, or a complete server—all from a single image backup.\r\nDisaster Recovery\r\nRecover your entire Windows server in minutes—to the same location, to new, dissimilar hardware, or to a virtual server. Acronis Backup Advanced can quickly restore data locally or remotely using Linux Kernel or WinPE media, or a PXE server to start the new server. Acronis’ driver injection and SID change capabilities will get you up and running quickly on new hardware.\r\nDeduplication\r\nBuilt-in source and target variable block size data deduplication reduces the volume of backup data by up to 90%. This maximizes backup speed, puts significantly less load on your network, and reduces backup storage requirements.\r\nCentralized Management\r\nAcronis Backup Advanced includes a unified centralized management and reporting console. Manage and report on all backup operations for all physical and virtual machines from a single dashboard.\r\nMultiple Backup Targets\r\nAcronis Backup Advanced supports disk, tape, and cloud locations providing multiple RTO options and full flexibility for recovery from multiple media sources and locations.\r\nAcronis Cloud Storage\r\nAcronis Backup Advanced includes secure, offsite cloud backup to the Acronis cloud. Simply add a subscription to your purchase to fortify your backup storage plan and double your data protection. \r\nFor more detailed information about Acronis Backup Advanced for Windows Server you may examine the review.\r\n","shortDescription":"Acronis Backup Advanced for Windows Server - New generation Windows® Server backup and recovery solutions","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Acronis Backup Advanced for Windows Server","keywords":"backup, Acronis, Backup, Advanced, your, data, Windows, server","description":"Backup and Protect Your Windows Server Environment\rAcronis Backup Advanced for Windows Server is the best-in-class solution for protecting your Windows®","og:title":"Acronis Backup Advanced for Windows Server","og:description":"Backup and Protect Your Windows Server Environment\rAcronis Backup Advanced for Windows Server is the best-in-class solution for protecting your Windows®","og:image":"https://old.b4r.io/fileadmin/user_upload/Acronis_Backup_Advanced_for_Windows_Server.jpg"},"eventUrl":"","translationId":357,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Резервное копирование (англ. backup) — процесс создания копии данных на носителе (жёстком диске, дискете и т. д.), предназначенном для восстановления данных в оригинальном или новом месте их расположения в случае их повреждения или разрушения.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A0%D0%B5%D0%B7%D0%B5%D1%80%D0%B2%D0%BD%D0%BE%D0%B5_%D0%BA%D0%BE%D0%BF%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_protection__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"acronis-true-image":{"id":1259,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Acronis_True_Image.png","logo":true,"scheme":false,"title":"Acronis True Image","vendorVerified":0,"rating":"1.70","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":2,"alias":"acronis-true-image","companyTitle":"Acronis","companyTypes":["vendor"],"companyId":2820,"companyAlias":"acronis","description":"<span style=\"font-weight: bold; \">Create a reliable backup</span>\r\nMake sure you always have dependable copies of your data so you can restore your entire system or individual files\r\n\r\n<ul><li>Back up. Use cloning and imaging to make a duplicate of your system, capturing all of your data for disk migration or system recovery</li><li>Store. Back up to a local drive and to the cloud for the Dual Protection of always having on-site and off-site copies available</li><li>Restore. Quickly recover your whole system or a specific file with confidence, knowing that the backup is as good as the original</li></ul>\r\n\r\n<span style=\"font-weight: bold; \">Control your data</span>\r\nBack up in just two clicks,\r\nand view all your data and backup information in one place\r\n<span style=\"font-weight: bold; \">Easy to use and manage</span>\r\nEnjoy a simple, intuitive approach to backup, because safeguarding your data doesn’t need to be complicated \r\n\r\n<ul><li>Cover Everything. With one solution you can safeguard PCs, Macs, iOS and Android devices as well as your social media accounts</li><li>Two-Click Protection. Protect everything by choosing where to store your data and creating a full image backup in just two clicks</li><li>Visual Dashboards. Know at a glance the size of your backup, the types of files, and how many ransomware attacks have been stopped</li></ul>\r\n\r\n<span style=\"font-weight: bold; \">Secure data against ransomware</span>\r\nActively defend your data against ransomware attacks with the only backup that detects, stops and reverses unauthorized encryption.\r\n\r\nSource: https://www.acronis.com/en-us/personal/computer-backup/\r\nFor more detailed information about Acronis True Image 2018 you may examine the review.\r\nhttps://www.cloudwards.net/review/acronis-true-image-cloud/\r\n","shortDescription":"Acronis True Image is a software product produced by Acronis that provides data protection for personal users including, backup, archive, access and recovery for Microsoft, OSX, iOS and Android operating systems. As disk imaging software, True Image can restore the previously captured image to another disk, replicating the structure and contents to the new disk, also allowing disk cloning and partition resizing, even if the new disk is of a different capacity. The backups are in a proprietary format which saves using a .tib filename format.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Acronis True Image","keywords":"your, data, backup, system, Back, ransomware, information, against","description":"Create a reliable backup\rMake sure you always have dependable copies of your data so you can restore your entire system or individual files\r\rBack up. Use","og:title":"Acronis True Image","og:description":"Create a reliable backup\rMake sure you always have dependable copies of your data so you can restore your entire system or individual files\r\rBack up. Use","og:image":"https://old.b4r.io/fileadmin/user_upload/Acronis_True_Image.png"},"eventUrl":"","translationId":1260,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Резервное копирование (англ. backup) — процесс создания копии данных на носителе (жёстком диске, дискете и т. д.), предназначенном для восстановления данных в оригинальном или новом месте их расположения в случае их повреждения или разрушения.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A0%D0%B5%D0%B7%D0%B5%D1%80%D0%B2%D0%BD%D0%BE%D0%B5_%D0%BA%D0%BE%D0%BF%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_protection__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"aruba-switch":{"id":49,"logoURL":"https://old.b4r.io/fileadmin/content/Aruba_Switch.png","logo":true,"scheme":false,"title":"Aruba Switch","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":575,"alias":"aruba-switch","companyTitle":"Hewlett Packard Enterprise","companyTypes":["supplier","vendor"],"companyId":172,"companyAlias":"hewlett-packard-enterprise","description":"<div class=\"group\" style=\"box-sizing: border-box; color: rgb(51, 51, 51); font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); \"><p style=\"box-sizing: border-box; margin: 0px 0px 30px; \"><span style=\"color: rgb(101, 109, 120); font-family: Pfhighwaysanspro-light; font-size: 16.8px; background-color: rgb(252, 252, 252); \">The Aruba Switch provides security, reliability, and ease of use for enterprise edge, branch office, and SMB deployments.</span></p>","shortDescription":"The Aruba Switch provides security, reliability, and ease of use for enterprise edge, branch office, and SMB deployments.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Aruba Switch","keywords":"Switch, Aruba, edge, enterprise, deployments, office, branch, ease","description":"The Aruba Switch provides security, reliability, and ease of use for enterprise edge, branch office, and SMB deployments.","og:title":"Aruba Switch","og:description":"The Aruba Switch provides security, reliability, and ease of use for enterprise edge, branch office, and SMB deployments.","og:image":"https://old.b4r.io/fileadmin/content/Aruba_Switch.png"},"eventUrl":"","translationId":102,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":56,"title":"Router","alias":"router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"azure-data-warehouse":{"id":1546,"logoURL":"https://old.b4r.io/fileadmin/user_upload/data-warehouse.jpg","logo":true,"scheme":false,"title":"Azure Data Warehouse","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"azure-data-warehouse","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily get started, take advantage of the performance, flexibility, and security of Azure's fully managed services, such as SQL Azure and Azure Databricks.</p>\r\n<h2>Get rid of worries</h2>\r\n<h2><br /><span style=\"font-weight: normal;\">Built-in advanced security features include transparent data encryption, auditing, threat detection, integration with Azure Active Directory and virtual network endpoints. Azure services correspond to more than 50 industry and geographic certifications and are available worldwide in 42 regions to store your data wherever your users are located. Finally, Microsoft offers financially secured service level agreements to spare you any hassle.</span></h2>","shortDescription":"Azure Data Warehouse - is a modern data storage from Microsoft","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Azure Data Warehouse","keywords":"Azure, data, your, analytics, security, such, services, correspond","description":"Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions","og:title":"Azure Data Warehouse","og:description":"Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions","og:image":"https://old.b4r.io/fileadmin/user_upload/data-warehouse.jpg"},"eventUrl":"","translationId":1549,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":24,"title":"IaaS - storage"}],"testingArea":"","categories":[{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IaaS_-_Storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"azure-resiliency":{"id":1420,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Azure_Resiliency.jpg","logo":true,"scheme":false,"title":"Azure Resiliency","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"azure-resiliency","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"<span style=\"font-weight: bold; \">Business continuity with data resiliency</span>\r\nBuild applications on Azure to take advantage of high availability, disaster recovery, and backup on Azure’s global network. Build redundancies at the virtual machine (VM), datacenter, and regional levels based on your business needs. And stay compliant with your country’s or region’s legal and regulatory requirements respective of the location of your data.\r\n<span style=\"font-weight: bold; \">Achieve High Availability faster in the cloud</span>\r\nAs soon as you sign up, access the tools, the infrastructure, and the guidance you need to deploy your applications in the cloud. Support your most demanding mission-critical applications to build always-available sites cost-effectively. And take advantage of an SLA of up to 99.99 percent for your virtual machines.\r\nHigh-availability solutions\r\n<ul><li>Availability Zones</li><li>Availability sets</li><li>Virtual Machine Scale Sets (VMSS)</li></ul>\r\n<span style=\"font-weight: bold; \">Easy disaster recovery and backup</span>\r\nAzure Site Recovery, combined with geo-redundant storage, is natively available for disaster recovery. Protect against bad code, data corruption, and accidental deletion with cost-effective backup. Stay compliant with long retention times, maintain reliability through geo-replicated storage, and simplify your processes with automation.\r\n<span style=\"font-weight: bold; \">Keep your applications up and running</span>\r\nHear from one of our customers about their resiliency experience building on Azure. Plus, our product team talks about our commitment to delivering a service that meets the needs of your resiliency strategy.\r\n<span style=\"font-weight: bold;\">Availability Zones</span> is a high-availability offering that protects your applications and data from datacenter failures. Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions. The physical separation of Availability Zones within a region protects applications and data from datacenter failures. Zone-redundant services replicate your applications and data across Availability Zones to protect from single-points-of-failure. With Availability Zones, Azure offers industry best 99.99% VM uptime SLA.\r\n","shortDescription":"Azure Resiliency is a comprehensive business-continuity solution build with confidence with high availability, disaster recovery, and backup","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Azure Resiliency","keywords":"your, with, Availability, applications, data, Azure, Zones, resiliency","description":"Business continuity with data resiliency\rBuild applications on Azure to take advantage of high availability, disaster recovery, and backup on Azure’s global","og:title":"Azure Resiliency","og:description":"Business continuity with data resiliency\rBuild applications on Azure to take advantage of high availability, disaster recovery, and backup on Azure’s global","og:image":"https://old.b4r.io/fileadmin/user_upload/Azure_Resiliency.jpg"},"eventUrl":"","translationId":1421,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Резервное копирование (англ. backup) — процесс создания копии данных на носителе (жёстком диске, дискете и т. д.), предназначенном для восстановления данных в оригинальном или новом месте их расположения в случае их повреждения или разрушения.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A0%D0%B5%D0%B7%D0%B5%D1%80%D0%B2%D0%BD%D0%BE%D0%B5_%D0%BA%D0%BE%D0%BF%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_protection__1_.png"},{"id":497,"title":"Backup and Recovery Reporting Software","alias":"backup-and-recovery-reporting-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-protection-and-recovery-reporting.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"azure-virtual-machines":{"id":1550,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Azure-Virtual-machines.png","logo":true,"scheme":false,"title":"Azure Virtual Machines","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"azure-virtual-machines","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide range of computing solutions. All current-generation virtual machines include load balancing and autoscaling. <span style=\"color: #505050; font-family: 'Segoe UI', SegoeUI, 'Segoe WP', Tahoma, Arial, sans-serif; font-size: 15px; background-color: #ffffff;\"><br /></span>Azure Virtual Machines - is a proposal that includes various solutions, from an inexpensive B series to virtual machines with the latest GPU optimized for machine learning. It is designed to perform any workloads within any budget.</p>","shortDescription":"Azure Virtual Machines - is a computing service from Microsoft","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Azure Virtual Machines","keywords":"Azure, virtual, machines, Machines, Virtual, solutions, Server, series","description":"Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide","og:title":"Azure Virtual Machines","og:description":"Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide","og:image":"https://old.b4r.io/fileadmin/user_upload/Azure-Virtual-machines.png"},"eventUrl":"","translationId":1551,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":26,"title":"IaaS - computing"}],"testingArea":"","categories":[{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"IaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computing ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iaas-computing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-backup":{"id":1312,"logoURL":"https://old.b4r.io/fileadmin/content/images_04.png","logo":true,"scheme":false,"title":"Barracuda Backup","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-backup","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<p>Barracuda Backup is a unified, cost-effective data protection solution for your physical, virtual, and SaaS environments. It’s a complete backup solution with remote storage that is easy to buy, install, and manage.</p>\r\n<p>Physical and Virtual</p>\r\n<p>Most businesses today have a mixed environment of physical and virtual servers. Barracuda Backup is a single solution to protect physical servers and virtual machines (VMware & Hyper-V) with snapshot and granular file recovery—all with unified management for replication and retention.</p>\r\n<p>All-in-One Backup Solution</p>\r\n<p>Barracuda Backup is a complete solution that comes from one vendor. It combines software, in-line deduplication, and offsite cloud or private replication without perserver or per-application licensing fees.</p>\r\n<p>Flexible Deployment</p>\r\n<p>Barracuda Backup is available as an all-inone physical appliance or a virtual appliance software offering for those wanting to leverage existing storage and compute infrastructures. Barracuda Backup can replicate data securely and efficiently from an on-premises physical or virtual backup appliance to Barracuda Cloud, a remote physical appliance, a remote virtual appliance, or Amazon Web Services (AWS).</p>","shortDescription":"Barracuda Backup unified, cost-effective data protection solution for your physical, virtual environments. It’s a complete backup solution with remote storage that is easy to buy, install, and manage.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Backup","keywords":"Barracuda, Backup, physical, virtual, appliance, solution, with, remote","description":"Barracuda Backup is a unified, cost-effective data protection solution for your physical, virtual, and SaaS environments. It’s a complete backup solution","og:title":"Barracuda Backup","og:description":"Barracuda Backup is a unified, cost-effective data protection solution for your physical, virtual, and SaaS environments. It’s a complete backup solution","og:image":"https://old.b4r.io/fileadmin/content/images_04.png"},"eventUrl":"","translationId":1393,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":71,"title":"Backup and Recovery"}],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Резервное копирование (англ. backup) — процесс создания копии данных на носителе (жёстком диске, дискете и т. д.), предназначенном для восстановления данных в оригинальном или новом месте их расположения в случае их повреждения или разрушения.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A0%D0%B5%D0%B7%D0%B5%D1%80%D0%B2%D0%BD%D0%BE%D0%B5_%D0%BA%D0%BE%D0%BF%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_protection__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-cloudgen-firewall":{"id":1909,"logoURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda CloudGen Firewall","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-cloudgen-firewall","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, and helps organizations transform their business.\r\n<span style=\"font-weight: bold;\">From the Next Generation Firewall to a Cloud Generation Solution</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications.\r\nBarracuda CloudGen Firewall is a family of physical appliance, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control.\r\nIn addition, Barracuda CloudGen Firewalls combine highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network.\r\nBarracuda's cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<ul><li>Protection Against Advanced Threats and Zero-Hour Attacks.</li><li>Secure SD-WAN: Reduce Costs and Ensure Application Availability.</li><li>Remote VPN Access for Off-Network Users – Anytime, Anywhere.</li><li>Secure Migration to the Public Cloud and Hybrid Environments.</li><li>Secure Connectivity for IoT Devices and Industrial Control Systems.</li></ul>\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN</span>\r\nBarracuda CloudGen Firewalls include full next-generation Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n<ul><li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li><li>VPN across multiple broadband connections and MPLS replacement</li><li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li><li>Replacing network backhauling central policy enforcement architectures with direct internet breakouts</li><li>Faster access to cloud applications like Office 365 by dynamically prioritizing them over non-critical traffic</li><li>Guaranteed user access to critical applications through granular policy controls</li><li>Increased available bandwidth with built-in traffic compression and data deduplication</li><li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li></ul>\r\n<span style=\"font-weight: bold;\">Cut MPLS Costs with Bandwidth Optimization</span>\r\nIf you have branch offices and remote locations that need to run SaaS applications or connect to your network, Barracuda can dramatically reduce your WAN costs. The traditional approach of backhauling traffic to a main office via costly MPLS leased lines can’t deliver on price and performance in the cloud era.\r\nBarracuda lets you establish direct internet breakouts for optimized cloud accessibility. Our SD-WAN maintains a fully meshed VPN using less expensive broadband connections. Use the Savings Calculator to see how much your organization to save.\r\n<span style=\"font-weight: bold;\">Why Barracuda CloudGen Firewall?</span>\r\nWhen selecting security technology, it is critical that your products are supported by people who take network security as seriously as you do. Barracuda CloudGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data.","shortDescription":"Barracuda CloudGen Firewall - Go Beyond Next-Generation Firewalls to Protect Your Network in the Cloud and On-Premises","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda CloudGen Firewall","keywords":"network, Barracuda, your, with, applications, Firewall, cloud, CloudGen","description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that","og:title":"Barracuda CloudGen Firewall","og:description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that","og:image":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1910,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-email-security-gateway":{"id":115,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_Email_Security_Gateway.png","logo":true,"scheme":false,"title":"Barracuda Email Security Gateway","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-email-security-gateway","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<strong>Provides Inbound/Outbound Filtering and Data Leak Prevention</strong>\r\nThe Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks. As a complete email management solution, the Barracuda Email Security Gateway lets organizations encrypt messages and leverage the cloud to spool email if mail servers become unavailable.\r\nThe Barracuda Email Security Gateway is offered without per-user or per-feature fees, and is also available as a virtual appliance or in a public cloud environment (Amazon Web Services (AWS), Microsoft Azure, or VMware vCloud Air). For hosted email security, see Barracuda Essentials for Email Security.\r\n<strong>Protect Against Email-Borne Threats</strong>\r\nWith the Barracuda Email Security Gateway, protecting against inbound malware, spam, phishing, and Denial of Service attacks ensures that business productivity isn’t impacted by attacks through the email system. Powerful and customizable policies enable further enforcement of detailed requirements that govern inbound email messages.\r\n \r\n<strong>Stop Threats before They Hit the Network</strong>\r\nOffload CPU-intensive tasks like antivirus and DDoS filtering to the cloud reduces the processing load on the appliance and to ensure that threats never reach the network perimeter. The Barracuda Email Security Gateway is integrated with a cloud-based service that pre-filters email before delivery to the onsite Barracuda Email Security Gateway, which performs further inbound security checks and outbound filtering.\r\n \r\n<strong>Ensure Continuous Email Availability</strong>\r\nEmail is a critical vehicle in today’s business world, therefore a failure of the email server can significantly limit business operations. With the Cloud Protection Layer, bundled free of charge with the Barracuda Email Security Gateway, email is spooled for up to 96 hours, with an option to re-direct traffic to a secondary server.\r\n \r\n<strong>Protect Sensitive Data</strong>\r\nLeverage powerful encryption technology to ensure that sensitive data cannot be viewed by outside parties. Outbound filtering and quarantine capabilities certify that every outbound email complies with corporate DLP policies.\r\nSimple and easy to deploy configurations on the Barracuda Email Security Gateway guarantee that customized email protection is in place in a matter of minutes. Cloud-based centralized management enhances day-to-day workflow and is included with no additional fees.\r\nThe affordable, all-inclusive pricing model has no per-user fees, minimizing the investment in securing your email infrastructure.","shortDescription":"Barracuda Email Security Gateway - Comprehensive Protection from Email-Based Threats","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Email Security Gateway","keywords":"Email, email, Security, Barracuda, Gateway, that, with, Features","description":"Provides Inbound/Outbound Filtering and Data Leak Prevention\rThe Barracuda Email Security Gateway is an email security gateway that manages and filters all","og:title":"Barracuda Email Security Gateway","og:description":"Provides Inbound/Outbound Filtering and Data Leak Prevention\rThe Barracuda Email Security Gateway is an email security gateway that manages and filters all","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_Email_Security_Gateway.png"},"eventUrl":"","translationId":116,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":554,"title":"Messaging Security - Appliance","alias":"messaging-security-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/mail-security-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-load-balancer":{"id":1199,"logoURL":"https://old.b4r.io/fileadmin/content/barracuda-load-balancer.jpg","logo":true,"scheme":false,"title":"Barracuda Load Balancer","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-load-balancer","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<p><span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Barracuda Load Balancer is a powerful and easy-to-use solution for distributing network traffic between servers. Designed to achieve resiliency, the Barracuda Load Ballancer is an easy-to-use solution that includes traffic balancing and IP5. This solution provides traffic distribution between multiple servers, and a fault-tolerance system in the event of a failure of one of them.</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Acceleration</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">The Barracuda Load Balancer ADC is ideal for optimizing application performance. It offloads computeintensive SSL transactions from the server, preserving resources for applications. In addition, optimization features such as caching, compression, and TCP pooling enable faster application delivery and ensure scalability.</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Availability</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Using health and performance checks, the Barracuda Load Balancer ADC distributes traffic for efficient use of server resources and employs server failover for high availability. Global Server Load Balancing allows redundancy across multiple sites enhancing availability and speeding disaster recovery.</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Control</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Content routing and content rewrites enable full control of application traffic and customized application delivery based on users, regions, and/or devices. Client controls gives administrators the ability to throttle requests to ensure application availability even during periods of heavy traffic.</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Security</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Content routing and content rewrites enable full control of application traffic and customized application delivery based on users, regions, and/or devices. Client controls gives administrators the ability to throttle requests to ensure application availability even during periods of heavy traffic.</span></p>","shortDescription":"Barracuda Load Balancer - automatic balancing several kinds of traffic. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Load Balancer","keywords":"traffic, application, Load, Barracuda, availability, Balancer, server, delivery","description":"Barracuda Load Balancer is a powerful and easy-to-use solution for distributing network traffic between servers. Designed to achieve resiliency, the Barracuda","og:title":"Barracuda Load Balancer","og:description":"Barracuda Load Balancer is a powerful and easy-to-use solution for distributing network traffic between servers. Designed to achieve resiliency, the Barracuda","og:image":"https://old.b4r.io/fileadmin/content/barracuda-load-balancer.jpg"},"eventUrl":"","translationId":1379,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":321,"title":"Workload Scheduling and Automation Software","alias":"workload-scheduling-and-automation-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/balancing-and-automated-load-control.png"},{"id":491,"title":"Datacenter Automation","alias":"datacenter-automation","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Data_Center_Automation__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-message-archiver":{"id":113,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_Message_Archiver.png","logo":true,"scheme":false,"title":"Barracuda Message Archiver","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-message-archiver","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"The Barracuda Message Archiver is ideal for organizations looking to reduce their email storage requirements and boost user productivity with mobile or desktop access to any email ever sent or received. The cloud-connected appliance uses the Barracuda Cloud to move information to the cloud as a secondary tier of storage. In addition, the Barracuda Message Archiver also provides a powerful, yet simple platform for eDiscovery and compliance. Affordable Budgeting is predictable with our simple pricing model. With no per-user or per-mailbox fees, the Barracuda Message Archiver often costs less over time than many online archiving services that are initially free to use. Comprehensive reporting makes it easy to project future storage needs. Key Features: Exchange Stubbing, PST Collector, Comprehensive Mobile Apps, Single Instance Storage, Usage Reports Reduces Email Server Storage Needs The Barracuda Message Archiver reduces expensive storage needs of email servers, extending server life while reducing costs. By eliminating the need for users to archive their emails locally with PST files, IT has more control over message tracking and retention. Key Features: Exchange Stubbing, PST Collector, Single Instance Storage, Message Import, Usage Report Convenient User Access Intuitive search and full-featured message management via a web browser, Outlook Add-in, PC, Mac, or mobile device enhances user productivity with self-service access and recovery of any message ever sent or received, even if deleted on the email server. Litigation and Compliance Support The Barracuda Message Archiver has comprehensive indexing, permissioning, search, legal hold, audit, and export capabilities that help accelerate and simplify eDiscovery requests. The appliance supports compliance with laws and regulations that require message archiving and retrieval, such as FOIA.","shortDescription":"Barracuda Message Archiver - Retain and retrieve all email communication while reducing storage requirements.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Message Archiver","keywords":"Barracuda, Message, Archiver, with, email, message, storage, that","description":"The Barracuda Message Archiver is ideal for organizations looking to reduce their email storage requirements and boost user productivity with mobile or desktop","og:title":"Barracuda Message Archiver","og:description":"The Barracuda Message Archiver is ideal for organizations looking to reduce their email storage requirements and boost user productivity with mobile or desktop","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_Message_Archiver.png"},"eventUrl":"","translationId":114,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":307,"title":"Archiving Software","alias":"archiving-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Data_archiving.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-nextgen-firewall-ngfw":{"id":1399,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_NextGen_Firewall.png","logo":true,"scheme":false,"title":"Barracuda NextGen Firewall (NGFW)","vendorVerified":0,"rating":"3.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-nextgen-firewall-ngfw","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications. The Barracuda NextGen Firewall F-Series is a family of hardware, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control. In addition, the F-Series combines highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network. The F-Series cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<span style=\"font-weight: bold;\">Security for the Cloud Era</span>\r\nSecurity paradigms are shifting—and securing your network perimeter is no longer good enough. In the cloud era, workloads happen everywhere, users are increasingly mobile, and potential attack surfaces are multiplying. Barracuda NextGen Firewall F-Series is purpose-built to deal with the challenges of securing widely distributed networks.\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN..</span>\r\nBarracuda Cloud Era Firewalls include full next gen Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n\r\n<ul>\r\n<li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li>\r\n<li>VPN across multiple broadband connections and MPLs replacement</li>\r\n<li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li>\r\n<li>Replacing network backhauling central policy enforcement architectures with direct internet break outs</li>\r\n<li>Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic</li>\r\n<li>Guaranteed users' access to critical applications through granular policy controls</li>\r\n<li>Increased available bandwidth with built-in traffic compression and data deduplication</li>\r\n<li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Why Barracuda NextGen Firewall?</span> When selecting security technology, it is critical that your products are supported by people who take your data security as seriously as you do. The Barracuda NextGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data. The Barracuda NextGen Firewall is part of a comprehensive line of data protection, network firewall, and security products and services designed for organizations seeking robust yet affordable protection from ever-increasing cyber threats. <span style=\"font-style: italic;\">Source: https://www.barracuda.com/products/nextgenfirewall_f</span>","shortDescription":"Barracuda's Next Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda NextGen Firewall (NGFW)","keywords":"network, Barracuda, your, with, Firewall, NextGen, security, access","description":"Next-Generation Firewalls for the Cloud Era\rIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have","og:title":"Barracuda NextGen Firewall (NGFW)","og:description":"Next-Generation Firewalls for the Cloud Era\rIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_NextGen_Firewall.png"},"eventUrl":"","translationId":1400,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-phishline":{"id":1906,"logoURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda PhishLine","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-phishline","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">Defend Your Business Against Social-Engineering Attacks</span> Fight phishing and other potentially-devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing exposure. Transform employees from potential victims into a layer of defense with Barracuda PhishLine. With PhishLine, you guard against every facet of social-engineering threats with continuous simulation and training for employees. Show them the latest attack techniques, how to recognize the subtle clues and help stop email fraud, data loss, and brand damage. Embed learning into your everyday business processes with customized simulations that test and reinforce good behavior. Only PhishLine helps you defend against a range of threats with patented, highly-variable attack simulations for multiple vectors, including phishing, smishing, vishing and found physical media.\r\n<ul>\r\n<li>Easy-to-implement cloud-based solution</li>\r\n<li>Patented simulation of email, SMS, voicemail and USB attacks</li>\r\n<li>Analytics and reporting based on thousands of data points</li>\r\n<li>Automate simulation campaigns with address book integration</li>\r\n<li>Large library of SCORM-compliant courseware</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Train Employees To Recognize Phishing Emails, Voicemails, and SMS Messages</span> Guard against every facet of social-engineering threats by training your employees to identify and report them. PhishLine provides patented, highly-variable attack simulations for multiple vectors, including phishing (email), smishing (SMS), vishing (voice) and found physical media (USB/SD card). Plus, use multiple simulation templates in a single campaign, to conduct hypothesis-based A/B tests and prevent users from receiving duplicate mock phishing templates. With PhishLine, you train employees to recognize threats from multiple sources and test them the way an attacker would. <span style=\"font-weight: bold;\">Customize Training to Make it Engaging and Relevant to Your Users</span> PhishLine’s simulation and training content is easy to use and is fully customizable. You get a wide variety of materials: Choose from hundreds of easy-to-use simulation templates, landing pages, risk assessment surveys, and engaging multi-lingual training content in the online PhishLine Content Center Marketplace™. Materials can be used individually or integrated into simulated phishing and social-engineering campaigns. New simulation and training content is added daily, to reflect the most recent threats and training resources available to help protect your business. PhishLine lets you deliver training as soon as the need is identified, using a built-in workflow engine. For example, you can use a landing page for in-the-moment training when someone performs an unsafe action as part of a mock phishing campaign. You can also send training invitations to specific employees based on their past actions and risk profile. Plus, you can schedule training invitations and post on-demand training on your intranet. PhishLine makes it easy for employees to instantly report suspicious emails to your help desk or incident response team. The built-in Phish Reporting Button is a simple, powerful solution that gives you complete control over the entire process at all times. <span style=\"font-weight: bold;\">Identify Human Risk Factors in a Non-Threatening Manner</span> Do employees truly understand that information security policy they signed? Did a recent information security announcement have any impact on their perceptions of risk? Is your security awareness program addressing the real needs of employees, from their perspectives? These are some of the questions addressed by PhishLine’s Risk-Based Survey module in a thoughtful, perceptive, and non-threatening manner. These unique, qualitative, risk-assessment capabilities allow for discovery in the “voice of the employee.” Back-end analysis capabilities lead to a unique and powerful assessment tool that quantifies risk by impact and likelihood scores. You can objectively evaluate your organization’s human-risk factor based on meaningful feedback from your employees. <span style=\"font-weight: bold;\">Protect Your Business With Updated Content That Guards Against The Latest Threats</span> With PhishLine, there’s no need to recycle the same old training and testing materials. The Content Center Marketplace is constantly updated by security experts to reflect the newest threats and the training resources available to protect your business. Engage employees – and keep their interest – with a wide variety of choices and materials designed to fit your corporate culture. In addition, PhishLine provides Click Thinking™, a monthly bundle of content updates. Each update is aligned around a hot topic, and includes a new training video, email template and landing page. <span style=\"font-weight: bold; text-decoration-line: underline;\">Content</span> <span style=\"font-weight: bold;\">Hundreds of Email Lure Templates, Landing Pages and Domains</span> New content is added every day creating endless combinations of email templates, landing pages, email account senders and web server domains. As the threat landscape changes so will our tests, giving you access to the most up-to-date content. <span style=\"font-weight: bold;\">PhishLine Content Center Marketplace™</span> All content can be found in the PhishLine Content Center Marketplace, a one-stop-shop for browsing, selecting and importing the perfect content to craft your continually evolving campaigns. <span style=\"font-weight: bold;\">Customized Templates</span> Add that special touch by customizing any of the templates so your simulated attacks come from people in positions of trust, effectively testing your workforce and teaching them to be wary of threats that only your organization may have seen. <span style=\"font-weight: bold; text-decoration-line: underline;\">Testing</span> <span style=\"font-weight: bold;\">Patented Multi-Variable Attack Simulations</span> In today’s threat landscape, you can be phished from more than just email. Train your team on every facet of threat with PhishLine’s multi-variable attacks with campaigns that include Smishing (SMS/Text), Vishing (Voicemail) and Found Physical Media. This unique capability will help prevent users from receiving the same mock phishing template in a campaign and can allow for hypothesis-based testing (A/B tests). <span style=\"font-weight: bold;\">Smishing (SMS/Text)</span> Protect your user base by training them to recognize unfamiliar outgoing texts with our industry-leading smishing simulation. The innovative incoming mode allows you to email requests to text custom phone numbers as the call-to-action for otherwise innocuous emails, catching what would be a normally unknown vector before it can be used against your workforce. <span style=\"font-weight: bold;\">Vishing (Voicemail)</span> Employees get many phone calls each day, which one of those will cost the company? With PhishLine’s anti-voicemail phishing or ‘Vishing’ we provide fully customizable simulated threats that will compliment any security awareness campaign. <span style=\"font-weight: bold;\">Found Physical Media (USB/SD Card)</span> Using the same Smart Attachment technology found in our email campaigns, you can distribute files on portable drives and cards with watermarks in a variety of file formats to track who is willing to plug it into your network. The files won’t cause security problems even if non-employees find them as the content redirects users to landing pages designed to educate on the perils found in anonymous portable media. <span style=\"font-weight: bold;\">Advanced Threat Simulation Features</span> Crafting effective scenarios is paramount when developing an effective anti-spearphishing campaign especially in long-term approaches where users would start seeing repetitive emails. Prevent that by using PhishLine’s advanced threat simulation features including time stamping to create a sense of urgency prompting users to respond before they can think it through, phone home macros, DLP tagging, geo-location and more. Our patented system allows for multiple combinations of email templates, landing pages, email account senders, and web server domains within a single campaign. <span style=\"font-weight: bold; text-decoration-line: underline;\">Reporting</span> <span style=\"font-weight: bold;\">Phish Reporting Button</span> Enable easy tracking of user phishing attempts with the Phish Reporting Button, simplifying the task of reporting possible threats while tying in user reporting to your training regimen. <span style=\"font-weight: bold;\">Robust User Attributes</span> Why stop at user name and email address when you can test based on location, job function, tenure, privileged credentials, or access to sensitive networks and applications? PhishLine gives you granular control for your reports, that your mid-level marketing managers in Kansas are more likely to click a link in an email on Tuesday, as well as testing and education so your workforce isn’t inundated with emails they shouldn’t get. <span style=\"font-weight: bold;\">Extensive reporting and metrics</span> More than 16,000 data points are at your disposal with PhishLIne’s advanced metrics and reporting. Identify levels of risk at macro and micro levels within your organization to help expedite remediation while keeping your workforce at maximum efficiency by targeting training to only those who need testing at that moment. <span style=\"font-weight: bold;\">Data Loss Prevention (DLP)</span> Worried about data leaking from your organization? With PhishLine’s built-in Data Loss Prevention Activator, you can track where those PhishLine campaign emails and portable media drops go and who accesses it to know who might leak your company data as well. <span style=\"font-weight: bold;\">HTTP/SSL</span> Is your workforce leaning hard on whether there’s an encryption symbol next to the URL when they click links in their emails? With HTTPS and SSL landing pages you can collect information from your users without the possibility of people snooping that information and using it against you while convincing your users that they are safe. <span style=\"font-weight: bold; text-decoration-line: underline;\">Education</span> <span style=\"font-weight: bold;\">Program Gamification</span> Engage your users and make the cat-and-mouse aspect of security awareness fun by turning the workflow into a game with leaderboards and user leveling systems. This will help train users to spot and report threats while keeping the idea of spearphishing at the forefront of their mind. Levelized Programs Measure and communicate the success of your security awareness efforts. A leveling program gives you the ability to create a custom program based on the hallmarks of a healthy security culture: training completion, avoiding interactions with simulation messages, and reporting suspected phishing. As employees move through the program, they are presented with on-level training and simulation content that challenges their security awareness, enabling the administrator to track and report on overall program effectiveness and individual user awareness. (Available in PhishLine Concierge only.) <span style=\"font-weight: bold;\">Risk-Based Surveys</span> Should a CEO or accounts payable team get the same test as your engineer, nurse or teacher? With PhishLine you can issue risk-based surveys that provide unique insights into your user level security posture. By being better informed about your user level risk and validating it throughout the year you will maintain a security plan that mirrors your organizational objectives. <span style=\"font-weight: bold;\">Bonus Security Awareness Training Materials</span> To support your computer-based training initiatives, PhishLine provides supplementary materials such as two-minute best practice videos covering topics such as Malware Awareness and Password Security. In addition, there is an array of bonus training materials including posters, newsletters, infographics, and tip sheets. PhishLine has partnered with several reputable content vendors to augment our built-in content.","shortDescription":"Barracuda PhishLine - Fight phishing with continuous simulation and training\r\nTrain employees to understand the latest attack techniques, recognize subtle clues, and help stop email fraud, data loss","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda PhishLine","keywords":"your, training, PhishLine, that, with, security, email, employees","description":"Defend Your Business Against Social-Engineering Attacks Fight phishing and other potentially-devastating attacks that can slip through security gateways. These","og:title":"Barracuda PhishLine","og:description":"Defend Your Business Against Social-Engineering Attacks Fight phishing and other potentially-devastating attacks that can slip through security gateways. These","og:image":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1907,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-sentinel":{"id":1908,"logoURL":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda Sentinel","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-sentinel","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<span style=\"font-weight: bold;\">A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise</span> <span style=\"font-weight: bold;\">Stop Targeted Attacks Before They Reach Your Users</span> Business Email Compromise (BEC) has cost businesses $12B since 2013 plus untold additional losses from lost productivity and damage to reputation. Email impersonation attacks have tricked individuals into sending wire transfers and sensitive customer and employee information to attackers who are impersonating their CEO, boss, or trusted colleague. Barracuda Sentinel uses artificial intelligence and deep integration with Office 365 to stop these attacks before they reach your mail server, as well as detecting threats already sitting in your inbox. <span style=\"font-weight: bold; text-decoration-line: underline;\">Benefits of Barracuda Sentinel</span> <span style=\"font-weight: bold;\">Stop Email Impersonation Attacks</span> Traditional email filters sit in front of your mail server, so they don't see threats already in your inbox. Sentinel works from inside O365 and uses artificial intelligence to detect signs of spear phishing and account takeover. <span style=\"font-weight: bold;\">Protect Your Business from Account Takeover</span> Account takeover is a major new threat to business data. Sentinel detects account takeover attempts and blocks email attacks launched from compromised accounts. <span style=\"font-weight: bold;\">Protect Your Reputation and Stop Domain Fraud</span> Don't let hackers impersonate your domain to launch email attacks. Sentinel protects your brand and reputation through simplified DMARC reporting and analysis. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Identify and Secure Your Highest-Risk Individuals</span> Sentinel uses machine learning to automatically identify the people within your organization who are most likely to be targeted. <span style=\"font-weight: bold;\">Part of a Complete Email Protection Platform</span> With the Total Email Protection edition, Sentinel is combined with Barracuda Essentials and PhishLine for a complete email security, archiving, and data protection solution. <span style=\"font-weight: bold;\">Sentinel Detects Threats that Email Security Gateways Can't</span> Sentinel detects threats that traditional email security systems can't. It integrates directly with Microsoft Office 365 APIs to detect attacks coming from both internal and external sources, including threats that may already be in your inbox. It uses artificial intelligence to detect signs of malicious intent and deception within every email with virtually no I.T. administration required. <span style=\"font-weight: bold;\">Protect Your Business Against Account Takeover</span> Corporate Account Takeover presents a significant new threat to business. Hackers gain access to corporate email accounts through stolen credentials and use them to launch subsequent targeted attacks, internally and against external targets. Account takeover or attacks that originate from these accounts are almost impossible to detect since they don’t leverage impersonation techniques—they come from a legitimate account and appear to be from a trusted source. In fact, traditional email security solutions don’t even observe internal traffic and have no way of stopping an attack originating internally. Barracuda Sentinel detects both account takeover attempts and attacks launched from compromised accounts. By analyzing both historical and inbound data Sentinel is able to identify behavioral, content, and link-forwarding anomalies within your organization, and to flag and quarantine fraudulent emails. It is also able to prevent attempts to compromise employee credentials by automatically blocking targeted phishing emails that try to harvest employee passwords. <span style=\"font-weight: bold;\">Features</span> <span style=\"font-weight: bold;\">Stop Targeted Attacks with AI</span>\r\n<ul>\r\n<li>Prevent Spear Phishing</li>\r\n<li>Prevent BEC and CEO Fraud</li>\r\n<li>Detect Employee Impersonation</li>\r\n<li>Stop Zero-Day Phishing</li>\r\n<li>Detect Web Impersonation</li>\r\n<li>Stop Inbound Spoofing</li>\r\n<li>Continuous Learning</li>\r\n<li>Exportable Reports</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Stop Account Takeover with AI</span>\r\n<ul>\r\n<li>Alerting for Account Takeover</li>\r\n<li>Prevent Account Takeover Infiltration</li>\r\n<li>Detect Compromised Emails</li>\r\n<li>Delete Emails Sent Internally</li>\r\n<li>Notify External Recipients</li>\r\n<li>Lock Attackers Out of Accounts</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Domain Fraud Prevention</span>\r\n<ul>\r\n<li>Prevent Third Party Domain Spoofing</li>\r\n<li>Automated DMARC Reporting</li>\r\n<li>DMARC Aggregation and Visualization</li>\r\n<li>DKIM/SPF Configuration and Troubleshooting</li>\r\n<li>Better Email Deliverability</li>\r\n<li>Spoofed Email Reports</li>\r\n<li>Detect Misconfigured Legitimate Senders</li>\r\n<li>Protects Customer Brands</li>\r\n<li>Exportable Reports</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Flexible API-based Deployment</span>\r\n<ul>\r\n<li>Lightweight Architecture</li>\r\n<li>Instant Setup</li>\r\n<li>Works with Any Gateway</li>\r\n<li>Historical Assessment</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Phishing Simulations</span>\r\n<ul>\r\n<li>Test Employee Security Awareness</li>\r\n<li>80 Real-World Templates</li>\r\n<li>Simulate Impersonation and BEC</li>\r\n<li>AI Determines Employee Risk</li>\r\n</ul>\r\n","shortDescription":"Barracuda Sentinel is A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Sentinel","keywords":"Sentinel, from, Account, Email, your, email, attacks, Stop","description":"A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise Stop Targeted Attacks Before They Reach Your Users Business Email","og:title":"Barracuda Sentinel","og:description":"A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise Stop Targeted Attacks Before They Reach Your Users Business Email","og:image":"https://old.b4r.io/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1911,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-waf-as-a-service":{"id":1582,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_WAF-as-a-Service.png","logo":true,"scheme":false,"title":"Barracuda WAF-as-a-Service","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-waf-as-a-service","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"Complete application security does not have to be complicated. Web applications are connected directly to your business and customer data. Attackers know this and have become increasingly clever with their attempts to bring down or compromise websites and apps. These attacks can be prevented, but organizations often struggle to implement a robust web application security posture due to several challenges:\r\n<ul>\r\n<li>Application security is complicated to deploy and manage without specialized resources.</li>\r\n<li>Continuous updates to applications can lead to new vulnerabilities.</li>\r\n<li>Legacy applications were developed without secure coding practices.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Why Barracuda WAF-as-a-Service?</span>\r\n<ul>\r\n<li>Built on a proven security platform. Enterprise-proven technology that provides comprehensive protection from all OWASP recognized security risks, DDoS attacks, and even the most advanced zero-day threats. Proactive bot defense ensures always-on protection from automated attacks, web scraping, and brute force attacks.</li>\r\n<li>Simplified application security for everyone. Remove the complexity of setting up and configuring your application security solution. Barracuda WAF-as-a-Service delivers protection for your web apps in minutes thanks to a simple 5-step setup wizard, and numerous pre-built security policy templates.</li>\r\n<li>Complete control. Unlimited rulesets. For more advanced users, Barracuda WAF-as-a-Service offers a level of control traditionally reserved only for on-premises and public cloud solutions. Fine-tune specific policies for each component of every application's security profile.</li>\r\n<li>Automated vulnerability discovery and remediation. Barracuda Vulnerability Remediation Service is built-in and provides automatic vulnerability detection and remediation which can be scheduled, ensuring ongoing protection without any administrative overhead.</li>\r\n<li>Granular visibility with detailed logs and reports. Gain rich insight into all web traffic events and users. Detailed compliance reports help you easily understand your security status at any given time by having complete visibility into all HTTP/S traffic.</li>\r\n<li>Unmetered DDoS protection included. DDoS attacks disrupt the service availability of your web apps which can have a significant impact on your business. Barracuda WAF-as-a-Service defends against the full spectrum of L3-L7 DDoS attacks ensuring the availability of your web apps.</li>\r\n</ul>\r\n","shortDescription":"Barracuda WAF-as-a-Service - Protect every web app, hosted anywhere, in minutes.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda WAF-as-a-Service","keywords":"security, your, Barracuda, attacks, protection, WAF-as-a-Service, application, DDoS","description":"Complete application security does not have to be complicated. Web applications are connected directly to your business and customer data. Attackers know this","og:title":"Barracuda WAF-as-a-Service","og:description":"Complete application security does not have to be complicated. Web applications are connected directly to your business and customer data. Attackers know this","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_WAF-as-a-Service.png"},"eventUrl":"","translationId":1583,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-web-application-firewall":{"id":1309,"logoURL":"https://old.b4r.io/fileadmin/content/zavantazhennja.png","logo":true,"scheme":false,"title":"Barracuda Web Application Firewall","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-web-application-firewall","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<p>The Barracuda Web Application Firewall blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target the applications hosted on your web servers—and the sensitive or confidential data to which they have access. Constant Protection from Evolving Threats The Barracuda Web Application Firewall provides superior protection against data loss, DDoS, and all known applicationlayer attack modalities. Automatic updates provide defense against new threats as they apear. As new types of threats emerge, it will acquire new capabilities to block them. Identity and Access Management The Barracuda Web Application Firewall has strong authentication and access control capabilities that ensure security and privacy by restricting access to sensitive applications or data to authorized users. Affordable and Easy to Use Pre-built security templates and intuitive web interface provide immediate security without the need for time-consuming tuning or application learning. Integration with security vulnerability scanners and SIEM tools automates the assessment, monitoring, and mitigation process</p>","shortDescription":"Barracuda Web Application Firewall - protect websites and apps from cyber threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Web Application Firewall","keywords":"Barracuda, Application, Firewall, security, data, access, capabilities, they","description":"The Barracuda Web Application Firewall blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target the applications hosted on","og:title":"Barracuda Web Application Firewall","og:description":"The Barracuda Web Application Firewall blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target the applications hosted on","og:image":"https://old.b4r.io/fileadmin/content/zavantazhennja.png"},"eventUrl":"","translationId":1391,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"barracuda-web-security-gateway":{"id":1198,"logoURL":"https://old.b4r.io/fileadmin/content/element_wsg_RGB.jpg","logo":true,"scheme":false,"title":"Barracuda Web Security Gateway","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-web-security-gateway","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<p>Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without loss of performance. Barracuda Networks Barracuda Web Security Gateway is a powerful integrated content protection and analysis solution that is applicable to all business categories. Barracuda Web Security Gateway is very easy to install, has an intuitive management and monitoring interface and is automatically updated every hour through the Barracuda Central website. To install the solution, no additional software is needed, network settings are changed, and there is no need to purchase licenses for each additional user when the system is expanded. Barracuda Web Security Gateway combines proactive, reactive and proactive protection measures, ensuring complete network security: Prevent spyware downloads. Preventing viruses loading. Blocking access to Web sites with spyware. Determining the access of spyware to the Internet. Complete removal of spyware. Blocking malicious Web sites.</p>","shortDescription":"Barracuda Web Security Gateway protect users from malware and saves bandwidth","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Web Security Gateway","keywords":"Barracuda, Gateway, spyware, Security, network, additional, solution, protection","description":"Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without","og:title":"Barracuda Web Security Gateway","og:description":"Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without","og:image":"https://old.b4r.io/fileadmin/content/element_wsg_RGB.jpg"},"eventUrl":"","translationId":1390,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":548,"title":"Web security - Appliance","alias":"web-security-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-security-hardware.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":485,"title":"Web security","alias":"web-security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web_security.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"big-ip-local-traffic-manager":{"id":201,"logoURL":"https://old.b4r.io/fileadmin/user_upload/BIG-IP_Local_Traffic_Manager.jpg","logo":true,"scheme":false,"title":"BIG-IP Local Traffic Manager","vendorVerified":0,"rating":"1.70","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":2,"alias":"big-ip-local-traffic-manager","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms the chaotic volume of network traffic into logically assembled streams of data, and then makes intelligent traffic management decisions, selecting the right destination based on server performance, security, and availability.\r\n\r\nYes, BIG-IP LTM enables sophisticated load balancing. But, that’s just the beginning.\r\nFull proxy means full power.\r\n\r\nIf you can see it, you can manipulate it.\r\n\r\nBecause BIG-IP LTM is a full proxy, you can inspect, manage, and report on application traffic entering and exiting your network. From basic load balancing to complex traffic management decisions based on client, server, or application status, BIG-IP LTM gives you granular control over app traffic.\r\n\r\nFor example, if you want to direct traffic based on the requested URL or log specific server responses to a reporting system, BIG-IP LTM has the architecture and the tools you need to do it.\r\n\r\nOperational efficiency? Check.\r\n\r\nBIG-IP LTM can optimize the speed and reliability of your applications via both network and application layers.\r\n\r\nUsing real-time protocol and traffic management decisions based on application and server conditions, extensive connection management, and TCP and content offloading, BIG-IP LTM dramatically improves page load times and the user experience.\r\n\r\nWhether it’s negotiating high-latency networks or offloading millions of connections, BIG-IP LTM can improve the performance of your infrastructure and your applications.\r\n\r\nThe SSL performance of BIG-IP LTM lets you cost-effectively protect the end-to-end user experience by encrypting everything from the client to the server. It also scales on-demand and absorbs potentially crippling DDoS attacks.\r\n\r\nOften SSL is turned on throughout the network. Thing is, most network security devices aren’t built to detect malicious traffic in layers 4–7. Separating the good and bad traffic is the first problem, taking action on the malicious traffic is the second.\r\n\r\nBIG-IP LTM includes levels of inspection necessary to block bad traffic and allow good traffic to pass through.\r\n\r\n","shortDescription":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BIG-IP Local Traffic Manager","keywords":"traffic, BIG-IP, application, network, server, your, based, management","description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms","og:title":"BIG-IP Local Traffic Manager","og:description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms","og:image":"https://old.b4r.io/fileadmin/user_upload/BIG-IP_Local_Traffic_Manager.jpg"},"eventUrl":"","translationId":202,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"check-point-21000-appliances":{"id":86,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Check_Point_21000.jpg","logo":true,"scheme":false,"title":"Check Point 21000 Appliances","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":76,"alias":"check-point-21000-appliances","companyTitle":"Check Point","companyTypes":["vendor"],"companyId":171,"companyAlias":"check-point","description":"Delivers the best performance in its class\r\n\r\nUp to 44.5 Gbps of real-world firewall throughput\r\nUp to 6.9 Gbps of real-world IPS throughput\r\nSupports sub 5 micro-second low-latency transactions\r\nSupports high availability and serviceability\r\n\r\nOffers a variety of network options to work in any network environment\r\nOffers Lights-Out-Management option for remote out-of-band management\r\nEnables service without downtime thanks to hot-swap and redundant components\r\nReduces costs through security consolidation\r\n\r\nExtends easily to add more security features without adding a new appliance\r\nAvailable in four complete and Software Blade packages that meet any security need\r\nAvailable in a low-cost, high-performance package with extended memory for maximum connection capacity\r\nFeatures\r\n\r\nMaximum security and performance\r\nThe Check Point 21000 Appliances offer maximum availability of business-critical applications and the best performance available in their class.\r\n\r\nHigh port density with up to 37x1GbE ports for network segmentation\r\n110 Gbps firewall throughput and sub-5µs latency for mission-critical applications\r\nComes in compact 2-rack unit chassis\r\nComes with acceleration and clustering technologies\r\n\r\nReliability and high serviceability\r\nMeet the uncompromising high availability standards of modern data centers; the 21000 Appliances are designed to be highly serviceable, even when deployed in customer networks.\r\n\r\nHot-swappable redundant power supplies, hard disk drives and fans\r\nAn advanced Lights-Out-Management card provides out-of-band remote management to remotely diagnose, start, restart and manage the appliance from a remote location\r\n\r\nPrevent unknown threats\r\nCheck Point provides complete zero-day threat prevention and alerts when under attack. Threat Extraction delivers zero-malware documents in zero seconds. Threat Emulation inspects files for malicious content in a virtual sandbox. When Threat Emulation discovers new threats, a signature is sent to the Check Point ThreatCloud database which documents and shares information on the newly identified malware with other Check Point customers — providing immediate protection against zero-day threats.\r\n\r\n\r\nSecurity acceleration module for greater performance confidence\r\nWith the optional Security Acceleration Module, you can confidently increase firewall and VPN bandwidth through your 21000 Appliance without performance degradation. Check Point’s innovative, purpose-built SecurityCore™ technology uses parallel and security processing power to accelerate security performance.\r\n\r\nOffloads security processing from the general purpose appliance CPU\r\nAvailable as a bundle for significant savings right out of the box\r\nHigh network capacity\r\nDeploy the Check Point 21000 Appliances in any network environment.\r\n\r\nUp to 37 10/100/1000Base-T ports\r\nUp to 36 1000base-F SFP, or up to 13 10GBase-F SFP+ ports\r\nThree front-facing expansion slots\r\nUp to 1,024 VLANs for higher network segmentation\r\n\r\nPre-configured with Next Generation Software Blade packages\r\nPre-configured with Next Generation Software Blade packages The Check Point 21000 Appliances offer a complete and consolidated security solution available in five Next Generation Security Software Blade packages.\r\n\r\nNext Generation Firewall—identify and control applications by user and scan content to stop threats (included Blades: IPS and Application Control)\r\nNext Generation Secure Web Gateway—enable secure use of Web 2.0 with real-time multilayer protection against web-borne malware (included Blades: Application Control, URL Filtering, Antivirus and SmartEvent)\r\nNext Generation Data Protection—preemptively protect sensitive information from unintentional loss, educate users on proper data-handling policies and empower them to remediate incidents in real-time (included Blades: IPS, Application Control and Data-Loss Prevention).\r\nNext Generation Threat Prevention—apply multiple layers of protection to prevent sophisticated cyber-threats (included Blades: IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security)\r\nNext Generation Threat Extraction—(NGTX): advanced next-gen zero-day threat prevention, NGTP with Threat Emulation and Threat Extraction.\r\nAdditional Software Blade upgrades are available to further extend and customize protection options","shortDescription":"The 21000 Appliances are designed for data centers with the most demanding requirements for performance and high availability. They are ideal for low-latency transactions, with sub 5 micro-second latency, and they deliver excellent serviceability features for cost-efficient operation.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point 21000 Appliances","keywords":"security, Check, with, Generation, Next, Threat, Point, 21000","description":"Delivers the best performance in its class\r\rUp to 44.5 Gbps of real-world firewall throughput\rUp to 6.9 Gbps of real-world IPS throughput\rSupports sub 5","og:title":"Check Point 21000 Appliances","og:description":"Delivers the best performance in its class\r\rUp to 44.5 Gbps of real-world firewall throughput\rUp to 6.9 Gbps of real-world IPS throughput\rSupports sub 5","og:image":"https://old.b4r.io/fileadmin/user_upload/Check_Point_21000.jpg"},"eventUrl":"","translationId":86,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["acronis-backup","acronis-backup-advanced-for-windows-server","acronis-true-image","aruba-switch","azure-data-warehouse","azure-resiliency","azure-virtual-machines","barracuda-backup","barracuda-cloudgen-firewall","barracuda-email-security-gateway","barracuda-load-balancer","barracuda-message-archiver","barracuda-nextgen-firewall-ngfw","barracuda-phishline","barracuda-sentinel","barracuda-waf-as-a-service","barracuda-web-application-firewall","barracuda-web-security-gateway","big-ip-local-traffic-manager","check-point-21000-appliances"]},"links":{"first":"http://b4r_be/api/products?page=1","last":"http://b4r_be/api/products?page=11","prev":null,"next":"http://b4r_be/api/products?page=2"},"meta":{"current_page":1,"from":1,"last_page":11,"path":"http://b4r_be/api/products","per_page":20,"to":20,"total":215},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"13":{"id":13,"title":"NG Firewall"},"19":{"id":19,"title":"WAF - Web Application Firewall"},"24":{"id":24,"title":"IaaS - storage"},"26":{"id":26,"title":"IaaS - computing"},"38":{"id":38,"title":"Secure E-mail Gateway"},"71":{"id":71,"title":"Backup and Recovery"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}