{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"ru":"Продукты","_type":"localeString","en":"Products","de":"die produkte"},"introduction-popover":{"_type":"localeString","en":"introduction","ru":"внедрения"},"partners-popover":{"_type":"localeString","en":"partners","ru":"партнеры"},"update-profile-button":{"en":"Update profile","ru":"Обновить профиль","_type":"localeString"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"user-implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"categories":{"ru":"Компетенции","_type":"localeString","en":"Categories"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"_type":"localeString","en":"User","ru":"Пользователь"},"partnership-vendors":{"_type":"localeString","en":"Partnership with vendors","ru":"Партнерство с производителями"},"partnership-suppliers":{"en":"Partnership with suppliers","ru":"Партнерство с поставщиками","_type":"localeString"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"_type":"localeString","en":"Country","ru":"Страна"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"ru":"область деятельности","_type":"localeString","en":"branch"},"employees-popover":{"en":"number of employees","ru":"количество сотрудников","_type":"localeString"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"_type":"localeString","en":"Partner discounts","ru":"Партнерские скидки"},"registered-discounts":{"en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString"},"additional-advantages":{"_type":"localeString","en":"Additional Benefits","ru":"Дополнительные преимущества"},"additional-requirements":{"_type":"localeString","en":"Partner level requirements","ru":"Требования к уровню партнера"},"certifications":{"ru":"Сертификация технических специалистов","_type":"localeString","en":"Certification of technical specialists"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"_type":"localeString","en":"Partners-suppliers","ru":"Партнеры-поставщики"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"en":"Produced products","ru":"Производимые продукты","_type":"localeString"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"_type":"localeString","en":"Supplied deployments","ru":"Поставляемые внедрения"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"not-yet-converted":{"en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString"},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"ru":"Регистрация ","_type":"localeString","en":"Register"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Roi4Webinar","_type":"localeString"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"meta":[{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"},{"content":"website","name":"og:type"}],"translatable_meta":[{"name":"title","translations":{"_type":"localeString","en":"Company","ru":"Компания"}},{"translations":{"_type":"localeString","en":"Company description","ru":"Описание компании"},"name":"description"},{"name":"keywords","translations":{"ru":"Ключевые слова для компании","_type":"localeString","en":"Company keywords"}}],"title":{"en":"ROI4CIO: Company","ru":"ROI4CIO: Компания","_type":"localeString"}}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"arinteg":{"id":2010,"title":"ARinteg","logoURL":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png","alias":"arinteg","address":"","roles":[{"id":2,"type":"supplier"}],"description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software solutions for information security services. Impeccable work, you have all the necessary competencies and adherence to professional ethics principles have allowed us to gain a high reputation in the market. Among our clients - major Russian companies and government organizations, including leading banks and industrial enterprises, multinational corporations and governments. ARinteg company provides a full range of services in the field of information security and the creation of effective IT infrastructures. The results of projects carried out ARinteg, are as follows: - construction of effective information security systems businesses - bringing the customer information systems to meet the requirements of regulatory authorities of the Russian Federation - the formation of the IT infrastructure of any level of complexity. In the course of experts ARinteg projects meet all the necessary expert-analytical, technical and consulting services: - audit of information systems and business processes, expertise in information security solutions, expert information systems of enterprises to meet the requirements of regulatory authorities, to develop sets of organizational and administrative documentation information security - the supply, installation, configuration and maintenance of IT systems - advice, training experts of customers.","companyTypes":["supplier"],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":76,"supplierImplementations":[{"id":177,"title":"CyberArk PRIVILEGED IDENTITY MANAGEMENT (PIM) для банка","description":"Внедрение решения Cyber-Ark PIM для контроля и управления удаленным доступом к информационным системам банка ВТБ 24\r\n\r\nразработка проекта: июль 2013\r\nКомпания ARinteg выполнила проект по внедрению решения Cyber-Ark PIM для контроля и управления удаленным доступом к информационным системам банка ВТБ 24\r\n\r\nЦель проекта\r\nОсновной целью проекта являлось снижение рисков для бизнес-процессов в информационных системах банка ВТБ 24, связанных с неконтролируемыми действиями специалистов, осуществляющих эксплуатацию и обслуживание элементов ИТ-инфраструктуры.\r\n\r\nЗадачи проекта:\r\n— Повышение эффективности производственной деятельности специалистов, осуществляющих эксплуатацию и обслуживание элементов ИТ-инфраструктуры;\r\n— Сведение к минимуму угроз, связанных с осуществлением удаленного доступа к соответствующим элементам ИТ-инфраструктуры;\r\n— Создать возможность осуществления доступа только тех специалистов, которым разрешен такой доступ, и только к тем элементам ИТ-инфраструктуры, к которым им доступ разрешен.\r\nО продукте\r\n\r\nПодсистема регистрации операций управления информационными системами для банка ВТБ 24 создана на базе решения Cyber-Ark PIM. Cyber-Ark Privileged Identity Manager - система управления привилегированными учётными записями, которая обеспечивает единую точку входа в ИТ-системы, исключающей разглашение идентификационной и аутентификационной информации конечным пользователям (администраторам). Система имеет прозрачный механизм обработки и согласования заявок на предоставление доступа.\r\n\r\nРешение предназначено для организации защищенного доступа персонала, осуществляющего обслуживание элементов ИТ-инфраструктуры, а также регистрации всех действий, осуществляемых в процессе выполнения работ по обслуживанию.\r\n\r\nИтоги проекта\r\nПроект был выполнен в запланированные сроки. В результате внедрения решения удалось достигнуть поставленных целей: была усилена информационная безопасность, увеличена продуктивность управления информационными системами и значительно снижены инсайдерские угрозы. Созданная система полностью оправдала ожидания клиента.","alias":"cyberark-privileged-identity-management-pim-dlja-banka","roi":0,"seo":{"title":"CyberArk PRIVILEGED IDENTITY MANAGEMENT (PIM) для банка","keywords":"банка, управления, ИТ-инфраструктуры, проекта, Cyber-Ark, решения, доступа, элементов","description":"Внедрение решения Cyber-Ark PIM для контроля и управления удаленным доступом к информационным системам банка ВТБ 24\r\rразработка проекта: июль 2013\rКомпания","og:title":"CyberArk PRIVILEGED IDENTITY MANAGEMENT (PIM) для банка","og:description":"Внедрение решения Cyber-Ark PIM для контроля и управления удаленным доступом к информационным системам банка ВТБ 24\r\rразработка проекта: июль 2013\rКомпания"},"deal_info":"","user":{"id":783,"title":"ВТБ 24 (ПАО)","logoURL":"https://old.b4r.io/uploads/roi/company/VTB_24__PAO_.png","alias":"vtb-24-pao","address":"","roles":[],"description":"ВТБ 24 (ПАО) — один из крупнейших участников российского рынка банковских услуг. Мы входим в международную финансовую группу ВТБ и специализируемся на обслуживании физических лиц, индивидуальных предпринимателей и предприятий малого бизнеса.\r\n\r\nСеть банка формируют 1062 офиса в 72 регионах страны. Мы предлагаем клиентам основные банковские продукты, принятые в международной финансовой практике.\r\n\r\nВ числе предоставляемых услуг: выпуск банковских карт, ипотечное и потребительское кредитование, автокредитование, услуги дистанционного управления счетами, кредитные карты с льготным периодом, срочные вклады, аренда сейфовых ячеек, денежные переводы. Часть услуг доступна нашим клиентам в круглосуточном режиме, для чего используются современные телекоммуникационные технологии.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.vtb24.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ВТБ 24 (ПАО)","keywords":"услуг, клиентам, банковских, управления, дистанционного, счетами, кредитные, льготным","description":"ВТБ 24 (ПАО) — один из крупнейших участников российского рынка банковских услуг. Мы входим в международную финансовую группу ВТБ и специализируемся на","og:title":"ВТБ 24 (ПАО)","og:description":"ВТБ 24 (ПАО) — один из крупнейших участников российского рынка банковских услуг. Мы входим в международную финансовую группу ВТБ и специализируемся на","og:image":"https://old.b4r.io/uploads/roi/company/VTB_24__PAO_.png"},"eventUrl":""},"supplier":{"id":2010,"title":"ARinteg","logoURL":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png","alias":"arinteg","address":"","roles":[],"description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software solutions for information security services. Impeccable work, you have all the necessary competencies and adherence to professional ethics principles have allowed us to gain a high reputation in the market. Among our clients - major Russian companies and government organizations, including leading banks and industrial enterprises, multinational corporations and governments. ARinteg company provides a full range of services in the field of information security and the creation of effective IT infrastructures. The results of projects carried out ARinteg, are as follows: - construction of effective information security systems businesses - bringing the customer information systems to meet the requirements of regulatory authorities of the Russian Federation - the formation of the IT infrastructure of any level of complexity. In the course of experts ARinteg projects meet all the necessary expert-analytical, technical and consulting services: - audit of information systems and business processes, expertise in information security solutions, expert information systems of enterprises to meet the requirements of regulatory authorities, to develop sets of organizational and administrative documentation information security - the supply, installation, configuration and maintenance of IT systems - advice, training experts of customers.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":76,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":5,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.arinteg.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ARinteg","keywords":"information, ARinteg, systems, security, services, meet, regulatory, authorities","description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:title":"ARinteg","og:description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:image":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png"},"eventUrl":""},"vendors":[{"id":174,"title":"CyberArk","logoURL":"https://old.b4r.io/uploads/roi/company/cyber-ark_logo.png","alias":"cyberark","address":"","roles":[],"description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial services, energy, retail and healthcare markets. As of September 2014, CyberArk had nearly 1,600 customers, including over 30 Fortune 100 companies and approximately 15% of the Global 2000. The company has offices in the US, Israel, UK, France, Germany, the Netherlands, and Singapore, with local sales presence in more than 20 countries.","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"www.cyberark.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CyberArk","keywords":"company, CyberArk, security, Fortune, offices, Global, approximately, companies","description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial","og:title":"CyberArk","og:description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial","og:image":"https://old.b4r.io/uploads/roi/company/cyber-ark_logo.png"},"eventUrl":""}],"products":[{"id":109,"logo":false,"scheme":false,"title":"CyberArk Privileged Identity Management (PIM)","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"cyberark-privileged-identity-management-pim","companyTypes":[],"description":"Privileged Identity Management is an area of Identity Management that focuses solely on privileged accounts, powerful accounts used by IT administrators, select business users and even some applications. Organizations considering Privileged Identity Management solutions must prioritize security as a requirement because privileged accounts are frequently targeted by external attackers and malicious insiders to access sensitive data and gain control of the IT infrastructure. Responding to the need for security, Privileged Account Security solutions approach Privileged Identity Management with a laser focus on securing the most sought-after accounts in an organization. Built from the ground up with security in mind, Privileged Account Security delivers unmatched protection, detection and response to cyber attacks when compared to Privileged Identity Management.\r\n\r\nTamper-proof storagefor credentials, log files and recordings ensures sensitive information is protected from unauthorized access and misuse.\r\nHigh availability and disaster recovery modules include built-in fail-safe measures, secure backup and simple recovery to meet disaster recovery requirements.\r\nSupport for strong authenticationincluding multi-factor solutions enables companies to leverage existing authentication solutions for privileged accounts.\r\nFIPS 140-2 validated cryptographyaddresses compliance and security requirements.\r\nCustomizable “request workflows” for credential access approval including dual controls, integration with helpdesk ticketing systems and multiple additional parameters\r\nSegregation of duties to ensure that ensure privileged credentials can only be accessed by authorized users for approved business reasons\r\nReal-time behavioral analytics to detect and disrupt in-progress attacks","shortDescription":"Privileged Identity Management Suite (PIM) -Providing access to critical systems, devices, and user accounts","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CyberArk Privileged Identity Management (PIM)","keywords":"Privileged, Identity, Management, accounts, solutions, privileged, security, recovery","description":"Privileged Identity Management is an area of Identity Management that focuses solely on privileged accounts, powerful accounts used by IT administrators,","og:title":"CyberArk Privileged Identity Management (PIM)","og:description":"Privileged Identity Management is an area of Identity Management that focuses solely on privileged accounts, powerful accounts used by IT administrators,"},"eventUrl":"","translationId":110,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":254,"title":"Centralize management"},{"id":10,"title":"Ensure Compliance"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"}]}},"categories":[{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://antiviruspro.ru/projects/detail.php?ID=131557","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":141,"title":"InfoWatch Traffic Monitor для банка","description":"Проект по внедрению системы предотвращения утечек конфиденциальной информации на базе ПО InfoWatch DLP и Oracle\r\n\r\nразработка проекта: июль 2010\r\nКомпания "Антивирусные решения" (торговая марка ARinteg) произвела работы по внедрению решения InfoWatch Traffic Monitor, предназначенного для защиты конфиденциальной информации от утечек и прочих внутренних угроз информационной безопасности, в одном из крупнейших банков России - Связь-Банке.\r\n\r\nСвязь-Банк основан в 1991 году. Сегодня Связь-Банк - это универсальный кредитно-финансовый институт, география присутствия которого охватывает 52 субъекта Российской Федерации. Региональная сеть Банка включает Головной офис в Москве, 51 филиал, 139 дополнительных и мини-офисов, 105 из которых расположены в отделениях почтовой связи.\r\n\r\nГлавный акционер Связь-Банка - Государственная корпорация "Банк развития и внешнеэкономической деятельности (Внешэкономбанк)", которой принадлежит 99,4666% акций Банка.\r\n\r\nКлючевыми направлениями деятельности Связь-Банка являются обслуживание юридических и физических лиц, организация долгового финансирования, международный бизнес: работа на международных финансовых рынках, торговое и структурное финансирование, внешние заимствования.\r\n\r\nDLP-решение от InfoWatch позволяет бороться не только с утечками информации, но со всей совокупностью угроз, связанных с обращением информации, такими как:\r\nУтечка информации\r\nНецелевое использование инфраструктуры\r\nИспользование каналов связи во вред компании\r\nНарушение политики информационной безопасности\r\nТак же программный продукт InfoWatch Traffic Monitor Enterprise обеспечивает:\r\n\r\nКонтроль каналов распространения и обращения корпоративной информации;\r\nКатегоризация - определение информации, содержащей интеллектуальную собственность;\r\nПредупреждение о нарушениях или их предотвращение (блокирование нежелательных действий);\r\nРасследование нарушений и сбор доказательной базы для судебных разбирательств;\r\nУправление операционными рисками;\r\nУправление репутационными рисками;\r\nУправление юридическими рисками;\r\nОбеспечение соответствия требованиям отраслевых стандартов и законодательства.\r\nПрограммный продукт InfoWatch Traffic Monitor Enterprise призван обеспечить необходимый банку уровень безопасности конфиденциальных данных Банка и обеспечить соблюдение требований закона "О персональных данных" (№152-ФЗ).\r\n\r\nОбъем работ:\r\nПроведены работы по планированию внедрения системы DLP;\r\nПроизведена поставка оборудования и лицензий и установка системы InfoWatch Traffic Monitor Enterprise;\r\nВыполнена интеграция системы в информационную инфраструктуру Банка;\r\nПроизведена установка системы централизованного архивирования и управления - InfoWatch Forensic Storage, основанной на объектно-реляционная система управления базами данных Oracle 11g;\r\nПроизведено внедрение базы контентной фильтрации, специально разработанной для использования с информационными данными Банка;\r\nВ ходе реализации проекта выполнялась консультация специалистов заказчика и адаптация решения под нужды информационной безопасности Банка.\r\nДостигнутые результаты:\r\nВ результате данного проекта, Банк получил следующие выгоды:\r\nКонтроль над обращением корпоративной информации\r\nСоответствие требованиям законодательства\r\nУправление рисками, связанными с обращением информации\r\nУлучшение корпоративной культуры и обучение сотрудников в области ИБ\r\nТочная идентификация конфиденциальных данных\r\nРешение, реализующее гибкую схему интеграции в IT-инфрастуктуру, с возможностью дальнейшего расширения его возможностей.\r\nВысоко производительную и отказоустойчивую систему и надежную систему долгосрочного хранения перехваченной информации.\r\nИнтеграцию с продуктами сторонних производителей для создания комплексной системы ИБ компании\r\nВ результате реализации этого проекта значительно повышена степень информационной безопасности Банка.","alias":"infowatch-traffic-monitor-dlja-banka","roi":0,"seo":{"title":"InfoWatch Traffic Monitor для банка","keywords":"информации, InfoWatch, Банка, системы, безопасности, Traffic, Monitor, информационной","description":"Проект по внедрению системы предотвращения утечек конфиденциальной информации на базе ПО InfoWatch DLP и Oracle\r\rразработка проекта: июль 2010\rКомпания","og:title":"InfoWatch Traffic Monitor для банка","og:description":"Проект по внедрению системы предотвращения утечек конфиденциальной информации на базе ПО InfoWatch DLP и Oracle\r\rразработка проекта: июль 2010\rКомпания"},"deal_info":"","user":{"id":2959,"title":"Sviaz-Bank","logoURL":"https://old.b4r.io/uploads/roi/company/Sviaz-Bank.png","alias":"svjaz-bank","address":"","roles":[],"description":"Sviaz-Bank is a universal financial institution. The Bank's head office is located in Moscow. Regional network of Sviaz-Bank has more than 100 sales points in 53 regions of Russia.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.sviaz-bank.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Sviaz-Bank","keywords":"Sviaz-Bank, than, more, sales, Russia, regions, points, network","description":"Sviaz-Bank is a universal financial institution. The Bank's head office is located in Moscow. Regional network of Sviaz-Bank has more than 100 sales points in","og:title":"Sviaz-Bank","og:description":"Sviaz-Bank is a universal financial institution. The Bank's head office is located in Moscow. Regional network of Sviaz-Bank has more than 100 sales points in","og:image":"https://old.b4r.io/uploads/roi/company/Sviaz-Bank.png"},"eventUrl":""},"supplier":{"id":2010,"title":"ARinteg","logoURL":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png","alias":"arinteg","address":"","roles":[],"description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software solutions for information security services. Impeccable work, you have all the necessary competencies and adherence to professional ethics principles have allowed us to gain a high reputation in the market. Among our clients - major Russian companies and government organizations, including leading banks and industrial enterprises, multinational corporations and governments. ARinteg company provides a full range of services in the field of information security and the creation of effective IT infrastructures. The results of projects carried out ARinteg, are as follows: - construction of effective information security systems businesses - bringing the customer information systems to meet the requirements of regulatory authorities of the Russian Federation - the formation of the IT infrastructure of any level of complexity. In the course of experts ARinteg projects meet all the necessary expert-analytical, technical and consulting services: - audit of information systems and business processes, expertise in information security solutions, expert information systems of enterprises to meet the requirements of regulatory authorities, to develop sets of organizational and administrative documentation information security - the supply, installation, configuration and maintenance of IT systems - advice, training experts of customers.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":76,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":5,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.arinteg.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ARinteg","keywords":"information, ARinteg, systems, security, services, meet, regulatory, authorities","description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:title":"ARinteg","og:description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:image":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png"},"eventUrl":""},"vendors":[{"id":1793,"title":"InfoWatch","logoURL":"https://old.b4r.io/uploads/roi/company/InfoWatch.png","alias":"infowatch","address":"","roles":[],"description":"InfoWatch has been active in the information security business for more than 10 years. Once a small Kaspersky Lab project, it evolved into a group of companies that protects enterprises against various information security threats.\r\nInfoWatch leads DLP markets in Russia and the CIS and offers effective solutions for enterprise protection against internal and external security threats.\r\n\r\nInfoWatch is a group consisting of several companies that develop software products and integrated solutions to ensure information security of organizations and combat external and internal security threats. InfoWatch Group has 20 offices in Russia, Germany, Belarus, and Malaysia. Main R&D office in Moscow employs over 300 specialists and experts in the development, implementation, and promotion of proprietary products and technologies.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"https://infowatch.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"InfoWatch","keywords":"InfoWatch, security, threats, information, companies, that, against, solutions","description":"InfoWatch has been active in the information security business for more than 10 years. Once a small Kaspersky Lab project, it evolved into a group of companies","og:title":"InfoWatch","og:description":"InfoWatch has been active in the information security business for more than 10 years. Once a small Kaspersky Lab project, it evolved into a group of companies","og:image":"https://old.b4r.io/uploads/roi/company/InfoWatch.png"},"eventUrl":""}],"products":[{"id":236,"logo":false,"scheme":false,"title":"InfoWatch Traffic Monitor","vendorVerified":0,"rating":"2.60","implementationsCount":2,"suppliersCount":0,"alias":"infowatch-traffic-monitor","companyTypes":[],"description":"InfoWatch Traffic Monitor Key Features\r\npreventing the leakage of personally identifiable information and customer data bases\r\nprotection against leaks of sensitive data\r\nintellectual property protection\r\nidentifying intruders, disloyal employees, persons engaged in espionage, conspiracies, sabotage\r\ninvestigation of information security incidents\r\n\r\nInfoWatch Traffic Monitor:\r\ndetects any clients' personally identifiable information or any information for insurance claims and contracts sent to an external email address. The security officer or an authorized person will promptly receive information about the incident.\r\n","shortDescription":"InfoWatch Traffic Monitor is a comprehensive solution for data protection, loss prevention and monitoring the transmission of sensitive information outside a company, as well as for the protection of the company from internal threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"InfoWatch Traffic Monitor","keywords":"information, InfoWatch, Monitor, Traffic, data, security, protection, personally","description":"InfoWatch Traffic Monitor Key Features\rpreventing the leakage of personally identifiable information and customer data bases\rprotection against leaks of","og:title":"InfoWatch Traffic Monitor","og:description":"InfoWatch Traffic Monitor Key Features\rpreventing the leakage of personally identifiable information and customer data bases\rprotection against leaks of"},"eventUrl":"","translationId":237,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"}]}},"categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://antiviruspro.ru/projects/detail.php?ID=26950","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":20,"title":"Kaspersky Business Space Security в банке \"Траст\"","description":"Защиту сетевой архитектуры банка от информационных угроз продолжают обеспечивать\r\n4 500 лицензий Kaspersky Business Space Security.\r\nСпециалисты компании отмечают высокий уровень защиты от вредоносных программ,\r\nоперативное устранение угроз и качественную техническую поддержку.\r\nАдминистраторы имеют возможность централизованно управлять настройками и политика-\r\nми на всех компьютерах, подключенных к серверу администрирования. Kaspersky Business\r\nSpace Security обеспечивает комплексную защиту IT-инфраструктуры банка, не замедляет\r\nрабочие процессы и полностью отвечает требованиям российского законодательства.","alias":"kaspersky-business-space-security-v-banke-trast","roi":0,"seo":{"title":"Kaspersky Business Space Security в банке \"Траст\"","keywords":"Kaspersky, Security, Space, Business, банка, угроз, компьютерах, всех","description":"Защиту сетевой архитектуры банка от информационных угроз продолжают обеспечивать\r4 500 лицензий Kaspersky Business Space Security.\rСпециалисты компании","og:title":"Kaspersky Business Space Security в банке \"Траст\"","og:description":"Защиту сетевой архитектуры банка от информационных угроз продолжают обеспечивать\r4 500 лицензий Kaspersky Business Space Security.\rСпециалисты компании"},"deal_info":"","user":{"id":356,"title":"Trust Bank","logoURL":"https://old.b4r.io/uploads/roi/company/trast_bank.png","alias":"trast-bank","address":"01014, г. Киев, ул. Болсуновская, 8","roles":[],"description":"ПАО Банк «ТРАСТ» работает на рынке с 2007 года и предоставляет широкий комплекс банковских услуг физическим и юридическим лицам. 78,9% акций Банка принадлежит украинскому бизнесмену, совладельцу группы компаний EasyPay и АВК Владимиру Авраменко.\r\n\r\nРозничная сеть Банка охватывает большинство регионов Украины и насчитывает 164 точки обслуживания клиентов.\r\n\r\nБанк является участником Фонда гарантирования вкладов физических лиц, членом международной платежной системы Visa, развивает партнерские программы с национальной системой электронных платежей EasyPay.\r\n\r\nНадежность и ответственность Банка перед своими клиентами подтверждены экспертными заключениями и рекомендациями постоянных клиентов.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.banktrust.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Trust Bank","keywords":"Банка, Банк, EasyPay, клиентов, системы, физических, членом, платежной","description":"ПАО Банк «ТРАСТ» работает на рынке с 2007 года и предоставляет широкий комплекс банковских услуг физическим и юридическим лицам. 78,9% акций Банка принадлежит","og:title":"Trust Bank","og:description":"ПАО Банк «ТРАСТ» работает на рынке с 2007 года и предоставляет широкий комплекс банковских услуг физическим и юридическим лицам. 78,9% акций Банка принадлежит","og:image":"https://old.b4r.io/uploads/roi/company/trast_bank.png"},"eventUrl":""},"supplier":{"id":2010,"title":"ARinteg","logoURL":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png","alias":"arinteg","address":"","roles":[],"description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software solutions for information security services. Impeccable work, you have all the necessary competencies and adherence to professional ethics principles have allowed us to gain a high reputation in the market. Among our clients - major Russian companies and government organizations, including leading banks and industrial enterprises, multinational corporations and governments. ARinteg company provides a full range of services in the field of information security and the creation of effective IT infrastructures. The results of projects carried out ARinteg, are as follows: - construction of effective information security systems businesses - bringing the customer information systems to meet the requirements of regulatory authorities of the Russian Federation - the formation of the IT infrastructure of any level of complexity. In the course of experts ARinteg projects meet all the necessary expert-analytical, technical and consulting services: - audit of information systems and business processes, expertise in information security solutions, expert information systems of enterprises to meet the requirements of regulatory authorities, to develop sets of organizational and administrative documentation information security - the supply, installation, configuration and maintenance of IT systems - advice, training experts of customers.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":76,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":5,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.arinteg.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ARinteg","keywords":"information, ARinteg, systems, security, services, meet, regulatory, authorities","description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:title":"ARinteg","og:description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:image":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png"},"eventUrl":""},"vendors":[{"id":173,"title":"Kaspersky Lab","logoURL":"https://old.b4r.io/uploads/roi/company/kaspersky_logo.png","alias":"kaspersky-lab","address":"","roles":[],"description":"Kaspersky Lab (Лаборатория Касперского, Laboratoriya Kasperskogo) is an international software security group operating in almost 200 countries and territories worldwide. The company is headquartered in Moscow, Russia, with its holding company registered in the United Kingdom. Kaspersky Lab currently employs over 2,850 qualified specialists. It has 31 representative territory offices in 30 countries and its products and technologies provide service for over 300 million users and over 250,000 corporate clients worldwide. The company is specially focused on large enterprises, and small- and medium-sized businesses.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":39,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":1,"supplierPartnersCount":172,"b4r":0,"categories":{},"companyUrl":"www.kaspersky.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Kaspersky Lab","keywords":"Kaspersky, over, company, worldwide, countries, service, provide, representative","description":"Kaspersky Lab (Лаборатория Касперского, Laboratoriya Kasperskogo) is an international software security group operating in almost 200 countries and territories","og:title":"Kaspersky Lab","og:description":"Kaspersky Lab (Лаборатория Касперского, Laboratoriya Kasperskogo) is an international software security group operating in almost 200 countries and territories","og:image":"https://old.b4r.io/uploads/roi/company/kaspersky_logo.png"},"eventUrl":""}],"products":[{"id":119,"logo":false,"scheme":false,"title":"Kaspersky Security для бизнеса","vendorVerified":0,"rating":"3.00","implementationsCount":7,"suppliersCount":0,"alias":"kaspersky-security-dlja-biznesa","companyTypes":[],"description":"\r\n<p> </p>\r\n<p>Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор возможностей, которые позволят вам видеть, контролировать и защищать вашу IT-инфраструктуру.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Продуктовая линейка включает в себя несколько уровней с возрастающим функционалом. Уровни – Kaspersky Endpoint Security для бизнеса СТАРТОВЫЙ, СТАНДАРТНЫЙ, РАСШИРЕННЫЙ и Kaspersky Total Security для бизнеса – построены по модульному принципу и позволяют расширять возможности решения в соответствии с растущими потребностями бизнеса: от базовой защиты рабочих мест от вредоносного ПО до безопасности каждого узла сети. Кроме того, многие из представленных решений могут быть приобретены отдельно. Таким образом, компании, желающие установить дополнительную защиту лишь на определенные узлы сети, могут сделать это без лишних затрат.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Линейка Kaspersky Security для бизнеса позволяет выбрать именно то решение, которое нужно вашей организации, чтобы вы могли контролировать рабочие места (от рабочих станций до смартфонов и виртуальных машин), серверы и интернет-шлюзы и обеспечить их надежной защитой. Наши продукты также позволяют управлять безопасностью всей вашей IT-инфраструктуры удаленно.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая консоль управления: администратор может наблюдать за состоянием защиты всех физических, виртуальных и мобильных устройств, а также управлять их безопасностью с помощью единой консоли администрирования.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая платформа: все используемые в продуктах «Лаборатории Касперского» ключевые технологии, функциональные компоненты и модули разрабатываются внутри компании на собственной технологической базе.Благодаря этому растет эффективность, снижается нагрузка на систему и повышается стабильность работы приложений.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Единая лицензия: вы не получаете несколько отдельных решений в рамках одной покупки — вы приобретаете единое комплексное решение, которое вы можете гибко настраивать в соответствии со своими бизнес-целями.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — СТАРТОВЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Это идеальный вариант для заказчиков, которым необходима только защита от вредоносного ПО. Единая консоль управления Kaspersky Security Center с интуитивно понятным интерфейсом дополняет все наши решения для рабочих станций.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — СТАНДАРТНЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Список средств защиты в решении уровня СТАНДАРТНЫЙ включает средства обеспечения безопасности рабочих станций и файловых серверов, динамические белые списки, а также средства контроля программ, устройств и веб-ресурсов. В него также входят инструменты для защиты мобильных устройств и управления ими. Если потребности вашего бизнеса включают защиту мобильных сотрудников и применение политик IT-безопасности, то вам подойдет решение уровня СТАНДАРТНЫЙ.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Endpoint Security для бизнеса — РАСШИРЕННЫЙ</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>На уровне РАСШИРЕННЫЙ «Лаборатория Касперского» добавила ко всем вышеперечисленным функциям шифрование данных. Еще одна новая разработка «Лаборатории Касперского» средство системного администрирования — обеспечивает безопасность и одновременно повышает производительность IT-инфраструктуры. <span style=\"font-weight: bold;\">Такой широкий набор функций и полезных инструментов позволяет:</span></p>\r\n<p> </p>\r\n\r\n\r\n<ul>\r\n<li>создавать и хранить образы систем и осуществлять их удаленное развертывание;</li>\r\n<li>устанавливать приоритет устранения уязвимостей в аппаратном и программном обеспечении благодаря эффективному сочетанию мониторинга уязвимостей и интеллектуального управления установкой исправлений;</li>\r\n<li>контролировать использование лицензий на программное обеспечение с помощью модуля управления лицензиями;</li>\r\n<li>задавать политики доступа к данным и IT-инфраструктуре для пользователей и гостей с помощью средства контроля доступа в сеть (NAC);</li>\r\n<li>удаленно развертывать и устанавливать программы и обновления на компьютеры пользователей с помощью единой централизованной консоли администрирования.</li>\r\n</ul>\r\n\r\n\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Kaspersky Total Security для бизнеса</span></p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p>Наш флагманский продукт — Kaspersky Total Security для бизнеса — включает в себя возможности всех предыдущих уровней и дополнительно укрепляет безопасность вашей IT-инфраструктуры с помощью средств для защиты почтовых серверов, интернет-шлюзов и серверов совместной работы. Это идеальное решение для организаций с высокими требованиями к IT-безопасности, которым нужна надежная защита каждого узла сети.</p>\r\n<p> </p>\r\n\r\n\r\n<p> </p>\r\n<p> </p>\r\n<p> </p>\r\n","shortDescription":"Kaspersky Security для бизнеса – для обеспечения безопасности корпоративной информационной сети, позволят вам видеть, контролировать и защищать вашу IT-инфраструктуру.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Kaspersky Security для бизнеса","keywords":"бизнеса, Kaspersky, Security, управления, помощью, защиты, Единая, Endpoint","description":"Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор","og:title":"Kaspersky Security для бизнеса","og:description":"Kaspersky Security для бизнеса – новейшая линейка продуктов для обеспечения безопасности корпоративной информационной сети, предоставляющая широкий набор"},"eventUrl":"","translationId":2340,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"2012-01-01","endDate":"2012-12-31","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"}]}},"categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.kaspersky.ru/about/news/business/2012/Bank_TRAST_i_Laboratoriya_Kasperskogo_prodoljayut_sovmestnuyu_rabotu","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":178,"title":"Виртуализации инфраструктуры серверного парка машиностроительного завода на базе Microsoft Hyper-V, Microsoft WINDOWS SERVER","description":"Проект по виртуализации инфраструктуры серверного парка предприятия на базе продуктов Microsoft\r\nразработка проекта: июль 2011\r\nМашиностроительный завод «ТОНАР» благодарит компанию «Антивирусные решения» (торговая марка ARinteg) за качественное и своевременное выполнение проекта по виртуализации серверного парка предприятия.\r\n\r\nСотрудники «Антивирусных решений» успешно справились со всеми поэтапными задачами проекта:\r\n\r\n— произвели тщательное обследование компьютерной сети завода\r\nподобрали оптимальное для данной сети решение виртуализации - технологию Microsoft Hyper-V, встроенную в серверную ОС Windows Server 2008 R2\r\nподготовили всю необходимую документацию, описывающую архитектуру выбранного решения и метод внедрения\r\nразвернули тестовый стенд, имитирующий компьютерную среду заказчика, где произвели тестирование на всех типичных задачах и пиковых нагрузках\r\nнастроили роли и сетевые интерфейсы, подключили систему хранения данных, организовали вычислительный кластер\r\nвыполнили «бесшовный» перенос физических серверов в виртуальную среду\r\nпродемонстрировали отказоустойчивую работу кластера при отключении одного из его узлов\r\n— запустили средства автоматического резервного копирования и централизованного управления виртуальными машинами\r\nпроизвели необходимые консультации специалистов заказчика, обслуживающих ИТ-инфраструктуру.\r\nВ результате выполнения проекта на заводе создана надежная, отказоустойчивая ИТ-инфраструктура, обеспечивающая высокую доступность ИТ-сервисов. Консолидация серверов позволила лучше загрузить вычислительные мощности. Используя средства централизованного управления, администраторы завода могут легко контролировать состояние виртуализированной среды и выполняемых сервисов, производить плановое обслуживание, перенос и создание виртуальных машин. Сокращены затраты времени на резервное копирование данных, восстановление и развертывание новых сервисов. Виртуализированная система легко масштабируется – при необходимости к кластеру могут быть подключены новые узлы.\r\n\r\nВсе работы по проекту выполнены в полном объеме и в установленные сроки. Участники проектной группы «Антивирусных решений» проявили высокий профессионализм и добросовестное отношение к работе. Следует также отметить их умение находить решения в нестандартных ситуациях и оперативный отклик на запросы и пожелания заказчика.\r\n\r\nМы надеемся на дальнейшее плодотворное сотрудничество и готовы рекомендовать компанию «Антивирусные решения» заинтересованным лицам и организациям для выполнения аналогичных проектов.\r\n\r\nГенеральный директор завода «ТОНАР» Владимир Антонович Пазычев","alias":"virtualizacii-infrastruktury-servernogo-parka-mashinostroitelnogo-zavoda-na-baze-microsoft-hyper-v-microsoft-windows-server","roi":0,"seo":{"title":"Виртуализации инфраструктуры серверного парка машиностроительного завода на базе Microsoft Hyper-V, Microsoft WINDOWS SERVER","keywords":"решения, проекта, завода, Microsoft, виртуализации, парка, произвели, серверного","description":"Проект по виртуализации инфраструктуры серверного парка предприятия на базе продуктов Microsoft\rразработка проекта: июль 2011\rМашиностроительный завод «ТОНАР»","og:title":"Виртуализации инфраструктуры серверного парка машиностроительного завода на базе Microsoft Hyper-V, Microsoft WINDOWS SERVER","og:description":"Проект по виртуализации инфраструктуры серверного парка предприятия на базе продуктов Microsoft\rразработка проекта: июль 2011\rМашиностроительный завод «ТОНАР»"},"deal_info":"","user":{"id":3011,"title":"TONAR","logoURL":"https://old.b4r.io/uploads/roi/company/Tonar.png","alias":"tonar","address":"","roles":[],"description":"Machinery building plant “TONAR” – this is one of the biggest and leader company to producing of trailers, semitrailers and tipper semitrailers in Russia.\r\n\r\n“TONAR” today – this is a modern machinery building plant, it located in Moscow region, village Gubino and to have area in 19 Hectares. Area of producing buildings – 44 944 sq. Warehouse “TONAR” to have area in 6 Hectares.\r\n\r\nThe production process covers the entire technological cycle - from design, manufacturing and assembly of finished products to sales and service.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.tonar.info/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TONAR","keywords":"TONAR, Hectares, area, producing, have, semitrailers, this, plant","description":"Machinery building plant “TONAR” – this is one of the biggest and leader company to producing of trailers, semitrailers and tipper semitrailers in Russia.\r","og:title":"TONAR","og:description":"Machinery building plant “TONAR” – this is one of the biggest and leader company to producing of trailers, semitrailers and tipper semitrailers in Russia.\r","og:image":"https://old.b4r.io/uploads/roi/company/Tonar.png"},"eventUrl":""},"supplier":{"id":2010,"title":"ARinteg","logoURL":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png","alias":"arinteg","address":"","roles":[],"description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software solutions for information security services. Impeccable work, you have all the necessary competencies and adherence to professional ethics principles have allowed us to gain a high reputation in the market. Among our clients - major Russian companies and government organizations, including leading banks and industrial enterprises, multinational corporations and governments. ARinteg company provides a full range of services in the field of information security and the creation of effective IT infrastructures. The results of projects carried out ARinteg, are as follows: - construction of effective information security systems businesses - bringing the customer information systems to meet the requirements of regulatory authorities of the Russian Federation - the formation of the IT infrastructure of any level of complexity. In the course of experts ARinteg projects meet all the necessary expert-analytical, technical and consulting services: - audit of information systems and business processes, expertise in information security solutions, expert information systems of enterprises to meet the requirements of regulatory authorities, to develop sets of organizational and administrative documentation information security - the supply, installation, configuration and maintenance of IT systems - advice, training experts of customers.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":76,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":5,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.arinteg.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ARinteg","keywords":"information, ARinteg, systems, security, services, meet, regulatory, authorities","description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:title":"ARinteg","og:description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:image":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png"},"eventUrl":""},"vendors":[{"id":2010,"title":"ARinteg","logoURL":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png","alias":"arinteg","address":"","roles":[],"description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software solutions for information security services. Impeccable work, you have all the necessary competencies and adherence to professional ethics principles have allowed us to gain a high reputation in the market. Among our clients - major Russian companies and government organizations, including leading banks and industrial enterprises, multinational corporations and governments. ARinteg company provides a full range of services in the field of information security and the creation of effective IT infrastructures. The results of projects carried out ARinteg, are as follows: - construction of effective information security systems businesses - bringing the customer information systems to meet the requirements of regulatory authorities of the Russian Federation - the formation of the IT infrastructure of any level of complexity. In the course of experts ARinteg projects meet all the necessary expert-analytical, technical and consulting services: - audit of information systems and business processes, expertise in information security solutions, expert information systems of enterprises to meet the requirements of regulatory authorities, to develop sets of organizational and administrative documentation information security - the supply, installation, configuration and maintenance of IT systems - advice, training experts of customers.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":76,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":5,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.arinteg.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ARinteg","keywords":"information, ARinteg, systems, security, services, meet, regulatory, authorities","description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:title":"ARinteg","og:description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:image":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png"},"eventUrl":""}],"products":[{"id":1497,"logo":false,"scheme":false,"title":"Microsoft Hyper-V, Microsoft WINDOWS SERVER от ARinteg","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"alias":"microsoft-hyper-v-microsoft-windows-server-ot-arinteg","companyTypes":[],"description":"Hyper-V существует в двух вариантах:\r\nКак отдельный продукт Microsoft Hyper-V Server. Существует четыре версии: Hyper-V Server 2012 R2 (текущая версия Hyper-V), Hyper-V Server 2012, Hyper-V Server 2008 R2 и Hyper-V Server 2008.\r\nКак роль Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2, Windows Server 2008 и x64-битная Pro и Enterprise версии Windows 8, Windows 8.1, Windows 10.","shortDescription":"Windows Server — линейка серверных операционных систем от компании Microsoft\r\nMicrosoft Hyper-V (кодовое имя Viridian), — система аппаратной виртуализации для x64-систем на основе гипервизора. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Hyper-V, Microsoft WINDOWS SERVER от ARinteg","keywords":"Server, Hyper-V, Windows, 2012, 2008, Microsoft, версии, x64-битная","description":"Hyper-V существует в двух вариантах:\rКак отдельный продукт Microsoft Hyper-V Server. Существует четыре версии: Hyper-V Server 2012 R2 (текущая версия Hyper-V),","og:title":"Microsoft Hyper-V, Microsoft WINDOWS SERVER от ARinteg","og:description":"Hyper-V существует в двух вариантах:\rКак отдельный продукт Microsoft Hyper-V Server. Существует четыре версии: Hyper-V Server 2012 R2 (текущая версия Hyper-V),"},"eventUrl":"","translationId":2709,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Virtual_machine_and_cloud_system_software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":9,"title":"Support Decision Making"},{"id":8,"title":"Reduce Production Timelines"},{"id":10,"title":"Ensure Compliance"},{"id":254,"title":"Centralize management"},{"id":307,"title":"Enhance Competitive Ability"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":179,"title":"Shortage of inhouse software developers"}]}},"categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Virtual_machine_and_cloud_system_software.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://antiviruspro.ru/projects/detail.php?ID=25243","title":"Supplier's web site"}},"comments":[],"referencesCount":0}],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":5,"supplierPartnersCount":0,"b4r":0,"categories":{},"branches":"Information Technology","companyUrl":"http://www.arinteg.ru/","countryCodes":["RUS"],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ARinteg","keywords":"information, ARinteg, systems, security, services, meet, regulatory, authorities","description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:title":"ARinteg","og:description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:image":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png"},"eventUrl":"","vendorPartners":[{"vendor":"Microsoft","partnershipLevel":"Gold","countries":"","partnersType":""},{"vendor":"VMware","partnershipLevel":"Solution Provider - Professional","countries":"","partnersType":""},{"vendor":"Kaspersky Lab","partnershipLevel":"Platinum","countries":"","partnersType":""},{"vendor":"Autodesk","partnershipLevel":"Bronze","countries":"","partnersType":""},{"vendor":"McAfee","partnershipLevel":"Gold","countries":"","partnersType":""}],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[{"id":2271,"logoURL":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg","logo":true,"scheme":false,"title":"Microsoft category A","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-category-a","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft category A","keywords":"","description":"","og:title":"Microsoft category A","og:description":"","og:image":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg"},"eventUrl":"","translationId":2271,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":832,"title":"Category A","alias":"category-a","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2273,"logoURL":"https://old.b4r.io/fileadmin/content/9631386584_f8ab2bf216_b_41.jpg","logo":true,"scheme":false,"title":"Microsoft test","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-test","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft test","keywords":"","description":"","og:title":"Microsoft test","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/9631386584_f8ab2bf216_b_41.jpg"},"eventUrl":"","translationId":2274,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":503,"title":"Storage Networking","alias":"storage-networking","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/storage-networks.png"},{"id":505,"title":"Entry Level Storage","alias":"entry-level-storage","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/entry-level-storage.png"},{"id":48,"title":"CCTV - Closed-circuit television","alias":"cctv-closed-circuit-television","description":"Видеонаблюдение (англ. Сlosed Circuit Television, CCTV — система телевидения замкнутого контура) — процесс, осуществляемый с применением оптико-электронных устройств, предназначенных для визуального контроля или автоматического анализа изображений (автоматическое распознавание лиц, государственных номеров).\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%92%D0%B8%D0%B4%D0%B5%D0%BE%D0%BD%D0%B0%D0%B1%D0%BB%D1%8E%D0%B4%D0%B5%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/video_control.png"},{"id":51,"title":"PaaS - Platform as a service","alias":"paas-platform-as-a-service","description":"Platform as a Service (PaaS, «платформа как услуга») — модель предоставления облачных вычислений, при которой потребитель получает доступ к использованию информационно-технологических платформ: операционных систем, систем управления базами данных, связующему программному обеспечению, средствам разработки и тестирования, размещённым у облачного провайдера. В этой модели вся информационно-технологическая инфраструктура, включая вычислительные сети, серверы, системы хранения, целиком управляется провайдером, провайдером же определяется набор доступных для потребителей видов платформ и набор управляемых параметров платформ, а потребителю предоставляется возможность использовать платформы, создавать их виртуальные экземпляры, устанавливать, разрабатывать, тестировать, эксплуатировать на них прикладное программное обеспечение, при этом динамически изменяя количество потребляемых вычислительных ресурсов.\r\n\r\nПровайдер облачной платформы может взимать плату с потребителей в зависимости от уровня потребления, тарификация возможна по времени работы приложений потребителя, по объёму обрабатываемых данных и количеству транзакций над ними, по сетевому трафику. Провайдеры облачных платформ достигают экономического эффекта за счёт использования виртуализации и экономии на масштабах, когда из множества потребителей в одно и то же время лишь часть из них активно использует вычислительные ресурсы, потребители — за счёт отказа от капитальных вложений в инфраструктуру и платформы, рассчитанных под пиковую мощность и непрофильных затрат на непосредственное обслуживание всего комплекса.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Platform_as_a_service","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PaaS__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2275,"logoURL":"https://old.b4r.io/fileadmin/content/71a0097cf851c21c82e3c3afb19f97e9f4889be6.jpg","logo":true,"scheme":false,"title":"Microsoft test 2","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-test-2","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft test 2","keywords":"","description":"","og:title":"Microsoft test 2","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/71a0097cf851c21c82e3c3afb19f97e9f4889be6.jpg"},"eventUrl":"","translationId":2275,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":775,"title":"Category","alias":"category","description":"","materialsDescription":""},{"id":832,"title":"Category A","alias":"category-a","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1497,"logoURL":"https://old.b4r.io/fileadmin/user_upload/ARinteg.png","logo":true,"scheme":false,"title":"Microsoft Hyper-V, Microsoft WINDOWS SERVER от ARinteg","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"microsoft-hyper-v-microsoft-windows-server-ot-arinteg","companyTitle":"ARinteg","companyTypes":["supplier"],"companyId":2010,"companyAlias":"arinteg","description":"Hyper-V существует в двух вариантах:\r\nКак отдельный продукт Microsoft Hyper-V Server. Существует четыре версии: Hyper-V Server 2012 R2 (текущая версия Hyper-V), Hyper-V Server 2012, Hyper-V Server 2008 R2 и Hyper-V Server 2008.\r\nКак роль Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2, Windows Server 2008 и x64-битная Pro и Enterprise версии Windows 8, Windows 8.1, Windows 10.","shortDescription":"Windows Server — линейка серверных операционных систем от компании Microsoft\r\nMicrosoft Hyper-V (кодовое имя Viridian), — система аппаратной виртуализации для x64-систем на основе гипервизора. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Hyper-V, Microsoft WINDOWS SERVER от ARinteg","keywords":"Server, Hyper-V, Windows, 2012, 2008, Microsoft, версии, x64-битная","description":"Hyper-V существует в двух вариантах:\rКак отдельный продукт Microsoft Hyper-V Server. Существует четыре версии: Hyper-V Server 2012 R2 (текущая версия Hyper-V),","og:title":"Microsoft Hyper-V, Microsoft WINDOWS SERVER от ARinteg","og:description":"Hyper-V существует в двух вариантах:\rКак отдельный продукт Microsoft Hyper-V Server. Существует четыре версии: Hyper-V Server 2012 R2 (текущая версия Hyper-V),","og:image":"https://old.b4r.io/fileadmin/user_upload/ARinteg.png"},"eventUrl":"","translationId":2709,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Virtual_machine_and_cloud_system_software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":10,"logoURL":"https://old.b4r.io/fileadmin/user_upload/autocad-2017-lockup-1200x132.png","logo":true,"scheme":false,"title":"Autodesk AutoCAD","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":70,"alias":"autodesk-autocad","companyTitle":"Autodesk","companyTypes":["vendor"],"companyId":180,"companyAlias":"autodesk","description":"Developed and marketed by Autodesk, AutoCAD was first released in December 1982 as a desktop app running on microcomputers with internal graphics controllers. Since 2010, AutoCAD was released as a mobile- and web app as well, marketed as AutoCAD 360. Auto CAD and AutoCAD LT are available for English, German, French, Italian, Spanish, Korean, Chinese Simplified, Chinese Traditional, Brazilian Portuguese, Russian, Czech, Polish and Hungarian, Albanian (also through additional language packs). The extent of localization varies from full translation of the product to documentation only. The AutoCAD command set is localized as a part of the software localization. Source: https://en.wikipedia.org/wiki/AutoCAD","shortDescription":"AutoCAD is a commercial computer-aided design (CAD) and drafting software application. It is used across a wide range of industries, by architects, project managers, engineers and graphic designers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":2,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Autodesk AutoCAD","keywords":"AutoCAD, localization, Autodesk, released, Chinese, marketed, Hungarian, Albanian","description":"Developed and marketed by Autodesk, AutoCAD was first released in December 1982 as a desktop app running on microcomputers with internal graphics controllers.","og:title":"Autodesk AutoCAD","og:description":"Developed and marketed by Autodesk, AutoCAD was first released in December 1982 as a desktop app running on microcomputers with internal graphics controllers.","og:image":"https://old.b4r.io/fileadmin/user_upload/autocad-2017-lockup-1200x132.png"},"eventUrl":"","translationId":1411,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"истема автоматизированного проектирования — автоматизированная система, реализующая информационную технологию выполнения функций проектирования, представляет собой организационно-техническую систему, предназначенную для автоматизации процесса проектирования, состоящую из персонала и комплекса технических, программных и других средств автоматизации его деятельности. Также для обозначения подобных систем широко используется аббревиатура САПР.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D0%B0%D0%B2%D1%82%D0%BE%D0%BC%D0%B0%D1%82%D0%B8%D0%B7%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%BD%D0%BE%D0%B3%D0%BE_%D0%BF%D1%80%D0%BE%D0%B5%D0%BA%D1%82%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D1%8F","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/sapr.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":778,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Surface_Laptop.jpg","logo":true,"scheme":false,"title":"Microsoft Surface Laptop","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-surface-laptop","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"Surface Laptop provides the perfect blend of texture, subtle details, and clean, elegant lines — plus the luxurious touch of our Signature Alcantara® material-covered keyboard.\r\nThe perfect balance of portability and performance.\r\nYou don’t have to choose between power and traveling light. At just 2.76 pounds, Surface Laptop gives you an ideal balance of both, plus all-day battery life.\r\nA stunning screen that responds to your touch.\r\nExperience faster, more natural navigation on the vibrant 13.5” PixelSense™ Display with immersive touchscreen. Enjoy more space for your ideas with an edge-to-edge display and ultra-thin bezel.\r\n\r\n","shortDescription":"Microsoft Surface Laptop is designed for Windows 10 S — streamlined for security and superior performance.2 Applications are delivered via the Windows Store, ensuring that they’re Microsoft verified.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Surface Laptop","keywords":"Laptop, Surface, touch, your, plus, perfect, balance, with","description":"Surface Laptop provides the perfect blend of texture, subtle details, and clean, elegant lines — plus the luxurious touch of our Signature Alcantara®","og:title":"Microsoft Surface Laptop","og:description":"Surface Laptop provides the perfect blend of texture, subtle details, and clean, elegant lines — plus the luxurious touch of our Signature Alcantara®","og:image":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Surface_Laptop.jpg"},"eventUrl":"","translationId":779,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1034,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Coco_Framework.png","logo":true,"scheme":false,"title":"Microsoft Coco Framework","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-coco-framework","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these requirements, Coco presents an alternative approach to ledger construction, giving enterprises the scalability, distributed governance and enhanced confidentiality they need without sacrificing the inherent security and immutability they expect.\r\nLeveraging the power of existing blockchain protocols, trusted execution environments (TEEs) such as Intel SGX and Windows Virtual Secure Mode (VSM), distributed systems and cryptography, Coco enables enterprise-ready blockchain networks that deliver:\r\n\r\n<ul><li>Throughput and latency approaching database speeds.</li><li>Richer, more flexible, business-specific confidentiality models.</li><li>Network policy management through distributed governance.</li><li>Support for non-deterministic transactions.</li></ul>\r\nBy providing these capabilities, Coco offers a trusted foundation with which existing blockchain protocols can be integrated to deliver complete, enterprise-ready ledger solutions, opening up broad, high scale scenarios across industries, and furthering blockchain's ability to digital transform business.\r\nWe have already begun exploring Coco’s potential across a variety of industries, including retail, supply chain and financial services.\r\nWhether a customer is designing an end-to-end trade finance solution, using blockchain to ensure security at the edge or leveraging Enterprise Smart Contracts to drive back office efficiencies, Coco enables them to meet their enterprise requirements. Microsoft is the only cloud provider that delivers consistency across on-premises and the public cloud at hyperscale while providing access to the rich Azure ecosystem for the wide range of applications that will be built on top of blockchain as a shared data layer.\r\nAn open approach\r\nBy design, Coco is open and compatible with any blockchain protocol. Microsoft has already begun integrating Ethereum into Coco and we’re thrilled to announce that J.P. Morgan Chase, Intel and R3 have committed to integrating enterprise ledgers, Quorum, Hyperledger Sawtooth and Corda, respectively. This is just the beginning, and we look forward to exploring integration opportunities with other ledgers in the near future.\r\n","shortDescription":"Microsoft Coco Framework is an open-source system that enables high-scale, confidential blockchain networks that meet all key enterprise requirements—providing a means to accelerate production enterprise adoption of blockchain technology.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Coco Framework","keywords":"Coco, blockchain, that, with, distributed, Microsoft, across, existing","description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these","og:title":"Microsoft Coco Framework","og:description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these","og:image":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Coco_Framework.png"},"eventUrl":"","translationId":1035,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1546,"logoURL":"https://old.b4r.io/fileadmin/user_upload/data-warehouse.jpg","logo":true,"scheme":false,"title":"Azure Data Warehouse","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"azure-data-warehouse","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily get started, take advantage of the performance, flexibility, and security of Azure's fully managed services, such as SQL Azure and Azure Databricks.</p>\r\n<h2>Get rid of worries</h2>\r\n<h2><br /><span style=\"font-weight: normal;\">Built-in advanced security features include transparent data encryption, auditing, threat detection, integration with Azure Active Directory and virtual network endpoints. Azure services correspond to more than 50 industry and geographic certifications and are available worldwide in 42 regions to store your data wherever your users are located. Finally, Microsoft offers financially secured service level agreements to spare you any hassle.</span></h2>","shortDescription":"Azure Data Warehouse - is a modern data storage from Microsoft","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Azure Data Warehouse","keywords":"Azure, data, your, analytics, security, such, services, correspond","description":"Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions","og:title":"Azure Data Warehouse","og:description":"Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions","og:image":"https://old.b4r.io/fileadmin/user_upload/data-warehouse.jpg"},"eventUrl":"","translationId":1549,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":24,"title":"IaaS - storage"}],"testingArea":"","categories":[{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IaaS_-_Storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1550,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Azure-Virtual-machines.png","logo":true,"scheme":false,"title":"Azure Virtual Machines","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"azure-virtual-machines","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide range of computing solutions. All current-generation virtual machines include load balancing and autoscaling. <span style=\"color: #505050; font-family: 'Segoe UI', SegoeUI, 'Segoe WP', Tahoma, Arial, sans-serif; font-size: 15px; background-color: #ffffff;\"><br /></span>Azure Virtual Machines - is a proposal that includes various solutions, from an inexpensive B series to virtual machines with the latest GPU optimized for machine learning. It is designed to perform any workloads within any budget.</p>","shortDescription":"Azure Virtual Machines - is a computing service from Microsoft","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Azure Virtual Machines","keywords":"Azure, virtual, machines, Machines, Virtual, solutions, Server, series","description":"Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide","og:title":"Azure Virtual Machines","og:description":"Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide","og:image":"https://old.b4r.io/fileadmin/user_upload/Azure-Virtual-machines.png"},"eventUrl":"","translationId":1551,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":26,"title":"IaaS - computing"}],"testingArea":"","categories":[{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"IaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computingIaaS - computing ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iaas-computing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1044,"logoURL":"https://old.b4r.io/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Microsoft System Center Virtual Machine Manager Analytics решение","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-system-center-virtual-machine-manager-analytics-reshenie","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"Microsoft System Center Virtual Machine Manager Analytics - это решение с открытым исходным кодом, которое может быть включено в рабочее пространство OMS. Это решение приносит данные о работе ваших локальных экземпляров VMM в лог-аналитику в OMS. Администраторы VMM могут затем использовать эту универсальную платформу для построения запросов для поиска соответствующих данных и создания визуализации данных.\r\n\r\nРешение Analytics для диспетчера виртуальных машин поставляется с некоторыми встроенными отчетами с предварительно сконфигурированной визуализацией данных, поэтому вы можете легко начать с часто используемых запросов, таких как:\r\n<ul><li>Распределение неудачных заданий в экземплярах VMM для легкого раскрытия разбитых экземпляров.</li><li>Распределение сбоев с течением времени, чтобы найти неожиданные всплески и помочь в корреляции причин и сбоев.</li><li>Распределение неудачных заданий и ошибок, чтобы помочь определить наиболее подверженные ошибкам задания и причину.</li><li>Распределение времени выполнения задания в разных прогонах для определения вялых и подверженных ошибкам заданий.</li></ul>\r\nКроме того, данные из System Center Virtual Machine Manager могут быть объединены с несколькими функциями в OMS для принудительного использования, в том числе:\r\n<ul><li>Объедините данные заданий из нескольких экземпляров VMM в одно рабочее пространство OMS. Теперь вы можете следить за деталями работы для всех экземпляров VMM вместе.</li><li>Настройте оповещения OMS с информацией о заданиях VMM, чтобы получать уведомления о завершении или сбое заданий VMM и информировать соответствующие команды.</li><li>Корреляция данных задания VMM с другими событиями в аналитике журналов OMS для быстрого устранения неполадок. Вы можете легко определить возможные причины неожиданных сбоев на машине VMM, сопоставив журналы работы VMM с информацией из таких решений, как Change Tracking и Hyper-V.</li><li>Используйте рабочие книги Azure Automation с данными задания VMM, чтобы помочь включить автоматическую коррекцию для известных или часто возникающих проблем.</li></ul>","shortDescription":"Решение Microsoft System Center Virtual Machine Manager Analytics, которое теперь доступно в Azure Log Analytics и в составе пакета управления операциями (OMS). Эти решения работают вместе с продуктами System Center для обеспечения современных сценариев управления ИТ, обеспечивая упрощенные способы решения и предотвращения проблем.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft System Center Virtual Machine Manager Analytics решение","keywords":"заданий, экземпляров, Распределение, задания, чтобы, данных, помочь, данные","description":"Microsoft System Center Virtual Machine Manager Analytics - это решение с открытым исходным кодом, которое может быть включено в рабочее пространство OMS. Это","og:title":"Microsoft System Center Virtual Machine Manager Analytics решение","og:description":"Microsoft System Center Virtual Machine Manager Analytics - это решение с открытым исходным кодом, которое может быть включено в рабочее пространство OMS. Это","og:image":"https://old.b4r.io/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":2622,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Virtual_machine_and_cloud_system_software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1045,"logoURL":"https://old.b4r.io/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Microsoft System Center Virtual Machine Manager Analytics solution","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-system-center-virtual-machine-manager-analytics-solution","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"The Virtual Machine Manager Analytics solution comes with some built-in reports with preconfigured data visualizations so you can easily get started with frequently used queries, such as:\r\n\r\n<ul><li>Distribution of failed jobs across VMM instances to easily scope down the broken instances.</li><li>Distribution of failures over time to find sudden spikes, and to help with correlating the cause and failures.</li><li>Distribution of failed jobs and errors to help with identifying the most error-prone jobs and the cause.</li><li>Distribution of the job runtime across different runs to identify the sluggish and error-prone jobs.</li></ul>\r\nThese are just a few examples of the possibilities with Virtual Machine Manager Analytics. Because the solution is open-source, we are looking forward to contributions from the community for other data visualizations.\r\nFurther, the data from System Center Virtual Machine Manager can be combined with several features in OMS for compelling use cases, including:\r\n<ul><li>Bring together the jobs data from multiple VMM instances to a single OMS workspace. With a view, now you can keep an eye on job details for all your VMM instances together.</li><li>Configure your OMS alerts with VMM jobs information to raise notifications for completion or failure of VMM jobs, and inform the appropriate teams.</li><li>Correlate VMM job data with other events in OMS log analytics for faster troubleshooting of failures. You can easily identify the possible causes of sudden failures on a VMM machine by correlating the VMM job logs with information from solutions like Change Tracking and Hyper-V management solutions.</li><li>Use Azure Automation runbooks with VMM job data to help enable automatic remediation for known or frequent issues.</li></ul>","shortDescription":"Virtual Machine Manager Analytics is an open-source solution that can be included in your OMS workspace. This solution brings in the job data of your on-premises VMM instances to the log analytics in OMS. VMM admins can then use this versatile platform to construct queries for searching the relevant data and creating data visualizations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft System Center Virtual Machine Manager Analytics solution","keywords":"with, jobs, data, failures, Distribution, instances, Manager, from","description":"The Virtual Machine Manager Analytics solution comes with some built-in reports with preconfigured data visualizations so you can easily get started with","og:title":"Microsoft System Center Virtual Machine Manager Analytics solution","og:description":"The Virtual Machine Manager Analytics solution comes with some built-in reports with preconfigured data visualizations so you can easily get started with","og:image":"https://old.b4r.io/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":1045,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Virtual_machine_and_cloud_system_software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":538,"logoURL":"https://old.b4r.io/fileadmin/content/csm_McAfee.png","logo":true,"scheme":false,"title":"McAfee Complete Endpoint Threat Protection","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-complete-endpoint-threat-protection","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: #53565a; font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;\">McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.</p>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: #53565a; font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;\">Core endpoint protection, including anti-malware, firewall, device control, email and web security works together with machine learning and dynamic application containment to detect zero-day threats in near real time, and classify and halt them before they can execute on your systems. Actionable forensic data and easy-to-read reports keep you informed and help you make the move from responding to outbreaks, to investigating and hardening your defenses. And, because McAfee Complete Endpoint Threat Protection is built using an extensible framework, you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.</p>","shortDescription":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Complete Endpoint Threat Protection","keywords":"McAfee, Complete, defenses, your, Threat, Endpoint, Protection, zero-day","description":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and","og:title":"McAfee Complete Endpoint Threat Protection","og:description":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and","og:image":"https://old.b4r.io/fileadmin/content/csm_McAfee.png"},"eventUrl":"","translationId":595,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2084,"logoURL":"https://old.b4r.io/fileadmin/content/MCAfee_Email.jpg","logo":true,"scheme":false,"title":"McAfee Email Gateway","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-email-gateway","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<p>McAfee Email Gateway consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single, easy-to-deploy and user-friendly appliance. As a comprehensive email security solution, Email Gateway can stand alone or work in tandem with McAfee SaaS Email Protection & Continuity. It eliminates ineffective piecemeal defenses, simplifies multivendor security environments, and reduces operating costs — while significantly strengthening email security. Email Gateway delivers:</p>\r\n<p><span style=\"font-weight: bold;\">Total inbound protection</span> — Email Gateway provides the most complete protection available against inbound threats. Powerful antispam scanning technologies identify and block incoming spam with over 99% accuracy. And it protects your network from viruses, malware, phishing, directory harvest, denial of service (DoS), bounceback attacks, zero-hour threats, and spam surges.</p>\r\n<p><span style=\"font-weight: bold;\">Total outbound protection</span> — Available at no extra charge are push, pull, and TLS encryption and built-in data loss prevention (DLP) capabilities that utilize the same text-matching dictionaries found in McAfee Data Loss Prevention. These DLP capabilities are fully administrable from the Email Gateway user interface or McAfee ePolicy Orchestrator (ePO). Using sophisticated content-scanning technologies, multiple encryption techniques, and granular, policy-based message handling, Email Gateway prevents outbound data loss and keeps sensitive data secure.</p>\r\n<p><span style=\"font-weight: bold;\">Simple, powerful administration from within McAfee ePO</span> — With Email Gateway, administrators can deliver superior email protection and document it with customizable, enterprise-class reporting, exportable report logs, real-time dashboards, and alerts. Email Gateway combines performance, scalability, and stability with a flexible delivery model to ensure maximum ROI.</p>\r\n<p><span style=\"font-weight: bold;\">A virtualized solution</span> — The Email Gateway appliance is also available as a virtual appliance, so you can reap the benefits of virtualization. With lower costs than a physical appliance, a virtual appliance also provides maximum flexibility, including the ability to consolidate solutions on a single server.</p>\r\n<p><span style=\"font-weight: bold;\">Enhanced security powered by McAfee Global Threat Intelligence (GTI)</span> — McAfee GTI is a comprehensive cloud-based threat intelligence service. Integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Email Gateway uses the message reputation service to identify email messages carrying malicious payloads.</p>","shortDescription":"MEG consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single, easy-to-deploy and user-friendly appliance.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Email Gateway","keywords":"Email, Gateway, McAfee, data, security, appliance, protection, email","description":"McAfee Email Gateway consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single,","og:title":"McAfee Email Gateway","og:description":"McAfee Email Gateway consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single,","og:image":"https://old.b4r.io/fileadmin/content/MCAfee_Email.jpg"},"eventUrl":"","translationId":2085,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1575,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Dynamics_365.png","logo":true,"scheme":false,"title":"Microsoft Dynamics 365","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-dynamics-365","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"<span style=\"font-weight: bold; \">Dynamics 365 for Sales</span>\r\nEmpower sellers with insights to personalize relationships, predict customer needs, and increase sales.\r\n<span style=\"font-weight: bold; \">Dynamics 365 for Retail</span>\r\nCreate personalized shopping experiences that unify digital, in-store, and back office operations.\r\n<span style=\"font-weight: bold;\">Dynamics 365 for Customer Service</span>\r\nExceed customer expectations across self and assisted support with empowered agents that deliver personalized experiences.\r\n<span style=\"font-weight: bold;\">Dynamics 365 for Field Service</span>\r\nServe customers better through proactive maintenance, predictive scheduling, and first-time fix.\r\n<span style=\"font-weight: bold;\">Dynamics 365 for Project Service Automation</span>\r\nDeliver customer projects on-time, within budget, and become a trusted advisor.\r\n<span style=\"font-weight: bold;\">Dynamics 365 for Finance and Operations</span>\r\nModernize your business operations across finance, manufacturing, and supply chain to drive new growth.\r\n<span style=\"font-weight: bold;\">Dynamics 365 for Talent</span>\r\nAttract the right people and seamlessly onboard, engage, and grow your talent.\r\n<span style=\"font-weight: bold;\">Adobe Marketing Cloud</span>\r\nDeliver personalized experiences throughout your marketing and sales engagements at scale with Dynamics 365 and Adobe.\r\n<span style=\"font-weight: bold;\">Dynamics 365 for Marketing</span>\r\nIncrease demand by automating tasks from multi-channel campaigns to events with an application built on the same platform as Dynamics 365 for Sales.","shortDescription":"Microsoft Dynamics 365 is unified CRM and ERP capabilities —modern, intelligent cloud applications that help move your business forward.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Dynamics 365","keywords":"Dynamics, with, personalized, customer, Service, experiences, your, operations","description":"Dynamics 365 for Sales\rEmpower sellers with insights to personalize relationships, predict customer needs, and increase sales.\rDynamics 365 for Retail\rCreate","og:title":"Microsoft Dynamics 365","og:description":"Dynamics 365 for Sales\rEmpower sellers with insights to personalize relationships, predict customer needs, and increase sales.\rDynamics 365 for Retail\rCreate","og:image":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Dynamics_365.png"},"eventUrl":"","translationId":1576,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"Система управления взаимоотношениями с клиентами (CRM, CRM-система, сокращение от англ. Customer Relationship Management) — прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками (клиентами), в частности для повышения уровня продаж, оптимизации маркетинга и улучшения обслуживания клиентов путём сохранения информации о клиентах и истории взаимоотношений с ними, установления и улучшения бизнес-процессов и последующего анализа результатов.\r\n\r\nCRM — модель взаимодействия, основанная на постулате, что центром всей философии бизнеса является клиент, а главными направлениями деятельности компании являются меры по обеспечению эффективного маркетинга, продаж и обслуживания клиентов. Поддержка этих бизнес-целей включает сбор, хранение и анализ информации о потребителях, поставщиках, партнёрах, а также о внутренних процессах компании. Функции для поддержки этих бизнес-целей включают продажи, маркетинг, поддержку потребителей.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%83%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2%D0%B7%D0%B0%D0%B8%D0%BC%D0%BE%D0%BE%D1%82%D0%BD%D0%BE%D1%88%D0%B5%D0%BD%D0%B8%D1%8F%D0%BC%D0%B8_%D1%81_%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/crm.png"},{"id":75,"title":"ERP - Enterprise Resource Planning","alias":"erp-enterprise-resource-planning","description":"ERP (англ. Enterprise Resource Planning, планирование ресурсов предприятия) — организационная стратегия интеграции производства и операций, управления трудовыми ресурсами, финансового менеджмента и управления активами, ориентированная на непрерывную балансировку и оптимизацию ресурсов предприятия посредством специализированного интегрированного пакета прикладного программного обеспечения, обеспечивающего общую модель данных и процессов для всех сфер деятельности. ERP-система — конкретный программный пакет, реализующий стратегию ERP.\r\n\r\nКонцепция ERP сформулирована в 1990 году аналитиком Gartner как видение развития методик MRP II и CIM (англ.)\r\n\r\nВнедрение ERP-системы считается фактически необходимым условием для публичной компании и, начиная с конца 1990-х годов, ERP-системы, изначально внедрявшиеся только промышленными предприятиями, эксплуатируются большинством крупных организаций вне зависимости от страны, формы собственности, отрасли.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/ERP","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ERP.png"},{"id":363,"title":"Project and Portfolio Management","alias":"project-and-portfolio-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/project-management.png"},{"id":351,"title":"Financial Accounting Applications","alias":"financial-accounting-applications","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/preparation-of-financial-statements.png"},{"id":68,"title":"Human Capital Management","alias":"human-capital-management","description":"Управление персоналом (англ. human resources management, HRM, HR-менеджмент) — область знаний и практической деятельности, направленная на обеспечение организации качественным персоналом, способным выполнять возложенные на него трудовые функции, и оптимальное его использование. Управление персоналом является неотъемлемой частью качественных систем управления организации.\r\n\r\nВ различных источниках могут встречаться и другие названия: управление трудовыми ресурсами, управление человеческим капиталом (англ. human capital management), кадровый менеджмент, менеджмент персонала.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D0%BF%D0%B5%D1%80%D1%81%D0%BE%D0%BD%D0%B0%D0%BB%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/hr-policy-management.png"},{"id":357,"title":"Procurement","alias":"procurement","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/procurement-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":826,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Skype_novoe_pokolenie.png","logo":true,"scheme":false,"title":"Skype новое поколение","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"skype-novoe-pokolenie","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"Обновленная версия Skype доступна будет на устройствах с Android и iOS в июне 2017 года. Версии для Windows и Mac будут выпущены до конца 2017 года.\r\nНовый Skype сделал группу чатов более персонализированной с настройкой цвета, надстройками и ботами. С панелью \"Поиск\" в центре внимания. Новая функция Skype: Highlights. Основные возможности позволяют создавать подсветку вашего дня с фотографиями и видео, чтобы вы могли делиться повседневными моментами. Чтобы опубликовать ярлык, проведите по экрану, чтобы получить доступ к своей камере, сделать снимок или видео, затем опубликовать его в разделе «Основные события» или отправить его непосредственно вашим контактам или группам. ","shortDescription":"Skype — это программное обеспечение для совершения индивидуальных и групповых голосовых и бесплатных видеозвонков, отправки сообщений и файлов другим пользователям Skype.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Skype новое поколение","keywords":"Skype, года, Основные, чтобы, опубликовать, видео, 2017, повседневными","description":"Обновленная версия Skype доступна будет на устройствах с Android и iOS в июне 2017 года. Версии для Windows и Mac будут выпущены до конца 2017 года.\rНовый","og:title":"Skype новое поколение","og:description":"Обновленная версия Skype доступна будет на устройствах с Android и iOS в июне 2017 года. Версии для Windows и Mac будут выпущены до конца 2017 года.\rНовый","og:image":"https://old.b4r.io/fileadmin/user_upload/Skype_novoe_pokolenie.png"},"eventUrl":"","translationId":2521,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":56,"title":"Web Conferencing Applications"}],"testingArea":"","categories":[{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Web_conferencing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":827,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Skype_novoe_pokolenie.png","logo":true,"scheme":false,"title":"The next generation of Skype","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"the-next-generation-of-skype","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"The next generation of Skype will be available on devices with Android and iOS in June 2017. Versions for Windows and Mac will be released by the end of 2017.\r\nNew Skype made a group of chat more personalized with color settings, add-ons and bots. With the \"Search\" panel in the spotlight. New Skype feature: Highlights. The main features allow you to create a highlight of your day with photos and videos so you can share everyday moments. ","shortDescription":"Skype is software for making individual and group voice and free video calls, sending messages and files to other Skype users.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"The next generation of Skype","keywords":"Skype, with, 2017, generation, next, will, features, allow","description":"The next generation of Skype will be available on devices with Android and iOS in June 2017. Versions for Windows and Mac will be released by the end of 2017.","og:title":"The next generation of Skype","og:description":"The next generation of Skype will be available on devices with Android and iOS in June 2017. Versions for Windows and Mac will be released by the end of 2017.","og:image":"https://old.b4r.io/fileadmin/user_upload/Skype_novoe_pokolenie.png"},"eventUrl":"","translationId":827,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":56,"title":"Web Conferencing Applications"}],"testingArea":"","categories":[{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Web_conferencing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":832,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Complete_EndPoint_Protection_-_Business__CEB_.png","logo":true,"scheme":false,"title":"McAfee Complete EndPoint Protection - Business (CEB)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-complete-endpoint-protection-business-ceb","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"Core endpoint protection\r\nMcAfee Complete Endpoint Threat Protection includes anti-malware, firewall, device control, and email and web security.\r\nPowered by machine learning\r\nWith integrated machine learning and dynamic application containment, detect zero-day threats in near real time, and classify and halt them before they can execute on your systems.\r\nActionable forensic data\r\nEasy-to-read reports help you make the move from responding to outbreaks to investigating and hardening your defenses.\r\nAn adaptable security framework\r\nMcAfee Complete Endpoint Threat Protection is built using an extensible framework, so you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.\r\n\r\nIntegrated, advanced threat defenses built with productivity in mind\r\nAutomate advanced threat defenses\r\nStay ahead of threats with reputation analysis and machine learning that evolves to pinpoint and streamline responses to zero-day threats by automatically stopping and containing greyware, ransomware, and other advanced threats.\r\nReduce security complexity\r\nEliminate multiple security management consoles and user interfaces. One console provides a single pane of glass to manage your environment so you can rapidly ramp up deployments and leverage cross-platform policies for Windows, Mac, and Linux environments.\r\nBuild a flexible and collaborative security framework\r\nEnsure your defenses work together to defeat threats and provide actionable threat forensics. Our purpose-built framework connects multiple defenses and allows for easy adoption of new advanced security technologies as the threat landscape changes.\r\n\r\nSystem requirements\r\nMcAfee Complete Endpoint Threat Protection is a suite that is supported on Windows, Mac, and Linux systems. For complete technical specifications for all of the products included in this suite, please review the minimum system requirements.\r\n","shortDescription":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate and contain zero-day threats and sophisticated attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Complete EndPoint Protection - Business (CEB)","keywords":"security, threat, defenses, your, advanced, threats, McAfee, framework","description":"Core endpoint protection\rMcAfee Complete Endpoint Threat Protection includes anti-malware, firewall, device control, and email and web security.\rPowered by","og:title":"McAfee Complete EndPoint Protection - Business (CEB)","og:description":"Core endpoint protection\rMcAfee Complete Endpoint Threat Protection includes anti-malware, firewall, device control, and email and web security.\rPowered by","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Complete_EndPoint_Protection_-_Business__CEB_.png"},"eventUrl":"","translationId":833,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":43,"title":"Data Encryption","alias":"data-encryption","description":"Шифрова́ние — обратимое преобразование информации в целях сокрытия от неавторизованных лиц, с предоставлением, в это же время, авторизованным пользователям доступа к ней. Главным образом, шифрование служит задачей соблюдения конфиденциальности передаваемой информации. Важной особенностью любого алгоритма шифрования является использование ключа, который утверждает выбор конкретного преобразования из совокупности возможных для данного алгоритма[1][2].\r\n\r\nПользователи являются авторизованными, если они обладают определенным аутентичным ключом. Вся сложность и, собственно, задача шифрования состоит в том, как именно реализован этот процесс[1].\r\n\r\nВ целом, шифрование состоит из двух составляющих — зашифрование и расшифрование.\r\n\r\nС помощью шифрования обеспечиваются три состояния безопасности информации[1]:\r\n\r\nКонфиденциальность.\r\nШифрование используется для скрытия информации от неавторизованных пользователей при передаче или при хранении.\r\nЦелостность.\r\nШифрование используется для предотвращения изменения информации при передаче или хранении.\r\nИдентифицируемость.\r\nШифрование используется для аутентификации источника информации и предотвращения отказа отправителя информации от того факта, что данные были отправлены именно им.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-encryption.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":834,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Protection_-_Advanced_Suite.jpg","logo":true,"scheme":false,"title":"McAfee Endpoint Protection — Advanced Suite","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-endpoint-protection-advanced-suite","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"Обеспечение всесторонней защиты конечных точек\r\nВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от вредоносных программ в режиме реального времени позволяют блокировать вирусы, троянских коней, червей, рекламные, шпионские и другие потенциально нежелательные программы.\r\nОбеспечение безопасности и нормативно-правового соответствия систем\r\nИспользование централизованного механизма управления и аудита на основе политик позволяет повысить надежность защиты.\r\nОбеспечение комплексного контроля над устройствами\r\nМониторинг и ограничение копирования данных на съемные устройства и носители позволяет упреждать утечки данных и обеспечивать сохранность конфиденциальной информации.\r\nСкорость и легкость развертывания\r\nНаличие единой консоли централизованного управления позволяет устанавливать средства защиты за считанные минуты всего несколькими щелчками мышью, а также обеспечивать более подробный сбор информации о происходящем и более эффективный контроль над средствами защиты и мерами обеспечения нормативно-правового соответствия.\r\nОптимизация процессов управления защитой конечных точек\r\n\r\nБлокирование угроз «нулевого дня»\r\nИнтегрированная в данное решение технология McAfee Host Intrusion Prevention for Desktop обеспечивает защиту от новых уязвимостей и сокращает необходимость срочной установки исправлений.\r\nКонтроль за использованием сети Интернет\r\nАдминистраторы могут ограничивать доступ пользователей, находящихся в корпоративной сети и вне ее, к веб-сайтам неуместного содержания и запрещать запуск нежелательных программ на системах путем блокирования приложений.\r\nАвтоматизация выполнения требований политик\r\nMcAfee Policy Auditor позволяет интегрировать отчеты о соответствии требованиям стандартов HIPAA, PCI и других нормативно-правовых документов.\r\n\r\nТребования к системе\r\nКомплект McAfee Endpoint Protection — Advanced Suite поддерживается в операционных системах Windows и Mac.","shortDescription":"Комплексная система упреждающей защиты, позволяющая блокировать вредоносные программы и угрозы «нулевого дня»\r\nКомплект McAfee Endpoint Protection — Advanced Suite обеспечивает защиту систем Windows, Mac и Linux, находящихся внутри вашей сети и за пределами.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Endpoint Protection — Advanced Suite","keywords":"защиты, McAfee, позволяет, сети, управления, Обеспечение, политик, точек","description":"Обеспечение всесторонней защиты конечных точек\rВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от","og:title":"McAfee Endpoint Protection — Advanced Suite","og:description":"Обеспечение всесторонней защиты конечных точек\rВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Protection_-_Advanced_Suite.jpg"},"eventUrl":"","translationId":2523,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":105,"logoURL":"https://old.b4r.io/fileadmin/user_upload/AutoCAD_Architecture.png","logo":true,"scheme":false,"title":"AutoCAD Architecture","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":70,"alias":"autocad-architecture","companyTitle":"Autodesk","companyTypes":["vendor"],"companyId":180,"companyAlias":"autodesk","description":"AutoCAD Architecture (abbreviated as ACA) is a version of Autodesk's flagship product, AutoCAD, with tools and functions specially suited to architectural work.\r\n\r\nArchitectural objects have a relationship to one another and interact with each other intelligently. For example, a window has a relationship to the wall that contains it. If you move or delete the wall, the window reacts accordingly. Objects can be represented in both 2D and 3D.\r\n\r\nIn addition, intelligent architectural objects maintain dynamic links with construction documents and specifications, resulting in more accurate project deliverables. When someone deletes or modifies a door, for example, the door schedule can be automatically updated. Spaces and areas update automatically when certain elements are changed, calculations such as square footage are always up to date.\r\n\r\nAutoCAD Architecture uses the DWG file format but an object enabler is needed to access, display, and manipulate object data in applications different from AutoCAD Architecture.\r\n\r\nAutoCAD Architecture was formerly known as AutoCAD Architectural Desktop (often abbreviated ADT) but Autodesk changed its name for the 2008 edition. The change was made to better match the names of Autodesk's other discipline-specific packages, such as AutoCAD Electrical and AutoCAD Mechanical.","shortDescription":"AutoCAD Architecture software is AutoCAD software for architects. Architectural drafting and documentation is more efficient with the software’s intuitive environment and tools built specifically for architects.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"AutoCAD Architecture","keywords":"AutoCAD, Architecture, with, Autodesk, relationship, other, example, such","description":"AutoCAD Architecture (abbreviated as ACA) is a version of Autodesk's flagship product, AutoCAD, with tools and functions specially suited to architectural","og:title":"AutoCAD Architecture","og:description":"AutoCAD Architecture (abbreviated as ACA) is a version of Autodesk's flagship product, AutoCAD, with tools and functions specially suited to architectural","og:image":"https://old.b4r.io/fileadmin/user_upload/AutoCAD_Architecture.png"},"eventUrl":"","translationId":106,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/CAD__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1643,"logoURL":"https://old.b4r.io/fileadmin/user_upload/autodesk_logo.jpeg","logo":true,"scheme":false,"title":"Autodesk 3ds Max","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":70,"alias":"autodesk-3ds-max","companyTitle":"Autodesk","companyTypes":["vendor"],"companyId":180,"companyAlias":"autodesk","description":"<p>It has modeling capabilities and a flexible plugin architecture and can be used on the Microsoft Windows platform. It is frequently used by video game developers, many TV commercial studios and architectural visualization studios. It is also used for movie effects and movie pre-visualization. For its modeling and animation tools, the latest version of 3ds Max also features shaders (such as ambient occlusion and subsurface scattering), dynamic simulation, particle systems, radiosity, normal map creation and rendering, global illumination, a customizable user interface, new icons, and its own scripting language. <span style=\"font-weight: bold;\">Features:</span></p>\r\n<ul>\r\n<li>MAXScript: built-in scripting language that can be used to automate repetitive tasks, combine existing functionality in new ways, develop new tools and user interfaces, and much more</li>\r\n<li>Character Studio helps users to animate virtual characters</li>\r\n<li>Scene Explorer, a tool that provides a hierarchical view of scene data and analysis, facilitates working with more complex scenes. Scene Explorer has the ability to sort, filter, and search a scene by any object type or property (including metadata)</li>\r\n<li>DWG import</li>\r\n<li>Texture assignment/editing: creative texture and planar mapping, including tiling, mirroring, decals, angle, rotate, blur, UV stretching, and relaxation; Remove Distortion; Preserve UV; and UV template image export</li>\r\n<li>General keyframing: set key and auto key — offer support for different keyframing workflows</li>\r\n<li>Constrained animation: objects can be animated along curves with controls for alignment, banking, velocity, smoothness, and looping, and along surfaces with controls for alignment. Weight path-controlled animation between multiple curves, and animate the weight. Objects can be constrained to animate with other objects in many ways — including look at, orientation in different coordinate spaces, and linking at different points in time</li>\r\n<li>Skinning</li>\r\n<li>Skeletons and inverse kinematics (IK)</li>\r\n<li>Integrated Cloth solver</li>\r\n<li>Integration with Autodesk Vault</li>\r\n<li>Max Creation Graph</li>\r\n</ul>","shortDescription":"Autodesk 3ds Max, formerly 3D Studio and 3D Studio Max, is a professional 3D computer graphics program for making 3D animations, models, games and images.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":3,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Autodesk 3ds Max","keywords":"with, used, including, animation, different, animate, language, that","description":"It has modeling capabilities and a flexible plugin architecture and can be used on the Microsoft Windows platform. It is frequently used by video game","og:title":"Autodesk 3ds Max","og:description":"It has modeling capabilities and a flexible plugin architecture and can be used on the Microsoft Windows platform. It is frequently used by video game","og:image":"https://old.b4r.io/fileadmin/user_upload/autodesk_logo.jpeg"},"eventUrl":"","translationId":1642,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/CAD__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}