{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"_type":"localeString","en":"Products","de":"die produkte","ru":"Продукты"},"introduction-popover":{"_type":"localeString","en":"introduction","ru":"внедрения"},"partners-popover":{"en":"partners","ru":"партнеры","_type":"localeString"},"update-profile-button":{"en":"Update profile","ru":"Обновить профиль","_type":"localeString"},"read-more-button":{"en":"Show more","ru":"Показать ещё","_type":"localeString"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"ru":"Компетенции","_type":"localeString","en":"Categories"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"en":"Bonus 4 reference","ru":"Бонус за референс","_type":"localeString"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"_type":"localeString","en":"Partner types","ru":"Типы партнеров"},"branch-popover":{"_type":"localeString","en":"branch","ru":"область деятельности"},"employees-popover":{"en":"number of employees","ru":"количество сотрудников","_type":"localeString"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"_type":"localeString","en":"Partner discounts","ru":"Партнерские скидки"},"registered-discounts":{"_type":"localeString","en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки"},"additional-advantages":{"en":"Additional Benefits","ru":"Дополнительные преимущества","_type":"localeString"},"additional-requirements":{"_type":"localeString","en":"Partner level requirements","ru":"Требования к уровню партнера"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"_type":"localeString","en":"Annual Sales Plan","ru":"Годовой план продаж"},"partners-vendors":{"ru":"Партнеры-производители","_type":"localeString","en":"Partners-vendors"},"partners-suppliers":{"en":"Partners-suppliers","ru":"Партнеры-поставщики","_type":"localeString"},"all-countries":{"_type":"localeString","en":"All countries","ru":"Все страны"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"en":"Produced products","ru":"Производимые продукты","_type":"localeString"},"vendor-implementations":{"en":"Produced deployments","ru":"Производимые внедрения","_type":"localeString"},"supplier-implementations":{"en":"Supplied deployments","ru":"Поставляемые внедрения","_type":"localeString"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"not-yet-converted":{"en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString"},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"register":{"ru":"Регистрация ","_type":"localeString","en":"Register"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"_type":"localeString","en":"Company presentation","ru":"Презентация компании"}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"ru":"Выйти","_type":"localeString","en":"logout"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"title":{"_type":"localeString","en":"ROI4CIO: Company","ru":"ROI4CIO: Компания"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"title","translations":{"ru":"Компания","_type":"localeString","en":"Company"}},{"translations":{"_type":"localeString","en":"Company description","ru":"Описание компании"},"name":"description"},{"translations":{"en":"Company keywords","ru":"Ключевые слова для компании","_type":"localeString"},"name":"keywords"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"juniper-networks":{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[{"id":2,"type":"supplier"},{"id":3,"type":"vendor"}],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":["supplier","vendor"],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[{"id":746,"title":"Impl 3004","description":"","alias":"impl-3004","roi":0,"seo":{"title":"Impl 3004","keywords":"","description":"","og:title":"Impl 3004","og:description":""},"deal_info":"","user":{"id":2949,"title":"Harvey Nichols","logoURL":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg","alias":"harvey-nichols","address":"","roles":[],"description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as the UK's premier luxury fashion retailer, Harvey Nichols is internationally renowned for its expertly edited fashion and beauty merchandise, premium food and wine offer and award-winning restaurants.\r\n\r\nHarvey Nichols has seven stores within the UK and Ireland, consisting of five large-format stores in London, Edinburgh, Birmingham, Leeds and Manchester, and two small-format stores in Bristol and Dublin. A beauty concept store, Beauty Bazaar, Harvey Nichols, opened in Liverpool in November 2012.\r\n\r\nAll UK stores have luxury Foodmarkets and Restaurants, Cafés or Brasseries. Harvey Nichols also owns and operates OXO Tower Restaurant, Bar and Brasserie on the South Bank in London.\r\n\r\nIn addition to this, there are seven large-format stores overseas: two in Turkey (Istanbul and Ankara), one in Riyadh, one in Dubai, two in Hong Kong and one in Kuwait.\r\n\r\nHarvey Nichols stores offer the ultimate fashion experience. Seen as ‘the place to be’, Harvey Nichols is the club that doesn’t require a membership. Exclusive, niche and established labels sit alongside accessible everyday collections, offering customers the must-have edit for all their wardrobe needs – from everyday to extraordinary.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.harveynichols.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Harvey Nichols","keywords":"Harvey, Nichols, stores, fashion, opened, luxury, beauty, offer","description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:title":"Harvey Nichols","og:description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:image":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg"},"eventUrl":""},"supplier":{"id":2947,"title":"Bytes Technology Group UK","logoURL":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png","alias":"bytes-technology-group-uk","address":"","roles":[],"description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\n\r\nBytes is part of the £2bn Altron Group. Our UK business began in 1982 and has grown profitably each year to reach a turnover in excess of £194m in FY2015, making us one of the largest software services and solutions businesses in the country.\r\n\r\nThe most important aspect of our business is our people. We value initiative, teamwork and achievement. Together, we focus on providing the highest levels of service so we can deliver our ultimate goal – your satisfaction.\r\n\r\nOur customers include leading brands, such as Marks & Spencer, BBC, Specsavers, NHS, Clifford Chance, BUPA, United Utilities, Hiscox, Allen & Overy LLP and thousands more across retail, media, finance, manufacturing, legal, the NHS and the public sector.\r\n\r\nWe also work closely with the majority of IT vendors and are delighted to have received honours, including Microsoft Worldwide Partner of the Year Winner three times in four years, and CheckPoint European Partner of the Year, to name a few of our recent awards.\r\n\r\nNeed to know more? Please explore our website and get in touch with any questions. We'll be delighted to help.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.bytes.co.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Bytes Technology Group UK","keywords":"Bytes, Group, with, business, Partner, more, delighted, Year","description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:title":"Bytes Technology Group UK","og:description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:image":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png"},"eventUrl":""},"vendors":[{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":""}],"products":[{"id":499,"logo":false,"scheme":false,"title":"Juniper Networks IDP Series","vendorVerified":0,"rating":"1.80","implementationsCount":2,"suppliersCount":0,"alias":"juniper-networks-idp-series","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Stateful signature</span>\r\nThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.\r\n<span style=\"font-weight: bold;\">Protocol anomaly</span>\r\nThe IDP rulebase attack objects detect protocol usages that violate published RFCs. This method protects your network from undiscovered vulnerabilities.\r\n<span style=\"font-weight: bold;\">Traffic anomaly</span>\r\nThe Traffic Anomalies rulebase uses heuristic rules to detect unexpected traffic patterns that might indicate reconnaissance or attacks. This method blocks distributed denial-of-service (DDoS) attacks and prevents reconnaissance activities.\r\n<span style=\"font-weight: bold;\">Backdoor</span>\r\nThe Backdoor rulebase uses heuristic-based anomalous traffic patterns and packet analysis to detect Trojans and rootkits. These methods prevent proliferation of malware in case other security measures have been compromised.\r\n<span style=\"font-weight: bold;\">IP spoofing</span>\r\nThe IDP appliance checks the validity of allowed addresses inside and outside the network, permitting only authentic traffic and blocking traffic with a disguised source.\r\n<span style=\"font-weight: bold;\">Layer 2 attacks</span>\r\nThe IDP appliance prevents Layer 2 attacks using rules for Address Resolution Protocol (ARP) tables, fragment handling, connection timeouts, and byte/length thresholds for packets. These methods prevent a compromised host from polluting an internal network using methods such as ARP cache poisoning.\r\n<span style=\"font-weight: bold;\">Denial of service (DoS)</span>\r\nThe SYN Protector rulebase provides two, alternative methods to prevent SYN-flood attacks.\r\n<span style=\"font-weight: bold;\">Network honeypot</span>\r\nThe IDP appliance impersonates vulnerable ports so you can track attacker reconnaissance activity.","shortDescription":"Juniper Networks IDP Series Intrusion Detection and Prevention Appliances.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Series","keywords":"attacks, rulebase, traffic, methods, method, detect, network, reconnaissance","description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.","og:title":"Juniper Networks IDP Series","og:description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives."},"eventUrl":"","translationId":499,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":131,"title":"Juniper Networks IDP Series for Luxury lifestyle retail chain","description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\n\r\nLuxury lifestyle retail chain, Harvey Nichols, engaged Bytes Security Partnerships to provide a cost effective solution to meet PCI Compliance standards and implement an Intrusion Prevention System (IPS) which complimented existing SSL VPN and fire-wall technology..\r\n\r\nChallenge\r\nLike most retailers within the UK, Harvey Nichols was looking to further secure their network in line with PCI DSS standards.\r\n\r\nIn particular they had a requirement to implement Intrusion Prevention Systems (IPS).\r\n\r\nHarvey Nichols was not a firm believer in the benefits of implementing an IPS solution but understood that this was key to becoming PCI Compliant.\r\n\r\nThe task Bytes Security Partnerships (BSP) faced was to recommend a solution that was not simply a ‘tick in the box’ solution but also offered added benefits to the business.\r\n\r\nBSP needed to find a solution that not only satisfied their business requirements but also further developed into a sound investment that was easily cost- justifiable.\r\n\r\nSolution\r\nBSP presented a number of flexible solutions to Harvey Nichols who entered into consultation with a range of BSP technical experts in order to make an effective decision.As a result, Harvey Nichols and Bytes selected Juniper Networks IDP Series which also complimented existing SSL VPN and fire-wall technology deployed within the company.\r\n\r\nJuniper Networks IDP Series appliances offer the latest capabilities in network intrusion prevention to protect the network from a wide range of attacks.\r\n\r\nUsing industry-recognised stateful inspection techniques, the IDP Series provides zero-day protection against worms, trojans, spyware, keyloggers, and other malware.\r\n\r\nAdditional benefits included a centralised management tool, which allowed Harvey Nichols to configure multiple devices from one interface, as well as giving quick visibility of network issues, which were previously difficult to trace.\r\n\r\nBenefits\r\nBSP met the requirements of Harvey Nichols within the timescales given, by providing a best-fit solution, proactive and responsive account management and direct access to second line engineers for technical enquiries.\r\n\r\nThe reliable and professional support and consultancy framework offered by BSP ensured the smooth introduction of the Juniper Networks appliances.\r\n\r\nOverall the project has created a valued relationship between BSP and Harvey Nichols built on trust and professional understanding..\r\n\r\nBytes SP provided the know-how and expertise which helped us in turning around perceptions of PCI Compliance from a poisoned chalice to a useful business investment.\r\nInfrastructure Manager, Harvey Nichols","alias":"juniper-networks-idp-series-for-luxury-lifestyle-retail-chain","roi":0,"seo":{"title":"Juniper Networks IDP Series for Luxury lifestyle retail chain","keywords":"Nichols, Harvey, solution, which, that, network, from, Networks","description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\rLuxury lifestyle retail chain, Harvey Nichols,","og:title":"Juniper Networks IDP Series for Luxury lifestyle retail chain","og:description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\rLuxury lifestyle retail chain, Harvey Nichols,"},"deal_info":"","user":{"id":2949,"title":"Harvey Nichols","logoURL":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg","alias":"harvey-nichols","address":"","roles":[],"description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as the UK's premier luxury fashion retailer, Harvey Nichols is internationally renowned for its expertly edited fashion and beauty merchandise, premium food and wine offer and award-winning restaurants.\r\n\r\nHarvey Nichols has seven stores within the UK and Ireland, consisting of five large-format stores in London, Edinburgh, Birmingham, Leeds and Manchester, and two small-format stores in Bristol and Dublin. A beauty concept store, Beauty Bazaar, Harvey Nichols, opened in Liverpool in November 2012.\r\n\r\nAll UK stores have luxury Foodmarkets and Restaurants, Cafés or Brasseries. Harvey Nichols also owns and operates OXO Tower Restaurant, Bar and Brasserie on the South Bank in London.\r\n\r\nIn addition to this, there are seven large-format stores overseas: two in Turkey (Istanbul and Ankara), one in Riyadh, one in Dubai, two in Hong Kong and one in Kuwait.\r\n\r\nHarvey Nichols stores offer the ultimate fashion experience. Seen as ‘the place to be’, Harvey Nichols is the club that doesn’t require a membership. Exclusive, niche and established labels sit alongside accessible everyday collections, offering customers the must-have edit for all their wardrobe needs – from everyday to extraordinary.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.harveynichols.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Harvey Nichols","keywords":"Harvey, Nichols, stores, fashion, opened, luxury, beauty, offer","description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:title":"Harvey Nichols","og:description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:image":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg"},"eventUrl":""},"supplier":{"id":2947,"title":"Bytes Technology Group UK","logoURL":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png","alias":"bytes-technology-group-uk","address":"","roles":[],"description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\n\r\nBytes is part of the £2bn Altron Group. Our UK business began in 1982 and has grown profitably each year to reach a turnover in excess of £194m in FY2015, making us one of the largest software services and solutions businesses in the country.\r\n\r\nThe most important aspect of our business is our people. We value initiative, teamwork and achievement. Together, we focus on providing the highest levels of service so we can deliver our ultimate goal – your satisfaction.\r\n\r\nOur customers include leading brands, such as Marks & Spencer, BBC, Specsavers, NHS, Clifford Chance, BUPA, United Utilities, Hiscox, Allen & Overy LLP and thousands more across retail, media, finance, manufacturing, legal, the NHS and the public sector.\r\n\r\nWe also work closely with the majority of IT vendors and are delighted to have received honours, including Microsoft Worldwide Partner of the Year Winner three times in four years, and CheckPoint European Partner of the Year, to name a few of our recent awards.\r\n\r\nNeed to know more? Please explore our website and get in touch with any questions. We'll be delighted to help.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.bytes.co.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Bytes Technology Group UK","keywords":"Bytes, Group, with, business, Partner, more, delighted, Year","description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:title":"Bytes Technology Group UK","og:description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:image":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png"},"eventUrl":""},"vendors":[{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":""}],"products":[{"id":499,"logo":false,"scheme":false,"title":"Juniper Networks IDP Series","vendorVerified":0,"rating":"1.80","implementationsCount":2,"suppliersCount":0,"alias":"juniper-networks-idp-series","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Stateful signature</span>\r\nThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.\r\n<span style=\"font-weight: bold;\">Protocol anomaly</span>\r\nThe IDP rulebase attack objects detect protocol usages that violate published RFCs. This method protects your network from undiscovered vulnerabilities.\r\n<span style=\"font-weight: bold;\">Traffic anomaly</span>\r\nThe Traffic Anomalies rulebase uses heuristic rules to detect unexpected traffic patterns that might indicate reconnaissance or attacks. This method blocks distributed denial-of-service (DDoS) attacks and prevents reconnaissance activities.\r\n<span style=\"font-weight: bold;\">Backdoor</span>\r\nThe Backdoor rulebase uses heuristic-based anomalous traffic patterns and packet analysis to detect Trojans and rootkits. These methods prevent proliferation of malware in case other security measures have been compromised.\r\n<span style=\"font-weight: bold;\">IP spoofing</span>\r\nThe IDP appliance checks the validity of allowed addresses inside and outside the network, permitting only authentic traffic and blocking traffic with a disguised source.\r\n<span style=\"font-weight: bold;\">Layer 2 attacks</span>\r\nThe IDP appliance prevents Layer 2 attacks using rules for Address Resolution Protocol (ARP) tables, fragment handling, connection timeouts, and byte/length thresholds for packets. These methods prevent a compromised host from polluting an internal network using methods such as ARP cache poisoning.\r\n<span style=\"font-weight: bold;\">Denial of service (DoS)</span>\r\nThe SYN Protector rulebase provides two, alternative methods to prevent SYN-flood attacks.\r\n<span style=\"font-weight: bold;\">Network honeypot</span>\r\nThe IDP appliance impersonates vulnerable ports so you can track attacker reconnaissance activity.","shortDescription":"Juniper Networks IDP Series Intrusion Detection and Prevention Appliances.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Series","keywords":"attacks, rulebase, traffic, methods, method, detect, network, reconnaissance","description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.","og:title":"Juniper Networks IDP Series","og:description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives."},"eventUrl":"","translationId":499,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":281,"title":"No IT security guidelines"}]}},"categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.bytes.co.uk/application/files/4914/7144/0532/Harvey_Nichols_PFD.pdf","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":441,"title":"Juniper Next-Generation Firewall (NGFW) for online shop customers security","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Privalia’s customers have been growing rapidly in numbers, and the need for a robust, always-on solution led this e-commerce retailer to upgrade its Juniper network and security platforms across core data center and warehouse operations.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“The way Juniper’s system splits its data and control planes is very appealing. When we implemented policy-based forwarding on our switches, other vendors’ equipment performance dropped off sharply, whereas Juniper’s just kept working.”- </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Donato Diaz, IT Network Architect, Privalia</span></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Overview</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Privalia is a fast growing e-commerce retailer that has attracted more than six million users since its founding in 2007. As a private shopping club, its members have access to high-end brands at bargain prices. Based in Barcelona, Spain, it has expanded its operations to include Brazil, Mexico, Italy, and Germany.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Challenge</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Privalia needed a network that would scale to support hundreds of thousands of customers simultaneously accessing its systems, with peak demands reaching up to three times that during successful sales campaigns. Privalia also wanted to upgrade its security and monitoring capabilities to give greater visibility into and control over the applications and traffic running on its network.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Solution</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Privalia evaluated and stress-tested several alternative solutions before choosing Juniper Networks as the best fit for its needs. Experts at local Juniper partner Seidor supported the upgrade, and the migration to the new platforms was completely transparent to Privalia’s customers.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Results</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">What matters most to Privalia is that its customers continue to experience a service where the Web platform and e-commerce applications are always available, from any location and at any time of day, regardless of demand.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“We push the Juniper equipment well beyond its specified limits but, in over three years, we haven’t even needed to reboot it. If we were to start the project over again, we wouldn’t change anything,” said IT Network Architect Donato Diaz.</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; white-space: pre;\">\t</span></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; text-decoration-line: underline;\">How we put it together</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">SRX Series Firewalls</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">High-performance network security with advanced integrated threat intelligence, delivered on the industry's most scalable and resilient platform.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">EX Series</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">High-performance carrier-class Ethernet switches for converged enterprise branch offices, campuses, and data centers, and for service provider deployments.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">AppSecure</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Software that delivers application visibility through identification and classification from within SRX Series Services Gateways.</span>","alias":"juniper-next-generation-firewall-ngfw-for-online-shop-customers-security","roi":0,"seo":{"title":"Juniper Next-Generation Firewall (NGFW) for online shop customers security","keywords":"Privalia, Juniper, that, customers, network, security, data, over","description":"Privalia’s customers have been growing rapidly in numbers, and the need for a robust, always-on solution led this e-commerce retailer to upgrade its Juniper","og:title":"Juniper Next-Generation Firewall (NGFW) for online shop customers security","og:description":"Privalia’s customers have been growing rapidly in numbers, and the need for a robust, always-on solution led this e-commerce retailer to upgrade its Juniper"},"deal_info":"","user":{"id":4208,"title":"Privalia","logoURL":"https://old.b4r.io/uploads/roi/company/Privalia.png","alias":"privalia","address":"","roles":[],"description":"Privalia is the leading online-fashion outlet, created in 2006 in Barcelona as an online shop, offering daily sales of products from top brands at exceptional prices and exclusively to its customers. According to this, our mission is to inspire people every day to feel better and save money. \r\n ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.privalia.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Privalia","keywords":"Privalia, every, feel, people, inspire, exceptional, this, According","description":"Privalia is the leading online-fashion outlet, created in 2006 in Barcelona as an online shop, offering daily sales of products from top brands at exceptional","og:title":"Privalia","og:description":"Privalia is the leading online-fashion outlet, created in 2006 in Barcelona as an online shop, offering daily sales of products from top brands at exceptional","og:image":"https://old.b4r.io/uploads/roi/company/Privalia.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":""}],"products":[{"id":1443,"logo":false,"scheme":false,"title":"Juniper Next-Generation Firewall (NGFW)","vendorVerified":0,"rating":"2.20","implementationsCount":3,"suppliersCount":0,"alias":"juniper-next-generation-firewall-ngfw","companyTypes":[],"description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your organization’s defenses. <span style=\"font-weight: bold;\">Identifying Application Risks</span> Juniper AppSecure, an NFGW Services component, is a suite of services that provides deep application visibility and control in your network:\r\n<ul>\r\n<li>AppTrack identifies applications on the network to assess their security risk and address user behavior. Contextual information helps you gain insight into which applications are permitted and the risk they may pose.</li>\r\n<li>AppFW provides policy-based enforcement and control, blocking access to high-risk applications and enforcing user-defined policies. Reports on application bandwidth usage deliver further insight, and you can throttle any application traffic not sanctioned by the enterprise.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Protection from Network Borne Attacks</span> Juniper Intrusion Prevention System (IPS) and Sky Advanced Threat Prevention (ATP) work together to provide comprehensive threat detection and protection against known and unknown threats that use the network as an attack vector. The capabilities provide immediate protection from malicious malware. Continual monitoring for new exploits and vulnerabilities keeps protection up to date. The system immediately blocks threats on client and server systems inline before damage can take place. <span style=\"font-weight: bold;\">Safeguards Against Malware</span> Although modern cyber criminals favor today’s sophisticated, turnkey techniques, they have not abandoned the tried and true approach of tucking malware into signature-based viruses and volume-based email. Integrated with our SRX platforms, Sophos Live Protection combines cloud-based reputation intelligence with on-box horsepower to deliver lightweight and fast security. <span style=\"font-weight: bold;\">Web Browsing Defense</span> The Web is full of deception designed to get unsuspecting users to click on malicious links that might install advanced malware. Attackers regularly compromise websites by tricking users into providing their user credentials. Juniper has partnered with Forcepoint to provide URL filtering that fights such attacks. The service is constantly and globally updated in real time to provide an always-current worldwide database of malicious URLs that protect against user compromise. <span style=\"font-weight: bold;\">Avoiding Unauthorized Access and Use</span> Every user in an enterprise must be able to access certain applications to perform specific tasks. But allowing users unlimited access to corporate resources outside their sphere of responsibility can enable the proliferation of insider threats. Our User Firewall service restricts application usage on a per-user basis by tightly integrating with Microsoft Active Directory (AD) and the Lightweight Directory Access Protocol (LDAP). As a result, you gain visibility and control of application and network use segmented by user-defined roles, enabling secure access to authorized applications. <span style=\"font-weight: bold;\">Features</span> <span style=\"font-weight: bold;\">Advanced Application Visibility and Control</span> You can identify applications running on your network regardless of port, protocol, and encryption. This visibility lets you immediately block evasive applications inline at the SRX firewall. <span style=\"font-weight: bold;\">Nested Application Support</span> You can accurately identify applications embedded in common network protocols such as HTTP or HTTPS traffic. This capability also provides visibility into and granular control over applications hidden inside encrypted SSL traffic. <span style=\"font-weight: bold;\">User and Role-Based Policies</span> Tight integration with Microsoft AD and LDAP allow you to set and enforce user- and role-based security policies. Policy setting becomes simpler and more secure, because you reduce the number of policies needed to account for user location, IP address, and so on. <span style=\"font-weight: bold;\">SSL Inspection</span> Inline decryption and inspection of inbound and outbound Secure Sockets Layer (SSL) connections at the SRX firewall provide visibility and protection against threats embedded in SSL encrypted traffic. <span style=\"font-weight: bold;\">Junos OS Integration</span> Integration with Juniper’s operating system consolidates and optimizes services on SRX devices for maximum scale.","shortDescription":"Juniper Next-Generation Firewall (NGFW) Services provide an array of cyber defenses to reduce your attack surface in this challenging environment.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Next-Generation Firewall (NGFW)","keywords":"applications, with, network, that, visibility, application, user, provide","description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your","og:title":"Juniper Next-Generation Firewall (NGFW)","og:description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your"},"eventUrl":"","translationId":1444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":4,"title":"Reduce Costs"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":384,"title":"Risk of attacks by hackers"}]}},"categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.juniper.net/uk/en/company/case-studies/enterprise/privalia/","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":443,"title":"Juniper Next-Generation Firewall (NGFW) for software company","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Hyland places a priority on collaboration and using digital tools to serve customers better. Legacy firewall performance issues and complexity were impeding its goals.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“The advanced command-and-control botnet detection is an extra layer of security. We love that part of the SRX.”-</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Hitesh Patel, Security Lead, Hyland</span></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Overview</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Based in Ohio, Hyland develops OnBase enterprise management software used by large healthcare providers, banks, and government agencies. A rapidly growing, increasingly global organization, Hyland needs a secure network with reliable connectivity and protection against threats that can disrupt business or compromise data.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Challenge</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The company’s firewalls couldn’t keep pace with employees’ growing use of collaboration tools, streaming media, and cloud applications. Performance issues disrupted business on a weekly basis. Managing firewall policies was labor intensive and time consuming. Hyland not only wanted to reduce the failure points to the Internet, but also strengthen its defenses against cyberattacks.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Technology Solution</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Hyland built a mesh VPN using SRX Series firewalls, including the SRX5400 in its data center, SRX1500 in regional offices, and SRX300 and SRX220 in local offices. Hyland manages firewall security policies using a centralized console on Junos Space Security Director. Threat intelligence is distributed to enforcement points through Security Director using Spotlight Secure Connector.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Results</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Using Juniper solutions has allowed Hyland to eliminate firewall performance disruptions, improve network availability, and reduce maintenance windows. Zone-based security and automated firewall configuration backup simplify security management, and advanced intelligence and botnet protection keep threats at bay. The 10-Gbps network will scale as the company grows.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“Using Juniper has allowed us to more reliably service partners and customers and grow as a software company. We can’t showcase our products if there are connectivity issues.”-</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Steven Watt, Network Administrator, Hyland</span></span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; white-space: pre;\">\t</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; text-decoration-line: underline;\">How we put it together</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">SRX Firewall</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">High-performance network security with advanced integrated threat intelligence, delivered on the industry’s most scalable and resilient platform.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Junos Space Security Director</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Security management for centralized policy control across physical and virtual SRX Series firewall services.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Spotlight Secure</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Integrated real-time threat intelligence to detect and block advanced threats at the firewall.</span>","alias":"juniper-next-generation-firewall-ngfw-for-software-company","roi":0,"seo":{"title":"Juniper Next-Generation Firewall (NGFW) for software company","keywords":"Hyland, firewall, security, Security, advanced, using, intelligence, network","description":"Hyland places a priority on collaboration and using digital tools to serve customers better. Legacy firewall performance issues and complexity were impeding","og:title":"Juniper Next-Generation Firewall (NGFW) for software company","og:description":"Hyland places a priority on collaboration and using digital tools to serve customers better. Legacy firewall performance issues and complexity were impeding"},"deal_info":"","user":{"id":4210,"title":"Hyland Software","logoURL":"https://old.b4r.io/uploads/roi/company/Hyland_Software.png","alias":"hyland-software","address":"","roles":[],"description":"We are a software company that thrives on new ideas and diverse perspectives. Since 1991, it’s been our mission to help our employees, customers and partners exceed their potential. We believe Hylanders can accomplish anything when they have the freedom to innovate, be creative and embrace the future. That, and an intense dedication to our core values, is what our award-winning software is built on.\r\n ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.hyland.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hyland Software","keywords":"software, innovate, have, freedom, creative, they, when, anything","description":"We are a software company that thrives on new ideas and diverse perspectives. Since 1991, it’s been our mission to help our employees, customers and partners","og:title":"Hyland Software","og:description":"We are a software company that thrives on new ideas and diverse perspectives. Since 1991, it’s been our mission to help our employees, customers and partners","og:image":"https://old.b4r.io/uploads/roi/company/Hyland_Software.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":""}],"products":[{"id":1443,"logo":false,"scheme":false,"title":"Juniper Next-Generation Firewall (NGFW)","vendorVerified":0,"rating":"2.20","implementationsCount":3,"suppliersCount":0,"alias":"juniper-next-generation-firewall-ngfw","companyTypes":[],"description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your organization’s defenses. <span style=\"font-weight: bold;\">Identifying Application Risks</span> Juniper AppSecure, an NFGW Services component, is a suite of services that provides deep application visibility and control in your network:\r\n<ul>\r\n<li>AppTrack identifies applications on the network to assess their security risk and address user behavior. Contextual information helps you gain insight into which applications are permitted and the risk they may pose.</li>\r\n<li>AppFW provides policy-based enforcement and control, blocking access to high-risk applications and enforcing user-defined policies. Reports on application bandwidth usage deliver further insight, and you can throttle any application traffic not sanctioned by the enterprise.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Protection from Network Borne Attacks</span> Juniper Intrusion Prevention System (IPS) and Sky Advanced Threat Prevention (ATP) work together to provide comprehensive threat detection and protection against known and unknown threats that use the network as an attack vector. The capabilities provide immediate protection from malicious malware. Continual monitoring for new exploits and vulnerabilities keeps protection up to date. The system immediately blocks threats on client and server systems inline before damage can take place. <span style=\"font-weight: bold;\">Safeguards Against Malware</span> Although modern cyber criminals favor today’s sophisticated, turnkey techniques, they have not abandoned the tried and true approach of tucking malware into signature-based viruses and volume-based email. Integrated with our SRX platforms, Sophos Live Protection combines cloud-based reputation intelligence with on-box horsepower to deliver lightweight and fast security. <span style=\"font-weight: bold;\">Web Browsing Defense</span> The Web is full of deception designed to get unsuspecting users to click on malicious links that might install advanced malware. Attackers regularly compromise websites by tricking users into providing their user credentials. Juniper has partnered with Forcepoint to provide URL filtering that fights such attacks. The service is constantly and globally updated in real time to provide an always-current worldwide database of malicious URLs that protect against user compromise. <span style=\"font-weight: bold;\">Avoiding Unauthorized Access and Use</span> Every user in an enterprise must be able to access certain applications to perform specific tasks. But allowing users unlimited access to corporate resources outside their sphere of responsibility can enable the proliferation of insider threats. Our User Firewall service restricts application usage on a per-user basis by tightly integrating with Microsoft Active Directory (AD) and the Lightweight Directory Access Protocol (LDAP). As a result, you gain visibility and control of application and network use segmented by user-defined roles, enabling secure access to authorized applications. <span style=\"font-weight: bold;\">Features</span> <span style=\"font-weight: bold;\">Advanced Application Visibility and Control</span> You can identify applications running on your network regardless of port, protocol, and encryption. This visibility lets you immediately block evasive applications inline at the SRX firewall. <span style=\"font-weight: bold;\">Nested Application Support</span> You can accurately identify applications embedded in common network protocols such as HTTP or HTTPS traffic. This capability also provides visibility into and granular control over applications hidden inside encrypted SSL traffic. <span style=\"font-weight: bold;\">User and Role-Based Policies</span> Tight integration with Microsoft AD and LDAP allow you to set and enforce user- and role-based security policies. Policy setting becomes simpler and more secure, because you reduce the number of policies needed to account for user location, IP address, and so on. <span style=\"font-weight: bold;\">SSL Inspection</span> Inline decryption and inspection of inbound and outbound Secure Sockets Layer (SSL) connections at the SRX firewall provide visibility and protection against threats embedded in SSL encrypted traffic. <span style=\"font-weight: bold;\">Junos OS Integration</span> Integration with Juniper’s operating system consolidates and optimizes services on SRX devices for maximum scale.","shortDescription":"Juniper Next-Generation Firewall (NGFW) Services provide an array of cyber defenses to reduce your attack surface in this challenging environment.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Next-Generation Firewall (NGFW)","keywords":"applications, with, network, that, visibility, application, user, provide","description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your","og:title":"Juniper Next-Generation Firewall (NGFW)","og:description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your"},"eventUrl":"","translationId":1444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":4,"title":"Reduce Costs"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":385,"title":"Risk of data loss or damage"},{"id":384,"title":"Risk of attacks by hackers"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.juniper.net/us/en/company/case-studies/enterprise/hyland/","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":442,"title":"Juniper Next-Generation Firewall (NGFW) to deliver enterprise applications faster and with customized security","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Secure-24 tailors its hosting services to individual customer requirements. With virtual firewalls, it found it could deploy and change services faster while also reducing risk.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“With a lot of other vendors, you have to sacrifice performance for virtualization. The vSRX truly had the performance to meet our clients’ needs.”- </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Sean Donaldson, CTO, Secure-24</span></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Overview</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Based in Michigan, Secure-24 serves multitenant customers with managed cloud, application hosting, and other mission-critical services. Network automation and security virtualization have simplified its operations across multiple data centers in two states and are critical to its business continuity and disaster recovery services.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Challenge</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The hosting company sought to reduce risk while speeding up the delivery of its mission-critical services, which it tailors to customers’ individual security and compliance requirements. While Secure-24 knew virtualization technology was likely the answer, it was apprehensive about how network performance would compare with physical firewalls.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Technology Solution</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Juniper vSRX, the industry’s fastest firewall, features the same performance as its SRX Series physical counterparts, with speeds that scale to 100 Gbps with 12 virtual CPUs. Secure-24 also uses Junos Space for management and Juniper’s AppSecure, a suite of threat visibility, enforcement, control, and protection tools for the vSRX.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Results</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Using Juniper solutions has allowed Secure-24 to deliver enterprise applications faster and with customized security, helping each customer quickly meet its changing compliance requirements. Automation and virtualization have given the company greater agility and competitiveness, because it can now operate more efficiently as its business continues to grow.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“Automation allows us to deploy a new customer environment in hours instead of weeks.”- </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Nick Ilitch, VP of Products, Secure-24</span></span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; white-space: pre;\">\t</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; text-decoration-line: underline;\">How we put it together</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">vSRX Virtual Firewall</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">High-performance network security in a virtual form factor with advanced, integrated threat intelligence.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Junos Space Security Director</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Security management for centralized policy control across physical and virtual SRX Series firewall services.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">AppSecure</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Security suite for SRX Series Services Gateways that delivers threat visibility, enforcement, control, and protection over the network.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Junos Space SDK</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Development tools for creating custom analytic and management applications for the Junos Space Network Management Platform.</span>","alias":"juniper-next-generation-firewall-ngfw-to-deliver-enterprise-applications-faster-and-with-customized-security","roi":0,"seo":{"title":"Juniper Next-Generation Firewall (NGFW) to deliver enterprise applications faster and with customized security","keywords":"Secure-24, with, services, security, Space, virtual, Junos, performance","description":"Secure-24 tailors its hosting services to individual customer requirements. With virtual firewalls, it found it could deploy and change services faster while","og:title":"Juniper Next-Generation Firewall (NGFW) to deliver enterprise applications faster and with customized security","og:description":"Secure-24 tailors its hosting services to individual customer requirements. With virtual firewalls, it found it could deploy and change services faster while"},"deal_info":"","user":{"id":4209,"title":"Secure-24","logoURL":"https://old.b4r.io/uploads/roi/company/Secure-24.png","alias":"secure-24","address":"","roles":[],"description":"Headquartered in Southfield, Michigan, Secure-24, since 2001,has been delivering managed IT operations, application hosting and comprehensive managed cloud services to enterprises worldwide. We are an Oracle Platinum Partner, and an SAP-certified Hosting and Cloud partner. We manage applications including SAP, Oracle E-Business Suite, PeopleSoft, JD Edwards and Hyperion across all industries for businesses of every size.\r\n ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.secure-24.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Secure-24","keywords":"Secure-24, managed, Oracle, 2001, partner, manage, applications, including","description":"Headquartered in Southfield, Michigan, Secure-24, since 2001,has been delivering managed IT operations, application hosting and comprehensive managed cloud","og:title":"Secure-24","og:description":"Headquartered in Southfield, Michigan, Secure-24, since 2001,has been delivering managed IT operations, application hosting and comprehensive managed cloud","og:image":"https://old.b4r.io/uploads/roi/company/Secure-24.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":""}],"products":[{"id":1443,"logo":false,"scheme":false,"title":"Juniper Next-Generation Firewall (NGFW)","vendorVerified":0,"rating":"2.20","implementationsCount":3,"suppliersCount":0,"alias":"juniper-next-generation-firewall-ngfw","companyTypes":[],"description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your organization’s defenses. <span style=\"font-weight: bold;\">Identifying Application Risks</span> Juniper AppSecure, an NFGW Services component, is a suite of services that provides deep application visibility and control in your network:\r\n<ul>\r\n<li>AppTrack identifies applications on the network to assess their security risk and address user behavior. Contextual information helps you gain insight into which applications are permitted and the risk they may pose.</li>\r\n<li>AppFW provides policy-based enforcement and control, blocking access to high-risk applications and enforcing user-defined policies. Reports on application bandwidth usage deliver further insight, and you can throttle any application traffic not sanctioned by the enterprise.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Protection from Network Borne Attacks</span> Juniper Intrusion Prevention System (IPS) and Sky Advanced Threat Prevention (ATP) work together to provide comprehensive threat detection and protection against known and unknown threats that use the network as an attack vector. The capabilities provide immediate protection from malicious malware. Continual monitoring for new exploits and vulnerabilities keeps protection up to date. The system immediately blocks threats on client and server systems inline before damage can take place. <span style=\"font-weight: bold;\">Safeguards Against Malware</span> Although modern cyber criminals favor today’s sophisticated, turnkey techniques, they have not abandoned the tried and true approach of tucking malware into signature-based viruses and volume-based email. Integrated with our SRX platforms, Sophos Live Protection combines cloud-based reputation intelligence with on-box horsepower to deliver lightweight and fast security. <span style=\"font-weight: bold;\">Web Browsing Defense</span> The Web is full of deception designed to get unsuspecting users to click on malicious links that might install advanced malware. Attackers regularly compromise websites by tricking users into providing their user credentials. Juniper has partnered with Forcepoint to provide URL filtering that fights such attacks. The service is constantly and globally updated in real time to provide an always-current worldwide database of malicious URLs that protect against user compromise. <span style=\"font-weight: bold;\">Avoiding Unauthorized Access and Use</span> Every user in an enterprise must be able to access certain applications to perform specific tasks. But allowing users unlimited access to corporate resources outside their sphere of responsibility can enable the proliferation of insider threats. Our User Firewall service restricts application usage on a per-user basis by tightly integrating with Microsoft Active Directory (AD) and the Lightweight Directory Access Protocol (LDAP). As a result, you gain visibility and control of application and network use segmented by user-defined roles, enabling secure access to authorized applications. <span style=\"font-weight: bold;\">Features</span> <span style=\"font-weight: bold;\">Advanced Application Visibility and Control</span> You can identify applications running on your network regardless of port, protocol, and encryption. This visibility lets you immediately block evasive applications inline at the SRX firewall. <span style=\"font-weight: bold;\">Nested Application Support</span> You can accurately identify applications embedded in common network protocols such as HTTP or HTTPS traffic. This capability also provides visibility into and granular control over applications hidden inside encrypted SSL traffic. <span style=\"font-weight: bold;\">User and Role-Based Policies</span> Tight integration with Microsoft AD and LDAP allow you to set and enforce user- and role-based security policies. Policy setting becomes simpler and more secure, because you reduce the number of policies needed to account for user location, IP address, and so on. <span style=\"font-weight: bold;\">SSL Inspection</span> Inline decryption and inspection of inbound and outbound Secure Sockets Layer (SSL) connections at the SRX firewall provide visibility and protection against threats embedded in SSL encrypted traffic. <span style=\"font-weight: bold;\">Junos OS Integration</span> Integration with Juniper’s operating system consolidates and optimizes services on SRX devices for maximum scale.","shortDescription":"Juniper Next-Generation Firewall (NGFW) Services provide an array of cyber defenses to reduce your attack surface in this challenging environment.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Next-Generation Firewall (NGFW)","keywords":"applications, with, network, that, visibility, application, user, provide","description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your","og:title":"Juniper Next-Generation Firewall (NGFW)","og:description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your"},"eventUrl":"","translationId":1444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":4,"title":"Reduce Costs"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":384,"title":"Risk of attacks by hackers"}]}},"categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.juniper.net/uk/en/company/case-studies/service-provider/secure-24/","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":114,"title":"Juniper QFX коммутаторы для Интернет-провайдера","description":"Компания ITbiz Solutions выступила партнером проекта по модернизации ядра сети компании Укрдатаком (Rusanovka-Net) — одного из крупнейших интернет-провайдеров в Киеве.\r\n\r\nДля реализации проекта по развитию сети и инвестициях в качество предоставляемых услуг предшествовал полный аудит сетевой инфраструктуры и разработка плана поэтапной миграции сетевых сервисов на новое оборудование, также компания ITbiz предоставила полную сервисную поддержку.\r\n\r\nОсновой модернизации послужило решение на базе оборудования Juniper QFX5100-96S для обеспечения максимальной эффективности работы ядра сети. Серия QFX5100 является универсальной основой для построения коммутационной архитектуры дата-центров и уровня дистрибуции для интернет-провайдеров за счет широкого спектра опций развертывания. Также QFX5100 позволяет легко адаптировать сеть под изменяющиеся потребности.\r\n\r\nrusanovkaПроизведенная модернизация позволяет многократно увеличить, как абонентскую базу, так и пропускную способность каналов. Широкие коммуникационные возможности нового оборудования способствуют росту связности (общей доступности) сети компании Укрдатаком, включению в новые точки обмена трафиком, организации пиринга с другими операторами.\r\n\r\n«За счет функционала Unified Forwarding Table, который позволяет эффективно управлять ресурсами, мы можем настроить Juniper QFX5100-96S под свои нужды, отдать приоритет L2 или L3 функционалу. На сегодняшний день высокопроизводительный, гибкий в настройках коммутатор выполняет функции граничного маршрутизатора (Border Router) для подключения паритетных каналов. За счет большой плотности интерфейсов, коммутатор агрегирует множество физических линков к паритетным операторам на одном устройстве, поверх которых поднимаются полноценные eBGP сессии. Также, коммутатор выступает в роли связующего звена для сегментов сети, что очень важно для нас. Благодарим компанию ITbiz за конструктивное сотрудничество и оперативность принимаемых решений. Всегда приятно работать с профессионалами, которые понимают твои потребности и могут в кратчайшие сроки подобрать и внедрить необходимое оборудование»,- комментирует Дмитрий Татаринов, технический консультант компании Укрдатаком.","alias":"juniper-qfx-kommutatory-dlja-internet-provaidera","roi":0,"seo":{"title":"Juniper QFX коммутаторы для Интернет-провайдера","keywords":"сети, коммутатор, позволяет, счет, ITbiz, Juniper, компании, Укрдатаком","description":"Компания ITbiz Solutions выступила партнером проекта по модернизации ядра сети компании Укрдатаком (Rusanovka-Net) — одного из крупнейших интернет-провайдеров","og:title":"Juniper QFX коммутаторы для Интернет-провайдера","og:description":"Компания ITbiz Solutions выступила партнером проекта по модернизации ядра сети компании Укрдатаком (Rusanovka-Net) — одного из крупнейших интернет-провайдеров"},"deal_info":"","user":{"id":2936,"title":"Rusanovka-Net","logoURL":"https://old.b4r.io/uploads/roi/company/Rusanovka-Net.png","alias":"rusanovka-net","address":"","roles":[],"description":"The company \"Rusanovka-Net\" works in the market of telecommunication services since 2000 and provides services to Kiev districts (Ukraine): Rusanivka, Left Bank and the array Nikolskaya Slobodka, including the Internet, television, telephony. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://rusanovka-net.kiev.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Rusanovka-Net","keywords":"services, Rusanovka-Net, Bank, Left, Ukraine, Rusanivka, Nikolskaya, television","description":"The company \"Rusanovka-Net\" works in the market of telecommunication services since 2000 and provides services to Kiev districts (Ukraine): Rusanivka, Left","og:title":"Rusanovka-Net","og:description":"The company \"Rusanovka-Net\" works in the market of telecommunication services since 2000 and provides services to Kiev districts (Ukraine): Rusanivka, Left","og:image":"https://old.b4r.io/uploads/roi/company/Rusanovka-Net.png"},"eventUrl":""},"supplier":{"id":2934,"title":"ITbiz Solutions","logoURL":"https://old.b4r.io/uploads/roi/company/ITbiz_Solutions.png","alias":"itbiz-solutions","address":"","roles":[],"description":"ITbiz Solutions\r\nIn the market of system integration we work since 2007 and during that time have accumulated a lot of experience in implementing complex projects, both in the construction / modernization of network infrastructure and management systems, and information security for key Internet providers, data centers, enterprises, energy and oil and gas industry, banking, government and industrial organizations, the media and television companies.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://itbiz.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ITbiz Solutions","keywords":"ITbiz, Solutions, Internet, providers, data, management, information, centers","description":"ITbiz Solutions\rIn the market of system integration we work since 2007 and during that time have accumulated a lot of experience in implementing complex","og:title":"ITbiz Solutions","og:description":"ITbiz Solutions\rIn the market of system integration we work since 2007 and during that time have accumulated a lot of experience in implementing complex","og:image":"https://old.b4r.io/uploads/roi/company/ITbiz_Solutions.png"},"eventUrl":""},"vendors":[{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":""}],"products":[{"id":488,"logo":false,"scheme":false,"title":"Juniper QFX коммутаторы","vendorVerified":0,"rating":"2.10","implementationsCount":2,"suppliersCount":0,"alias":"juniper-qfx-kommutatory","companyTypes":[],"description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для нескольких архитектур ткани центров обработки данных.\r\nQFX5200 коммутаторы фиксированной конфигурации предлагают гибкие варианты подключения, от 10GbE к 100GbE. \r\nВ QFX10000 коммутаторы с высокой масштабируемостью, высокой плотностью платформ, которые поддерживают различные развертывания 10GbE / 40GbE / 100GbE, обеспечивая прочную основу для самых требовательных центров обработки данных.","shortDescription":"Коммутаторы Juniper серии QFX являются высокопроизводительными, с платформой высокой плотности, удовлетворяют потребности самых требовательных корпоративных сред. Предназначен для топ-стойки для развертывания в современных центрах обработки данных, коммутаторы QFX серии могут быть развернуты с доступом 10GbE, 40GbE, 100GbE","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper QFX коммутаторы","keywords":"коммутаторы, 10GbE, которые, 40GbE, данных, высокой, 100GbE, центров","description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для","og:title":"Juniper QFX коммутаторы","og:description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для"},"eventUrl":"","translationId":2393,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":56,"title":"Router","alias":"router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":5,"title":"Enhance Staff Productivity"},{"id":7,"title":"Improve Customer Service"},{"id":252,"title":"Increase Customer Base"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":177,"title":"Decentralized IT systems"}]}},"categories":[{"id":56,"title":"Router","alias":"router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://itbiz.ua/kompaniya-itbiz-vyistupila-partnerom-proekta-po-modernizaczii-seti-kompanii-ukrdatakom","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":113,"title":"Juniper QFX коммутаторы для оператора Интернет связи","description":"Компания ITbiz Solutions выступила реализатором проекта, предоставив коммутатор Juniper QFX3500 и полную техническую поддержку по модернизации сети компании «Максимум – Нет» — ведущего регионального оператора связи. В связи с динамичным ростом и развитием компании «Максимум-Нет», существующая на момент реализации проекта инфраструктура сети (по предоставлению услуг доступа к сети Интернет, телевидения и построения сетей передачи данных) перестала удовлетворять нужды компании. Основными требованиями к новой backbone-сети, стали: низкое время сходимости при аварии, большое количество MAC-адресов (128К на шасси), 100% резервирование control plane и data plane. Решение Juniper QFX3500 Juniper QFX3500 высокопроизводительный коммутатор, который обеспечивает подключение к сети серверов, традиционных систем хранения данных или виртуальных дата-центров. Несмотря на то, что QFX 3500 позиционируется как коммутатор, компания остановила свой выбор спираясь на технолгию virtual-chassis. Коммутатор является высокопроизводительным и многофункциональным решением уровня L2 и L3 с очень малой задержкой, которое может поддерживать большое количество сценариев развертывания, включая традиционные и виртуальные центры обработки данных, высокопроизводительные вычисления, сетевые системы хранения данных, конвергентные серверные системы ввода-вывода и облачные вычисления. Результаты и преимущества проекта Коммутаторы Juniper QFX были установлены на территориально разнесенных площадках заказчика и были объединены в единое шасси Virtual Chassis Technology (одно логическое устройство). На сети заказчика, функциональная роль, которую выполняет внедренное решение – центральный коммутатор дистрибуции backbone- сети. Основными преимуществами данной схемы являются:\r\nВысокая масштабируемость: за счет большой плотности 10Gbe (48 SFP+/SFP портов) портов появилась возможность наращивать пропускную способность сети, подключать новые коммутаторы и предоставлять новые услуги.\r\nОтказоустойчивость: уход от использования технологии STP позволил значительно ускорить сходимость сети при аварийных ситуациях, время сходимости составило 50 мс. Использование Virtual Chassis Technology позволяет гибко управлять всеми устройствами, состоящими в шасси, распределять ресурсы и быстро вносить требуемые изменения в конфигурацию.\r\nУвеличение производительности: backplane 1.28 Tbps и коммутация на скорости до 960 Mpps для высокоскоростных приложений с минимальной задержкой. Все порты коммутатора могут работать без ограничений по скорости на L2 и L3 уровне модели OSI в режимах cut-through и store-and-forward. QFX3500 имеет большую таблицу MAC-адресов, что позволяет ему без проблем обслуживать крупные сети.\r\n«Одним из главных преимуществ компании ITbiz — это оперативно решать поставленные бизнес-задачи в кратчайшие сроки. Поэтому решение о выборе компании партнера и о внедрении Juniper QFX3500 для модернизации сети нашей компании было абсолютно обосновано. На сегодняшний день на рынке не так много решений, которые позволяют собрать большое количество 10G интерфейсов в 1U-устройстве. Virtual Chassis из QFX’ов — это опорная L2 сеть, в которую включены где-то бордеры, брасы, а где-то межоператорские стыки. При этом она одновременно и масштабируема по пропускной способности, и сама по себе отказоустойчива с временем сходимости 50 мс. А для развития сети можно отдать приоритет L3 функционалу», — комментирует Алимов Вадим Анатольевич, CIO (технический директор) компании «Максимум-Нет». На территории Украины официальным реселлером продуктов компании Junipers Networks является компания ITbiz. Компания ITbiz— ведущий системный интегратор специализированых аппаратных решений на IT рынке Украины. В портфель компании входят такие известные мировые производители, как Juniper Networks, Extreme, Arbor Networks, FireEye, Ruggedcom, Barco, и др.","alias":"juniper-qfx-kommutatory-dlja-operatora-internet-svjazi","roi":0,"seo":{"title":"Juniper QFX коммутаторы для оператора Интернет связи","keywords":"сети, компании, Juniper, QFX3500, коммутатор, данных, Networks, количество","description":"Компания ITbiz Solutions выступила реализатором проекта, предоставив коммутатор Juniper QFX3500 и полную техническую поддержку по модернизации сети компании","og:title":"Juniper QFX коммутаторы для оператора Интернет связи","og:description":"Компания ITbiz Solutions выступила реализатором проекта, предоставив коммутатор Juniper QFX3500 и полную техническую поддержку по модернизации сети компании"},"deal_info":"","user":{"id":2935,"title":"Maximum-net","logoURL":"https://old.b4r.io/uploads/roi/company/Maksimum-Net.jpg","alias":"maksimum-net","address":"","roles":[],"description":"Regional telecom operator \"Maximum-Net\" provides access to the Internet, television, and construction of data transmission networks in Ukraine","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.maximuma.net/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Maximum-net","keywords":"construction, data, transmission, networks, television, Ukraine, operator, telecom","description":"Regional telecom operator \"Maximum-Net\" provides access to the Internet, television, and construction of data transmission networks in Ukraine","og:title":"Maximum-net","og:description":"Regional telecom operator \"Maximum-Net\" provides access to the Internet, television, and construction of data transmission networks in Ukraine","og:image":"https://old.b4r.io/uploads/roi/company/Maksimum-Net.jpg"},"eventUrl":""},"supplier":{"id":2934,"title":"ITbiz Solutions","logoURL":"https://old.b4r.io/uploads/roi/company/ITbiz_Solutions.png","alias":"itbiz-solutions","address":"","roles":[],"description":"ITbiz Solutions\r\nIn the market of system integration we work since 2007 and during that time have accumulated a lot of experience in implementing complex projects, both in the construction / modernization of network infrastructure and management systems, and information security for key Internet providers, data centers, enterprises, energy and oil and gas industry, banking, government and industrial organizations, the media and television companies.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://itbiz.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ITbiz Solutions","keywords":"ITbiz, Solutions, Internet, providers, data, management, information, centers","description":"ITbiz Solutions\rIn the market of system integration we work since 2007 and during that time have accumulated a lot of experience in implementing complex","og:title":"ITbiz Solutions","og:description":"ITbiz Solutions\rIn the market of system integration we work since 2007 and during that time have accumulated a lot of experience in implementing complex","og:image":"https://old.b4r.io/uploads/roi/company/ITbiz_Solutions.png"},"eventUrl":""},"vendors":[{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":""}],"products":[{"id":488,"logo":false,"scheme":false,"title":"Juniper QFX коммутаторы","vendorVerified":0,"rating":"2.10","implementationsCount":2,"suppliersCount":0,"alias":"juniper-qfx-kommutatory","companyTypes":[],"description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для нескольких архитектур ткани центров обработки данных.\r\nQFX5200 коммутаторы фиксированной конфигурации предлагают гибкие варианты подключения, от 10GbE к 100GbE. \r\nВ QFX10000 коммутаторы с высокой масштабируемостью, высокой плотностью платформ, которые поддерживают различные развертывания 10GbE / 40GbE / 100GbE, обеспечивая прочную основу для самых требовательных центров обработки данных.","shortDescription":"Коммутаторы Juniper серии QFX являются высокопроизводительными, с платформой высокой плотности, удовлетворяют потребности самых требовательных корпоративных сред. Предназначен для топ-стойки для развертывания в современных центрах обработки данных, коммутаторы QFX серии могут быть развернуты с доступом 10GbE, 40GbE, 100GbE","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper QFX коммутаторы","keywords":"коммутаторы, 10GbE, которые, 40GbE, данных, высокой, 100GbE, центров","description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для","og:title":"Juniper QFX коммутаторы","og:description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для"},"eventUrl":"","translationId":2393,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":56,"title":"Router","alias":"router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":371,"title":"No control over the state of communication channels"}]}},"categories":[{"id":56,"title":"Router","alias":"router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://itbiz.ua/kompaniya-maksimu-net-vyibiraet-kommutatoryi-serii-juniper-qfx3500-dlya-modernizaczii-svoej-seti","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":745,"title":"Внед 3004","description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\n\r\nрусс русс русс","alias":"vned-3004","roi":0,"seo":{"title":"Внед 3004","keywords":"","description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\n\r\nрусс русс русс","og:title":"Внед 3004","og:description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\n\r\nрусс русс русс"},"deal_info":"","user":{"id":2949,"title":"Harvey Nichols","logoURL":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg","alias":"harvey-nichols","address":"","roles":[],"description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as the UK's premier luxury fashion retailer, Harvey Nichols is internationally renowned for its expertly edited fashion and beauty merchandise, premium food and wine offer and award-winning restaurants.\r\n\r\nHarvey Nichols has seven stores within the UK and Ireland, consisting of five large-format stores in London, Edinburgh, Birmingham, Leeds and Manchester, and two small-format stores in Bristol and Dublin. A beauty concept store, Beauty Bazaar, Harvey Nichols, opened in Liverpool in November 2012.\r\n\r\nAll UK stores have luxury Foodmarkets and Restaurants, Cafés or Brasseries. Harvey Nichols also owns and operates OXO Tower Restaurant, Bar and Brasserie on the South Bank in London.\r\n\r\nIn addition to this, there are seven large-format stores overseas: two in Turkey (Istanbul and Ankara), one in Riyadh, one in Dubai, two in Hong Kong and one in Kuwait.\r\n\r\nHarvey Nichols stores offer the ultimate fashion experience. Seen as ‘the place to be’, Harvey Nichols is the club that doesn’t require a membership. Exclusive, niche and established labels sit alongside accessible everyday collections, offering customers the must-have edit for all their wardrobe needs – from everyday to extraordinary.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.harveynichols.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Harvey Nichols","keywords":"Harvey, Nichols, stores, fashion, opened, luxury, beauty, offer","description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:title":"Harvey Nichols","og:description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:image":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg"},"eventUrl":""},"supplier":{"id":2947,"title":"Bytes Technology Group UK","logoURL":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png","alias":"bytes-technology-group-uk","address":"","roles":[],"description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\n\r\nBytes is part of the £2bn Altron Group. Our UK business began in 1982 and has grown profitably each year to reach a turnover in excess of £194m in FY2015, making us one of the largest software services and solutions businesses in the country.\r\n\r\nThe most important aspect of our business is our people. We value initiative, teamwork and achievement. Together, we focus on providing the highest levels of service so we can deliver our ultimate goal – your satisfaction.\r\n\r\nOur customers include leading brands, such as Marks & Spencer, BBC, Specsavers, NHS, Clifford Chance, BUPA, United Utilities, Hiscox, Allen & Overy LLP and thousands more across retail, media, finance, manufacturing, legal, the NHS and the public sector.\r\n\r\nWe also work closely with the majority of IT vendors and are delighted to have received honours, including Microsoft Worldwide Partner of the Year Winner three times in four years, and CheckPoint European Partner of the Year, to name a few of our recent awards.\r\n\r\nNeed to know more? Please explore our website and get in touch with any questions. We'll be delighted to help.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.bytes.co.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Bytes Technology Group UK","keywords":"Bytes, Group, with, business, Partner, more, delighted, Year","description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:title":"Bytes Technology Group UK","og:description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:image":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png"},"eventUrl":""},"vendors":[{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":""}],"products":[{"id":498,"logo":false,"scheme":false,"title":"Juniper Networks IDP Серии","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"alias":"juniper-networks-idp-serii","companyTypes":[],"description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием безопасности сети.","shortDescription":"Juniper Networks IDP Серии - межсетевой экран.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Серии","keywords":"сети, минимизация, ущерб, причинен, временных, материальных, поддержанием, безопасности","description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием","og:title":"Juniper Networks IDP Серии","og:description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием"},"eventUrl":"","translationId":2397,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":252,"title":"Increase Customer Base"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":174,"title":"No unified email system"},{"id":281,"title":"No IT security guidelines"}]}},"categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0}],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{"56":{"id":56,"title":"Router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png","alias":"router"},"174":{"id":174,"title":"System and Network Management Software","description":"Software-defined networking (SDN) is an approach to computer networking that allows network administrators to manage network services through abstraction of lower-level functionality. SDN is meant to address the fact that the static architecture of traditional networks doesn't support the dynamic, scalable computing and storage needs of more modern computing environments such as data centers. This is done by decoupling or disassociating the system that makes decisions about where traffic is sent (the control plane) from the underlying systems that forward traffic to the selected destination (the data plane).\r\n\r\nSDN was commonly associated with the OpenFlow protocol (for remote communication with network plane elements for the purpose of determining the path of network packets across network switches) since the latter's emergence in 2011. Since 2012, however, many companies have moved away from OpenFlow as a single-solution, and have embraced a number of different techniques. These include Cisco's Open Network Environment and Nicira’s Network virtualization platform.\r\n\r\nSD-WAN is an emerging Wide Area Networking (WAN) technology that is an implementation of software-defined networking.\r\n\r\nSource: https://en.wikipedia.org/wiki/Software-defined_networking","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/system-and-network-management-software.png","alias":"system-and-network-management-software"}},"branches":"Information Technology","companySizes":"More than 2000 Employees","companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":true,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[{"supplier":"MUK","partnershipLevel":"","countries":"","partnersType":""}],"vendoredProducts":[{"id":232,"logoURL":"https://old.b4r.io/fileadmin/user_upload/QFabric_System.jpg","logo":true,"scheme":false,"title":"QFabric System","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"qfabric-system","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"The QFabric® System is composed of multiple components working together as a single switch. It flattens the network to a single tier to provide high-performance, any-to-any connectivity and management simplicity, making it the ideal network foundation for cloud-ready, virtualized data centers.\r\nThe QFabric System is composed of multiple components working together as a single switch to provide high-performance, any-to-any connectivity and management simplicity in the data center. The QFabric System flattens the entire data center network to a single tier where all access points are equal, eliminating the effects of network locality and making it the ideal network foundation for cloud-ready, virtualized data centers.\r\nQFabric is a highly scalable system that improves application performance with low latency and converged services in a non-blocking, lossless architecture that supports Layer 2, Layer 3, and Fibre Channel over Ethernet capabilities.\r\n<span style=\"font-weight: bold;\">Distributed switch composed of three components:</span>\r\nQFX3500/QFX3600/QFX5100 QFabric Node\r\nQFX3600-I/QFX3008-I QFabric Interconnect\r\nQFX3100 QFabric Director\r\n\r\n<span style=\"font-weight: bold;\">Features</span>\r\n\r\nScales to 40 Tbps to deliver unprecedented capacity beyond 10GbE at the access layer.\r\nUltra-low Deterministic Latency is ideal for supporting latency-sensitive applications, east-west traffic flows, virtualization, cloud, and other high-performance data center initiatives.\r\nSingle-Switch Management greatly simplifies data center operations with less complexity and lower power, space, cooling, and operational costs.\r\nCarrier-Class Solution requires no downtime for reconfiguration or maintenance.\r\nScales to Thousands of Ports within a single-tier network in a "pay-as-you-grow" model.\r\nIncremental Design allows conversion of QFX Series switches from top-of-rack to QFabric devices.\r\n\r\n<span style=\"font-weight: bold; \">QFabric System Models</span>\r\nQFX3000-M \r\nQFX3000-G ","shortDescription":"The QFabric® System is composed of multiple components working together as a single switch.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"QFabric System","keywords":"QFabric, data, network, System, single, center, composed, ideal","description":"The QFabric® System is composed of multiple components working together as a single switch. It flattens the network to a single tier to provide","og:title":"QFabric System","og:description":"The QFabric® System is composed of multiple components working together as a single switch. It flattens the network to a single tier to provide","og:image":"https://old.b4r.io/fileadmin/user_upload/QFabric_System.jpg"},"eventUrl":"","translationId":233,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":56,"title":"Router","alias":"router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":489,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Juniper_QFX_kommutatory.png","logo":true,"scheme":false,"title":"Juniper QFX Series switches","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-qfx-series-switches","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"QFX5100\r\nThe QFX5100 Switches are low-latency, high-performance 10GbE/40GbE switches that act as a flexible building block for multiple data center fabric architectures.\r\nQFX5200\r\nQFX5200 fixed-configuration switches offer flexible connectivity options, from 10GbE to 100GbE, making them ideally suited for leaf deployments in next-generation IP data center fabrics.\r\nQFX10000\r\nThe QFX10000 Switches are highly scalable, high-density platforms that support a variety of 10GbE/40GbE/100GbE deployments, providing a robust foundation for the most demanding data centers.\r\nHigh performance, low latency\r\nWith throughput of up to 6 Tbps per slot, QFX Series switches deliver sustained wire-speed switching with low latency and jitter for virtualized data center environments.\r\nHighly available\r\nRedundant fabrics, power and cooling, combined with separate control and data planes, ensure maximum system availability.\r\nData center fabric building blocks\r\nQFX Series switches provide the universal building blocks for multiple data center fabric architectures, including Junos Fusion, QFabric System, Virtual Chassis and Virtual Chassis Fabric.\r\nStandards-based\r\nStandards-based bridging, routing, VMware NSX Layer 2 gateway, and Fibre Channel technology enable interoperability and easy integration.","shortDescription":"QFX Series switches are high-performance, high-density platforms that satisfy the needs of today’s most demanding enterprise and service provider environments. Designed for top-of-rack, end-of-row, and spine-and-core aggregation deployments in modern data centers, QFX Series switches can be deployed as 10GbE, 40GbE or 100GbE access, spine, core or aggregation devices in Virtual Chassis, Virtual Chassis Fabric, Multi-Chassis LAG and Junos Fusion architectures.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper QFX Series switches","keywords":"data, center, switches, 10GbE, building, fabric, Series, latency","description":"QFX5100\rThe QFX5100 Switches are low-latency, high-performance 10GbE/40GbE switches that act as a flexible building block for multiple data center fabric","og:title":"Juniper QFX Series switches","og:description":"QFX5100\rThe QFX5100 Switches are low-latency, high-performance 10GbE/40GbE switches that act as a flexible building block for multiple data center fabric","og:image":"https://old.b4r.io/fileadmin/user_upload/Juniper_QFX_kommutatory.png"},"eventUrl":"","translationId":489,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":56,"title":"Router","alias":"router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":498,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg","logo":true,"scheme":false,"title":"Juniper Networks IDP Серии","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-networks-idp-serii","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием безопасности сети.","shortDescription":"Juniper Networks IDP Серии - межсетевой экран.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Серии","keywords":"сети, минимизация, ущерб, причинен, временных, материальных, поддержанием, безопасности","description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием","og:title":"Juniper Networks IDP Серии","og:description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием","og:image":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg"},"eventUrl":"","translationId":2397,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":499,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg","logo":true,"scheme":false,"title":"Juniper Networks IDP Series","vendorVerified":0,"rating":"1.80","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-networks-idp-series","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"<span style=\"font-weight: bold;\">Stateful signature</span>\r\nThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.\r\n<span style=\"font-weight: bold;\">Protocol anomaly</span>\r\nThe IDP rulebase attack objects detect protocol usages that violate published RFCs. This method protects your network from undiscovered vulnerabilities.\r\n<span style=\"font-weight: bold;\">Traffic anomaly</span>\r\nThe Traffic Anomalies rulebase uses heuristic rules to detect unexpected traffic patterns that might indicate reconnaissance or attacks. This method blocks distributed denial-of-service (DDoS) attacks and prevents reconnaissance activities.\r\n<span style=\"font-weight: bold;\">Backdoor</span>\r\nThe Backdoor rulebase uses heuristic-based anomalous traffic patterns and packet analysis to detect Trojans and rootkits. These methods prevent proliferation of malware in case other security measures have been compromised.\r\n<span style=\"font-weight: bold;\">IP spoofing</span>\r\nThe IDP appliance checks the validity of allowed addresses inside and outside the network, permitting only authentic traffic and blocking traffic with a disguised source.\r\n<span style=\"font-weight: bold;\">Layer 2 attacks</span>\r\nThe IDP appliance prevents Layer 2 attacks using rules for Address Resolution Protocol (ARP) tables, fragment handling, connection timeouts, and byte/length thresholds for packets. These methods prevent a compromised host from polluting an internal network using methods such as ARP cache poisoning.\r\n<span style=\"font-weight: bold;\">Denial of service (DoS)</span>\r\nThe SYN Protector rulebase provides two, alternative methods to prevent SYN-flood attacks.\r\n<span style=\"font-weight: bold;\">Network honeypot</span>\r\nThe IDP appliance impersonates vulnerable ports so you can track attacker reconnaissance activity.","shortDescription":"Juniper Networks IDP Series Intrusion Detection and Prevention Appliances.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Series","keywords":"attacks, rulebase, traffic, methods, method, detect, network, reconnaissance","description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.","og:title":"Juniper Networks IDP Series","og:description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.","og:image":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg"},"eventUrl":"","translationId":499,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":488,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Juniper_QFX_kommutatory.png","logo":true,"scheme":false,"title":"Juniper QFX коммутаторы","vendorVerified":0,"rating":"2.10","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-qfx-kommutatory","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для нескольких архитектур ткани центров обработки данных.\r\nQFX5200 коммутаторы фиксированной конфигурации предлагают гибкие варианты подключения, от 10GbE к 100GbE. \r\nВ QFX10000 коммутаторы с высокой масштабируемостью, высокой плотностью платформ, которые поддерживают различные развертывания 10GbE / 40GbE / 100GbE, обеспечивая прочную основу для самых требовательных центров обработки данных.","shortDescription":"Коммутаторы Juniper серии QFX являются высокопроизводительными, с платформой высокой плотности, удовлетворяют потребности самых требовательных корпоративных сред. Предназначен для топ-стойки для развертывания в современных центрах обработки данных, коммутаторы QFX серии могут быть развернуты с доступом 10GbE, 40GbE, 100GbE","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper QFX коммутаторы","keywords":"коммутаторы, 10GbE, которые, 40GbE, данных, высокой, 100GbE, центров","description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для","og:title":"Juniper QFX коммутаторы","og:description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для","og:image":"https://old.b4r.io/fileadmin/user_upload/Juniper_QFX_kommutatory.png"},"eventUrl":"","translationId":2393,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":56,"title":"Router","alias":"router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1443,"logoURL":"https://old.b4r.io/fileadmin/user_upload/juniper_networks.png","logo":true,"scheme":false,"title":"Juniper Next-Generation Firewall (NGFW)","vendorVerified":0,"rating":"2.20","implementationsCount":3,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-next-generation-firewall-ngfw","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your organization’s defenses. <span style=\"font-weight: bold;\">Identifying Application Risks</span> Juniper AppSecure, an NFGW Services component, is a suite of services that provides deep application visibility and control in your network:\r\n<ul>\r\n<li>AppTrack identifies applications on the network to assess their security risk and address user behavior. Contextual information helps you gain insight into which applications are permitted and the risk they may pose.</li>\r\n<li>AppFW provides policy-based enforcement and control, blocking access to high-risk applications and enforcing user-defined policies. Reports on application bandwidth usage deliver further insight, and you can throttle any application traffic not sanctioned by the enterprise.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Protection from Network Borne Attacks</span> Juniper Intrusion Prevention System (IPS) and Sky Advanced Threat Prevention (ATP) work together to provide comprehensive threat detection and protection against known and unknown threats that use the network as an attack vector. The capabilities provide immediate protection from malicious malware. Continual monitoring for new exploits and vulnerabilities keeps protection up to date. The system immediately blocks threats on client and server systems inline before damage can take place. <span style=\"font-weight: bold;\">Safeguards Against Malware</span> Although modern cyber criminals favor today’s sophisticated, turnkey techniques, they have not abandoned the tried and true approach of tucking malware into signature-based viruses and volume-based email. Integrated with our SRX platforms, Sophos Live Protection combines cloud-based reputation intelligence with on-box horsepower to deliver lightweight and fast security. <span style=\"font-weight: bold;\">Web Browsing Defense</span> The Web is full of deception designed to get unsuspecting users to click on malicious links that might install advanced malware. Attackers regularly compromise websites by tricking users into providing their user credentials. Juniper has partnered with Forcepoint to provide URL filtering that fights such attacks. The service is constantly and globally updated in real time to provide an always-current worldwide database of malicious URLs that protect against user compromise. <span style=\"font-weight: bold;\">Avoiding Unauthorized Access and Use</span> Every user in an enterprise must be able to access certain applications to perform specific tasks. But allowing users unlimited access to corporate resources outside their sphere of responsibility can enable the proliferation of insider threats. Our User Firewall service restricts application usage on a per-user basis by tightly integrating with Microsoft Active Directory (AD) and the Lightweight Directory Access Protocol (LDAP). As a result, you gain visibility and control of application and network use segmented by user-defined roles, enabling secure access to authorized applications. <span style=\"font-weight: bold;\">Features</span> <span style=\"font-weight: bold;\">Advanced Application Visibility and Control</span> You can identify applications running on your network regardless of port, protocol, and encryption. This visibility lets you immediately block evasive applications inline at the SRX firewall. <span style=\"font-weight: bold;\">Nested Application Support</span> You can accurately identify applications embedded in common network protocols such as HTTP or HTTPS traffic. This capability also provides visibility into and granular control over applications hidden inside encrypted SSL traffic. <span style=\"font-weight: bold;\">User and Role-Based Policies</span> Tight integration with Microsoft AD and LDAP allow you to set and enforce user- and role-based security policies. Policy setting becomes simpler and more secure, because you reduce the number of policies needed to account for user location, IP address, and so on. <span style=\"font-weight: bold;\">SSL Inspection</span> Inline decryption and inspection of inbound and outbound Secure Sockets Layer (SSL) connections at the SRX firewall provide visibility and protection against threats embedded in SSL encrypted traffic. <span style=\"font-weight: bold;\">Junos OS Integration</span> Integration with Juniper’s operating system consolidates and optimizes services on SRX devices for maximum scale.","shortDescription":"Juniper Next-Generation Firewall (NGFW) Services provide an array of cyber defenses to reduce your attack surface in this challenging environment.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Next-Generation Firewall (NGFW)","keywords":"applications, with, network, that, visibility, application, user, provide","description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your","og:title":"Juniper Next-Generation Firewall (NGFW)","og:description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your","og:image":"https://old.b4r.io/fileadmin/user_upload/juniper_networks.png"},"eventUrl":"","translationId":1444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[{"id":232,"logoURL":"https://old.b4r.io/fileadmin/user_upload/QFabric_System.jpg","logo":true,"scheme":false,"title":"QFabric System","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"qfabric-system","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"The QFabric® System is composed of multiple components working together as a single switch. It flattens the network to a single tier to provide high-performance, any-to-any connectivity and management simplicity, making it the ideal network foundation for cloud-ready, virtualized data centers.\r\nThe QFabric System is composed of multiple components working together as a single switch to provide high-performance, any-to-any connectivity and management simplicity in the data center. The QFabric System flattens the entire data center network to a single tier where all access points are equal, eliminating the effects of network locality and making it the ideal network foundation for cloud-ready, virtualized data centers.\r\nQFabric is a highly scalable system that improves application performance with low latency and converged services in a non-blocking, lossless architecture that supports Layer 2, Layer 3, and Fibre Channel over Ethernet capabilities.\r\n<span style=\"font-weight: bold;\">Distributed switch composed of three components:</span>\r\nQFX3500/QFX3600/QFX5100 QFabric Node\r\nQFX3600-I/QFX3008-I QFabric Interconnect\r\nQFX3100 QFabric Director\r\n\r\n<span style=\"font-weight: bold;\">Features</span>\r\n\r\nScales to 40 Tbps to deliver unprecedented capacity beyond 10GbE at the access layer.\r\nUltra-low Deterministic Latency is ideal for supporting latency-sensitive applications, east-west traffic flows, virtualization, cloud, and other high-performance data center initiatives.\r\nSingle-Switch Management greatly simplifies data center operations with less complexity and lower power, space, cooling, and operational costs.\r\nCarrier-Class Solution requires no downtime for reconfiguration or maintenance.\r\nScales to Thousands of Ports within a single-tier network in a "pay-as-you-grow" model.\r\nIncremental Design allows conversion of QFX Series switches from top-of-rack to QFabric devices.\r\n\r\n<span style=\"font-weight: bold; \">QFabric System Models</span>\r\nQFX3000-M \r\nQFX3000-G ","shortDescription":"The QFabric® System is composed of multiple components working together as a single switch.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"QFabric System","keywords":"QFabric, data, network, System, single, center, composed, ideal","description":"The QFabric® System is composed of multiple components working together as a single switch. It flattens the network to a single tier to provide","og:title":"QFabric System","og:description":"The QFabric® System is composed of multiple components working together as a single switch. It flattens the network to a single tier to provide","og:image":"https://old.b4r.io/fileadmin/user_upload/QFabric_System.jpg"},"eventUrl":"","translationId":233,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":56,"title":"Router","alias":"router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":489,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Juniper_QFX_kommutatory.png","logo":true,"scheme":false,"title":"Juniper QFX Series switches","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-qfx-series-switches","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"QFX5100\r\nThe QFX5100 Switches are low-latency, high-performance 10GbE/40GbE switches that act as a flexible building block for multiple data center fabric architectures.\r\nQFX5200\r\nQFX5200 fixed-configuration switches offer flexible connectivity options, from 10GbE to 100GbE, making them ideally suited for leaf deployments in next-generation IP data center fabrics.\r\nQFX10000\r\nThe QFX10000 Switches are highly scalable, high-density platforms that support a variety of 10GbE/40GbE/100GbE deployments, providing a robust foundation for the most demanding data centers.\r\nHigh performance, low latency\r\nWith throughput of up to 6 Tbps per slot, QFX Series switches deliver sustained wire-speed switching with low latency and jitter for virtualized data center environments.\r\nHighly available\r\nRedundant fabrics, power and cooling, combined with separate control and data planes, ensure maximum system availability.\r\nData center fabric building blocks\r\nQFX Series switches provide the universal building blocks for multiple data center fabric architectures, including Junos Fusion, QFabric System, Virtual Chassis and Virtual Chassis Fabric.\r\nStandards-based\r\nStandards-based bridging, routing, VMware NSX Layer 2 gateway, and Fibre Channel technology enable interoperability and easy integration.","shortDescription":"QFX Series switches are high-performance, high-density platforms that satisfy the needs of today’s most demanding enterprise and service provider environments. Designed for top-of-rack, end-of-row, and spine-and-core aggregation deployments in modern data centers, QFX Series switches can be deployed as 10GbE, 40GbE or 100GbE access, spine, core or aggregation devices in Virtual Chassis, Virtual Chassis Fabric, Multi-Chassis LAG and Junos Fusion architectures.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper QFX Series switches","keywords":"data, center, switches, 10GbE, building, fabric, Series, latency","description":"QFX5100\rThe QFX5100 Switches are low-latency, high-performance 10GbE/40GbE switches that act as a flexible building block for multiple data center fabric","og:title":"Juniper QFX Series switches","og:description":"QFX5100\rThe QFX5100 Switches are low-latency, high-performance 10GbE/40GbE switches that act as a flexible building block for multiple data center fabric","og:image":"https://old.b4r.io/fileadmin/user_upload/Juniper_QFX_kommutatory.png"},"eventUrl":"","translationId":489,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":56,"title":"Router","alias":"router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":498,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg","logo":true,"scheme":false,"title":"Juniper Networks IDP Серии","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-networks-idp-serii","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием безопасности сети.","shortDescription":"Juniper Networks IDP Серии - межсетевой экран.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Серии","keywords":"сети, минимизация, ущерб, причинен, временных, материальных, поддержанием, безопасности","description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием","og:title":"Juniper Networks IDP Серии","og:description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием","og:image":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg"},"eventUrl":"","translationId":2397,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":499,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg","logo":true,"scheme":false,"title":"Juniper Networks IDP Series","vendorVerified":0,"rating":"1.80","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-networks-idp-series","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"<span style=\"font-weight: bold;\">Stateful signature</span>\r\nThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.\r\n<span style=\"font-weight: bold;\">Protocol anomaly</span>\r\nThe IDP rulebase attack objects detect protocol usages that violate published RFCs. This method protects your network from undiscovered vulnerabilities.\r\n<span style=\"font-weight: bold;\">Traffic anomaly</span>\r\nThe Traffic Anomalies rulebase uses heuristic rules to detect unexpected traffic patterns that might indicate reconnaissance or attacks. This method blocks distributed denial-of-service (DDoS) attacks and prevents reconnaissance activities.\r\n<span style=\"font-weight: bold;\">Backdoor</span>\r\nThe Backdoor rulebase uses heuristic-based anomalous traffic patterns and packet analysis to detect Trojans and rootkits. These methods prevent proliferation of malware in case other security measures have been compromised.\r\n<span style=\"font-weight: bold;\">IP spoofing</span>\r\nThe IDP appliance checks the validity of allowed addresses inside and outside the network, permitting only authentic traffic and blocking traffic with a disguised source.\r\n<span style=\"font-weight: bold;\">Layer 2 attacks</span>\r\nThe IDP appliance prevents Layer 2 attacks using rules for Address Resolution Protocol (ARP) tables, fragment handling, connection timeouts, and byte/length thresholds for packets. These methods prevent a compromised host from polluting an internal network using methods such as ARP cache poisoning.\r\n<span style=\"font-weight: bold;\">Denial of service (DoS)</span>\r\nThe SYN Protector rulebase provides two, alternative methods to prevent SYN-flood attacks.\r\n<span style=\"font-weight: bold;\">Network honeypot</span>\r\nThe IDP appliance impersonates vulnerable ports so you can track attacker reconnaissance activity.","shortDescription":"Juniper Networks IDP Series Intrusion Detection and Prevention Appliances.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Series","keywords":"attacks, rulebase, traffic, methods, method, detect, network, reconnaissance","description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.","og:title":"Juniper Networks IDP Series","og:description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.","og:image":"https://old.b4r.io/fileadmin/user_upload/Juniper_Networks_IDP_Serii.jpg"},"eventUrl":"","translationId":499,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":488,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Juniper_QFX_kommutatory.png","logo":true,"scheme":false,"title":"Juniper QFX коммутаторы","vendorVerified":0,"rating":"2.10","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-qfx-kommutatory","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для нескольких архитектур ткани центров обработки данных.\r\nQFX5200 коммутаторы фиксированной конфигурации предлагают гибкие варианты подключения, от 10GbE к 100GbE. \r\nВ QFX10000 коммутаторы с высокой масштабируемостью, высокой плотностью платформ, которые поддерживают различные развертывания 10GbE / 40GbE / 100GbE, обеспечивая прочную основу для самых требовательных центров обработки данных.","shortDescription":"Коммутаторы Juniper серии QFX являются высокопроизводительными, с платформой высокой плотности, удовлетворяют потребности самых требовательных корпоративных сред. Предназначен для топ-стойки для развертывания в современных центрах обработки данных, коммутаторы QFX серии могут быть развернуты с доступом 10GbE, 40GbE, 100GbE","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper QFX коммутаторы","keywords":"коммутаторы, 10GbE, которые, 40GbE, данных, высокой, 100GbE, центров","description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для","og:title":"Juniper QFX коммутаторы","og:description":"QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для","og:image":"https://old.b4r.io/fileadmin/user_upload/Juniper_QFX_kommutatory.png"},"eventUrl":"","translationId":2393,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":56,"title":"Router","alias":"router","description":"Маршрутиза́тор или ро́утер (транслитерация английского слова)) — специализированный сетевой компьютер, имеющий два или более сетевых интерфейсов[2] и пересылающий пакеты данных между различными сегментами сети. Маршрутизатор может связывать разнородные сети различных архитектур. Для принятия решений о пересылке пакетов используется информация о топологии сети и определённые правила, заданные администратором.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%82%D0%BE%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/router.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1443,"logoURL":"https://old.b4r.io/fileadmin/user_upload/juniper_networks.png","logo":true,"scheme":false,"title":"Juniper Next-Generation Firewall (NGFW)","vendorVerified":0,"rating":"2.20","implementationsCount":3,"suppliersCount":0,"supplierPartnersCount":1,"alias":"juniper-next-generation-firewall-ngfw","companyTitle":"Juniper Networks","companyTypes":["supplier","vendor"],"companyId":2784,"companyAlias":"juniper-networks","description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your organization’s defenses. <span style=\"font-weight: bold;\">Identifying Application Risks</span> Juniper AppSecure, an NFGW Services component, is a suite of services that provides deep application visibility and control in your network:\r\n<ul>\r\n<li>AppTrack identifies applications on the network to assess their security risk and address user behavior. Contextual information helps you gain insight into which applications are permitted and the risk they may pose.</li>\r\n<li>AppFW provides policy-based enforcement and control, blocking access to high-risk applications and enforcing user-defined policies. Reports on application bandwidth usage deliver further insight, and you can throttle any application traffic not sanctioned by the enterprise.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Protection from Network Borne Attacks</span> Juniper Intrusion Prevention System (IPS) and Sky Advanced Threat Prevention (ATP) work together to provide comprehensive threat detection and protection against known and unknown threats that use the network as an attack vector. The capabilities provide immediate protection from malicious malware. Continual monitoring for new exploits and vulnerabilities keeps protection up to date. The system immediately blocks threats on client and server systems inline before damage can take place. <span style=\"font-weight: bold;\">Safeguards Against Malware</span> Although modern cyber criminals favor today’s sophisticated, turnkey techniques, they have not abandoned the tried and true approach of tucking malware into signature-based viruses and volume-based email. Integrated with our SRX platforms, Sophos Live Protection combines cloud-based reputation intelligence with on-box horsepower to deliver lightweight and fast security. <span style=\"font-weight: bold;\">Web Browsing Defense</span> The Web is full of deception designed to get unsuspecting users to click on malicious links that might install advanced malware. Attackers regularly compromise websites by tricking users into providing their user credentials. Juniper has partnered with Forcepoint to provide URL filtering that fights such attacks. The service is constantly and globally updated in real time to provide an always-current worldwide database of malicious URLs that protect against user compromise. <span style=\"font-weight: bold;\">Avoiding Unauthorized Access and Use</span> Every user in an enterprise must be able to access certain applications to perform specific tasks. But allowing users unlimited access to corporate resources outside their sphere of responsibility can enable the proliferation of insider threats. Our User Firewall service restricts application usage on a per-user basis by tightly integrating with Microsoft Active Directory (AD) and the Lightweight Directory Access Protocol (LDAP). As a result, you gain visibility and control of application and network use segmented by user-defined roles, enabling secure access to authorized applications. <span style=\"font-weight: bold;\">Features</span> <span style=\"font-weight: bold;\">Advanced Application Visibility and Control</span> You can identify applications running on your network regardless of port, protocol, and encryption. This visibility lets you immediately block evasive applications inline at the SRX firewall. <span style=\"font-weight: bold;\">Nested Application Support</span> You can accurately identify applications embedded in common network protocols such as HTTP or HTTPS traffic. This capability also provides visibility into and granular control over applications hidden inside encrypted SSL traffic. <span style=\"font-weight: bold;\">User and Role-Based Policies</span> Tight integration with Microsoft AD and LDAP allow you to set and enforce user- and role-based security policies. Policy setting becomes simpler and more secure, because you reduce the number of policies needed to account for user location, IP address, and so on. <span style=\"font-weight: bold;\">SSL Inspection</span> Inline decryption and inspection of inbound and outbound Secure Sockets Layer (SSL) connections at the SRX firewall provide visibility and protection against threats embedded in SSL encrypted traffic. <span style=\"font-weight: bold;\">Junos OS Integration</span> Integration with Juniper’s operating system consolidates and optimizes services on SRX devices for maximum scale.","shortDescription":"Juniper Next-Generation Firewall (NGFW) Services provide an array of cyber defenses to reduce your attack surface in this challenging environment.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Next-Generation Firewall (NGFW)","keywords":"applications, with, network, that, visibility, application, user, provide","description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your","og:title":"Juniper Next-Generation Firewall (NGFW)","og:description":"Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your","og:image":"https://old.b4r.io/fileadmin/user_upload/juniper_networks.png"},"eventUrl":"","translationId":1444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"partnershipProgramme":{"levels":[{"id":309,"level":"Select Reseller"},{"id":311,"level":"Elite Reseller"},{"id":313,"level":"Distributor"}],"partnerDiscounts":{"Select Reseller":"","Elite Reseller":"","Distributor":""},"registeredDiscounts":{"Select Reseller":"","Elite Reseller":"","Distributor":""},"additionalBenefits":[],"salesPlan":{"Select Reseller":"","Elite Reseller":"","Distributor":""},"additionalRequirements":[]}}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}