{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"products-popover":{"de":"die produkte","ru":"Продукты","_type":"localeString","en":"Products"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"ru":"Обновить профиль","_type":"localeString","en":"Update profile"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"ru":"Компетенции","_type":"localeString","en":"Categories"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"en":"Partnership with suppliers","ru":"Партнерство с поставщиками","_type":"localeString"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"_type":"localeString","en":"Partner status","ru":"Статус партнёра"},"country":{"_type":"localeString","en":"Country","ru":"Страна"},"partner-types":{"en":"Partner types","ru":"Типы партнеров","_type":"localeString"},"branch-popover":{"ru":"область деятельности","_type":"localeString","en":"branch"},"employees-popover":{"en":"number of employees","ru":"количество сотрудников","_type":"localeString"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"_type":"localeString","en":"Partner discounts","ru":"Партнерские скидки"},"registered-discounts":{"ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString","en":"Additional benefits for registering a deal"},"additional-advantages":{"en":"Additional Benefits","ru":"Дополнительные преимущества","_type":"localeString"},"additional-requirements":{"ru":"Требования к уровню партнера","_type":"localeString","en":"Partner level requirements"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"_type":"localeString","en":"Annual Sales Plan","ru":"Годовой план продаж"},"partners-vendors":{"ru":"Партнеры-производители","_type":"localeString","en":"Partners-vendors"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"en":"Produced products","ru":"Производимые продукты","_type":"localeString"},"vendor-implementations":{"_type":"localeString","en":"Produced deployments","ru":"Производимые внедрения"},"supplier-implementations":{"_type":"localeString","en":"Supplied deployments","ru":"Поставляемые внедрения"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"en":"Register","ru":"Регистрация ","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"en":"Company presentation","ru":"Презентация компании","_type":"localeString"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"_type":"localeString","en":"logout","ru":"Выйти"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"_type":"localeString","en":"My Profile","ru":"Мои Данные"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"en":"Roi4Webinar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"_type":"localeString","en":"Company name","ru":"Компания"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"title","translations":{"ru":"Компания","_type":"localeString","en":"Company"}},{"name":"description","translations":{"en":"Company description","ru":"Описание компании","_type":"localeString"}},{"name":"keywords","translations":{"_type":"localeString","en":"Company keywords","ru":"Ключевые слова для компании"}}],"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"}}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"issp":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[{"id":2,"type":"supplier"}],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":["supplier"],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[{"id":75,"title":"HP ArcSight ESM для банка","description":"Особенность проекта внедрения SIEM – это большие объемы интеграционных работ, которые значительно усложняются, если есть кастомизированные или самописные информационные системы. Необходима серьезная вовлеченность службы ИТ и привлечение к проекту ключевых сотрудников бизнес подразделений.\r\nФункцию управления проектом банк ПУМБ выполнял своими силами. Это удалось за счет достаточно высокого уровня зрелости внутренней системы проектного менеджмента.\r\nСтратегия интеграции была построена с целью максимального заполнения работой всех возможных временных промежутков. Последовательный план подключения систем к ArcSight начинался не от простого к сложному, а наоборот. Это позволило быстрее выявить технологические нюансы и начать цикл их проработки. А возникающие паузы заполняли подключением простых, стандартных систем.\r\nСовместно с Управлением информационной безопасности ПУМБ компания ISSP разработала и провела тренинг для специалистов основных подразделений банка. С помощью широких функциональных возможностей такого инструмента, как HP ArcSight, компания ISSP сумела реализовать интересные, адаптированные под банк задачи, которые выходят за рамки стандартно проекта по внедрению SIEM-системы. Выбранная Управлением ИБ стратегия развития системы управления инцидентами демонстрирует высокую эффективность. Дальнейшее развитие стратегии автоматизированных контролей и обнаружения инцидентов в ПУМБ позволит автоматизировать множество операционных задач и установить важные контроли, для повышения операционной эффективности и противодействию кибермошенничеству.\r\nЗа месяц активной фазы интеграции к ArcSight было подключено 15 разнородных информационных систем, в составе которых 45 серверов и 17 единиц коммуникационного оборудования. Это очень хороший результат, учитывая, что сотрудники компании-интегратора ISSP все это время работали в режиме командировки в Донецке.","alias":"hp-arcsight-esm-dlja-banka","roi":0,"seo":{"title":"HP ArcSight ESM для банка","keywords":"ArcSight, систем, системы, ПУМБ, ISSP, которые, подразделений, Управлением","description":"Особенность проекта внедрения SIEM – это большие объемы интеграционных работ, которые значительно усложняются, если есть кастомизированные или самописные","og:title":"HP ArcSight ESM для банка","og:description":"Особенность проекта внедрения SIEM – это большие объемы интеграционных работ, которые значительно усложняются, если есть кастомизированные или самописные"},"deal_info":"","user":{"id":530,"title":"First Ukrainian International Bank (FUIB)","logoURL":"https://old.b4r.io/uploads/roi/company/Pervyi_Ukrainskii_Mezhdunarodnyi_Bank__PUMB_.png","alias":"pervyi-ukrainskii-mezhdunarodnyi-bank-pumb","address":"","roles":[],"description":"First Ukrainian International Bank (FUIB) is a large, sustainable, privately owned bank with two-decades of operations in Ukraine’s financial market, delivering high quality banking services, consiste","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://pumb.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"First Ukrainian International Bank (FUIB)","keywords":"Ukraine’s, financial, operations, market, delivering, services, consiste, banking","description":"First Ukrainian International Bank (FUIB) is a large, sustainable, privately owned bank with two-decades of operations in Ukraine’s financial market,","og:title":"First Ukrainian International Bank (FUIB)","og:description":"First Ukrainian International Bank (FUIB) is a large, sustainable, privately owned bank with two-decades of operations in Ukraine’s financial market,","og:image":"https://old.b4r.io/uploads/roi/company/Pervyi_Ukrainskii_Mezhdunarodnyi_Bank__PUMB_.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":4386,"title":"Micro Focus","logoURL":"https://old.b4r.io/uploads/roi/company/Micro_Focus.png","alias":"micro-focus","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to mobile to cloud.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">We are one of the largest pure-play software companies in the world, focused from the ground up on building, selling, and supporting software. This focus allows us to deliver on our mission to put customers at the center of innovation and deliver high-quality, enterprise-grade scalable software that our teams can be proud of. We help customers bridge the old and the new by maximizing the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.</span>","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.microfocus.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Micro Focus","keywords":"software, innovation, customers, deliver, Micro, existing, Focus, hybrid","description":"Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to","og:title":"Micro Focus","og:description":"Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to","og:image":"https://old.b4r.io/uploads/roi/company/Micro_Focus.png"},"eventUrl":""}],"products":[{"id":434,"logo":false,"scheme":false,"title":"Micro Focus ESM","vendorVerified":0,"rating":"2.30","implementationsCount":2,"suppliersCount":0,"alias":"micro-focus-esm","companyTypes":[],"description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process.\r\nCategorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats.\r\nImprove incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most.\r\nRapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface.\r\nEnriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process.\r\nCategorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats.\r\nImprove incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most.\r\nRapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface.\r\nAccelerate your SIEM deployment with a large library of predefined security use cases and compliance automation and reporting tools that are the cornerstone of building Security Operations.\r\nAutomatically or manually escalate events to the right people in the right time frame. The robust workflow framework comes with built in case management and can integrate with your existing systems.","shortDescription":"Micro Focus ESM is a comprehensive security information and event management solution that identifies and prioritize threats in real time so you can respond and remediate quickly.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Micro Focus ESM","keywords":"with, data, most, search, that, simple, investigation, threats","description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to","og:title":"Micro Focus ESM","og:description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to"},"eventUrl":"","translationId":435,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"}]}},"categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=163","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":74,"title":"HP ArcSight ESM для пищепрома","description":"Компания ISSP вместе с сотрудниками компании «КОНТИ» осуществили внедрение HP/ArcSight SIEM в инфраструктуру предприятия.\r\nВ рамках проекта создан контент для контроля изменений в Active Directory, оценке количества событий от целевых источников. Осуществляется контроль почтового и веб-трафика.\r\nНаписан флекс-коннектор, который позволяет хранить и анализировать события в информационной системе предприятия.\r\nИТ специалисты компании «КОНТИ» получили мощный инструмент для отслеживания любых ИТ-процессов на предприятии.","alias":"hp-arcsight-esm-dlja-pishcheproma","roi":150,"seo":{"title":"HP ArcSight ESM для пищепрома","keywords":"компании, КОНТИ, предприятия, ArcSight, позволяет, хранить, Осуществляется, анализировать","description":"Компания ISSP вместе с сотрудниками компании «КОНТИ» осуществили внедрение HP/ArcSight SIEM в инфраструктуру предприятия.\rВ рамках проекта создан контент для","og:title":"HP ArcSight ESM для пищепрома","og:description":"Компания ISSP вместе с сотрудниками компании «КОНТИ» осуществили внедрение HP/ArcSight SIEM в инфраструктуру предприятия.\rВ рамках проекта создан контент для"},"deal_info":"","user":{"id":472,"title":"KONTI","logoURL":"https://old.b4r.io/uploads/roi/company/KONTI.png","alias":"konti","address":"","roles":[],"description":"The company "KONTI" was set up in 1997 as a closed joint stock company under the name “Production Association “Kiev-Konti”. At that moment the enterprise comprised of one confectionery factory, that i","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.konti.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KONTI","keywords":"that, company, Association, moment, Kiev-Konti, comprised, factory, confectionery","description":"The company "KONTI" was set up in 1997 as a closed joint stock company under the name “Production Association “Kiev-Konti”. At that moment the","og:title":"KONTI","og:description":"The company "KONTI" was set up in 1997 as a closed joint stock company under the name “Production Association “Kiev-Konti”. At that moment the","og:image":"https://old.b4r.io/uploads/roi/company/KONTI.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":4386,"title":"Micro Focus","logoURL":"https://old.b4r.io/uploads/roi/company/Micro_Focus.png","alias":"micro-focus","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to mobile to cloud.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">We are one of the largest pure-play software companies in the world, focused from the ground up on building, selling, and supporting software. This focus allows us to deliver on our mission to put customers at the center of innovation and deliver high-quality, enterprise-grade scalable software that our teams can be proud of. We help customers bridge the old and the new by maximizing the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.</span>","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.microfocus.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Micro Focus","keywords":"software, innovation, customers, deliver, Micro, existing, Focus, hybrid","description":"Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to","og:title":"Micro Focus","og:description":"Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to","og:image":"https://old.b4r.io/uploads/roi/company/Micro_Focus.png"},"eventUrl":""}],"products":[{"id":434,"logo":false,"scheme":false,"title":"Micro Focus ESM","vendorVerified":0,"rating":"2.30","implementationsCount":2,"suppliersCount":0,"alias":"micro-focus-esm","companyTypes":[],"description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process.\r\nCategorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats.\r\nImprove incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most.\r\nRapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface.\r\nEnriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process.\r\nCategorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats.\r\nImprove incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most.\r\nRapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface.\r\nAccelerate your SIEM deployment with a large library of predefined security use cases and compliance automation and reporting tools that are the cornerstone of building Security Operations.\r\nAutomatically or manually escalate events to the right people in the right time frame. The robust workflow framework comes with built in case management and can integrate with your existing systems.","shortDescription":"Micro Focus ESM is a comprehensive security information and event management solution that identifies and prioritize threats in real time so you can respond and remediate quickly.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Micro Focus ESM","keywords":"with, data, most, search, that, simple, investigation, threats","description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to","og:title":"Micro Focus ESM","og:description":"Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to"},"eventUrl":"","translationId":435,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":350,"title":"No monitoring of corporate IT processes"}]}},"categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=182","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":70,"title":"Imperva Web Application Firewall для 1+1 медиа","description":"Постоянное стремление к увеличению охвата аудитории и непрерывной связи и общении с ней, побуждает медиа-компании вести активную деятельность в сети Интернет. Для этих целей в их распоряжении имеется большое количество порталов и веб-ресурсов с разветвлённой и сложной структурой веб-страниц, которые без надлежащей защиты могут поставить под угрозу доступность веб-приложений, сохранность конфиденциальных данных и репутацию самой компании.\r\nКомпания ISSP успешно завершила проект с 1+1 медиа по защите веб-приложений. Выбор был сделан в пользу Imperva WAF. Решение очень гибкое, его легко развернуть в любой инфраструктуре и настроить под потребности безопасности, что было отмечено еще при первом тестировании решения в идентичной рабочей среде компании-заказчика. С помощью Imperva WAF ИТ-отдел теперь может выстроить сильную линию обороны.\r\nImperva WAF покрывала следующие обязательные требования:\r\nцентрализованное управление\r\nгранулирование политик\r\nвысокая производительность\r\nудобство в использовании\r\nблокировка внешних атак на веб-приложения\r\nпрофилирование страниц\r\nмонитор трафика веб-приложений\r\nпредотвращение несанкционированного доступа к определенным веб-серверам извне\r\nКак ключевой компонент защиты внешней среды, Imperva WAF ежедневно обеспечивает безопасность веб-приложениям компании-заказчика от кибератак, уменьшает риски, связанные с кражей и модификацией конфиденциальных данных, что для медиа компании – главный приоритет.","alias":"imperva-web-application-firewall-dlja-1-1-media","roi":0,"seo":{"title":"Imperva Web Application Firewall для 1+1 медиа","keywords":"Imperva, медиа, веб-приложений, данных, защиты, компании, конфиденциальных, компании-заказчика","description":"Постоянное стремление к увеличению охвата аудитории и непрерывной связи и общении с ней, побуждает медиа-компании вести активную деятельность в сети Интернет. ","og:title":"Imperva Web Application Firewall для 1+1 медиа","og:description":"Постоянное стремление к увеличению охвата аудитории и непрерывной связи и общении с ней, побуждает медиа-компании вести активную деятельность в сети Интернет. "},"deal_info":"","user":{"id":2897,"title":"1+1 media","logoURL":"https://old.b4r.io/uploads/roi/company/1_1_media.png","alias":"1-1-media","address":"","roles":[],"description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши корпоративные ценности: СМЕЛОСТЬ. ЧЕСТНОСТЬ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":39,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://media.345aanonstop1plus1.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"1+1 media","keywords":"media","description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши","og:title":"1+1 media","og:description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши","og:image":"https://old.b4r.io/uploads/roi/company/1_1_media.png"},"eventUrl":"https://calendly.com/anastasia-filatova19/nea-event"},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":207,"title":"Imperva","logoURL":"https://old.b4r.io/uploads/roi/company/imperva_logo.png","alias":"imperva","address":"","roles":[],"description":"Imperva provides cyber security software and services to protect companies’ sensitive data and application software from both external attacks and internal threats, and to ensure regulatory compliance. Headquartered in Redwood Shores, California, Imperva has more than 4,500 customers and 500 partners in over 90 countries.","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"www.imperva.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Imperva","keywords":"Imperva, software, Shores, California, Redwood, Headquartered, over, countries","description":"Imperva provides cyber security software and services to protect companies’ sensitive data and application software from both external attacks and internal","og:title":"Imperva","og:description":"Imperva provides cyber security software and services to protect companies’ sensitive data and application software from both external attacks and internal","og:image":"https://old.b4r.io/uploads/roi/company/imperva_logo.png"},"eventUrl":""}],"products":[{"id":154,"logo":false,"scheme":false,"title":"Imperva SecureSphere Web Application Firewall","vendorVerified":0,"rating":"2.10","implementationsCount":1,"suppliersCount":0,"alias":"imperva-securesphere-web-application-firewall","companyTypes":[],"description":"Imperva SecureSphere Web Application Firewall (WAF) analyzes all user access to your business-critical web applications and protects your applications and data from cyber attacks. SecureSphere WAF dynamically learns your applications’ “normal” behavior and correlates this with the threat intelligence crowd-sourced from around the world and updated in real time to deliver superior protection. The industry leading SecureSphere WAF identifies and acts upon dangers maliciously woven into innocent-looking website traffic; traffic that slips right through traditional defenses. This includes blocking technical attacks such as SQL injection, cross-site scripting and remote file inclusion that exploit vulnerabilities in web applications; business logic attacks such as site scraping and comment spam; botnets and DDoS attacks; and preventing account takeover attempts in real-time, before fraudulent transactions can be performed. SecureSphere WAF uses patented Dynamic Application Profiling to learn all aspects of web applications, including the directories, URLs, parameters, and acceptable user inputs to detect attacks with exceptional accuracy and block only bad parties, while eliminating impact to legitimate customers. SecureSphere WAF mitigates both technical attacks such as DDoS and SQL injection, as well as non-technical attacks such as comment spamming and site scraping.\r\nOVERVIEW SPECIFICATIONS\r\nProtect Your Critical Web Applications and Data Imperva SecureSphere Web Application Firewall (WAF) analyzes all user access to your business-critical web applications and protects your applications and data from cyber attacks. SecureSphere WAF dynamically learns your applications’ “normal” behavior and correlates this with the threat intelligence crowd-sourced from around the world and updated in real time to deliver superior protection. The industry leading SecureSphere WAF identifies and acts upon dangers maliciously woven into innocent-looking website traffic; traffic that slips right through traditional defenses. This includes blocking technical attacks such as SQL injection, cross-site scripting and remote file inclusion that exploit vulnerabilities in web applications; business logic attacks such as site scraping and comment spam; botnets and DDoS attacks; and preventing account takeover attempts in real-time, before fraudulent transactions can be performed.\r\nDYNAMIC APPLICATION PROFILING\r\nSecureSphere WAF uses patented Dynamic Application Profiling to learn all aspects of web applications, including the directories, URLs, parameters, and acceptable user inputs to detect attacks with exceptional accuracy and block only bad parties, while eliminating impact to legitimate customers. SecureSphere WAF mitigates both technical attacks such as DDoS and SQL injection, as well as non-technical attacks such as comment spamming and site scraping.\r\nGRANULAR CORRELATION POLICIES REDUCE FALSE POSITIVES\r\nSecureSphere WAF distinguishes attacks from unusual, but legitimate, behavior by correlating web requests across security layers and over time. SecureSphere Correlated Attack Validation capability examines multiple attributes such as HTTP protocol conformance, profile violations, signatures, special characters, and user reputation, to accurately alert on or block attacks with the lowest rate of false positives in the industry.\r\nFLEXIBLE DEPLOYMENT OPTIONS\r\n'SecureSphere WAF can be deployed as a physical or virtual appliance on-premises, and as a virtual image on Amazon Web Services or Microsoft Azure. Physical appliance deployments are particularly flexible in that they allow SecureSphere WAF to run transparently, requiring virtually no changes to the customer’s network. And granular policy controls enable superior accuracy and unequaled control to match each organization’s specific protection requirements.\r\nDEEP THREAT INTELLIGENCE\r\nTo protect against today’s well resourced cyber-criminals, it is vital to have an advanced warning system that is aware of and protects against constantly evolving web-based attacks. Imperva ThreatRadar updates SecureSphere WAF with real-time threat intelligence crowd-sourced from around the world and curated by Imperva Application Defense Center. ThreatRadar provides better protection, improves WAF accuracy, and makes the security team more efficient by proactively filtering traffic from known bad sources so the security team can focus on what is really important. The following ThreatRadar intelligence feeds are available: Reputation Services: Filters traffic based upon latest, real-time reputation of source Community Defense: Adds unique threat intelligence crowd-sourced from Imperva users Bot Protection: Detects botnet clients and application DDoS attacks Account Takeover Protection: Protects website user accounts from attack and takeover Fraud Prevention: Simplifies deployment of best-in-class partner fraud prevention solutions VIRTUAL PATCHING SecureSphere WAF can perform “virtual patching” for your web applications via vulnerability scanner integration. Instead of leaving a web application exposed to attack for weeks or months while code is modified after discovering a vulnerability, virtual patching actively protects web applications from attacks to reduce the window of exposure, and decreases the costs of emergency fix cycles until you are able to patch them.\r\nCUSTOMIZABLE REPORTS FOR COMPLIANCE AND FORENSICS\r\nSecureSphere WAF rich graphical reporting capabilities enable customers to easily understand security status and meet regulatory compliance. SecureSphere WAF provides both pre-defined and fully-customizable reports. This enables you to quickly assess your security status and streamline demonstration of compliance with PCI, SOX, HIPAA and FISMA and other compliance standards.\r\nMONITORING FOR IN-DEPTH ANALYSIS OF ATTACKS\r\nAlerts can be easily searched, sorted, and directly linked to corresponding security rules. SecureSphere WAF monitoring and reporting framework provides instant visibility into security, compliance, and content delivery concerns. A real-time dashboard provides a high-level view of system status and security events.\r\n ","shortDescription":"Imperva SecureSphere Web Application Firewall (WAF) analyzes all user access to your business-critical web applications and protects your applications and data from cyber attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Imperva SecureSphere Web Application Firewall","keywords":"SecureSphere, attacks, from, applications, such, security, your, with","description":"Imperva SecureSphere Web Application Firewall (WAF) analyzes all user access to your business-critical web applications and protects your applications and data","og:title":"Imperva SecureSphere Web Application Firewall","og:description":"Imperva SecureSphere Web Application Firewall (WAF) analyzes all user access to your business-critical web applications and protects your applications and data"},"eventUrl":"","translationId":155,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":252,"title":"Increase Customer Base"},{"id":253,"title":"Expand Sales Geography"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=213","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":76,"title":"McAfee ePolicy Orchestrator (McAfee ePO) для Айбокс Банк","description":"Как показывает опыт последних лет, использование лишь одного антивируса на всех рабочих станциях корпоративной сети, как единственной средства для информационной защиты, уже не является достаточной и эффективной мерой для обеспечения высокого уровня информационной безопасности. На сегодняшний день, наиболее эффективным способом является комплексный подход к защите конечных точек. В связи с ежедневным повышением риска утери данных на рабочих станциях и серверах, офицеры информационной безопасности Айбокс Банка (АгроКомбанка) принялись за поиск решения для комплексной защиты рабочих станций.\r\nПродукты компании McAfee ежегодно признаются мировыми экспертами как одни из лучших решений на рынке. А линейка продуктов для защиты конечных точек по предоставлению непрерывной, обновляемой и мощной защиты от самых разных угроз - McAfee Endpoint Protection Suite и McAfee Total Protection for Data постоянно является лидером мировых рейтингов продуктов для защиты рабочих станций и серверов.\r\nСпециалистами компании ISSP была изучена сетевая инфраструктура банка и предложен вариант внедрения решений от компании McAfee. Универсальный инструмент McAfee ePolicy Orchestrator (McAfee ePO) – это масштабируемый под любую сетевую инфраструктуру механизм «все-в-одном» для централизованного управления, контроля и отчетности. еРО разработан для среды уровня «Энтерпрайз» благодаря чему за короткое время, были развернуты все продукты для комплексной защиты конечных точек: анти-вирус, анти-спам, межсетевой экран на рабочих станциях, продукт для безопасной работы в интернете, контроль портов, шифрования дисков, шифрование файлов и папок, шифрование съемных носителей.\r\nПо результатам проекта инфраструктура Айбокс Банка (АгроКомбанка) получила защищенные рабочие станции посредством установки продуктов для защиты конечных точек с возможностью управления ими с единой консоли еРО. Это позволяет удобно и централизовано вести постоянный контроль над всеми компьютерами в сети организации.","alias":"mcafee-epolicy-orchestrator-mcafee-epo-dlja-aiboks-bank","roi":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO) для Айбокс Банк","keywords":"McAfee, защиты, рабочих, точек, конечных, компании, является, Айбокс","description":"Как показывает опыт последних лет, использование лишь одного антивируса на всех рабочих станциях корпоративной сети, как единственной средства для","og:title":"McAfee ePolicy Orchestrator (McAfee ePO) для Айбокс Банк","og:description":"Как показывает опыт последних лет, использование лишь одного антивируса на всех рабочих станциях корпоративной сети, как единственной средства для"},"deal_info":"","user":{"id":2900,"title":"Ibox Bank","logoURL":"https://old.b4r.io/uploads/roi/company/Aiboks_Bank.png","alias":"aiboks-bank","address":"","roles":[],"description":"Ibox Bank operates in the Ukrainian market for over 20 years. During this time it has repeatedly been recognized as one of the most stable banks in Ukraine according to many experts, rating agencies in the banking industry.\r\n\r\nIn particular, in 2013 Ibox Bank was recognized the \"Most reliable and stable bank of the year\" at the First International Competition \"Trusted Bank\". In addition, the \"Bankir\" Magazine recognized the Ibox Bank as the \"Most customer-oriented bank\" in 2013.\r\n\r\nFor 20 years we have been entrusted the savings from more than 1,000 domestic investors. Also, the Ibox Bank became the bank of choice among 4000 thousands of successful companies, including 100 foreign ones.\r\n\r\nIbox Bank is a traditional universal bank that provides all kinds of services to individuals and legal entities of any type of ownership, with an emphasis on comfort and prompt service.\r\n\r\nIbox Bank obtains income through prudent investment in stable Ukrainian companies with an impeccable reputation and high profitability level, including the agricultural sector of Ukraine.\r\n\r\nOver the past 10 years Ibox Bank assets increased by 800%, confirming the right choice of Bank's strategy and demonstrating its continued successful development.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.iboxbank.online/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Ibox Bank","keywords":"Bank, Ibox, bank, recognized, stable, years, Ukraine, companies","description":"Ibox Bank operates in the Ukrainian market for over 20 years. During this time it has repeatedly been recognized as one of the most stable banks in Ukraine","og:title":"Ibox Bank","og:description":"Ibox Bank operates in the Ukrainian market for over 20 years. During this time it has repeatedly been recognized as one of the most stable banks in Ukraine","og:image":"https://old.b4r.io/uploads/roi/company/Aiboks_Bank.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":429,"logo":false,"scheme":false,"title":"McAfee ePolicy Orchestrator (McAfee ePO)","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"mcafee-epolicy-orchestrator-mcafee-epo","companyTypes":[],"description":"A single console for all your security management\r\nMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.\r\n\r\nGet a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks. \r\nSimplify security operations with streamlined workflows for proven efficiencies.\r\nFlexible security management options allow you to select either a traditional premises-based or a cloud-based management version of McAfee ePO.\r\nLeverage your existing third-party IT infrastructure from a single security management console with our extensible architecture.\r\n\r\nQuick deployment for maximum efficiency\r\n\r\nDeploy quickly and easily\r\nEnsure broad-based security and risk management solutions work together to reduce security gaps and complexity. Single agent deployment and customizable policy enforcement secure your environment quickly.\r\n\r\nGain efficiencies\r\nStreamline security and compliance workflows with automations and a personalized workspace. McAfee ePO offers an enterprise-class security management architecture that scales for organizations of all sizes, significantly reducing the number of servers to deploy.\r\n\r\nFuture-proof your security infrastructure\r\nProtect your organization from today’s—and tomorrow’s—threats. Real-time threat intelligence from McAfee Labs proactively guards your infrastructure. The open platform facilitates rapid adoption of security innovations as new threat categories emerge.","shortDescription":"McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO)","keywords":"security, your, management, McAfee, with, from, infrastructure, threat","description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security","og:title":"McAfee ePolicy Orchestrator (McAfee ePO)","og:description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security"},"eventUrl":"","translationId":430,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":5,"title":"Enhance Staff Productivity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"}]}},"categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=94","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":69,"title":"McAfee ePolicy Orchestrator (McAfee ePO) для банка","description":"Проект по миграции сервера управления программным обеспечением McAfee, используется в банке на новую версию McAfee ePolicy Orchestrator 4.6 начался после окончания действия поддержки поставщиком старой версии Эро 4.5. В рамках этого проекта специалисты банка также решили реализовать некоторые изменения архитектуры работы решения с целью улучшения его производительности, а именно перенос базы данных на отдельный сервер.\r\nУчитывая, что ОАО «Альфа-Банк» - имеет большую инфраструктуру, а миграция требует углубленных знаний и работы с программным обеспечением (ПО) McAfee к проекту были привлечены специалисты компании-интегратора ООО «Информейшн Системс Секьюрити Партнерс» (ISSP).\r\nВ рамках проекта были проведены следующие этапы:\r\nДетальное исследование, анализ архитектуры и инфраструктуры заказчика\r\nОбщее определение плана процесса миграции и плана резервного копирования и восстановления ПО McAfee;\r\nПроверка выбранной модели реализации в тестовой среде;\r\nРаботы по переходу программного обеспечения.\r\nПо окончании основной части проекта для специалистов банка компания ISSP провела двухдневное обучение по администрированию обновленной системы.\r\nВ результате проекта банк получил программное обеспечение, поддерживается современными производителями ПО, а также обогатился новыми и усовершенствованными функциями управления защитой рабочих станций и серверов. В целом ОАО «Альфа-Банк» оптимизировал использование своих ресурсов, которые необходимы для обеспечения защиты конечных точек инфраструктуры банка.","alias":"mcafee-epolicy-orchestrator-mcafee-epo-dlja-banka","roi":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO) для банка","keywords":"McAfee, банка, проекта, также, архитектуры, специалисты, инфраструктуры, рамках","description":"Проект по миграции сервера управления программным обеспечением McAfee, используется в банке на новую версию McAfee ePolicy Orchestrator 4.6 начался после","og:title":"McAfee ePolicy Orchestrator (McAfee ePO) для банка","og:description":"Проект по миграции сервера управления программным обеспечением McAfee, используется в банке на новую версию McAfee ePolicy Orchestrator 4.6 начался после"},"deal_info":"","user":{"id":342,"title":"Alfa-Bank Ukraine","logoURL":"https://old.b4r.io/uploads/roi/company/alfabank.png","alias":"alfa-bank-ukraina","address":"","roles":[],"description":"Alfa-Bank Ukraine - a major Ukrainian commercial bank with international capital, which is a private investment holding company ABH Holdings SA (ABHH)with headquarters in Luxembourg. The holding compa","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://alfabank.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Alfa-Bank Ukraine","keywords":"Alfa-Bank, with, holding, Ukraine, company, Holdings, headquarters, compa","description":"Alfa-Bank Ukraine - a major Ukrainian commercial bank with international capital, which is a private investment holding company ABH Holdings SA (ABHH)with","og:title":"Alfa-Bank Ukraine","og:description":"Alfa-Bank Ukraine - a major Ukrainian commercial bank with international capital, which is a private investment holding company ABH Holdings SA (ABHH)with","og:image":"https://old.b4r.io/uploads/roi/company/alfabank.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":429,"logo":false,"scheme":false,"title":"McAfee ePolicy Orchestrator (McAfee ePO)","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"mcafee-epolicy-orchestrator-mcafee-epo","companyTypes":[],"description":"A single console for all your security management\r\nMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.\r\n\r\nGet a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks. \r\nSimplify security operations with streamlined workflows for proven efficiencies.\r\nFlexible security management options allow you to select either a traditional premises-based or a cloud-based management version of McAfee ePO.\r\nLeverage your existing third-party IT infrastructure from a single security management console with our extensible architecture.\r\n\r\nQuick deployment for maximum efficiency\r\n\r\nDeploy quickly and easily\r\nEnsure broad-based security and risk management solutions work together to reduce security gaps and complexity. Single agent deployment and customizable policy enforcement secure your environment quickly.\r\n\r\nGain efficiencies\r\nStreamline security and compliance workflows with automations and a personalized workspace. McAfee ePO offers an enterprise-class security management architecture that scales for organizations of all sizes, significantly reducing the number of servers to deploy.\r\n\r\nFuture-proof your security infrastructure\r\nProtect your organization from today’s—and tomorrow’s—threats. Real-time threat intelligence from McAfee Labs proactively guards your infrastructure. The open platform facilitates rapid adoption of security innovations as new threat categories emerge.","shortDescription":"McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO)","keywords":"security, your, management, McAfee, with, from, infrastructure, threat","description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security","og:title":"McAfee ePolicy Orchestrator (McAfee ePO)","og:description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security"},"eventUrl":"","translationId":430,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.issp.ua/resource_descr.php?l=ru&id=204","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":71,"title":"McAfee Web Gateway для ПроКредит Банк","description":"После того, как Microsoft прекратила развитие своего продукта Forefront TMG, многим пользователям этого решения пришлось начать процедуру поиска замены. Среди таких клиентов оказался и ПроКредит Банк. Перед банком встала задача интеграции нового прокси-сервера. И уже летом 2013 года специалистами ПроКредит Банка были проведены сравнительные тестирования лидирующих решений этого рынка с частичным привлечением компании ISSP - специализированного экспертного интегратора систем информационной безопасности. Результатом тестирования стал выбор в пользу McAfee Web Gateway.\r\nДля предоставления услуг внедрения и настройки работы McAfee Content Security Suite (модуля McAfee Web Gateway) также была задействована компания ISSP, которая прекрасно проявила себя во время тестирования, продемонстрировав высокие компетенции и богатый опыт работы с продуктами McAfee.\r\nВнедрение шлюза по обеспечению защиты Интернет-доступа состояло из этапа миграции существующих настроек прокси-сервера с Microsoft ISA на McAfee Web Gateway и этапа настройки новых функций.\r\nКомпания ISSP совместно со специалистами департамента информационных технологий Банка по согласованной схеме установили и настроили базовые фильтры - аутентификацию, доступ сотрудников Банка к важным ресурсам, фильтрацию типов данных, а также проверили корректности выполненных изменений.\r\nДополнительно было настроено сервер отчетности и интегрувано прокси-сервер с системой резервного копирования конфигурационных данных. Специалистам обеих компаний удалось провести интеграцию McAfee Web Gateway таким образом, чтобы минимизировать изменения в существующей инфраструктуре Банка.\r\nВ результате выполнения этой части проекта, ПроКредит Банк не просто изменил систему для предоставления интернет-доступа, а получил решение высокого класса для фильтрации веб 2.0 и как результат - безопасный доступ к сети Интернет от лидера сегмента рынка - компании Intel Security (McAfee). Кроме того, с автоматической проверкой категории сайтов, отпала необходимость тратить инженерные ресурсы на ручную проверку классов веб-ресурсов, оптимизировала работу IT департамента.","alias":"mcafee-web-gateway-dlja-prokredit-bank","roi":0,"seo":{"title":"McAfee Web Gateway для ПроКредит Банк","keywords":"McAfee, Gateway, Банка, ПроКредит, ISSP, Банк, тестирования, рынка","description":"После того, как Microsoft прекратила развитие своего продукта Forefront TMG, многим пользователям этого решения пришлось начать процедуру поиска замены. Среди","og:title":"McAfee Web Gateway для ПроКредит Банк","og:description":"После того, как Microsoft прекратила развитие своего продукта Forefront TMG, многим пользователям этого решения пришлось начать процедуру поиска замены. Среди"},"deal_info":"","user":{"id":540,"title":"ProCredit Bank","logoURL":"https://old.b4r.io/uploads/roi/company/ProCredit_Bank.png","alias":"prokredit-bank","address":"","roles":[],"description":"ProCredit Bank is a development-oriented commercial bank. We offer excellent customer service to small and medium enterprises and to private individuals who would like to save.\r\n\r\nProCredit Bank is pa","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.procreditbank.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ProCredit Bank","keywords":"ProCredit, Bank, enterprises, private, medium, individuals, would, save","description":"ProCredit Bank is a development-oriented commercial bank. We offer excellent customer service to small and medium enterprises and to private individuals who","og:title":"ProCredit Bank","og:description":"ProCredit Bank is a development-oriented commercial bank. We offer excellent customer service to small and medium enterprises and to private individuals who","og:image":"https://old.b4r.io/uploads/roi/company/ProCredit_Bank.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":431,"logo":false,"scheme":false,"title":"McAfee Web Gateway","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"mcafee-web-gateway","companyTypes":[],"description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost of remediation and minimize the chance of data loss in an attack. Sharing web threat information can make other security tools more intelligent. None of this should disrupt the productivity of a large workforce.\r\n\r\nGateway technology for the world’s most demanding IT environments\r\n\r\nBest-in-class threat prevention\r\nProtect against highly sophisticated malware and targeted attacks that evade URL filtering and antivirus signatures. This secure web gateway provides industry-leading, proactive detection of zero-day malware with full coverage of web traffic, including SSL.\r\n\r\nThreat information sharing\r\nMcAfee Web Gateway is integrated with the Security Connected platform to enable more effective threat detection, reduce incident response times, and improve operational efficiency. Learn about key integration points, McAfee Advanced Threat Defense and McAfee Threat Intelligence Exchange.\r\n\r\nPowerful rules-based policy engine\r\nTake action on any element of the web request-response cycle, allowing limitless flexibility and web security crafted for your organization.","shortDescription":"McAfee Web Gateway delivers high-performance web security through an on-premises appliance that can be deployed both as dedicated hardware and a virtual machine. McAfee Web Gateway is part of the McAfee Web Protection solution alongside McAfee Web Gateway Cloud Service, available together to provide optimal protection for users everywhere.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Web Gateway","keywords":"McAfee, threat, Threat, Gateway, malware, security, more, information","description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost","og:title":"McAfee Web Gateway","og:description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost"},"eventUrl":"","translationId":432,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"}]}},"categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=en&id=209","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":73,"title":"TRITON AP-DATA для торговой розничной сети","description":"ООО «Фудмережа», являясь оператором розничных сетей «Велика Кишеня», «ВК Селект», «ВК Експрес» и «Велмарт», располагает большим количеством коммерческой и торговой информацией, персональными данными о своих клиентах, и осознает всю ответственность, связанную с обеспечением достойного уровня безопасности таких активов.\r\nРешение о необходимости внедрения системы предотвращения утечки информации было принято с целью обезопасить компанию от рисков, связанных с торговыми операциями, потерей репутации, поведением пользователей.\r\nДля работы над проектом была привлечена компания-интегратор систем информационной безопасности ISSP, обладающая весомым опытом работы с продуктами Websense. Во время тестирования решение Websense AP-DATA легко интегрировалось в инфраструктуру компании, и сразу же позволяло наблюдать преимущества своего использования в организации.\r\nВнедрение системы прошло легко и без осложнений, никак не повлияв на непрерывность ведения бизнеса компании. Все этапы проекта: анализ инфраструктуры организации, согласование архитектуры, подготовка технической документации, внедрение системы предотвращения утечек информации и переход в промышленную эксплуатацию, - были завершены в установленные сроки.\r\n «Мы первые на рынке розничной торговли Украины внедрили решение Websense AP-DATA и после полуторалетнего использования системы можем с уверенностью отметить, что удовлетворены её работой. Использование системы дает нам возможность видеть полную картину того, как используется информация в организации, и основываясь на этом настраивать правильные политики к чувствительным данным», - Москалюк Андрей Антонович, начальник отдела информационной безопасности ООО «Фудмережа».","alias":"triton-ap-data-dlja-torgovoi-roznichnoi-seti","roi":0,"seo":{"title":"TRITON AP-DATA для торговой розничной сети","keywords":"системы, Websense, AP-DATA, безопасности, организации, предотвращения, информации, решение","description":"ООО «Фудмережа», являясь оператором розничных сетей «Велика Кишеня», «ВК Селект», «ВК Експрес» и «Велмарт», располагает большим количеством коммерческой и","og:title":"TRITON AP-DATA для торговой розничной сети","og:description":"ООО «Фудмережа», являясь оператором розничных сетей «Велика Кишеня», «ВК Селект», «ВК Експрес» и «Велмарт», располагает большим количеством коммерческой и"},"deal_info":"","user":{"id":462,"title":"Kviza-Trade","logoURL":"https://old.b4r.io/uploads/roi/company/Kviza-Treid____Velika_Kishenja___.png","alias":"kviza-treid","address":"Железнодорожное шоссе, 57, г. Киев, 01103","roles":[],"description":"Квиза-Трейд («Велика Кишеня») — одна из крупнейших сетей розничной торговли Украины с четырнадцатилетней историей успешной работы. \r\nНа сегодняшний день в 16 городах Украины открыт 51 магазин сети — 40 супермаркетов «Велика Кишеня», 1 магазин премиум-формата «ВК SELECT» и 9 «магазинов у дома» «ВК Експрес».\r\nШесть лет подряд «Велика Кишеня» становится лучшей сетью розничной торговли по результатам фестиваля-конкурса «Выбор года». Доверие покупателей, выбирающих «Велику Кишеню», — это самая большая награда для нас и огромный стимул развиваться дальше.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://kishenya.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Kviza-Trade","keywords":"Кишеня, Велика, Квиза-Трейд, магазин, Украины, торговли, розничной, результатам","description":"Квиза-Трейд («Велика Кишеня») — одна из крупнейших сетей розничной торговли Украины с четырнадцатилетней историей успешной работы. \rНа сегодняшний день в 16","og:title":"Kviza-Trade","og:description":"Квиза-Трейд («Велика Кишеня») — одна из крупнейших сетей розничной торговли Украины с четырнадцатилетней историей успешной работы. \rНа сегодняшний день в 16","og:image":"https://old.b4r.io/uploads/roi/company/Kviza-Treid____Velika_Kishenja___.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":39,"logo":false,"scheme":false,"title":"TRITON AP-DATA","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"triton-ap-data","companyTypes":[],"description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\r\n<ul><li>Предотвращение потери данных</li><li>Безопасность бизнес-процесса</li><li>Управление приложений и угроз</li></ul>\r\nData Discover - обнаружение конфиденциальной информации, хранимой в сети<br />\r\n<ul><li>Обнаружение мест хранения конфиденциальных данных</li><li>Измерение и уменьшение риска потери данных</li><li>Поддержка e-discovery для разрешаемого контроля</li></ul>\r\nData Monitor - средство аудита и мониторинга сетевых каналов передачи данных на предмет утечек конфиденциальной информации<br />\r\n<ul><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li><li>Data Protect - обнаружение и блокировка утечек конфиденциальной информации на уровне всех сетевых каналов</li><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li></ul>\r\n\r\n\r\n\r\n\r\nData Endpoint - обнаружение и предотвращение утечки конфиденциальной информации через конечные компьютеры и сменные носители\r\n<ul><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li></ul>","shortDescription":"TRITON AP-DATA - решение от утечки конфиденциальной информации (DLP)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"TRITON AP-DATA","keywords":"конфиденциальной, потери, информации, риска, уменьшение, блокировка, утечки, данных","description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\rПредотвращение потери данныхБезопасность","og:title":"TRITON AP-DATA","og:description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\rПредотвращение потери данныхБезопасность"},"eventUrl":"","translationId":2323,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":10,"title":"Ensure Compliance"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"}]}},"categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=207","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1,"title":"Websense WSG для Lukoil","description":"Специалисты компании ISSP совместно с специалистами ЛТС Украина провели глубокий анализ технических требований к системе и определили продукт, выполняющий все поставленные задачи – Websense Web Security Gateway (WSG). Внедрение системы Websense WSG предусматривалось в режиме повышенной доступности – “Load Balancing”. Многомодульный характер Websense Web Security Gateway и мульти-вариантность методов развертывания решения позволили обеспечить высокий уровень отказоустойчивости и распределения нагрузки в активном режиме. Благодаря поддержке различных режимов работы, специалистам ISSP и ЛТС Украина удалось внедрить решение в сложную отказоустойчивую инфраструктуру Лукойл Украина, в процессе была проведена интеграция со многими элементами инфраструктуры и синхронизация резервных модулей для отказоустойчивости. Первые несколько месяцев после развертывания система проходила период адаптации – политики ограничения действий пользователей при работе с сетью Интернет постепенно подстраивались согласно регламенту использования интернет ресурсов для пользователей и их групп. Гибкость контроля, доступная администраторам значительно возросла – теперь внутреннюю сеть и Интернет разделяет не просто кеширующий прокси, но и одно из лучших в классе решений по веб-безопасности.","alias":"websense-wsg-dlja-lukoil","roi":50,"seo":{"title":"Websense WSG для Lukoil","keywords":"Websense, Украина, Security, Интернет, пользователей, отказоустойчивости, развертывания, Gateway","description":"Специалисты компании ISSP совместно с специалистами ЛТС Украина провели глубокий анализ технических требований к системе и определили продукт, выполняющий все","og:title":"Websense WSG для Lukoil","og:description":"Специалисты компании ISSP совместно с специалистами ЛТС Украина провели глубокий анализ технических требований к системе и определили продукт, выполняющий все"},"deal_info":"http://roi-redesign.my-dev.org/","user":{"id":837,"title":"LUKOIL","logoURL":"https://old.b4r.io/uploads/roi/company/LUKOIL.png","alias":"lukoil","address":"","roles":[],"description":"LUKOIL is one of the largest oil & gas vertical integrated companies in the world accounting for over 2% of crude production and circa 1% of proved hydrocarbon reserves globally. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.lukoil.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"LUKOIL","keywords":"LUKOIL, production, crude, circa, over, reserves, hydrocarbon, proved","description":"LUKOIL is one of the largest oil & gas vertical integrated companies in the world accounting for over 2% of crude production and circa 1% of proved hydrocarbon","og:title":"LUKOIL","og:description":"LUKOIL is one of the largest oil & gas vertical integrated companies in the world accounting for over 2% of crude production and circa 1% of proved hydrocarbon","og:image":"https://old.b4r.io/uploads/roi/company/LUKOIL.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":1525,"logo":false,"scheme":false,"title":"Websense Web Security Gateway (WSG)","vendorVerified":0,"rating":"3.30","implementationsCount":2,"suppliersCount":0,"alias":"websense-web-security-gateway-wsg","companyTypes":[],"description":"<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web 2.0. </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Решение выполняет функции сканирующего прокси-сервера для анализа web- и SSL-трафика на наличие современных угроз безопасности. Кроме того, решение включает в себя службы web-репутации и </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">полный набор URL-категорий безопасности: бот-сети, шпионские программы, фишинг и мошенничество, перехватчики клавиатуры, вредоносные web-сайты, потенциально нежелательные программы.</span>\r\n<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \"></span> ","shortDescription":"Программа анализирует web-трафик в реальном времени, защищая работу c интернет-ресурсами и с современными порталами Web 2.0. Решение выполняет функции сканирующего прокси-сервера","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Websense Web Security Gateway (WSG)","keywords":"программы, безопасности, себя, включает, решение, Кроме, того, web-репутации","description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web","og:title":"Websense Web Security Gateway (WSG)","og:description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web"},"eventUrl":"","translationId":2729,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"2012-01-18","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":282,"title":"Unaurthorized access to corporate IT systems and data"}]}},"categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=81","title":"Media"}},"comments":[],"referencesCount":0}],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{"24":{"id":24,"title":"DLP - Data Leak Prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png","alias":"dlp-data-leak-prevention"},"25":{"id":25,"title":"Web filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png","alias":"web-filtering"},"40":{"id":40,"title":"Endpoint security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png","alias":"endpoint-security"},"41":{"id":41,"title":"Antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png","alias":"antispam"},"42":{"id":42,"title":"UTM - Unified threat management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png","alias":"utm-unified-threat-management"},"43":{"id":43,"title":"Data Encryption","description":"Шифрова́ние — обратимое преобразование информации в целях сокрытия от неавторизованных лиц, с предоставлением, в это же время, авторизованным пользователям доступа к ней. Главным образом, шифрование служит задачей соблюдения конфиденциальности передаваемой информации. Важной особенностью любого алгоритма шифрования является использование ключа, который утверждает выбор конкретного преобразования из совокупности возможных для данного алгоритма[1][2].\r\n\r\nПользователи являются авторизованными, если они обладают определенным аутентичным ключом. Вся сложность и, собственно, задача шифрования состоит в том, как именно реализован этот процесс[1].\r\n\r\nВ целом, шифрование состоит из двух составляющих — зашифрование и расшифрование.\r\n\r\nС помощью шифрования обеспечиваются три состояния безопасности информации[1]:\r\n\r\nКонфиденциальность.\r\nШифрование используется для скрытия информации от неавторизованных пользователей при передаче или при хранении.\r\nЦелостность.\r\nШифрование используется для предотвращения изменения информации при передаче или хранении.\r\nИдентифицируемость.\r\nШифрование используется для аутентификации источника информации и предотвращения отказа отправителя информации от того факта, что данные были отправлены именно им.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-encryption.png","alias":"data-encryption"},"44":{"id":44,"title":"IAM - Identity and Access Management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png","alias":"iam-identity-and-access-management"},"45":{"id":45,"title":"SIEM - Security Information and Event Management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png","alias":"siem-security-information-and-event-management"},"50":{"id":50,"title":"IPC - Information Protection and Control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png","alias":"ipc-information-protection-and-control"},"78":{"id":78,"title":"PAM - privileged access management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png","alias":"pam-privileged-access-management"},"79":{"id":79,"title":"VM - Vulnerability management","description":"Система управления уязвимостями выполняет проактивное сканирование IT-инфраструктуры на наличие неверных конфигураций, слабых мест, вредоносных компонентов и предоставляет рекомендации по устранению существующих рисков.\r\n \r\nТакая система анализирует все компоненты инфраструктуры, включая сети, операционные системы, базы данных и web-приложения. По итогам проверки приложение осуществляет приоритезацию обнаруженных угроз и генерирует руководства, как снизить каждую из них. \r\n ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/VM.png","alias":"vm-vulnerability-management"}},"branches":"Information Technology","companySizes":"1 to 50 Employees","companyUrl":"www.isspgroup.com","countryCodes":["GEO","KAZ","RUS","UKR"],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":"","vendorPartners":[{"vendor":"Microsoft","partnershipLevel":"Silver","countries":"","partnersType":""},{"vendor":"VMware","partnershipLevel":"Solution Provider - Professional","countries":"","partnersType":""},{"vendor":"DELL","partnershipLevel":"Registered","countries":"","partnersType":""},{"vendor":"Cisco","partnershipLevel":"Gold","countries":"","partnersType":""},{"vendor":"Check Point","partnershipLevel":"2 Star Partner","countries":"","partnersType":""},{"vendor":"Hewlett Packard Enterprise","partnershipLevel":"Silver","countries":"","partnersType":""},{"vendor":"CyberArk","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Symantec","partnershipLevel":"Norton Registered","countries":"","partnersType":""},{"vendor":"Forcepoint Company","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"vendor":"McAfee","partnershipLevel":"Gold","countries":"","partnersType":""},{"vendor":"Imperva","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Rapid7","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Altium","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"F5","partnershipLevel":"Silver UNITY Reseller","countries":"","partnersType":""},{"vendor":"gemalto","partnershipLevel":"Certified Partner","countries":"","partnersType":""},{"vendor":"DeviceLock (SmartLine Inc)","partnershipLevel":"Silver","countries":"","partnersType":""},{"vendor":"Acunetix","partnershipLevel":"Advisor","countries":"","partnersType":""},{"vendor":"Mojo Networks","partnershipLevel":"Value-Added Reseller","countries":"","partnersType":""},{"vendor":"Cyberoam","partnershipLevel":"DIAMOND PARTNER","countries":"","partnersType":""},{"vendor":"IronKey","partnershipLevel":"PLATINUM PARTNER","countries":"","partnersType":""},{"vendor":"RSA","partnershipLevel":"RESELLER","countries":"","partnersType":""},{"vendor":"Skybox Security","partnershipLevel":"Silver Reseller","countries":"","partnersType":""},{"vendor":"SOC Prime","partnershipLevel":"","countries":"","partnersType":""},{"vendor":"Versasec","partnershipLevel":"Authorized Resellers\\Integrators","countries":"","partnersType":""},{"vendor":"(ISC)²","partnershipLevel":"","countries":"","partnersType":""}],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[{"id":2271,"logoURL":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg","logo":true,"scheme":false,"title":"Microsoft category A","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-category-a","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft category A","keywords":"","description":"","og:title":"Microsoft category A","og:description":"","og:image":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg"},"eventUrl":"","translationId":2271,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":832,"title":"Category A","alias":"category-a","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2273,"logoURL":"https://old.b4r.io/fileadmin/content/9631386584_f8ab2bf216_b_41.jpg","logo":true,"scheme":false,"title":"Microsoft test","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-test","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft test","keywords":"","description":"","og:title":"Microsoft test","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/9631386584_f8ab2bf216_b_41.jpg"},"eventUrl":"","translationId":2274,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":503,"title":"Storage Networking","alias":"storage-networking","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/storage-networks.png"},{"id":505,"title":"Entry Level Storage","alias":"entry-level-storage","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/entry-level-storage.png"},{"id":48,"title":"CCTV - Closed-circuit television","alias":"cctv-closed-circuit-television","description":"Видеонаблюдение (англ. Сlosed Circuit Television, CCTV — система телевидения замкнутого контура) — процесс, осуществляемый с применением оптико-электронных устройств, предназначенных для визуального контроля или автоматического анализа изображений (автоматическое распознавание лиц, государственных номеров).\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%92%D0%B8%D0%B4%D0%B5%D0%BE%D0%BD%D0%B0%D0%B1%D0%BB%D1%8E%D0%B4%D0%B5%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/video_control.png"},{"id":51,"title":"PaaS - Platform as a service","alias":"paas-platform-as-a-service","description":"Platform as a Service (PaaS, «платформа как услуга») — модель предоставления облачных вычислений, при которой потребитель получает доступ к использованию информационно-технологических платформ: операционных систем, систем управления базами данных, связующему программному обеспечению, средствам разработки и тестирования, размещённым у облачного провайдера. В этой модели вся информационно-технологическая инфраструктура, включая вычислительные сети, серверы, системы хранения, целиком управляется провайдером, провайдером же определяется набор доступных для потребителей видов платформ и набор управляемых параметров платформ, а потребителю предоставляется возможность использовать платформы, создавать их виртуальные экземпляры, устанавливать, разрабатывать, тестировать, эксплуатировать на них прикладное программное обеспечение, при этом динамически изменяя количество потребляемых вычислительных ресурсов.\r\n\r\nПровайдер облачной платформы может взимать плату с потребителей в зависимости от уровня потребления, тарификация возможна по времени работы приложений потребителя, по объёму обрабатываемых данных и количеству транзакций над ними, по сетевому трафику. Провайдеры облачных платформ достигают экономического эффекта за счёт использования виртуализации и экономии на масштабах, когда из множества потребителей в одно и то же время лишь часть из них активно использует вычислительные ресурсы, потребители — за счёт отказа от капитальных вложений в инфраструктуру и платформы, рассчитанных под пиковую мощность и непрофильных затрат на непосредственное обслуживание всего комплекса.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Platform_as_a_service","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PaaS__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2275,"logoURL":"https://old.b4r.io/fileadmin/content/71a0097cf851c21c82e3c3afb19f97e9f4889be6.jpg","logo":true,"scheme":false,"title":"Microsoft test 2","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-test-2","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft test 2","keywords":"","description":"","og:title":"Microsoft test 2","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/71a0097cf851c21c82e3c3afb19f97e9f4889be6.jpg"},"eventUrl":"","translationId":2275,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":775,"title":"Category","alias":"category","description":"","materialsDescription":""},{"id":832,"title":"Category A","alias":"category-a","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/210781-Halloween-Kitty.jpg"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1681,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Acunetix_Vulnerability_Scanner.png","logo":true,"scheme":false,"title":"Acunetix Vulnerability Scanner","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"acunetix-vulnerability-scanner","companyTitle":"Acunetix","companyTypes":["vendor"],"companyId":3850,"companyAlias":"acunetix","description":"With the uptake of cloud computing and advancements in browser technology, web applications have become a core component of business processes, and a lucrative target for hackers. Organizations must make web application security not only a priority, but a fundamental requirement. Enter Acunetix Vulnerability Scanner! <span style=\"font-weight: bold;\">A Firewall is not enough</span> Firewalls, SSL and hardened networks are futile against web application hacking. Web attacks are carried out over HTTP and HTTPS; the same protocols that are used to deliver content to legitimate users. Web applications are often tailor-made and tested less than off-the-shelf-software; the repercussions of a web attack are often worse than traditional network-based attacks.\r\n<ul>\r\n<li>Detects over 4500 web application vulnerabilities.</li>\r\n<li>Scan open-source software and custom-built applications.</li>\r\n<li>Detects Critical Vulnerabilities with 100% Accuracy.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Technology Leader in Automated Web Application Security</span> Acunetix are the pioneers in automated web application security testing with innovative technologies including:\r\n<ul>\r\n<li>DeepScan Technology – for crawling of AJAX-heavy client-side Single Page Applications (SPAs).</li>\r\n<li>Industry’s most advanced SQL Injection and Cross-site Scripting testing – includes advanced detection of DOM-based XSS.</li>\r\n<li>AcuSensor Technology – Combines black box scanning techniques with feedback from its sensors placed inside source code.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Fast, Accurate, Easy to Use</span> Multi-threaded, lightning fast crawler and scanner that can crawl hundreds of thousands of pages without interruptions.\r\n<ul>\r\n<li>Highest detection of WordPress vulnerabilities – scans WordPress installations for over 1200 known vulnerabilities in WordPress’ core, themes and plugins.</li>\r\n<li>An easy to use Login Sequence Recorder that allows the automatic scanning of complex password protected areas.</li>\r\n<li>Review vulnerability data with built-in vulnerability management. Easily generate a wide variety of technical and compliance reports.</li>\r\n</ul>\r\n","shortDescription":"Acunetix Web Vulnerability Scanner Audits Your Web Security ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Acunetix Vulnerability Scanner","keywords":"application, with, that, WordPress, Acunetix, vulnerabilities, over, Technology","description":"With the uptake of cloud computing and advancements in browser technology, web applications have become a core component of business processes, and a lucrative","og:title":"Acunetix Vulnerability Scanner","og:description":"With the uptake of cloud computing and advancements in browser technology, web applications have become a core component of business processes, and a lucrative","og:image":"https://old.b4r.io/fileadmin/user_upload/Acunetix_Vulnerability_Scanner.png"},"eventUrl":"","translationId":1683,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":32,"title":"Web Application Vulnerability Scanner"}],"testingArea":"","categories":[{"id":793,"title":"Web Application Vulnerability Scanner","alias":"web-application-vulnerability-scanner","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-application-vulnerability-scanner.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":21,"logoURL":"https://old.b4r.io/fileadmin/user_upload/full-metasploit-shield_2.jpg","logo":true,"scheme":false,"title":"Rapid7 Metasploit","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"rapid7-metasploit","companyTitle":"Rapid7","companyTypes":["vendor"],"companyId":210,"companyAlias":"rapid7","description":"<span style=\"font-weight: bold;\">Know Your Weak Points</span>\r\nIt’s vital to find your vulnerabilities before a malicious attacker does.\r\n\r\n<span style=\"font-weight: bold;\">Utilize world's largest exploit database</span>\r\nLeading the Metasploit project gives Rapid7 unique insights into the latest attacker methods and mindset. Rapid7 works with the community to add an average of 1 new exploit per day, currently counting more than 1,300 exploits and more than 2,000 modules.\r\n<span style=\"font-weight: bold;\">Simulate real-world attacks against your defenses</span>\r\nMetasploit evades leading anti-virus solutions 90% of the time and enables you to completely take over a machine you have compromised from over 200 modules. Pivot throughout your network to find out just how far an attacker can get.\r\n<span style=\"font-weight: bold;\">Uncover weak and reused credentials</span>\r\nTest your network for weak and reused passwords. Going beyond just cracking operating system accounts, Metasploit Pro can run brute–force attacks against over 20 account types, including databases, web servers, and remote administration solutions. In addition, it can utilize specialized tools designed to expose credentials' scope and effectively gauge impact of an exposed credential.\r\n<span style=\"font-weight: bold;\">Prioritize What Matters Most</span>\r\nFinding your weak points is only half the battle. As a penetration tester, it is your job to perform a thorough assessment and communicate what needs to be done to reduce the risk of a breach.\r\nPinpoint weak links in the attack chain\r\nAttacks are more sophisticated today; the adversary is using multiple techniques combined to breach your systems faster than ever. With Metasploit Pro, you can simulate attacks like the adversary and easily report the biggest security risks.\r\n<span style=\"font-weight: bold;\">Closed-loop integration with Nexpose for remediation</span>\r\nWhen other departments question the validity of scan results, demonstrate that a vulnerability puts systems and data at risk of compromise. You'll get quick buy–in for remediation measures and build credibility with stakeholders. Metasploit and Nexpose provide the only closed-loop validation solution from a single vendor that simplifies vulnerability prioritization and remediation reporting.\r\n<span style=\"font-weight: bold;\">Drive Better Security Program Development</span>\r\nTime is of the essence. Automation, proactive user education, and advanced reporting will enhance your team’s efficiency, productivity, and success.\r\n<span style=\"font-weight: bold;\">Run penetration projects at scale</span>\r\nConducting an assessment and managing data in networks with over 100 hosts can be challenging. Metasploit Pro scales to support thousands of hosts per project on engagements and multiple penetration testers. Automate penetration testing steps with Task Chains and MetaModules to improve productivity.\r\n<span style=\"font-weight: bold;\">Reduce user risk using phishing campaigns and education</span>\r\nSend and track emails to thousands of users with Metasploit Pro's scalable phishing campaigns. Clone web application login pages with one click to harvest credentials. Measure conversion rates at each step in the phishing campaign funnel. When users take a dangerous action, they can be redirected to a training site on the spot. With InsightUBA, any users who have been phished will also be automatically added to the InsightUBA watch list.\r\n<span style=\"font-weight: bold;\">Complete compliance programs faster</span>\r\nGenerate reports to show your findings and sort them by regulations such as PCI DSS and FISMA. Verify that remediations or compensating controls implemented to protect systems are operational and effective. Create vulnerability exceptions based on hard evidence that easily pass your next audit. Automatically record actions and findings from your network and application–layer assessment to save valuable time otherwise spent on cutting and pasting.","shortDescription":"Metasploit, backed by a community of 200,000 users and contributors, gives you that insight. It's the most impactful penetration testing solution on the planet. With it, uncover weaknesses in your defenses, focus on the highest risks, and improve your security outcomes.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Rapid7 Metasploit","keywords":"your, Metasploit, with, over, weak, that, penetration, attacker","description":"Know Your Weak Points\rIt’s vital to find your vulnerabilities before a malicious attacker does.\r\rUtilize world's largest exploit database\rLeading the","og:title":"Rapid7 Metasploit","og:description":"Know Your Weak Points\rIt’s vital to find your vulnerabilities before a malicious attacker does.\r\rUtilize world's largest exploit database\rLeading the","og:image":"https://old.b4r.io/fileadmin/user_upload/full-metasploit-shield_2.jpg"},"eventUrl":"","translationId":22,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":445,"title":"Penetration Testing","alias":"penetration-testing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/penetration-testing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":25,"logoURL":"https://old.b4r.io/fileadmin/user_upload/full-nexpose-shield_0.jpg","logo":true,"scheme":false,"title":"Rapid7 Nexpose","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"rapid7-nexpose","companyTitle":"Rapid7","companyTypes":["vendor"],"companyId":210,"companyAlias":"rapid7","description":"Rapid7 Nexpose анализирует все компоненты инфраструктуры, включая сети, операционные системы, базы данных и web-приложения. По итогам проверки приложение осуществляет приоритезацию обнаруженных угроз и генерирует руководства, как снизить каждую из них. Система Rapid7 Nexpose может интегрироваться с Metasploit – решением для тестирования проникновения угроз, – чтобы комплексно оценивать риски безопасности в IT-инфраструктуре организации. \r\n\r\n<span style=\"font-weight: bold;\">Редакции Rapid7 Nexpose:</span>\r\n<span style=\"font-style: italic;\">Community</span> – версия для индивидуальных пользователей с функциями сканирования до 32 IP, проверки сетей, операционных систем и баз данных. Community может развертываться только на программную платформу.\r\n\r\n<span style=\"font-style: italic;\">Express</span> – версия для небольших организаций с функциями сканирования до 128 или 256 (версия Pro) IP, проверки сетей, операционных систем и баз данных. Express может развертываться только на программную платформу.\r\n\r\n<span style=\"font-style: italic;\">Consultant </span>– версия для консультирующих агентств по IT-безопасности, предлагающая функции сканирования до 1024 IP, проверки сетей, операционных систем, web-приложений, виртуальных сред и баз данных. Consultant может развертываться только на программную платформу. Кроме того, редакция предлагает возможности оценки конфигураций и управления политиками, пользовательской настройки параметров сканирования, отчетов и планов устранения угроз. Доступна приоритетная техподдержка по телефону.\r\n\r\n<span style=\"font-style: italic;\">Enterprise</span> – масштабируемая версия для среднего и крупного бизнеса, предлагающая функции сканирования неограниченного числа IP, проверки сетей, операционных систем, web-приложений, виртуальных сред и баз данных. Enterprise может развертываться на программные, аппаратные и виртуальные платформы. Кроме того, редакция предлагает возможности оценки конфигураций и управления политиками, пользовательской настройки параметров сканирования, отчетов и планов устранения угроз. Доступна приоритетная техподдержка по телефону.\r\n\r\n<span style=\"font-weight: bold;\">Характеристики Rapid7 Nexpose:</span>\r\n\r\n<ol> <li>Автоматическое обнаружение текущих IT-активов, приложений и сервисов, включая IPv6, виртуальные и облачные компоненты. Полученная информация легко интегрируется с со сторонними системами IT инвентаризации, такими как Active Directory (AD), LDAP и VMware vCenter. Администраторы могут легко организовывать и динамически обновлять активы в логических группах, созданных на базе десятков критериев обнаруженных активов АО и ПО.</li> <li>Всеобъемлющая оценка таких угроз, как уязвимости, неверные конфигурации, нарушения политик, открытость для эксплойтов и вирусов, в пределах всех IT-активов, включая операционные системы, сети, базы данных и web-приложения.</li> <li>Использование принятых в индустрии схем приоритезации, таких как система ранжирования рисков CVSS, для определения степени критичности обнаруженных уязвимостей. Фильтрация угроз по 145 категориям для более удобной расстановки приоритетов в устранении рисков в IT-инфраструктуре.</li> <li>Автоматизация сканирования и генерации отчетов – планирование этих процессов тогда, когда удобно администратору. Реализованы возможности исключения определенных уязвимостей из отчетов, создания исключений и отмены корпоративных политик для процедур сканирования и отчетности и т. п.</li> <li>Генерация подробных отчетов с рекомендациями по устранению рисков, чтобы IT-специалисты могли оперативно справляться с найденными уязвимостями. В системе доступны множество шаблонов отчетов, включая отчеты, позволяющие отслеживать тенденции.</li> <li>Интеграция с Metasploit для комплексной оценки выявленных угроз. Metasploit использует данные, полученные сканерами Nexpose, чтобы определить наиболее вероятные цели и траектории потенциальных атак.</li> <li>Отслеживание внутренних политик и их сравнение с такими признанными мировыми стандартами, как FDCC и USGCB. Создание собственных политик благодаря встроенному редактору Nexpose, оценка безопасности и генерация отчетности по стандартам PCI, HIPAA, NERC, FISMA, SANS Top 20 и местного законодательства.</li> <li>Автоматическое определение статуса виртуальных активов, непрерывное сканирование виртуальной среды (включая гостевые ОС, гипервизоры и виртуальные приложения) на наличие уязвимостей. Возможность интеграции с VMware vCenter в целях отслеживания изменений в динамичной виртуальной инфраструктуре.</li> <li>Гибкое и масштабируемое развертывание за несколько минут – возможность выбора вариантов развертывания (на ПО, оборудование, виртуальные и облачные платформы – в зависимости от редакции).</li> </ol>","shortDescription":"Rapid7 Nexpose является системой управления уязвимостями, которая выполняет проактивное сканирование IT-инфраструктуры на наличие неверных конфигураций, слабых мест, вредоносных компонентов и предоставляет рекомендации по устранению существующих рисков.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Rapid7 Nexpose","keywords":"сканирования, угроз, Nexpose, данных, отчетов, версия, может, проверки","description":"Rapid7 Nexpose анализирует все компоненты инфраструктуры, включая сети, операционные системы, базы данных и web-приложения. По итогам проверки приложение","og:title":"Rapid7 Nexpose","og:description":"Rapid7 Nexpose анализирует все компоненты инфраструктуры, включая сети, операционные системы, базы данных и web-приложения. По итогам проверки приложение","og:image":"https://old.b4r.io/fileadmin/user_upload/full-nexpose-shield_0.jpg"},"eventUrl":"","translationId":2321,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":79,"title":"VM - Vulnerability management","alias":"vm-vulnerability-management","description":"Система управления уязвимостями выполняет проактивное сканирование IT-инфраструктуры на наличие неверных конфигураций, слабых мест, вредоносных компонентов и предоставляет рекомендации по устранению существующих рисков.\r\n \r\nТакая система анализирует все компоненты инфраструктуры, включая сети, операционные системы, базы данных и web-приложения. По итогам проверки приложение осуществляет приоритезацию обнаруженных угроз и генерирует руководства, как снизить каждую из них. \r\n ","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/VM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1581,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IMPERVA_Incapsula.png","logo":true,"scheme":false,"title":"Imperva Incapsula","vendorVerified":0,"rating":"1.70","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":2,"alias":"imperva-incapsula","companyTitle":"Imperva","companyTypes":["vendor"],"companyId":207,"companyAlias":"imperva","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula can protect your organization against any DDoS threat.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">WEBSITE PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Always-on DDoS protection that automatically detects and mitigates attacks targeting websites and web applications.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Website Protection is an optional DDoS mitigation service that can be added to any Website Security subscription.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">INFRASTRUCTURE PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">On-demand or always-on protection against DDoS attacks that directly target your network infrastructure.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Infrastructure Protection can be used to defend entire subnets.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">NAME SERVER PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Always-on DDoS protection for your Name Server (NS) that protects DNS servers against network and application layer assaults.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Name Server Protection also accelerates DNS responses.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">ALL-INCLUSIVE DDOS PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula DDoS protection supports Unicast and Anycast technologies to power a many-to-many defense methodology. This automatically detects and mitigates attacks exploiting application and server vulnerabilities, hit-and-run events and large botnets.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">10-SECOND MITIGATION SLA</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">When DDoS strikes, it takes target services moments to go down and hours to recover. Incapsula is the only service to offer a SLA-backed guarantee to detect and block all attacks in under 10 seconds.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">HIGH-CAPACITY NETWORK</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our high-capacity global network holds over (Terabits per second) of on-demand scrubbing capacity and can process 30 billion attack packets per second. Incapsula network has successfully defended clients against some of the largest attacks on record.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">ATTACK VISIBILITY</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula shows you attacks as they are happening and gives you actionable insight into Layer 7 attacks. Incapsula security dashboard lets you quickly analyze attacks and lets you adjust security policies on-the-fly to stop web application attacks.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">BLOCK ANY TYPE OF DDOS ATTACK</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula proxies all web requests to block DDoS attacks from being relayed to client origin servers. Incapsula detects and mitigates any type of attack, including:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<ul><li>TCP SYN+ACK</li><li>TCP FIN</li><li>TCP RESET</li><li>TCP ACK</li><li>TCP ACK+PSH</li><li>TCP Fragment</li><li>UDP</li><li>Slowloris</li><li>Spoofing</li><li>ICMP</li><li>IGMP</li><li>HTTP Flood</li><li>Brute Force</li><li>Connection Flood</li><li>DNS Flood</li><li>NXDomain</li><li>Mixed SYN + UDP or ICMP + UDP Flood</li><li>Ping of Death</li><li>Smurf</li><li>Reflected ICMP & UDP</li><li>As well as other attacks</li></ul>","shortDescription":"Incapsula is guaranteed to mitigate any DDoS attack in under 10 seconds, regardless of its size and without getting in the way of legitimate traffic. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":10,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Imperva Incapsula","keywords":"attacks, Incapsula, DDoS, against, network, PROTECTION, protection, that","description":"Incapsula can protect your organization against any DDoS threat.\rWEBSITE PROTECTION\rAlways-on DDoS protection that automatically detects and mitigates attacks","og:title":"Imperva Incapsula","og:description":"Incapsula can protect your organization against any DDoS threat.\rWEBSITE PROTECTION\rAlways-on DDoS protection that automatically detects and mitigates attacks","og:image":"https://old.b4r.io/fileadmin/user_upload/IMPERVA_Incapsula.png"},"eventUrl":"","translationId":1446,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1601,"logoURL":"https://old.b4r.io/fileadmin/user_upload/imperva_logo.png","logo":true,"scheme":false,"title":"Imperva SecureSphere Database Firewall","vendorVerified":0,"rating":"1.70","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":2,"alias":"imperva-securesphere-database-firewall","companyTitle":"Imperva","companyTypes":["vendor"],"companyId":207,"companyAlias":"imperva","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">SecureSphere use two monitoring channels – one for security policies and one for </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">audit policies. The independence enables resource and task optimization that is not </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">possible with a single channel.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">SecureSphere Database Firewall</span>\r\n\r\n<ul>\r\n<li>Logs only what activity is necessary while monitoring all activity for security violations</li>\r\n<li>Monitors and protects high-transaction databases</li>\r\n<li>Blocks suspicious behavior when it happens – investigate in-context</li>\r\n<li>Executes multi-action security alerts, eliminating bottlenecks and delays</li>\r\n<li>Interlocks database protection with the SecureSphere Web Application Firewall, CounterBreach Insider threat protection, and malware protection, providing multifactored data security</li>\r\n</ul>\r\nSecureSphere helps organizations address compliance regulations including GDPR, PCI DSS, SOX, POPI, and HIPAA.","shortDescription":"SecureSphere Database Firewall effectively protects databases from attacks, data loss and theft.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":20,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Imperva SecureSphere Database Firewall","keywords":"SecureSphere, security, Firewall, protection, with, activity, policies, Database","description":"SecureSphere use two monitoring channels – one for security policies and one for audit policies. The independence enables resource and task","og:title":"Imperva SecureSphere Database Firewall","og:description":"SecureSphere use two monitoring channels – one for security policies and one for audit policies. The independence enables resource and task","og:image":"https://old.b4r.io/fileadmin/user_upload/imperva_logo.png"},"eventUrl":"","translationId":1572,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1604,"logoURL":"https://old.b4r.io/fileadmin/user_upload/F5_Silverline_Web_Application_Firewall.jpg","logo":true,"scheme":false,"title":"F5 Silverline Web Application Firewall","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"f5-silverline-web-application-firewall","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"F5® Silverline® Web Application Firewall is a cloud based service with 24x7x365 support from highly specialized security experts. It helps organizations protect web applications and data, and enable compliance with industry security standards, such as PCI DSS. Silverline Web Application Firewall is available as a fully managed service for comprehensive and customized app protection, or as an express self-service for rapid deployment of expertly maintained policies.\r\n<span style=\"font-weight: bold;\">Managed service key benefits</span>\r\n<ul>\r\n<li>Ensure application security and compliance</li>\r\n<li>Get comprehensive protection from advanced layer 7 attacks, OWASP Top Ten application security risks, and zero-day attacks—and enable compliance with key regulatory mandates.</li>\r\n<li>Get 24x7x365 expert service</li>\r\n<li>Receive 24x7x365 access to web application firewall (WAF) experts who build, proactively monitor, and fine-tune WAF policies against known and emerging threats.</li>\r\n<li>Deploy flexibly across hybrid environments</li>\r\n<li>Ensure consistent web application security, availability, and user experiences across traditional and cloud data centers.</li>\r\n<li>Defend with proven security effectiveness</li>\r\n<li>Leverage security efficacy with technology built on the NSS Labs–recommended F5 BIG-IP® Application Security Manager™ (ASM), based on tests that demonstrate 99.89 percent overall security effectiveness.</li>\r\n<li>Drive operational and cost efficiencies</li>\r\n<li>Remove the complexity of WAF management,</li>\r\n<li>increase the speed to deploy new policies, and</li>\r\n<li>decrease operational expenses.</li>\r\n<li>Gain attack insights and intelligence</li>\r\n<li>Access reports through the cloud-based customer portal and incorporate external intelligence for securing apps against identified threats. </li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">What’s Inside</span>\r\n<ul>\r\n<li>Drive Efficiencies with a Comprehensive Web Application Firewall Service</li>\r\n<li>Receive Expert Policy Building and Monitoring</li>\r\n<li>Hybrid Policy Management and Deployment</li>\r\n<li>Defend with Proven Security Effectiveness</li>\r\n<li>Comprehensive Attack Protection</li>\r\n<li>Built-In Compliance and Reporting Capabilities</li>\r\n<li>Gain Attack Insights and Intelligence</li>\r\n<li>Comprehensive Managed Service App Protection</li>\r\n<li>Streamlined Self-Service App Protection</li>\r\n<li>The Silverline Cloud-Based Platform</li>\r\n<li>Flexible Licensing</li>\r\n<li>Add-On Threat Intelligence Services</li>\r\n<li>F5 Security Operations Center</li>\r\n</ul>\r\n","shortDescription":"F5® Silverline® Web Application Firewall is a cloud-based service with 24x7x365 support from highly specialized security experts. It helps organizations protect web applications and data.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 Silverline Web Application Firewall","keywords":"security, with, Application, service, Silverline, application, Firewall, policies","description":"F5® Silverline® Web Application Firewall is a cloud based service with 24x7x365 support from highly specialized security experts. It helps","og:title":"F5 Silverline Web Application Firewall","og:description":"F5® Silverline® Web Application Firewall is a cloud based service with 24x7x365 support from highly specialized security experts. It helps","og:image":"https://old.b4r.io/fileadmin/user_upload/F5_Silverline_Web_Application_Firewall.jpg"},"eventUrl":"","translationId":1605,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1673,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Rapid7_Appspider.png","logo":true,"scheme":false,"title":"AppSpider","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"appspider","companyTitle":"Rapid7","companyTypes":["vendor"],"companyId":210,"companyAlias":"rapid7","description":"While today’s malicious attackers pursue a variety of goals, they share a preferred channel of attack—the millions of custom web, mobile, and cloud applications companies deploy to serve their customers. AppSpider dynamically assesses these applications for vulnerabilities across all modern technologies, provides tools that speed remediation and monitors applications for changes. Keep your applications safe and secure—now and moving forward. KNOW YOUR WEAK POINTS AppSpider automatically finds vulnerabilities across a wide range of applications— from the relatively simple to the most complex—and it includes unique capabilities and integrations that enable teams to automate more of the security testing program across the entire software development lifecycle (SDLC), from creation through production. Coverage is the first step to scanner accuracy. Scanners were originally built with a crawl and attack architecture, but crawling doesn’t work for web services and other dynamic technologies. AppSpider can still crawl traditional name=value pair formats like HTML, but it also has a Universal Translator that can interpret the new technologies being used in today’s web and mobile applications (AJAX, GWT, REST, JSON, etc.). With AppSpider, you can: • Close the coverage gap with our Universal Translator • Intelligently simulate real-world attacks • Continuously monitor your applications • Stay authenticated for deep assessment AppSpider includes interactive actionable reports that prioritize the highest risk and streamline remediation efforts by enabling users to quickly get to and analyze the data that matters most. With one click, you can drill deep into a vulnerability to get more information and replay attacks in real-time. Sifting through pages and pages of vulnerabilities in a PDF report takes too much time. AppSpider provides interactive, actionable reports that behave like web pages with an intuitive organization and links for deeper analysis. The analysis doesn’t have to be tedious: Findings are organized and consolidated by attack types (XSS, SQLi, etc.), and with one click, you can drill deep into a vulnerability to get more information. AppSpider’s sophisticated reports reduce remediation time and streamline communication with developers. With AppSpider, you can: • Conduct deeper analysis with interactive reports • Quickly replay web attacks • Categorize applications for easy reporting In order to improve your overall security posture, you need a high-level view of your application security program that enables you to see where things stand. AppSpider enables centralized control, automation, and interoperability over all aspects of your enterprise web application security program, including continuous scanning configuration, user permissions, scheduling, and monitoring. In addition, AppSpider includes trends and analyze data to help collaborate with all stakeholders toward improved security posture. Time is critical when remediating vulnerabilities. Using innovative automated rule generation, AppSpider’s defensive capabilities help security professionals patch web application vulnerabilities almost immediately—in a matter of minutes, instead of days or weeks. Without the need to build a custom rule for a web application firewall (WAF) or intrusion prevention system (IPS), or the need to deliver a source code patch, our software allows you the time to identify the root cause of the problem and fix it in the code. With AppSpider, you can: • Manage and control application security programs • Automate targeted virtual patching • Meet compliance requirements • Integrate into your DevSecOps workflow","shortDescription":"AppSpider automatically finds vulnerabilities across a wide range of applications— from the relatively simple to the most complex—and it includes unique capabilities and integrations","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AppSpider","keywords":"AppSpider, applications, security, with, that, your, vulnerabilities, application","description":"While today’s malicious attackers pursue a variety of goals, they share a preferred channel of attack—the millions of custom web, mobile, and cloud","og:title":"AppSpider","og:description":"While today’s malicious attackers pursue a variety of goals, they share a preferred channel of attack—the millions of custom web, mobile, and cloud","og:image":"https://old.b4r.io/fileadmin/user_upload/Rapid7_Appspider.png"},"eventUrl":"","translationId":1674,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":32,"title":"Web Application Vulnerability Scanner"}],"testingArea":"","categories":[{"id":793,"title":"Web Application Vulnerability Scanner","alias":"web-application-vulnerability-scanner","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-application-vulnerability-scanner.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":201,"logoURL":"https://old.b4r.io/fileadmin/user_upload/BIG-IP_Local_Traffic_Manager.jpg","logo":true,"scheme":false,"title":"BIG-IP Local Traffic Manager","vendorVerified":0,"rating":"1.70","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":2,"alias":"big-ip-local-traffic-manager","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms the chaotic volume of network traffic into logically assembled streams of data, and then makes intelligent traffic management decisions, selecting the right destination based on server performance, security, and availability.\r\n\r\nYes, BIG-IP LTM enables sophisticated load balancing. But, that’s just the beginning.\r\nFull proxy means full power.\r\n\r\nIf you can see it, you can manipulate it.\r\n\r\nBecause BIG-IP LTM is a full proxy, you can inspect, manage, and report on application traffic entering and exiting your network. From basic load balancing to complex traffic management decisions based on client, server, or application status, BIG-IP LTM gives you granular control over app traffic.\r\n\r\nFor example, if you want to direct traffic based on the requested URL or log specific server responses to a reporting system, BIG-IP LTM has the architecture and the tools you need to do it.\r\n\r\nOperational efficiency? Check.\r\n\r\nBIG-IP LTM can optimize the speed and reliability of your applications via both network and application layers.\r\n\r\nUsing real-time protocol and traffic management decisions based on application and server conditions, extensive connection management, and TCP and content offloading, BIG-IP LTM dramatically improves page load times and the user experience.\r\n\r\nWhether it’s negotiating high-latency networks or offloading millions of connections, BIG-IP LTM can improve the performance of your infrastructure and your applications.\r\n\r\nThe SSL performance of BIG-IP LTM lets you cost-effectively protect the end-to-end user experience by encrypting everything from the client to the server. It also scales on-demand and absorbs potentially crippling DDoS attacks.\r\n\r\nOften SSL is turned on throughout the network. Thing is, most network security devices aren’t built to detect malicious traffic in layers 4–7. Separating the good and bad traffic is the first problem, taking action on the malicious traffic is the second.\r\n\r\nBIG-IP LTM includes levels of inspection necessary to block bad traffic and allow good traffic to pass through.\r\n\r\n","shortDescription":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BIG-IP Local Traffic Manager","keywords":"traffic, BIG-IP, application, network, server, your, based, management","description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms","og:title":"BIG-IP Local Traffic Manager","og:description":"BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms","og:image":"https://old.b4r.io/fileadmin/user_upload/BIG-IP_Local_Traffic_Manager.jpg"},"eventUrl":"","translationId":202,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":500,"logoURL":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg","logo":true,"scheme":false,"title":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM)","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"f5-big-ip-dns-ranee-global-traffic-manager-gtm","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"Преимущества:\r\n\r\nглобальная балансировка нагрузки на приложения\r\nповышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)\r\nзащита DNS от DDoS-атак\r\nлегкая масштабируемость системы доменных имен.\r\n","shortDescription":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM) — модуль, распределяющий запросы и нагрузки на корпоративные приложения и систему DNS , также обеспечивает защиту вашей DNS инфраструктуры от DDoS-атак и обеспечивает решение DNSSEC в реальном времени.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM)","keywords":"системы, имен, доменных, свыше, запросов, обработка, секунду, легкая","description":"Преимущества:\r\rглобальная балансировка нагрузки на приложения\rповышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)","og:title":"F5 BIG-IP DNS (ранее Global Traffic Manager - GTM)","og:description":"Преимущества:\r\rглобальная балансировка нагрузки на приложения\rповышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)","og:image":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg"},"eventUrl":"","translationId":2399,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":501,"logoURL":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg","logo":true,"scheme":false,"title":"F5 BIG-IP DNS (formerly Global Traffic Manager - GTM)","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"f5-big-ip-dns-formerly-global-traffic-manager-gtm","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"Speed, meet security.\r\nBIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries. \r\nWith a set of features that includes multicore scalability, DNS Express, and IP Anycast integration, BIG-IP DNS handles millions of DNS queries, protects your business from DDoS attacks, and ensures top application performance for users.\r\nBIG-IP DNS delivers a real-time, signed DNSSEC query response and DNS firewall services for attack protection and mitigates complex threats by blocking access to malicious domains.\r\nWorks with what you already have in place.\r\nBIG-IP DNS services integrate with DNS zone management solutions, increase DNS performance at the network edge, and mask the DNS back-end infrastructure.\r\n\r\nThat translates into higher productivity, server consolidation, faster responses, and protected DNS management.\r\nAll-over availability.\r\nBIG-IP DNS routes distributed app traffic to keep pace with changing network and user volumes that can overwhelm data centers during peak traffic times.\r\nBIG-IP DNS can also be configured as a full proxy for global load balancing applications and DNS across architectures, as well as across the globe. Plus, you can use it in virtual and hybrid cloud environments to extend DNS services and global app availability while keeping centralized control within the data center.\r\n","shortDescription":"BIG-IP DNS improves the performance and availability of your global applications by sending users to the closest or best-performing physical, virtual, or cloud environment. It also hyperscales and secures your DNS infrastructure from DDoS attacks and delivers a real-time DNSSEC solution that protects against hijacking attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 BIG-IP DNS (formerly Global Traffic Manager - GTM)","keywords":"BIG-IP, services, with, across, availability, that, global, queries","description":"Speed, meet security.\rBIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries. \rWith a set of","og:title":"F5 BIG-IP DNS (formerly Global Traffic Manager - GTM)","og:description":"Speed, meet security.\rBIG-IP DNS hyperscales up to 100 million responses per second (RPS) to manage rapid increases in DNS queries. \rWith a set of","og:image":"https://old.b4r.io/fileadmin/user_upload/F5_BIG-IP_DNS__ranee_Global_Traffic_Manager_-_GTM_.jpg"},"eventUrl":"","translationId":501,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":443,"title":"Application Delivery Controller (load balancer) - appliance","alias":"application-delivery-controller-load-balancer-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/application-delivery-load-balancer-appliance.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":810,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Gemalto_Trusted_Service_Hub.png","logo":true,"scheme":false,"title":"Gemalto Trusted Service Hub","vendorVerified":0,"rating":"1.90","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"gemalto-trusted-service-hub","companyTitle":"gemalto","companyTypes":["vendor"],"companyId":2787,"companyAlias":"gemalto","description":"Gemalto’s TSH enables seamless and secure over-the-air deployment of the digital keys to any type of phone that supports the solution.\r\nWith the key safely downloaded to a secure element via Gemalto’s TSH, drivers can lock/unlock their cars by simply placing the smartphone against the door handle. The engine can also be turned on with the phone in the charging tray of the dashboard and pressing the start button. Capable of operating even if the phone battery is drained, the need to carry a conventional key is eliminated.\r\nAs an integral part of the ‘Mercedes me connect’ program, the digital vehicle key will connect seamlessly with services that meet the demands of modern mobility and digital lifestyles.\r\n\r\n<span style=\"color: rgb(51, 51, 51); font-family: "Lucida Grande", Arial, Helvetica, sans-serif; \">Source: Gemalto</span>","shortDescription":"Gemalto is providing its Trusted Services Hub (TSH) to support Daimler AG’s new smartphone-based ‘digital vehicle key’ for the Mercedes-Benz E-Class range. The premium car maker’s innovative solution gives drivers the freedom to lock/unlock and start their vehicles using nothing more than an NFC smartphone. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Gemalto Trusted Service Hub","keywords":"digital, phone, Gemalto, Gemalto’s, that, with, secure, drained","description":"Gemalto’s TSH enables seamless and secure over-the-air deployment of the digital keys to any type of phone that supports the solution.\rWith the key safely","og:title":"Gemalto Trusted Service Hub","og:description":"Gemalto’s TSH enables seamless and secure over-the-air deployment of the digital keys to any type of phone that supports the solution.\rWith the key safely","og:image":"https://old.b4r.io/fileadmin/user_upload/Gemalto_Trusted_Service_Hub.png"},"eventUrl":"","translationId":811,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":43,"title":"Data Encryption","alias":"data-encryption","description":"Шифрова́ние — обратимое преобразование информации в целях сокрытия от неавторизованных лиц, с предоставлением, в это же время, авторизованным пользователям доступа к ней. Главным образом, шифрование служит задачей соблюдения конфиденциальности передаваемой информации. Важной особенностью любого алгоритма шифрования является использование ключа, который утверждает выбор конкретного преобразования из совокупности возможных для данного алгоритма[1][2].\r\n\r\nПользователи являются авторизованными, если они обладают определенным аутентичным ключом. Вся сложность и, собственно, задача шифрования состоит в том, как именно реализован этот процесс[1].\r\n\r\nВ целом, шифрование состоит из двух составляющих — зашифрование и расшифрование.\r\n\r\nС помощью шифрования обеспечиваются три состояния безопасности информации[1]:\r\n\r\nКонфиденциальность.\r\nШифрование используется для скрытия информации от неавторизованных пользователей при передаче или при хранении.\r\nЦелостность.\r\nШифрование используется для предотвращения изменения информации при передаче или хранении.\r\nИдентифицируемость.\r\nШифрование используется для аутентификации источника информации и предотвращения отказа отправителя информации от того факта, что данные были отправлены именно им.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-encryption.png"},{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":240,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IDBridge1.png","logo":true,"scheme":false,"title":"IDBridge","vendorVerified":0,"rating":"1.90","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"idbridge","companyTitle":"gemalto","companyTypes":["vendor"],"companyId":2787,"companyAlias":"gemalto","description":"IDBridge - Interface smart card readers are the most necessary components of any system that works with smart cards. \r\nProducts IDBridge is created on the basis of more than 30 years of experience in research and development of solutions in the sphere of security and cryptography. It is a robust, versatile products that meet the requirements of the relevant standards and certified in all industries.\r\nThe range of products IDBridge includes reader for desktopcomputers, secure remote access and remote access. this provides maximum flexibility devices for use in any business environment. \r\n","shortDescription":"IDBridge - Interface smart card readers are the most necessary components of any system that works with smart cards.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IDBridge","keywords":"IDBridge, access, that, products, remote, smart, relevant, standards","description":"IDBridge - Interface smart card readers are the most necessary components of any system that works with smart cards. \rProducts IDBridge is created on the","og:title":"IDBridge","og:description":"IDBridge - Interface smart card readers are the most necessary components of any system that works with smart cards. \rProducts IDBridge is created on the","og:image":"https://old.b4r.io/fileadmin/user_upload/IDBridge1.png"},"eventUrl":"","translationId":241,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":769,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Dell_Wyse_3040_tonkii_klient.jpg","logo":true,"scheme":false,"title":"Dell Wyse 3040 тонкий клиент","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":22,"alias":"dell-wyse-3040-tonkii-klient","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Широкие возможности подключения. Клиент Wyse 3040 обладает всеми функциями беспроводной связи и проводными сетевыми подключениями, двумя разъемами DisplayPort, 4 портами USB, в том числе 1 портом USB 3.0 и платой беспроводной связи с поддержкой технологии Bluetooth (опционально).\r\n\r\nВыберите оптимальную ОС. Клиент Wyse 3040 поддерживает ThinOS и ThinLinux (скоро в продаже).Пользователи, в зависимости от потребностей и стоящих задач, смогут выбрать наиболее подходящую операционную систему.\r\nЭффективный и экономичный.\r\n\r\nТонкий клиент Wyse 3040. Упрощенная настройка<span class=\"Apple-tab-span\" style=\"white-space:pre\">\t</span>Упрощенная настройка. Благодаря упрощенной автоматической установке, настройке и управлению клиент Wyse 3040 является идеальным инструментом для построения максимально эффективных систем VDI. Возможность подключения различных виртуальных рабочих столов, включая среды от Citrix, Microsoft и VMware. Решение Wyse 3040 предлагает основные протоколы и поддержку периферийных устройств, включая опциональный PCoIP.\r\nТонкий клиент Wyse 3040. Экономия энергии. Экономия денег.<span class=\"Apple-tab-span\" style=\"white-space:pre\">\t</span>Экономия энергии. Экономия денег. Доступные цены обеспечивают низкий уровень начальных инвестиций, а благодаря низкому энергопотреблению (менее 5 ватт) достигается ежедневная энергоэффективность работы.\r\nТонкий клиент Wyse 3040. Простое управление<span class=\"Apple-tab-span\" style=\"white-space:pre\">\t</span>Простое управление. Простота управления тонким клиентом Wyse 3040 достигается за счет использования программного обеспечения Dell Wyse Device Manager (WDM) или Cloud Client Manager (CCM). Мощное, простое в использовании и высокомасштабируемое ПО WDM позволяет выполнять настройку, мониторинг устройств Dell Wyse и управление ими.","shortDescription":"Благодаря высокой производительности, достигаемой с помощью четырехъядерных процессоров Intel®, тонкий клиент Wyse 3040 обеспечивает высочайшее качество работы виртуальных настольных систем в своем классе.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dell Wyse 3040 тонкий клиент","keywords":"Wyse, 3040, клиент, Экономия, Тонкий, управление, Dell, энергии","description":"Широкие возможности подключения. Клиент Wyse 3040 обладает всеми функциями беспроводной связи и проводными сетевыми подключениями, двумя разъемами DisplayPort,","og:title":"Dell Wyse 3040 тонкий клиент","og:description":"Широкие возможности подключения. Клиент Wyse 3040 обладает всеми функциями беспроводной связи и проводными сетевыми подключениями, двумя разъемами DisplayPort,","og:image":"https://old.b4r.io/fileadmin/user_upload/Dell_Wyse_3040_tonkii_klient.jpg"},"eventUrl":"","translationId":2490,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":770,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Dell_Wyse_3040_tonkii_klient.jpg","logo":true,"scheme":false,"title":"Dell Wyse 3040 Thin Client","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":22,"alias":"dell-wyse-3040-thin-client","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Efficient and effective.\r\nWyse 3040 Thin Client - Simplified setup<span style=\"white-space:pre\">\t</span>Simplified setup: With simplified automatic setup, configuration and management, the Wyse 3040 can be deployed right out-of-the box. Connect to a variety of virtual desktops including Citrix, Microsoft and VMware environments and provides essential protocol and peripheral support, including optional PCoIP.\r\nWyse 3040 Thin Client - Save energy. Save money<span style=\"white-space:pre\">\t</span>Save energy. Save money: An affordable price point keeps your initial investment low while power-efficient operation of less than 5 watts maintains cost-effectiveness from one day to the next.\r\nWyse 3040 Thin Client - Makes management a snap<span style=\"white-space:pre\">\t</span>Makes management a snap: Easily manage your Wyse 3040 thin client with Dell Wyse Device Manager (WDM) or Cloud Client Manager (CCM). Powerful, easy-to-use and highly scalable, WDM software enables you to configure, monitor and manage Dell Wyse devices.","shortDescription":"At the top of its class: With strong performance featuring Intel® Quad Core processors, Wyse 3040 delivers the best virtual desktop experience of any thin client solution in its class.\r\nWell connected: Wyse 3040 features wireless and wired network connectivity, with two DisplayPort interfaces, 4 USB ports—including 1 USB 3.1 and an AC wireless with optional Bluetooth.\r\nPick the OS that works for you: Wyse 3040 supports both ThinOS and ThinLinux (coming soon), so task and productivity users can choose the system that fits their needs.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dell Wyse 3040 Thin Client","keywords":"Wyse, 3040, Client, Save, Thin, Dell, setup, management","description":"Efficient and effective.\rWyse 3040 Thin Client - Simplified setup\tSimplified setup: With simplified automatic setup, configuration and management, the Wyse","og:title":"Dell Wyse 3040 Thin Client","og:description":"Efficient and effective.\rWyse 3040 Thin Client - Simplified setup\tSimplified setup: With simplified automatic setup, configuration and management, the Wyse","og:image":"https://old.b4r.io/fileadmin/user_upload/Dell_Wyse_3040_tonkii_klient.jpg"},"eventUrl":"","translationId":770,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":778,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Surface_Laptop.jpg","logo":true,"scheme":false,"title":"Microsoft Surface Laptop","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-surface-laptop","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"Surface Laptop provides the perfect blend of texture, subtle details, and clean, elegant lines — plus the luxurious touch of our Signature Alcantara® material-covered keyboard.\r\nThe perfect balance of portability and performance.\r\nYou don’t have to choose between power and traveling light. At just 2.76 pounds, Surface Laptop gives you an ideal balance of both, plus all-day battery life.\r\nA stunning screen that responds to your touch.\r\nExperience faster, more natural navigation on the vibrant 13.5” PixelSense™ Display with immersive touchscreen. Enjoy more space for your ideas with an edge-to-edge display and ultra-thin bezel.\r\n\r\n","shortDescription":"Microsoft Surface Laptop is designed for Windows 10 S — streamlined for security and superior performance.2 Applications are delivered via the Windows Store, ensuring that they’re Microsoft verified.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Surface Laptop","keywords":"Laptop, Surface, touch, your, plus, perfect, balance, with","description":"Surface Laptop provides the perfect blend of texture, subtle details, and clean, elegant lines — plus the luxurious touch of our Signature Alcantara®","og:title":"Microsoft Surface Laptop","og:description":"Surface Laptop provides the perfect blend of texture, subtle details, and clean, elegant lines — plus the luxurious touch of our Signature Alcantara®","og:image":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Surface_Laptop.jpg"},"eventUrl":"","translationId":779,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1034,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Coco_Framework.png","logo":true,"scheme":false,"title":"Microsoft Coco Framework","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"microsoft-coco-framework","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these requirements, Coco presents an alternative approach to ledger construction, giving enterprises the scalability, distributed governance and enhanced confidentiality they need without sacrificing the inherent security and immutability they expect.\r\nLeveraging the power of existing blockchain protocols, trusted execution environments (TEEs) such as Intel SGX and Windows Virtual Secure Mode (VSM), distributed systems and cryptography, Coco enables enterprise-ready blockchain networks that deliver:\r\n\r\n<ul><li>Throughput and latency approaching database speeds.</li><li>Richer, more flexible, business-specific confidentiality models.</li><li>Network policy management through distributed governance.</li><li>Support for non-deterministic transactions.</li></ul>\r\nBy providing these capabilities, Coco offers a trusted foundation with which existing blockchain protocols can be integrated to deliver complete, enterprise-ready ledger solutions, opening up broad, high scale scenarios across industries, and furthering blockchain's ability to digital transform business.\r\nWe have already begun exploring Coco’s potential across a variety of industries, including retail, supply chain and financial services.\r\nWhether a customer is designing an end-to-end trade finance solution, using blockchain to ensure security at the edge or leveraging Enterprise Smart Contracts to drive back office efficiencies, Coco enables them to meet their enterprise requirements. Microsoft is the only cloud provider that delivers consistency across on-premises and the public cloud at hyperscale while providing access to the rich Azure ecosystem for the wide range of applications that will be built on top of blockchain as a shared data layer.\r\nAn open approach\r\nBy design, Coco is open and compatible with any blockchain protocol. Microsoft has already begun integrating Ethereum into Coco and we’re thrilled to announce that J.P. Morgan Chase, Intel and R3 have committed to integrating enterprise ledgers, Quorum, Hyperledger Sawtooth and Corda, respectively. This is just the beginning, and we look forward to exploring integration opportunities with other ledgers in the near future.\r\n","shortDescription":"Microsoft Coco Framework is an open-source system that enables high-scale, confidential blockchain networks that meet all key enterprise requirements—providing a means to accelerate production enterprise adoption of blockchain technology.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Coco Framework","keywords":"Coco, blockchain, that, with, distributed, Microsoft, across, existing","description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these","og:title":"Microsoft Coco Framework","og:description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these","og:image":"https://old.b4r.io/fileadmin/user_upload/Microsoft_Coco_Framework.png"},"eventUrl":"","translationId":1035,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1546,"logoURL":"https://old.b4r.io/fileadmin/user_upload/data-warehouse.jpg","logo":true,"scheme":false,"title":"Azure Data Warehouse","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":928,"alias":"azure-data-warehouse","companyTitle":"Microsoft","companyTypes":["supplier","vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily get started, take advantage of the performance, flexibility, and security of Azure's fully managed services, such as SQL Azure and Azure Databricks.</p>\r\n<h2>Get rid of worries</h2>\r\n<h2><br /><span style=\"font-weight: normal;\">Built-in advanced security features include transparent data encryption, auditing, threat detection, integration with Azure Active Directory and virtual network endpoints. Azure services correspond to more than 50 industry and geographic certifications and are available worldwide in 42 regions to store your data wherever your users are located. Finally, Microsoft offers financially secured service level agreements to spare you any hassle.</span></h2>","shortDescription":"Azure Data Warehouse - is a modern data storage from Microsoft","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Azure Data Warehouse","keywords":"Azure, data, your, analytics, security, such, services, correspond","description":"Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions","og:title":"Azure Data Warehouse","og:description":"Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions","og:image":"https://old.b4r.io/fileadmin/user_upload/data-warehouse.jpg"},"eventUrl":"","translationId":1549,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":24,"title":"IaaS - storage"}],"testingArea":"","categories":[{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IaaS_-_Storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}