{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"en":"Products","de":"die produkte","ru":"Продукты","_type":"localeString"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"_type":"localeString","en":"Update profile","ru":"Обновить профиль"},"read-more-button":{"en":"Show more","ru":"Показать ещё","_type":"localeString"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"user-implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"categories":{"en":"Categories","ru":"Компетенции","_type":"localeString"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"en":"Bonus 4 reference","ru":"Бонус за референс","_type":"localeString"},"partner-status":{"en":"Partner status","ru":"Статус партнёра","_type":"localeString"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"en":"Partner types","ru":"Типы партнеров","_type":"localeString"},"branch-popover":{"_type":"localeString","en":"branch","ru":"область деятельности"},"employees-popover":{"_type":"localeString","en":"number of employees","ru":"количество сотрудников"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"_type":"localeString","en":"Partner discounts","ru":"Партнерские скидки"},"registered-discounts":{"ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString","en":"Additional benefits for registering a deal"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"ru":"Требования к уровню партнера","_type":"localeString","en":"Partner level requirements"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"ru":"Поставляемые внедрения","_type":"localeString","en":"Supplied deployments"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"not-yet-converted":{"en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString"},"schedule-event":{"en":"Events schedule","ru":"Pасписание событий","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"ru":"Регистрация ","_type":"localeString","en":"Register"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"en":"To view company events please log in or register on the sit.","ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString"},"company-presentation":{"_type":"localeString","en":"Company presentation","ru":"Презентация компании"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"ru":"Выйти","_type":"localeString","en":"logout"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"translatable_meta":[{"name":"title","translations":{"_type":"localeString","en":"Company","ru":"Компания"}},{"name":"description","translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"}},{"translations":{"ru":"Ключевые слова для компании","_type":"localeString","en":"Company keywords"},"name":"keywords"}],"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"angara-technologies-group":{"id":631,"title":"ANGARA Technologies Group","logoURL":"https://old.b4r.io/uploads/roi/company/ANGARA.png","alias":"angara-technologies-group","address":"","roles":[{"id":2,"type":"supplier"},{"id":3,"type":"vendor"}],"description":"Company ANGARA is a system integrator in the field of information security, specializing in:\r\n<ul><li>providing control and monitoring of information security;</li><li>analytical processing information to improve management processes and improve the stability and security of the operation of information and technological infrastructures.</li></ul>\r\nThe mission of the company sees it, is to help as many as possible of their customers are not distracted by the threats and challenges of the digital world. We are ready to take care of the safety of their customers, allowing them to focus on their core, the primary task.","companyTypes":["supplier","vendor"],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":215,"supplierImplementations":[{"id":284,"title":"Гарда БД (решение защиты баз данных) для банка","description":"ПАО «Сбербанк» завершил проект по внедрению системы защиты баз данных «Гарда БД». Проект реализован системным интегратором решений по информационной безопасности «Ангара» совместно с разработчиком «МФИ Софт».\r\nЗадача проекта состояла в обеспечении непрерывного мониторинга доступа к базам данных и веб-приложениям «Сбербанка», автоматизации поиска новых уязвимостей и обеспечение целостности системы безопасности. Система защиты баз данных «Гарда БД» применяется для реализации требований регуляторов, включая международный стандарт PCI DSS.\r\nВыбор и тестирование различных систем защиты баз данных «Сбербанк» совместно с компанией «Ангара» проводили с 2015 года. По результатам пилотных проектов выбор банковской сети был сделан в пользу отечественного решения класса DAM (Database Activity Monitoring) «Гарда БД» от «МФИ Софт».\r\nСистема «Гарда БД» контролирует безопасность автоматизированной банковской системы (АБС), выявляет попытки внешнего вторжения в СУБД, в том числе через системы интернет-банкинга, блокирует попытки злоупотребления сотрудников своими полномочиями, неслужебного обращения к персональным данным и банковской тайне. Решение сводит к минимуму риски несанкционированного доступа к критически важной информации, в том числе со стороны привилегированных пользователей, осуществляет аудит событий безопасности в режиме реального времени и позволяет не только предотвратить инцидент, но и провести детальное расследование в ретроспективе.\r\nИванов Денис, начальник отдела сопровождения средств мониторинга Операционного центра информационной безопасности ПАО «Сбербанк»: «Система информационной безопасности «Сбербанка» постоянно совершенствуется, мы стремимся опережать появление новых рисков. Задача защиты СУБД и веб-приложений банковской сети стоит остро, киберугроз и случаев утечки персональных данных в банковском секторе становится все больше. Мы ценим доверие, которое оказывает нам каждый клиент, и в ответе за сохранность их данных».\r\nВладимир Пономарев, заместитель генерального директора «МФИ Софт»: «Безопасность банков – это актуальное направление, для которого мы разработали комплексное функциональное решение, отвечающее и требованиям регуляторов, и потребностям пользователей. Система «Гарда БД» де-факто является стандартом безопасности баз данных и необходимым инструментом для предотвращения утечек информации».\r\nСергей Шерстобитов, генеральный директор компании «Ангара»: «Обеспечение защиты информации – основное требование отечественных и международных регуляторов для компаний финансовой сферы. Внедрение системы защиты баз данных — это часть масштабного проекта по формированию единой системы управления информационной безопасностью всей сети ПАО «Сбербанк». Учитывая региональную распределенность и большие объемы информации, мы не допускали компромиссов и выбрали наилучшие решения, которые доступны на рынке». \r\n\r\n","alias":"garda-bd-reshenie-zashchity-baz-dannykh-dlja-banka","roi":0,"seo":{"title":"Гарда БД (решение защиты баз данных) для банка","keywords":"данных, защиты, системы, Гарда, безопасности, банковской, Сбербанк, информации","description":"ПАО «Сбербанк» завершил проект по внедрению системы защиты баз данных «Гарда БД». Проект реализован системным интегратором решений по информационной","og:title":"Гарда БД (решение защиты баз данных) для банка","og:description":"ПАО «Сбербанк» завершил проект по внедрению системы защиты баз данных «Гарда БД». Проект реализован системным интегратором решений по информационной"},"deal_info":"","user":{"id":1187,"title":"Sberbank of Russia","logoURL":"https://old.b4r.io/uploads/roi/company/Sberbank_01.png","alias":"sberbank-rossii","address":"","roles":[],"description":"History of Subsidiary Bank JSC \"Sberbank of Russia\" in Kazakhstan starting at the end of 2006, when Sberbank of Russia , the flagship of the Russian financial system, the largest financial institution","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.sberbank.kz/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Sberbank of Russia","keywords":"Sberbank, Russia, financial, when, institution, largest, flagship, system","description":"History of Subsidiary Bank JSC \"Sberbank of Russia\" in Kazakhstan starting at the end of 2006, when Sberbank of Russia , the flagship of the Russian financial","og:title":"Sberbank of Russia","og:description":"History of Subsidiary Bank JSC \"Sberbank of Russia\" in Kazakhstan starting at the end of 2006, when Sberbank of Russia , the flagship of the Russian financial","og:image":"https://old.b4r.io/uploads/roi/company/Sberbank_01.png"},"eventUrl":""},"supplier":{"id":631,"title":"ANGARA Technologies Group","logoURL":"https://old.b4r.io/uploads/roi/company/ANGARA.png","alias":"angara-technologies-group","address":"","roles":[],"description":"Company ANGARA is a system integrator in the field of information security, specializing in:\r\n<ul><li>providing control and monitoring of information security;</li><li>analytical processing information to improve management processes and improve the stability and security of the operation of information and technological infrastructures.</li></ul>\r\nThe mission of the company sees it, is to help as many as possible of their customers are not distracted by the threats and challenges of the digital world. We are ready to take care of the safety of their customers, allowing them to focus on their core, the primary task.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":215,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":24,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.angaratech.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ANGARA Technologies Group","keywords":"information, their, security, improve, ANGARA, customers, threats, challenges","description":"Company ANGARA is a system integrator in the field of information security, specializing in:\rproviding control and monitoring of information","og:title":"ANGARA Technologies Group","og:description":"Company ANGARA is a system integrator in the field of information security, specializing in:\rproviding control and monitoring of information","og:image":"https://old.b4r.io/uploads/roi/company/ANGARA.png"},"eventUrl":""},"vendors":[],"products":[],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":336,"title":"Risk or Leaks of confidential information"}]}},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.angaratech.ru/about/novosti/angara-vnedrila-v-pao-sberbank-reshenie-dlya-zashchity-baz-dannykh-mfi-soft/","title":"Supplier's web site"}},"comments":[],"referencesCount":0}],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":24,"supplierPartnersCount":0,"b4r":0,"categories":{"5":{"id":5,"title":"Security Software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png","alias":"security-software"},"24":{"id":24,"title":"DLP - Data Leak Prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png","alias":"dlp-data-leak-prevention"},"25":{"id":25,"title":"Web filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png","alias":"web-filtering"},"40":{"id":40,"title":"Endpoint security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png","alias":"endpoint-security"},"41":{"id":41,"title":"Antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png","alias":"antispam"},"42":{"id":42,"title":"UTM - Unified threat management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png","alias":"utm-unified-threat-management"},"43":{"id":43,"title":"Data Encryption","description":"Шифрова́ние — обратимое преобразование информации в целях сокрытия от неавторизованных лиц, с предоставлением, в это же время, авторизованным пользователям доступа к ней. Главным образом, шифрование служит задачей соблюдения конфиденциальности передаваемой информации. Важной особенностью любого алгоритма шифрования является использование ключа, который утверждает выбор конкретного преобразования из совокупности возможных для данного алгоритма[1][2].\r\n\r\nПользователи являются авторизованными, если они обладают определенным аутентичным ключом. Вся сложность и, собственно, задача шифрования состоит в том, как именно реализован этот процесс[1].\r\n\r\nВ целом, шифрование состоит из двух составляющих — зашифрование и расшифрование.\r\n\r\nС помощью шифрования обеспечиваются три состояния безопасности информации[1]:\r\n\r\nКонфиденциальность.\r\nШифрование используется для скрытия информации от неавторизованных пользователей при передаче или при хранении.\r\nЦелостность.\r\nШифрование используется для предотвращения изменения информации при передаче или хранении.\r\nИдентифицируемость.\r\nШифрование используется для аутентификации источника информации и предотвращения отказа отправителя информации от того факта, что данные были отправлены именно им.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-encryption.png","alias":"data-encryption"},"44":{"id":44,"title":"IAM - Identity and Access Management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png","alias":"iam-identity-and-access-management"},"45":{"id":45,"title":"SIEM - Security Information and Event Management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png","alias":"siem-security-information-and-event-management"},"47":{"id":47,"title":"Access Control Systems","description":"Система контроля и управления доступом (СКУД) — совокупность программно-аппаратных технических средств безопасности, имеющих целью ограничение и регистрацию входа-выхода объектов (людей, транспорта) на заданной территории через «точки прохода»: двери, ворота, КПП.\r\n\r\nОсновная задача — управление доступом на заданную территорию (кого пускать, в какое время и на какую территорию), включая также\r\n\r\nограничение доступа на заданную территорию\r\nидентификация лица, имеющего доступ на заданную территорию\r\nДополнительные задачи:\r\n\r\nучёт рабочего времени;\r\nрасчет заработной платы (при интеграции с системами бухгалтерского учёта);\r\nведение базы персонала / посетителей;\r\nинтеграция с системой безопасности, например:\r\nс системой видеонаблюдения для совмещения архивов событий систем, передачи системе видеонаблюдения извещений о необходимости стартовать запись, повернуть камеру для записи последствий зафиксированного подозрительного события;\r\nс системой охранной сигнализации (СОС), например, для ограничения доступа в помещения, стоящие на охране, или для автоматического снятия и постановки помещений на охрану.\r\nс системой пожарной сигнализации (СПС) для получения информации о состоянии пожарных извещателей, автоматического разблокирования эвакуационных выходов и закрывания противопожарных дверей в случае пожарной тревоги.\r\nс системами обеззараживания, например на предприятиях с повышенной угрозой биологического и химического загрязнения.\r\nНа особо ответственных объектах сеть устройств СКУД выполняется физически несвязанной с другими информационными сетями.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D0%BA%D0%BE%D0%BD%D1%82%D1%80%D0%BE%D0%BB%D1%8F_%D0%B8_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B4%D0%BE%D1%81%D1%82%D1%83%D0%BF%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/skud-access-control-and-management-system.png","alias":"access-control-systems"},"48":{"id":48,"title":"CCTV - Closed-circuit television","description":"Видеонаблюдение (англ. Сlosed Circuit Television, CCTV — система телевидения замкнутого контура) — процесс, осуществляемый с применением оптико-электронных устройств, предназначенных для визуального контроля или автоматического анализа изображений (автоматическое распознавание лиц, государственных номеров).\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%92%D0%B8%D0%B4%D0%B5%D0%BE%D0%BD%D0%B0%D0%B1%D0%BB%D1%8E%D0%B4%D0%B5%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/video_control.png","alias":"cctv-closed-circuit-television"},"49":{"id":49,"title":"VPN - Virtual Private Network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png","alias":"vpn-virtual-private-network"},"50":{"id":50,"title":"IPC - Information Protection and Control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png","alias":"ipc-information-protection-and-control"},"77":{"id":77,"title":"SOC - Situation Centre","description":"Ситуационный/диспетчерский центр — это помещение (зал, комната, кабинет), оснащённое средствами коммуникаций (видеоконференцсвязь, конференц-связь и другими средствами интерактивного представления информации), предназначенное для оперативного принятия управленческих решений, контроля и мониторинга объектов различной природы, ситуаций и других функций.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%82%D1%83%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D1%8B%D0%B9_%D1%86%D0%B5%D0%BD%D1%82%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SOC.png","alias":"soc-situation-centre"},"78":{"id":78,"title":"PAM - privileged access management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png","alias":"pam-privileged-access-management"},"79":{"id":79,"title":"VM - Vulnerability management","description":"Система управления уязвимостями выполняет проактивное сканирование IT-инфраструктуры на наличие неверных конфигураций, слабых мест, вредоносных компонентов и предоставляет рекомендации по устранению существующих рисков.\r\n \r\nТакая система анализирует все компоненты инфраструктуры, включая сети, операционные системы, базы данных и web-приложения. По итогам проверки приложение осуществляет приоритезацию обнаруженных угроз и генерирует руководства, как снизить каждую из них. \r\n ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/VM.png","alias":"vm-vulnerability-management"},"80":{"id":80,"title":"VMS - Video Management Solution","description":"Программное обеспечение для управления системами видеонаблюдения поддерживает возможность интеграции с широким спектром камер и приложениями сторонних производителей. Пользователи могут создавать индивидуальные решения, отвечающие их требованиям и бюджету, а также расширять их функции путем внедрения технических новинок. ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/VMS.png","alias":"vms-video-management-solution"},"199":{"id":199,"title":"Deception Techniques and Honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png","alias":"deception-techniques-and-honeypots"},"204":{"id":204,"title":"Managed Detection and Response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png","alias":"managed-detection-and-response"},"205":{"id":205,"title":"NAC - Network Access Control","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NAC.png","alias":"nac-network-access-control"},"206":{"id":206,"title":"Application Security Testing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-code-security-analyzer.png","alias":"application-security-testing"},"307":{"id":307,"title":"Archiving Software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Data_archiving.png","alias":"archiving-software"},"335":{"id":335,"title":"Secure Content and Threat Management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png","alias":"secure-content-and-threat-management"},"375":{"id":375,"title":"Mobile Enterprise Security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/mobile_security.png","alias":"mobile-enterprise-security"},"437":{"id":437,"title":"PSM - Privileged Session Management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PSM.png","alias":"psm-privileged-session-management"},"445":{"id":445,"title":"Penetration Testing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/penetration-testing.png","alias":"penetration-testing"},"457":{"id":457,"title":"DDoS Protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png","alias":"ddos-protection"},"461":{"id":461,"title":"Data Diode","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-diode.png","alias":"data-diode"},"465":{"id":465,"title":"UEBA - User and Entity Behavior Analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png","alias":"ueba-user-and-entity-behavior-analytics"},"467":{"id":467,"title":"Network Forensics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/network-expertise.png","alias":"network-forensics"},"469":{"id":469,"title":"Secure E-mail Gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png","alias":"secure-e-mail-gateway"},"481":{"id":481,"title":"WAF-web application firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png","alias":"waf-web-application-firewall"},"483":{"id":483,"title":"Messaging Security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security.png","alias":"messaging-security"},"485":{"id":485,"title":"Web security","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web_security.png","alias":"web-security"},"487":{"id":487,"title":"Secure Web Gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png","alias":"secure-web-gateway"},"489":{"id":489,"title":"Network Security Policy Management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/network-security-policy-management.png","alias":"network-security-policy-management"},"540":{"id":540,"title":"Security Hardware","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/security-hardware.png","alias":"security-hardware"},"542":{"id":542,"title":"UTM - Unified Threat Management Appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png","alias":"utm-unified-threat-management-appliance"},"544":{"id":544,"title":"DLP - Appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png","alias":"dlp-appliance"},"546":{"id":546,"title":"WAF-web application firewall appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png","alias":"waf-web-application-firewall-appliance"},"548":{"id":548,"title":"Web security - Appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-security-hardware.png","alias":"web-security-appliance"},"550":{"id":550,"title":"Web filtering - Appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png","alias":"web-filtering-appliance"},"552":{"id":552,"title":"Secure Web Gateway - Appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png","alias":"secure-web-gateway-appliance"},"554":{"id":554,"title":"Messaging Security - Appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/mail-security-hardware.png","alias":"messaging-security-appliance"},"556":{"id":556,"title":"Antispam - Appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png","alias":"antispam-appliance"},"558":{"id":558,"title":"Secure E-mail Gateway - Appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png","alias":"secure-e-mail-gateway-appliance"},"560":{"id":560,"title":"IPC - Information Protection and Control - Appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png","alias":"ipc-information-protection-and-control-appliance"},"562":{"id":562,"title":"DDoS Protection - Appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png","alias":"ddos-protection-appliance"},"750":{"id":750,"title":"Biometric Identification","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/biometric-identification.png","alias":"biometric-identification"}},"companyUrl":"http://www.angaratech.ru/","countryCodes":["RUS"],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":true,"presenterCodeLng":"","seo":{"title":"ANGARA Technologies Group","keywords":"information, their, security, improve, ANGARA, customers, threats, challenges","description":"Company ANGARA is a system integrator in the field of information security, specializing in:\rproviding control and monitoring of information","og:title":"ANGARA Technologies Group","og:description":"Company ANGARA is a system integrator in the field of information security, specializing in:\rproviding control and monitoring of information","og:image":"https://old.b4r.io/uploads/roi/company/ANGARA.png"},"eventUrl":"","vendorPartners":[{"vendor":"Microsoft","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Cisco","partnershipLevel":"Select","countries":"","partnersType":""},{"vendor":"Check Point","partnershipLevel":"3 Star Partner","countries":"Russian Federation","partnersType":""},{"vendor":"Hewlett Packard Enterprise","partnershipLevel":"Silver","countries":"","partnersType":""},{"vendor":"Kaspersky Lab","partnershipLevel":"Platinum","countries":"","partnersType":""},{"vendor":"CyberArk","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Symantec","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"IBM","partnershipLevel":"Member","countries":"","partnersType":""},{"vendor":"Forcepoint Company","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"vendor":"Barracuda Networks","partnershipLevel":"Registered","countries":"","partnersType":""},{"vendor":"McAfee","partnershipLevel":"Gold","countries":"","partnersType":""},{"vendor":"Fortinet","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Dell EMC","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"InfoWatch","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Palo Alto Networks","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Security Code","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Huawei","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"F5","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"gemalto","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"MobileIron","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Entensys","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Tufin","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Acronis","partnershipLevel":"","countries":"Russian Federation","partnersType":""},{"vendor":"Blue Coat Systems","partnershipLevel":"Authorized","countries":"Russian Federation","partnersType":""}],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[{"id":2271,"logoURL":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg","logo":true,"scheme":false,"title":"Microsoft category A","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-category-a","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft category A","keywords":"","description":"","og:title":"Microsoft category A","og:description":"","og:image":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg"},"eventUrl":"","translationId":2271,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":832,"title":"Category A","alias":"category-a","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2273,"logoURL":"https://old.b4r.io/fileadmin/content/9631386584_f8ab2bf216_b_41.jpg","logo":true,"scheme":false,"title":"Microsoft test","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-test","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft test","keywords":"","description":"","og:title":"Microsoft test","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/9631386584_f8ab2bf216_b_41.jpg"},"eventUrl":"","translationId":2274,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":503,"title":"Storage Networking","alias":"storage-networking","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/storage-networks.png"},{"id":505,"title":"Entry Level Storage","alias":"entry-level-storage","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/entry-level-storage.png"},{"id":48,"title":"CCTV - Closed-circuit television","alias":"cctv-closed-circuit-television","description":"Видеонаблюдение (англ. Сlosed Circuit Television, CCTV — система телевидения замкнутого контура) — процесс, осуществляемый с применением оптико-электронных устройств, предназначенных для визуального контроля или автоматического анализа изображений (автоматическое распознавание лиц, государственных номеров).\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%92%D0%B8%D0%B4%D0%B5%D0%BE%D0%BD%D0%B0%D0%B1%D0%BB%D1%8E%D0%B4%D0%B5%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/video_control.png"},{"id":51,"title":"PaaS - Platform as a service","alias":"paas-platform-as-a-service","description":"Platform as a Service (PaaS, «платформа как услуга») — модель предоставления облачных вычислений, при которой потребитель получает доступ к использованию информационно-технологических платформ: операционных систем, систем управления базами данных, связующему программному обеспечению, средствам разработки и тестирования, размещённым у облачного провайдера. В этой модели вся информационно-технологическая инфраструктура, включая вычислительные сети, серверы, системы хранения, целиком управляется провайдером, провайдером же определяется набор доступных для потребителей видов платформ и набор управляемых параметров платформ, а потребителю предоставляется возможность использовать платформы, создавать их виртуальные экземпляры, устанавливать, разрабатывать, тестировать, эксплуатировать на них прикладное программное обеспечение, при этом динамически изменяя количество потребляемых вычислительных ресурсов.\r\n\r\nПровайдер облачной платформы может взимать плату с потребителей в зависимости от уровня потребления, тарификация возможна по времени работы приложений потребителя, по объёму обрабатываемых данных и количеству транзакций над ними, по сетевому трафику. Провайдеры облачных платформ достигают экономического эффекта за счёт использования виртуализации и экономии на масштабах, когда из множества потребителей в одно и то же время лишь часть из них активно использует вычислительные ресурсы, потребители — за счёт отказа от капитальных вложений в инфраструктуру и платформы, рассчитанных под пиковую мощность и непрофильных затрат на непосредственное обслуживание всего комплекса.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Platform_as_a_service","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PaaS__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2275,"logoURL":"https://old.b4r.io/fileadmin/content/71a0097cf851c21c82e3c3afb19f97e9f4889be6.jpg","logo":true,"scheme":false,"title":"Microsoft test 2","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-test-2","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft test 2","keywords":"","description":"","og:title":"Microsoft test 2","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/71a0097cf851c21c82e3c3afb19f97e9f4889be6.jpg"},"eventUrl":"","translationId":2275,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":775,"title":"Category","alias":"category","description":"","materialsDescription":""},{"id":832,"title":"Category A","alias":"category-a","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":356,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Acronis_Backup_Advanced_for_Windows_Server.jpg","logo":true,"scheme":false,"title":"Acronis Backup Advanced for Windows Server","vendorVerified":0,"rating":"0.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"acronis-backup-advanced-for-windows-server","companyTitle":"Acronis","companyTypes":["vendor"],"companyId":2820,"companyAlias":"acronis","description":"Backup and Protect Your Windows Server Environment\r\nAcronis Backup Advanced for Windows Server is the best-in-class solution for protecting your Windows® environment.\r\nPowered by Acronis AnyData Technology, this solution can back up your entire Windows server in a single pass, delivering dramatically faster protection and the most flexible, reliable recovery available.\r\nNow you can quickly and easily restore individual files/folders, application data, or an entire server—all from the same backup. Acronis Backup Advanced also offers the flexibility of restoring your server to its original location, to entirely new, dissimilar hardware, or to a virtual machine.\r\n\r\n<span style=\"font-weight: bold; \">Key Features</span>\r\nUniversal Restore\r\nIncluded with all Acronis backup solutions, this unique data recovery technology gives you the convenient ability to instantly restore backups to any machine, regardless of platform. Now you can restore files, configurations, applications, or an entire system to the same hardware, to different hardware, or to a virtual server—all with a few simple clicks! \r\nFull Image Backups\r\nBlock-level, image-based backups capture all application and operating system data in one efficient step. Unlike other backup solutions, Acronis Backup Advanced automatically skips unused data blocks to provide faster results with less storage requirements.\r\nEfficient Incremental Backups\r\nIncremental backups identify only the changes made since the last backup, significantly reducing backup time and any impact on network bandwidth or backup storage.\r\nFlexible Recovery\r\nQuickly restore only what you need! Recover granular files, folders, volumes, or a complete server—all from a single image backup.\r\nDisaster Recovery\r\nRecover your entire Windows server in minutes—to the same location, to new, dissimilar hardware, or to a virtual server. Acronis Backup Advanced can quickly restore data locally or remotely using Linux Kernel or WinPE media, or a PXE server to start the new server. Acronis’ driver injection and SID change capabilities will get you up and running quickly on new hardware.\r\nDeduplication\r\nBuilt-in source and target variable block size data deduplication reduces the volume of backup data by up to 90%. This maximizes backup speed, puts significantly less load on your network, and reduces backup storage requirements.\r\nCentralized Management\r\nAcronis Backup Advanced includes a unified centralized management and reporting console. Manage and report on all backup operations for all physical and virtual machines from a single dashboard.\r\nMultiple Backup Targets\r\nAcronis Backup Advanced supports disk, tape, and cloud locations providing multiple RTO options and full flexibility for recovery from multiple media sources and locations.\r\nAcronis Cloud Storage\r\nAcronis Backup Advanced includes secure, offsite cloud backup to the Acronis cloud. Simply add a subscription to your purchase to fortify your backup storage plan and double your data protection. \r\nFor more detailed information about Acronis Backup Advanced for Windows Server you may examine the review.\r\n","shortDescription":"Acronis Backup Advanced for Windows Server - New generation Windows® Server backup and recovery solutions","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Acronis Backup Advanced for Windows Server","keywords":"backup, Acronis, Backup, Advanced, your, data, Windows, server","description":"Backup and Protect Your Windows Server Environment\rAcronis Backup Advanced for Windows Server is the best-in-class solution for protecting your Windows®","og:title":"Acronis Backup Advanced for Windows Server","og:description":"Backup and Protect Your Windows Server Environment\rAcronis Backup Advanced for Windows Server is the best-in-class solution for protecting your Windows®","og:image":"https://old.b4r.io/fileadmin/user_upload/Acronis_Backup_Advanced_for_Windows_Server.jpg"},"eventUrl":"","translationId":357,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Резервное копирование (англ. backup) — процесс создания копии данных на носителе (жёстком диске, дискете и т. д.), предназначенном для восстановления данных в оригинальном или новом месте их расположения в случае их повреждения или разрушения.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A0%D0%B5%D0%B7%D0%B5%D1%80%D0%B2%D0%BD%D0%BE%D0%B5_%D0%BA%D0%BE%D0%BF%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_protection__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1199,"logoURL":"https://old.b4r.io/fileadmin/content/barracuda-load-balancer.jpg","logo":true,"scheme":false,"title":"Barracuda Load Balancer","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-load-balancer","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<p><span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Barracuda Load Balancer is a powerful and easy-to-use solution for distributing network traffic between servers. Designed to achieve resiliency, the Barracuda Load Ballancer is an easy-to-use solution that includes traffic balancing and IP5. This solution provides traffic distribution between multiple servers, and a fault-tolerance system in the event of a failure of one of them.</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Acceleration</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">The Barracuda Load Balancer ADC is ideal for optimizing application performance. It offloads computeintensive SSL transactions from the server, preserving resources for applications. In addition, optimization features such as caching, compression, and TCP pooling enable faster application delivery and ensure scalability.</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Availability</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Using health and performance checks, the Barracuda Load Balancer ADC distributes traffic for efficient use of server resources and employs server failover for high availability. Global Server Load Balancing allows redundancy across multiple sites enhancing availability and speeding disaster recovery.</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Control</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Content routing and content rewrites enable full control of application traffic and customized application delivery based on users, regions, and/or devices. Client controls gives administrators the ability to throttle requests to ensure application availability even during periods of heavy traffic.</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Security</span> <span lang=\"EN-US\" style=\"mso-ansi-language: EN-US;\">Content routing and content rewrites enable full control of application traffic and customized application delivery based on users, regions, and/or devices. Client controls gives administrators the ability to throttle requests to ensure application availability even during periods of heavy traffic.</span></p>","shortDescription":"Barracuda Load Balancer - automatic balancing several kinds of traffic. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Load Balancer","keywords":"traffic, application, Load, Barracuda, availability, Balancer, server, delivery","description":"Barracuda Load Balancer is a powerful and easy-to-use solution for distributing network traffic between servers. Designed to achieve resiliency, the Barracuda","og:title":"Barracuda Load Balancer","og:description":"Barracuda Load Balancer is a powerful and easy-to-use solution for distributing network traffic between servers. Designed to achieve resiliency, the Barracuda","og:image":"https://old.b4r.io/fileadmin/content/barracuda-load-balancer.jpg"},"eventUrl":"","translationId":1379,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":321,"title":"Workload Scheduling and Automation Software","alias":"workload-scheduling-and-automation-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/balancing-and-automated-load-control.png"},{"id":491,"title":"Datacenter Automation","alias":"datacenter-automation","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Data_Center_Automation__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":301,"logoURL":"https://old.b4r.io/fileadmin/user_upload/MobileIron_Core.jpg","logo":true,"scheme":false,"title":"MobileIron Core","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"mobileiron-core","companyTitle":"MobileIron","companyTypes":["vendor"],"companyId":2810,"companyAlias":"mobileiron","description":"The MobileIron EMM platform enables global enterprises to secure and manage modern operating systems in a world of mixed-use mobile devices. It incorporates identity, context, and privacy enforcement to set the appropriate level of access to enterprise data and services. \r\n","shortDescription":"A key component to the MobileIron Platform is MobileIron Core, which integrates with backend enterprise IT systems and enables IT to define security and management policies for mobile apps, content and devices.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"MobileIron Core","keywords":"MobileIron, context, privacy, enforcement, identity, incorporates, Core, data","description":"The MobileIron EMM platform enables global enterprises to secure and manage modern operating systems in a world of mixed-use mobile devices. It incorporates","og:title":"MobileIron Core","og:description":"The MobileIron EMM platform enables global enterprises to secure and manage modern operating systems in a world of mixed-use mobile devices. It incorporates","og:image":"https://old.b4r.io/fileadmin/user_upload/MobileIron_Core.jpg"},"eventUrl":"","translationId":302,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":3,"title":"MDM - Mobile Device Management","alias":"mdm-mobile-device-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/MDM_-_Mobile_Device_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":303,"logoURL":"https://old.b4r.io/fileadmin/user_upload/UserGate_Proxy___Firewall.png","logo":true,"scheme":false,"title":"UserGate Proxy & Firewall","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"usergate-proxy-firewall","companyTitle":"Entensys","companyTypes":["vendor"],"companyId":2811,"companyAlias":"entensys","description":"Control Internet Access. Protect from Advanced Threats.\r\nUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe.\r\n\r\nNetwork Firewall, IDPS, and Router\r\nEnforce uninterrupted connectivity, network access controls, and regulate Internet traffic.\r\nKeep viruses, worms, Trojans, and spyware from infesting your network.\r\nGuarantee the bandwidth levels required to serve business-critical applications.\r\nMonitoring User Internet Activity\r\n\r\nControl access to websites and enforce any reasonable corporate policy.\r\nLink the headquarters to remote users and branch offices through a Secure VPN connection\r\nProduct Overview\r\nUserGate Proxy & Firewall is an all-in-one gateway security solution combining a network firewall, router, gateway antivirus, intrusion detection and prevention (IDPS), VPN server, web filtering, reporting and statistics and other important functions. It allows you to manage network traffic, optimize bandwidth, and provide Internet access control.\r\n\r\nHow does it work?\r\nUserGate Proxy & Firewall can be installed on any Windows-based machine and works as a web security gateway. It provides Internet access sharing, web security, and traffic management. UserGate works basing on user account and applicable policies. The product lets administrators control traffic flow and trace web pages visited by employees. Numerous policies can be used to grant or restrict access to specific website categories, control downloads or application use, set traffic quotas, and keep detailed statistics.\r\n","shortDescription":"UserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"UserGate Proxy & Firewall","keywords":"access, Internet, Firewall, UserGate, traffic, network, Proxy, security","description":"Control Internet Access. Protect from Advanced Threats.\rUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous","og:title":"UserGate Proxy & Firewall","og:description":"Control Internet Access. Protect from Advanced Threats.\rUserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous","og:image":"https://old.b4r.io/fileadmin/user_upload/UserGate_Proxy___Firewall.png"},"eventUrl":"","translationId":304,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":347,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Tufin_Orchestration_Suite2.jpg","logo":true,"scheme":false,"title":"Tufin Orchestration Suite","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"tufin-orchestration-suite","companyTitle":"Tufin","companyTypes":["vendor"],"companyId":2816,"companyAlias":"tufin","description":"Gain visibility & control across physical networks & hybrid cloud environments\r\nReduce the attack surface & ensure continuous compliance\r\nImplement security changes in minutes instead of days\r\n\r\n<span style=\"font-weight: bold;\">Tufin Security Policy Orchestration for Today’s Enterprise Networks</span>\r\nLearn how the Tufin Orchestration Suite empowers you to visualize and control your network security policy across all on-premise environments and cloud platforms\r\n\r\n<span style=\"font-weight: bold; font-style: italic;\">Whatever your industry, at Tufin we understand the serious network security challenges that your enterprise faces every day:</span>\r\n<span style=\"font-weight: bold;\">Complexity</span>\r\nToday’s hybrid IT reality is multi-vendor as well as multi-technology, resulting in limited visibility and control for enterprise networks spanning physical and cloud platforms.\r\n<span style=\"font-weight: bold;\">Change</span>\r\nEver-changing network security policies introduce new attack vectors. In addition, enterprises must handle an overwhelming volume of changes, while remaining secure and efficient.\r\n<span style=\"font-weight: bold;\">Cybersecurity</span>\r\nCyber-attacks will happen and organizations must do everything they can to contain these threats which are increasing at an alarming rate.\r\n<span style=\"font-weight: bold;\">Connectivity</span>\r\nApplication-centric security and connectivity management is critical to avoid outages and ensure business continuity.\r\n<span style=\"font-weight: bold;\">Compliance</span>\r\nThere is an ever-present need for audit readiness to enforce and demonstrate compliance with internal and regulatory standards as your industry requires.\r\nIn addition, massive projects like data center migration, application migration and moving workloads to the cloud magnify the challenges of daily operations.\r\n\r\n<span style=\"font-weight: bold;\">The Tufin Orchestration Suite Solution</span>\r\nThe award-winning Tufin Orchestration Suite is a policy-centric solution for automatically analyzing risk, designing, provisioning and auditing network security changes. Tufin reduces the attack surface and minimizes disruptions to critical applications. Its network security automation enables enterprises to implement security changes in minutes instead of days with continuous compliance and increased agility.\r\nTufin Orchestration Suite provides multi-vendor device support for leading enterprises networks, including finance, telecom, energy and utilities, healthcare, retail, education, government, manufacturing, transportation and auditing. Tufin’s Technology Alliance involves close partnership with industry leaders to provide seamless integration of the award-winning Tufin Orchestration Suite with their solutions.\r\n<span style=\"font-weight: bold;\">Capabilities</span>\r\nSingle Pane of Glass for Network Security\r\nNetwork Security Policy Baseline\r\nApplication-Centric Security & Connectivity Management\r\nNetwork Security Change Automation\r\nCompliance & Audit Readiness\r\nInteroperability with IT Service Management, Ticketing & 3rd Party Systems","shortDescription":"The award-winning Tufin Orchestration Suite provides enterprises with cybersecurity and agility with Network Security Policy Orchestration for a wide range of technologies and integrations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Tufin Orchestration Suite","keywords":"Tufin, security, Orchestration, Suite, Security, with, network, changes","description":"Gain visibility & control across physical networks & hybrid cloud environments\rReduce the attack surface & ensure continuous compliance\rImplement","og:title":"Tufin Orchestration Suite","og:description":"Gain visibility & control across physical networks & hybrid cloud environments\rReduce the attack surface & ensure continuous compliance\rImplement","og:image":"https://old.b4r.io/fileadmin/user_upload/Tufin_Orchestration_Suite2.jpg"},"eventUrl":"","translationId":348,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":489,"title":"Network Security Policy Management","alias":"network-security-policy-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/network-security-policy-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2070,"logoURL":"https://old.b4r.io/fileadmin/user_upload/acronis-backup-12-logo.png","logo":true,"scheme":false,"title":"Acronis Backup","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"acronis-backup","companyTitle":"Acronis","companyTypes":["vendor"],"companyId":2820,"companyAlias":"acronis","description":"<p>Acronis Backup is a fast, scalable and reliable backup solution for files, applications, and complete systems.</p>\r\n<p>Acronis Backup is highly customizable, allowing you to set up whatever type of backup solution you need, including on-location, cloud-based or hybrid.</p>\r\n<p>The company can back up data from servers, mobile devices, cloud platforms and virtual machines. Acronis is also flexible in its backup options, allowing you to back up to a different cloud storage platform, if you prefer.</p>\r\n<p>You can set up quick incremental and differential backups of your servers with options to back up your network on local, remote and cloud locations. All the while, the data deduplication feature ensures that your backup doesn't consist of copies, which keeps storage requirements more manageable. In addition, you can encrypt your backups with three options: 128-bit, 192-bit and 256-bit AES cipher encryption. This means that you can store your archived backups off-site without fear of the data being stolen.</p>\r\n<p>Acronis includes several features for protecting and backing up your virtual environment. It integrates with the most popular and used virtual platforms, including VMWare vSphere, Microsoft Hyper-V, Citrix XenServer, Linux KVM and Oracle VM Server.</p>\r\n<p>One of the best features of Acronis Backup Advanced is the instant recovery, or recovery in place. This recovery feature launches the backed-up data onto a virtual server so that users can still access the data while you work to restore the original server. There is virtually no downtime.</p>\r\n<p>In addition, the disk-imaging restoration allows you to store entire disks to dissimilar hardware on a granular level. This allows you to convert backups of physical servers to virtual machines (physical to virtual) and convert work in progress from those virtual machines back to bare metal (virtual to physical) and even dissimilar hardware.</p>\r\n<p>You can implement backup and recoveries from anywhere in the world, as long as you are on a computer with an internet connection. When you combine this with the wake-on-LAN feature, you can essentially access any computer connected to your network and run backups without physically accessing the computers.</p>","shortDescription":"Acronis Backup is a fast, scalable and reliable backup solution for files, applications, and complete systems.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Acronis Backup","keywords":"virtual, your, Acronis, backup, with, data, backups, Backup","description":"Acronis Backup is a fast, scalable and reliable backup solution for files, applications, and complete systems.\rAcronis Backup is highly customizable, allowing","og:title":"Acronis Backup","og:description":"Acronis Backup is a fast, scalable and reliable backup solution for files, applications, and complete systems.\rAcronis Backup is highly customizable, allowing","og:image":"https://old.b4r.io/fileadmin/user_upload/acronis-backup-12-logo.png"},"eventUrl":"","translationId":2071,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":71,"title":"Backup and Recovery"}],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Резервное копирование (англ. backup) — процесс создания копии данных на носителе (жёстком диске, дискете и т. д.), предназначенном для восстановления данных в оригинальном или новом месте их расположения в случае их повреждения или разрушения.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A0%D0%B5%D0%B7%D0%B5%D1%80%D0%B2%D0%BD%D0%BE%D0%B5_%D0%BA%D0%BE%D0%BF%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_protection__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1604,"logoURL":"https://old.b4r.io/fileadmin/user_upload/F5_Silverline_Web_Application_Firewall.jpg","logo":true,"scheme":false,"title":"F5 Silverline Web Application Firewall","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"f5-silverline-web-application-firewall","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"F5® Silverline® Web Application Firewall is a cloud based service with 24x7x365 support from highly specialized security experts. It helps organizations protect web applications and data, and enable compliance with industry security standards, such as PCI DSS. Silverline Web Application Firewall is available as a fully managed service for comprehensive and customized app protection, or as an express self-service for rapid deployment of expertly maintained policies.\r\n<span style=\"font-weight: bold;\">Managed service key benefits</span>\r\n<ul>\r\n<li>Ensure application security and compliance</li>\r\n<li>Get comprehensive protection from advanced layer 7 attacks, OWASP Top Ten application security risks, and zero-day attacks—and enable compliance with key regulatory mandates.</li>\r\n<li>Get 24x7x365 expert service</li>\r\n<li>Receive 24x7x365 access to web application firewall (WAF) experts who build, proactively monitor, and fine-tune WAF policies against known and emerging threats.</li>\r\n<li>Deploy flexibly across hybrid environments</li>\r\n<li>Ensure consistent web application security, availability, and user experiences across traditional and cloud data centers.</li>\r\n<li>Defend with proven security effectiveness</li>\r\n<li>Leverage security efficacy with technology built on the NSS Labs–recommended F5 BIG-IP® Application Security Manager™ (ASM), based on tests that demonstrate 99.89 percent overall security effectiveness.</li>\r\n<li>Drive operational and cost efficiencies</li>\r\n<li>Remove the complexity of WAF management,</li>\r\n<li>increase the speed to deploy new policies, and</li>\r\n<li>decrease operational expenses.</li>\r\n<li>Gain attack insights and intelligence</li>\r\n<li>Access reports through the cloud-based customer portal and incorporate external intelligence for securing apps against identified threats. </li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">What’s Inside</span>\r\n<ul>\r\n<li>Drive Efficiencies with a Comprehensive Web Application Firewall Service</li>\r\n<li>Receive Expert Policy Building and Monitoring</li>\r\n<li>Hybrid Policy Management and Deployment</li>\r\n<li>Defend with Proven Security Effectiveness</li>\r\n<li>Comprehensive Attack Protection</li>\r\n<li>Built-In Compliance and Reporting Capabilities</li>\r\n<li>Gain Attack Insights and Intelligence</li>\r\n<li>Comprehensive Managed Service App Protection</li>\r\n<li>Streamlined Self-Service App Protection</li>\r\n<li>The Silverline Cloud-Based Platform</li>\r\n<li>Flexible Licensing</li>\r\n<li>Add-On Threat Intelligence Services</li>\r\n<li>F5 Security Operations Center</li>\r\n</ul>\r\n","shortDescription":"F5® Silverline® Web Application Firewall is a cloud-based service with 24x7x365 support from highly specialized security experts. It helps organizations protect web applications and data.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 Silverline Web Application Firewall","keywords":"security, with, Application, service, Silverline, application, Firewall, policies","description":"F5® Silverline® Web Application Firewall is a cloud based service with 24x7x365 support from highly specialized security experts. It helps","og:title":"F5 Silverline Web Application Firewall","og:description":"F5® Silverline® Web Application Firewall is a cloud based service with 24x7x365 support from highly specialized security experts. It helps","og:image":"https://old.b4r.io/fileadmin/user_upload/F5_Silverline_Web_Application_Firewall.jpg"},"eventUrl":"","translationId":1605,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":201,"logoURL":"https://old.b4r.io/fileadmin/user_upload/BIG-IP_Local_Traffic_Manager.jpg","logo":true,"scheme":false,"title":"BIG-IP Local Traffic Manager","vendorVerified":0,"rating":"1.70","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":2,"alias":"big-ip-local-traffic-manager","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms the chaotic volume of network traffic into logically assembled streams of data, and then makes intelligent traffic management decisions, selecting the right destination based on server performance, security, and availability.\r\n\r\nYes, BIG-IP LTM enables sophisticated load balancing. But, that’s just the beginning.\r\nFull proxy means full power.\r\n\r\nIf you can see it, you can manipulate it.\r\n\r\nBecause BIG-IP LTM is a full proxy, you can inspect, manage, and report on application traffic entering and exiting your network. From basic load balancing to complex traffic management decisions based on client, server, or application status, BIG-IP LTM gives you granular control over app traffic.\r\n\r\nFor example, if you want to direct traffic based on the requested URL or log specific server responses to a reporting system, BIG-IP LTM has the architecture and the tools you need to do it.\r\n\r\nOperational efficiency? Check.\r\n\r\nBIG-IP LTM can optimize the speed and reliability of your applications via both network and application layers.\r\n\r\nUsing real-time protocol and traffic management decisions based on application and server conditions, extensive connection management, and TCP and content offloading, BIG-IP LTM dramatically improves page load times and the user experience.\r\n\r\nWhether it’s negotiating high-latency networks or offloading millions of connections, BIG-IP LTM can improve the performance of your infrastructure and your applications.\r\n\r\nThe SSL performance of BIG-IP LTM lets you cost-effectively protect the end-to-end user experience by encrypting everything from the client to the server. It also scales on-demand and absorbs potentially crippling DDoS attacks.\r\n\r\nOften SSL is turned on throughout the network. Thing is, most network security devices aren’t built to detect malicious traffic in layers 4–7. Separating the good and bad traffic is the first problem, taking action on the malicious traffic is the second.\r\n\r\nBIG-IP LTM includes levels of inspection necessary to block bad traffic and allow good traffic to pass through.\r\n\r\n","shortDescription":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BIG-IP Local Traffic Manager","keywords":"traffic, BIG-IP, application, network, server, your, based, management","description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms","og:title":"BIG-IP Local Traffic Manager","og:description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms","og:image":"https://old.b4r.io/fileadmin/user_upload/BIG-IP_Local_Traffic_Manager.jpg"},"eventUrl":"","translationId":202,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1259,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Acronis_True_Image.png","logo":true,"scheme":false,"title":"Acronis True Image","vendorVerified":0,"rating":"1.70","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":2,"alias":"acronis-true-image","companyTitle":"Acronis","companyTypes":["vendor"],"companyId":2820,"companyAlias":"acronis","description":"<span style=\"font-weight: bold; \">Create a reliable backup</span>\r\nMake sure you always have dependable copies of your data so you can restore your entire system or individual files\r\n\r\n<ul><li>Back up. Use cloning and imaging to make a duplicate of your system, capturing all of your data for disk migration or system recovery</li><li>Store. Back up to a local drive and to the cloud for the Dual Protection of always having on-site and off-site copies available</li><li>Restore. Quickly recover your whole system or a specific file with confidence, knowing that the backup is as good as the original</li></ul>\r\n\r\n<span style=\"font-weight: bold; \">Control your data</span>\r\nBack up in just two clicks,\r\nand view all your data and backup information in one place\r\n<span style=\"font-weight: bold; \">Easy to use and manage</span>\r\nEnjoy a simple, intuitive approach to backup, because safeguarding your data doesn’t need to be complicated \r\n\r\n<ul><li>Cover Everything. With one solution you can safeguard PCs, Macs, iOS and Android devices as well as your social media accounts</li><li>Two-Click Protection. Protect everything by choosing where to store your data and creating a full image backup in just two clicks</li><li>Visual Dashboards. Know at a glance the size of your backup, the types of files, and how many ransomware attacks have been stopped</li></ul>\r\n\r\n<span style=\"font-weight: bold; \">Secure data against ransomware</span>\r\nActively defend your data against ransomware attacks with the only backup that detects, stops and reverses unauthorized encryption.\r\n\r\nSource: https://www.acronis.com/en-us/personal/computer-backup/\r\nFor more detailed information about Acronis True Image 2018 you may examine the review.\r\nhttps://www.cloudwards.net/review/acronis-true-image-cloud/\r\n","shortDescription":"Acronis True Image is a software product produced by Acronis that provides data protection for personal users including, backup, archive, access and recovery for Microsoft, OSX, iOS and Android operating systems. As disk imaging software, True Image can restore the previously captured image to another disk, replicating the structure and contents to the new disk, also allowing disk cloning and partition resizing, even if the new disk is of a different capacity. The backups are in a proprietary format which saves using a .tib filename format.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Acronis True Image","keywords":"your, data, backup, system, Back, ransomware, information, against","description":"Create a reliable backup\rMake sure you always have dependable copies of your data so you can restore your entire system or individual files\r\rBack up. Use","og:title":"Acronis True Image","og:description":"Create a reliable backup\rMake sure you always have dependable copies of your data so you can restore your entire system or individual files\r\rBack up. Use","og:image":"https://old.b4r.io/fileadmin/user_upload/Acronis_True_Image.png"},"eventUrl":"","translationId":1260,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Резервное копирование (англ. backup) — процесс создания копии данных на носителе (жёстком диске, дискете и т. д.), предназначенном для восстановления данных в оригинальном или новом месте их расположения в случае их повреждения или разрушения.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A0%D0%B5%D0%B7%D0%B5%D1%80%D0%B2%D0%BD%D0%BE%D0%B5_%D0%BA%D0%BE%D0%BF%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_protection__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":500,"logoURL":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg","logo":true,"scheme":false,"title":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM)","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"f5-big-ip-dns-ranee-global-traffic-manager-gtm","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"Преимущества:\r\n\r\nглобальная балансировка нагрузки на приложения\r\nповышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)\r\nзащита DNS от DDoS-атак\r\nлегкая масштабируемость системы доменных имен.\r\n","shortDescription":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM) — модуль, распределяющий запросы и нагрузки на корпоративные приложения и систему DNS , также обеспечивает защиту вашей DNS инфраструктуры от DDoS-атак и обеспечивает решение DNSSEC в реальном времени.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM)","keywords":"системы, имен, доменных, свыше, запросов, обработка, секунду, легкая","description":"Преимущества:\r\rглобальная балансировка нагрузки на приложения\rповышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)","og:title":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM)","og:description":"Преимущества:\r\rглобальная балансировка нагрузки на приложения\rповышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)","og:image":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg"},"eventUrl":"","translationId":2399,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":501,"logoURL":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg","logo":true,"scheme":false,"title":"F5 BIG-IP DNS (formerly Global Traffic Manager - GTM)","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"f5-big-ip-dns-formerly-global-traffic-manager-gtm","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"Speed, meet security.\r\nBIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries. \r\nWith a set of features that includes multicore scalability, DNS Express, and IP Anycast integration, BIG-IP DNS handles millions of DNS queries, protects your business from DDoS attacks, and ensures top application performance for users.\r\nBIG-IP DNS delivers a real-time, signed DNSSEC query response and DNS firewall services for attack protection and mitigates complex threats by blocking access to malicious domains.\r\nWorks with what you already have in place.\r\nBIG-IP DNS services integrate with DNS zone management solutions, increase DNS performance at the network edge, and mask the DNS back-end infrastructure.\r\n\r\nThat translates into higher productivity, server consolidation, faster responses, and protected DNS management.\r\nAll-over availability.\r\nBIG-IP DNS routes distributed app traffic to keep pace with changing network and user volumes that can overwhelm data centers during peak traffic times.\r\nBIG-IP DNS can also be configured as a full proxy for global load balancing applications and DNS across architectures, as well as across the globe. Plus, you can use it in virtual and hybrid cloud environments to extend DNS services and global app availability while keeping centralized control within the data center.\r\n","shortDescription":"BIG-IP DNS improves the performance and availability of your global applications by sending users to the closest or best-performing physical, virtual, or cloud environment. It also hyperscales and secures your DNS infrastructure from DDoS attacks and delivers a real-time DNSSEC solution that protects against hijacking attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 BIG-IP DNS (formerly Global Traffic Manager - GTM)","keywords":"BIG-IP, services, with, across, availability, that, global, queries","description":"Speed, meet security.\rBIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries. \rWith a set of","og:title":"F5 BIG-IP DNS (formerly Global Traffic Manager - GTM)","og:description":"Speed, meet security.\rBIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries. \rWith a set of","og:image":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg"},"eventUrl":"","translationId":501,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":810,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Gemalto_Trusted_Service_Hub.png","logo":true,"scheme":false,"title":"Gemalto Trusted Service Hub","vendorVerified":0,"rating":"1.90","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"gemalto-trusted-service-hub","companyTitle":"gemalto","companyTypes":["vendor"],"companyId":2787,"companyAlias":"gemalto","description":"Gemalto’s TSH enables seamless and secure over-the-air deployment of the digital keys to any type of phone that supports the solution.\r\nWith the key safely downloaded to a secure element via Gemalto’s TSH, drivers can lock/unlock their cars by simply placing the smartphone against the door handle. The engine can also be turned on with the phone in the charging tray of the dashboard and pressing the start button. Capable of operating even if the phone battery is drained, the need to carry a conventional key is eliminated.\r\nAs an integral part of the ‘Mercedes me connect’ program, the digital vehicle key will connect seamlessly with services that meet the demands of modern mobility and digital lifestyles.\r\n\r\n<span style=\"color: rgb(51, 51, 51); font-family: "Lucida Grande", Arial, Helvetica, sans-serif; \">Source: Gemalto</span>","shortDescription":"Gemalto is providing its Trusted Services Hub (TSH) to support Daimler AG’s new smartphone-based ‘digital vehicle key’ for the Mercedes-Benz E-Class range. The premium car maker’s innovative solution gives drivers the freedom to lock/unlock and start their vehicles using nothing more than an NFC smartphone. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Gemalto Trusted Service Hub","keywords":"digital, phone, Gemalto, Gemalto’s, that, with, secure, drained","description":"Gemalto’s TSH enables seamless and secure over-the-air deployment of the digital keys to any type of phone that supports the solution.\rWith the key safely","og:title":"Gemalto Trusted Service Hub","og:description":"Gemalto’s TSH enables seamless and secure over-the-air deployment of the digital keys to any type of phone that supports the solution.\rWith the key safely","og:image":"https://old.b4r.io/fileadmin/user_upload/Gemalto_Trusted_Service_Hub.png"},"eventUrl":"","translationId":811,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":43,"title":"Data Encryption","alias":"data-encryption","description":"Шифрова́ние — обратимое преобразование информации в целях сокрытия от неавторизованных лиц, с предоставлением, в это же время, авторизованным пользователям доступа к ней. Главным образом, шифрование служит задачей соблюдения конфиденциальности передаваемой информации. Важной особенностью любого алгоритма шифрования является использование ключа, который утверждает выбор конкретного преобразования из совокупности возможных для данного алгоритма[1][2].\r\n\r\nПользователи являются авторизованными, если они обладают определенным аутентичным ключом. Вся сложность и, собственно, задача шифрования состоит в том, как именно реализован этот процесс[1].\r\n\r\nВ целом, шифрование состоит из двух составляющих — зашифрование и расшифрование.\r\n\r\nС помощью шифрования обеспечиваются три состояния безопасности информации[1]:\r\n\r\nКонфиденциальность.\r\nШифрование используется для скрытия информации от неавторизованных пользователей при передаче или при хранении.\r\nЦелостность.\r\nШифрование используется для предотвращения изменения информации при передаче или хранении.\r\nИдентифицируемость.\r\nШифрование используется для аутентификации источника информации и предотвращения отказа отправителя информации от того факта, что данные были отправлены именно им.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-encryption.png"},{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":240,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IDBridge1.png","logo":true,"scheme":false,"title":"IDBridge","vendorVerified":0,"rating":"1.90","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"idbridge","companyTitle":"gemalto","companyTypes":["vendor"],"companyId":2787,"companyAlias":"gemalto","description":"IDBridge - Interface smart card readers are the most necessary components of any system that works with smart cards. \r\nProducts IDBridge is created on the basis of more than 30 years of experience in research and development of solutions in the sphere of security and cryptography. It is a robust, versatile products that meet the requirements of the relevant standards and certified in all industries.\r\nThe range of products IDBridge includes reader for desktopcomputers, secure remote access and remote access. this provides maximum flexibility devices for use in any business environment. \r\n","shortDescription":"IDBridge - Interface smart card readers are the most necessary components of any system that works with smart cards.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IDBridge","keywords":"IDBridge, access, that, products, remote, smart, relevant, standards","description":"IDBridge - Interface smart card readers are the most necessary components of any system that works with smart cards. \rProducts IDBridge is created on the","og:title":"IDBridge","og:description":"IDBridge - Interface smart card readers are the most necessary components of any system that works with smart cards. \rProducts IDBridge is created on the","og:image":"https://old.b4r.io/fileadmin/user_upload/IDBridge1.png"},"eventUrl":"","translationId":241,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1537,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Untitled-2-300x200.png","logo":true,"scheme":false,"title":"IBM Cloud Object Storage","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":223,"alias":"ibm-cloud-object-storage","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"<h1 id=\"ibm-pagetitle-h1\">IBM Cloud Object Storage is</h1>\r\n<p>a highly scalable cloud storage service, designed for high durability, resiliency and security. <span style=\"color: #323232; font-family: ibm-plex-sans, 'Helvetica Neue', Arial, sans-serif; font-size: 16px; background-color: #f4f4f4;\">Designed for data durability of 99.999999999 percent. Data is sliced, and slices are dispersed across multiple devices in multiple facilities for resiliency. High data durability is maintained by built-in integrity checking and self-repair capabilities.</span> <span style=\"color: #323232; font-family: ibm-plex-sans, 'Helvetica Neue', Arial, sans-serif; font-size: 16px; background-color: #f4f4f4;\">Data at rest is secured using server-side encryption and data in motion is secured using carrier-grade TLS/SSL. Gain additional control with role-based policies and use IBM Cloud Identity & Access Management to set bucket-level permissions.</span></p>","shortDescription":"Get your data to the cloud faster, analyze it in place, archive it for less.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM Cloud Object Storage","keywords":"durability, data, Cloud, resiliency, using, secured, Data, multiple","description":"IBM Cloud Object Storage is\ra highly scalable cloud storage service, designed for high durability, resiliency and security. Designed for data durability of","og:title":"IBM Cloud Object Storage","og:description":"IBM Cloud Object Storage is\ra highly scalable cloud storage service, designed for high durability, resiliency and security. Designed for data durability of","og:image":"https://old.b4r.io/fileadmin/user_upload/Untitled-2-300x200.png"},"eventUrl":"","translationId":1538,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":24,"title":"IaaS - storage"}],"testingArea":"","categories":[{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IaaS_-_Storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1539,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Bez_nazvanija.png","logo":true,"scheme":false,"title":"IBM Cloud IaaS для вычислений и блочного хранения данных","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":223,"alias":"ibm-cloud-iaas-dlja-vychislenii-i-blochnogo-khranenija-dannykh","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"<p style=\"margin-bottom: .0001pt; line-height: normal;\"><span style=\"font-size: 12.0pt; color: black; background: white;\">IBM Cloud IaaS для вычислений и блочного хранения данных в значительной степени считается инфраструктурой как услугой (IaaS) , формой облачных вычислений, в которой сторонний поставщик использует свое программное обеспечение и другие компоненты инфраструктуры от имени своих пользователей.</span></p>\r\n<p style=\"margin-bottom: .0001pt; line-height: normal;\"><span style=\"font-size: 12.0pt;\"> </span><span style=\"font-size: 12pt;\">Для вычислений, IBM предоставляетBareMetal и виртуальный сервер, наряду с ассортиментом операционных систем, гипервизоров и платформ баз данных. Конфигурации виртуального сервера доступны либо в модели с одним, либо с несколькими арендаторами , тогда как конфигурации сервера без использования железа доступна только в модели с одним арендатором.</span></p>\r\n<p style=\"margin-bottom: .0001pt; line-height: 15.0pt;\"><span style=\"font-size: 12.0pt;\"> </span><span style=\"font-size: 12pt;\">Приложения облачного хранилища IBM включают в себя функции блоков, файлов, объектов и резервного копирования. Сетевые службы включают в себя балансировку нагрузки и прямые ссылки - которые обеспечивают частное подключение к центру обработки данных IBM Cloud IaaS - сервисам домена и виртуализованным сетевым устройствам.</span></p>","shortDescription":"Общедоступная платформа для облачных вычислений, которая предлагает ряд услуг, в том числе для вычислений, сетей, хранения, безопасности и разработки приложений.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM Cloud IaaS для вычислений и блочного хранения данных","keywords":"IaaS, вычислений, данных, Cloud, включают, одним, либо, сервера","description":"IBM Cloud IaaS для вычислений и блочного хранения данных в значительной степени считается инфраструктурой как услугой (IaaS) , формой облачных","og:title":"IBM Cloud IaaS для вычислений и блочного хранения данных","og:description":"IBM Cloud IaaS для вычислений и блочного хранения данных в значительной степени считается инфраструктурой как услугой (IaaS) , формой облачных","og:image":"https://old.b4r.io/fileadmin/user_upload/Bez_nazvanija.png"},"eventUrl":"","translationId":2733,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":26,"title":"IaaS - computing"}],"testingArea":"","categories":[{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"IaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computing ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iaas-computing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1540,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Bez_nazvanija.png","logo":true,"scheme":false,"title":"IBM Cloud IaaS for compute and block storage","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":223,"alias":"ibm-cloud-iaas-for-compute-and-block-storage","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"<p>IBM Cloud IaaS for compute and block storage is a public cloud computing platform that offers a range of services, including those for compute, networking, storage, security and application development. Cloud administrators and users access IBM SoftLayer services over the Internet or through a dedicated network connection. IBM<span style=\"background-color: #ffffff;\">Cloud IaaS for compute and block storage</span>is largely considered infrastructure as a service (IaaS), a form of cloud computing in which a third-party provider hosts hardware, software and other infrastructure components on its users' behalf. For compute, IBM SoftLayer provides various bare-metal and virtual server configurations, along with an assortment of operating systems, hypervisors and database platforms. The virtual server configurations are available in either a single- or multi-tenant model, whereas the bare-metal server configurations are available in a single-tenant model only.</p>","shortDescription":"IBM Cloud is a public cloud computing platform that offers a range of services, including those for compute, networking, storage, security and application development.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM Cloud IaaS for compute and block storage","keywords":"compute, IaaS, configurations, server, storage, Cloud, block, available","description":"IBM Cloud IaaS for compute and block storage is a public cloud computing platform that offers a range of services, including those for compute, networking,","og:title":"IBM Cloud IaaS for compute and block storage","og:description":"IBM Cloud IaaS for compute and block storage is a public cloud computing platform that offers a range of services, including those for compute, networking,","og:image":"https://old.b4r.io/fileadmin/user_upload/Bez_nazvanija.png"},"eventUrl":"","translationId":1540,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":26,"title":"IaaS - computing"}],"testingArea":"","categories":[{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"IaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computing ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iaas-computing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1797,"logoURL":"https://old.b4r.io/fileadmin/user_upload/ClearQuest.png","logo":true,"scheme":false,"title":"ClearQuest","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":223,"alias":"clearquest","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"This software provides tools and processes that allow you to maintain control of changes while catering to the diverse needs of the developer. IBM also provides a new bundled offering under a new consumption model that changes the way you can use and deploy DevOps software. The new offering helps simplify your planning for adoption and growth of critical IBM DevOps products. Read more in the solution brief below. <span style=\"font-weight: bold;\">Feature spotlights:</span> <span style=\"font-weight: bold;\">Create repeatable, enforceable and predictable processes</span> IBM® Rational® ClearQuest® helps you improve team collaboration by integrating typically siloed processes such as analysis, development, testing and deployment. Automated workflows and email notification help ensure that appropriate team members are alerted in near real time when action is required. Team members also receive information about any change or update that can impact their activities. Workflows are ready for immediate use to jump-start your implementation. <span style=\"font-weight: bold;\">Get process automation and full lifecycle traceability</span> This software allows you to customize and enforce consistent development processes to achieve an integrated, consolidated view across the project. In addition to process automation and lifecycle traceability, the IBM Rational ClearQuest security features such as user authentication, user authorization, electronic signatures and audit trails are critical to help ensure compliance with internal and external requirements. <span style=\"font-weight: bold;\">Access the most up-to-date information</span> This software provides deployments that can support thousands of users, working across dozens of sites. A wide range of access capabilities helps ensure that all team members, local and remote, have access to the most up-to-date information virtually anytime, anywhere. Whether your team is a small workgroup at a single location or a highly distributed team spanning multiple locations, IBM Rational ClearQuest software provides the flexibility and scalability to support your organizational needs. <span style=\"font-weight: bold;\">Get clear insight into your processes</span> IBM Rational ClearQuest provides support for querying, charting and reporting. Distribution, trend and aging charts help you visualize complex data. Charts can be created and refined to allow you to drill into the area of data that you need. Queries and reports allow you to view the associations of requirements and the status of your test planning, test authoring and test execution activities. <span style=\"font-weight: bold;\">Flexible pricing and deployment</span> With the new IBM Cloud DevOps for Hybrid Deployment bundle, IBM delivers a new consumption model based on FlexPoints. FlexPoints can be purchased and allocated across the applications included in the bundle according to needs of the business.","shortDescription":"IBM Rational ClearQuest is change management software that helps improve developer productivity while accommodating the methodologies, processes and tools that best fit the project and the people","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ClearQuest","keywords":"that, your, provides, software, team, processes, ClearQuest, Rational","description":"This software provides tools and processes that allow you to maintain control of changes while catering to the diverse needs of the developer. IBM also","og:title":"ClearQuest","og:description":"This software provides tools and processes that allow you to maintain control of changes while catering to the diverse needs of the developer. IBM also","og:image":"https://old.b4r.io/fileadmin/user_upload/ClearQuest.png"},"eventUrl":"","translationId":1798,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":43,"title":"QA Bug tracking systems"}],"testingArea":"","categories":[{"id":808,"title":"Bug tracking systems","alias":"bug-tracking-systems","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/bug-tracking-systems.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}