{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"products-popover":{"ru":"Продукты","_type":"localeString","en":"Products","de":"die produkte"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"_type":"localeString","en":"partners","ru":"партнеры"},"update-profile-button":{"en":"Update profile","ru":"Обновить профиль","_type":"localeString"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"ru":"Компетенции","_type":"localeString","en":"Categories"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"role-user":{"en":"User","ru":"Пользователь","_type":"localeString"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"_type":"localeString","en":"Partnership with suppliers","ru":"Партнерство с поставщиками"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"en":"Country","ru":"Страна","_type":"localeString"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"en":"branch","ru":"область деятельности","_type":"localeString"},"employees-popover":{"ru":"количество сотрудников","_type":"localeString","en":"number of employees"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"_type":"localeString","en":"Partner discounts","ru":"Партнерские скидки"},"registered-discounts":{"_type":"localeString","en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"ru":"Требования к уровню партнера","_type":"localeString","en":"Partner level requirements"},"certifications":{"ru":"Сертификация технических специалистов","_type":"localeString","en":"Certification of technical specialists"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"ru":"Партнеры-производители","_type":"localeString","en":"Partners-vendors"},"partners-suppliers":{"_type":"localeString","en":"Partners-suppliers","ru":"Партнеры-поставщики"},"all-countries":{"_type":"localeString","en":"All countries","ru":"Все страны"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"_type":"localeString","en":"Produced deployments","ru":"Производимые внедрения"},"supplier-implementations":{"_type":"localeString","en":"Supplied deployments","ru":"Поставляемые внедрения"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"register":{"ru":"Регистрация ","_type":"localeString","en":"Register"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"en":"Company presentation","ru":"Презентация компании","_type":"localeString"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"logout"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"_type":"localeString","en":"Requests","de":"References","ru":"Мои запросы"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"title","translations":{"ru":"Компания","_type":"localeString","en":"Company"}},{"name":"description","translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"}},{"translations":{"ru":"Ключевые слова для компании","_type":"localeString","en":"Company keywords"},"name":"keywords"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"cyberark":{"id":174,"title":"CyberArk","logoURL":"https://old.b4r.io/uploads/roi/company/cyber-ark_logo.png","alias":"cyberark","address":"","roles":[{"id":3,"type":"vendor"}],"description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial services, energy, retail and healthcare markets. As of September 2014, CyberArk had nearly 1,600 customers, including over 30 Fortune 100 companies and approximately 15% of the Global 2000. The company has offices in the US, Israel, UK, France, Germany, the Netherlands, and Singapore, with local sales presence in more than 20 countries.","companyTypes":["vendor"],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[{"id":144,"title":"CyberArk Privileged Account Security Solution для банка","description":"Для защиты от намеренных или случайных деструктивных действий привилегированных пользователей в Банке СОЮЗ была внедрена система управления привилегированными учётными записями на базе решений одного из лидеров данного сегмента — компании CyberArk. Решения CyberArk используют 17 из 20 крупнейших мировых банков. Теперь они стали появляться и в России.\r\n\r\nЧем вы рискуете\r\nВсе эксперты в области информационной безопасности и защиты информации сходятся во мнении, что внутренняя угроза является наиболее актуальной и масштабной для бизнеса. По некоторым оценкам, почти три четверти успешных вторжений и атак осуществляются из пределов защищаемой зоны объектов собственными сотрудниками организаций. В эту оценку вошли и атаки, осуществляемые из-за пределов компании, но с ведома или при непосредственном участии инсайдеров.\r\n\r\nВместе с тем, в каждой организации, в каждом бизнесе, где есть хоть какие-то информационные технологии, имеются сотрудники, обладающие повышенными привилегиями в корпоративных информационных системах (КИС) - это системные администраторы, администраторы баз данных, администраторы ИБ, аутсорсеры, обслуживающие КИС. Причём большинство из них — около 70% (исследование Independent Oracle User Group) — уверены, что их работодатель или заказчик не может контролировать их деятельность.\r\n\r\nА насколько вы доверяете своим привилегированным пользователям?\r\n\r\nГлавный ресурс банка\r\nГлавным ресурсом банка являются деньги и знания. Причём большей частью это деньги не свои, а клиентов. И это показывает уровень ответственности сотрудников, обеспечивающих безопасность знаний о клиентах, их счетах, движении денежных средств.\r\n\r\nЧто было сделано\r\nДля защиты от намеренных или случайных деструктивных действий привилегированных пользователей в Банке СОЮЗ была внедрена система управления привилегированными учётными записями на базе решений одного из лидеров данного сегмента — компании CyberArk. Решения CyberArk используют 17 из 20 крупнейших мировых банков. Теперь они стали появляться и в России.\r\n\r\nВ рамках данного проекта специалисты ЭЛВИС-ПЛЮС и Банка СОЮЗ решили следующие задачи:\r\n\r\nРеализовали единую точку входа для всех привилегированных пользователей.\r\nОбеспечили соответствие требованиям Банка России по регистрации действий привилегированных пользователей.\r\nПолучили возможность оперативного получения отчётов, содержащих сведения о фактах привилегированного доступа пользователей и администраторов к прикладным информационным системам, для службы ИБ и руководства банка.\r\nОпределили права, обязанности и разграничили зоны ответственности персонала компании в части предоставления привилегированного доступа к различным информационным системам.\r\nКак всё работает\r\nВ информационных системах банка сейчас трудятся несколько модулей комплексного решения CyberArk.\r\n\r\n«Ядром» системы является CyberArk Privileged Identity Management, который отвечает за строгую аутентификацию пользователей, хранение информации об учётных записях, событиях и инцидентах (полезность этого инструмента при проведении расследований сложно переоценить). В связке с CA PIM работает Enterprise Password Vault. Это защищённое хранилище позволяет банку хранить, управлять и отслеживать использование привилегированных учётных данных. На ключевых точках информационной инфраструктуры — серверах и базах данных — установлены модули CA Enterprise Password Vault. Они изолируют, мониторят, записывают и контролируют использование критических сервисов привилегированными пользователями.\r\n\r\nИнтересной возможностью решений CyberArk является обеспечение многофакторной аутентификации пользователей даже в том случае, если целевая информационная система не поддерживает её. Пользователь аутентифицируется в единой точке системы — веб-интерфейсе, который поддерживает методы усиленной аутентификации и уже через него получает доступ к нужным сервисам и приложениям.\r\n\r\nЧто в итоге\r\nОт внедрения выигрывают все: банк получает отличный инструмент для контроля своих администраторов, клиенты банка — ещё один элемент уверенности в сохранности своих денег.\r\n\r\nСергей Панов, заместитель генерального директора ЭЛВИС-ПЛЮС: «Контроль действий пользователей, имеющих максимально возможные полномочия, является одним из важнейших аспектов обеспечения ИБ. Ведь ошибка, злонамеренные или мошеннические действия с их стороны могут нанести серьезнейший урон информационным и финансовым активам компании, способны оказать критическое влияние на её бизнес. Поэтому в комплексных решениях АО «ЭЛВИС-ПЛЮС» реализация задач контроля действий привилегированных пользователей играет ключевую роль. Сочетание экспертизы ЭЛВИС-ПЛЮС и продвинутых функциональных возможностей продуктов ведущего вендора в этом сегменте рынка решений ИБ компании CyberArk позволяют эффективно и надёжно решать задачи по защите активов компаний заказчиков от внутренних угроз».","alias":"cyberark-privileged-account-security-solution-dlja-banka","roi":0,"seo":{"title":"CyberArk Privileged Account Security Solution для банка","keywords":"пользователей, CyberArk, привилегированных, компании, банка, действий, является, решений","description":"Для защиты от намеренных или случайных деструктивных действий привилегированных пользователей в Банке СОЮЗ была внедрена система управления привилегированными","og:title":"CyberArk Privileged Account Security Solution для банка","og:description":"Для защиты от намеренных или случайных деструктивных действий привилегированных пользователей в Банке СОЮЗ была внедрена система управления привилегированными"},"deal_info":"","user":{"id":761,"title":"Bank Soyuz","logoURL":"https://old.b4r.io/uploads/roi/company/Bank_SOJUZ.png","alias":"bank-sojuz","address":"","roles":[],"description":"Банк СОЮЗ (АО) был основан в 1993 году как АКБ «АЛИНА-МОСКВА». В 1999 году название банка было изменено на АКБ «ИНГОССТРАХ-СОЮЗ», а в 2003 году, после присоединения к нему трёх банков: Автогазбанк, Сибрегионбанк и Народный банк сбережений, объединённый банк получил наименование АКБ «СОЮЗ» (ОАО). В 2015 году наименование банка было изменено на Банк СОЮЗ (АО). Основной акционер - СПАО «Ингосстрах» (99,99% акций).\r\n\r\nНа 1 апреля 2016 года активы Банка СОЮЗ составили 112 млрд руб. Совокупный кредитный портфель банка (до вычета резервов и без учета межбанковских кредитов) составил 52,1 млрд руб. Чистая ссудная задолженность банка (после вычета резервов и без учета межбанковских кредитов) – 46,4 млрд руб.\r\n\r\nПо данным на 1 апреля 2016 года кредитный портфель физических лиц составил 18,0 млрд руб., а юридических лиц - 34,1 млрд руб.\r\n\r\nБанк поддерживает стабильную долю средств клиентов в составе своих обязательств (на 01.04.2016 г. - 84%). По итогам 1-го квартала 2016 года доля вкладов физических лиц в совокупном объеме средств клиентов составила 33,3%. Объем вкладов физических лиц составил 19,8 млрд руб. Банк СОЮЗ имеет диверсифицированную структуру привлечения ресурсов, привлекает депозиты как физических, так и юридических лиц.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://banksoyuz.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Bank Soyuz","keywords":"млрд, СОЮЗ, Банк, 2016, физических, году, банка, составил","description":"Банк СОЮЗ (АО) был основан в 1993 году как АКБ «АЛИНА-МОСКВА». В 1999 году название банка было изменено на АКБ «ИНГОССТРАХ-СОЮЗ», а в 2003 году, после","og:title":"Bank Soyuz","og:description":"Банк СОЮЗ (АО) был основан в 1993 году как АКБ «АЛИНА-МОСКВА». В 1999 году название банка было изменено на АКБ «ИНГОССТРАХ-СОЮЗ», а в 2003 году, после","og:image":"https://old.b4r.io/uploads/roi/company/Bank_SOJUZ.png"},"eventUrl":""},"supplier":{"id":711,"title":"ELVIS-PLUS","logoURL":"https://old.b4r.io/uploads/roi/company/EHLVIS-PLJUS.png","alias":"ehlvis-pljus","address":"","roles":[],"description":"ELVIS-PLUS COMPANY WAS FOUNDED IN 1991.\r\n\r\nFrom foundation our Company succeeded to take a strong position on the system integration market in the fields of telecommunications, networking and information technologies and in the field of information security. Among our clients there are such well-known Companies like Russian Central Bank, LUKOIL, RUSAL, RAO UES (United Energy Systems) of Russia, \"Suhoy\", Rostelecom and more.\r\n\r\nAlong with the higher professional level of designed solutions one of our general strategies and principals is to build and maintain long-term, continuously and trustful relations with our clients and partners.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":40,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":4,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://elvis.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ELVIS-PLUS","keywords":"ELVIS-PLUS, clients, information, with, Along, Rostelecom, more, Systems","description":"ELVIS-PLUS COMPANY WAS FOUNDED IN 1991.\r\rFrom foundation our Company succeeded to take a strong position on the system integration market in the fields of","og:title":"ELVIS-PLUS","og:description":"ELVIS-PLUS COMPANY WAS FOUNDED IN 1991.\r\rFrom foundation our Company succeeded to take a strong position on the system integration market in the fields of","og:image":"https://old.b4r.io/uploads/roi/company/EHLVIS-PLJUS.png"},"eventUrl":""},"vendors":[{"id":174,"title":"CyberArk","logoURL":"https://old.b4r.io/uploads/roi/company/cyber-ark_logo.png","alias":"cyberark","address":"","roles":[],"description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial services, energy, retail and healthcare markets. As of September 2014, CyberArk had nearly 1,600 customers, including over 30 Fortune 100 companies and approximately 15% of the Global 2000. The company has offices in the US, Israel, UK, France, Germany, the Netherlands, and Singapore, with local sales presence in more than 20 countries.","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"www.cyberark.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CyberArk","keywords":"company, CyberArk, security, Fortune, offices, Global, approximately, companies","description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial","og:title":"CyberArk","og:description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial","og:image":"https://old.b4r.io/uploads/roi/company/cyber-ark_logo.png"},"eventUrl":""}],"products":[{"id":453,"logo":false,"scheme":false,"title":"CyberArk Privileged Account Security Solution","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"cyberark-privileged-account-security-solution","companyTypes":[],"description":"<p>Privileged accounts represent the largest security vulnerability an organization faces today. In the hands of an external attacker or malicious insider, privileged accounts allow attackers to take full control of an organization’s IT infrastructure, disable security controls, steal confidential information, commit financial fraud and disrupt operations. Stolen, abused or misused privileged credentials are used in nearly all breaches. With this growing threat, organizations need controls put in place to proactively protect against, detect and respond to in-progress cyber attacks before they strike vital systems and compromise sensitive data. CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry’s most comprehensive Privileged Account Security Solution. Each product can be managed independently or combined for a cohesive and complete solution for operating systems, databases, applications, hypervisors, network devices, security appliances and more. The solution is designed for on-premise, hybrid cloud and OT/SCADA environments. The CyberArk Privileged Account Security Solution is based on CyberArk Shared Technology Platform™, which combines an isolated vault server, a unified policy engine, and a discovery engine to provide scalability, reliability and unmatched security for privileged accounts. <span style=\"font-weight: bold;\">Product list:</span> Enterprise Password Vault® fully protects privileged passwords based on privileged account security policies and controls who can access which passwords when. SSH Key Manager™ secures, rotates and controls access to SSH keys in accordance with policy to prevent unauthorized access to privileged accounts. Privileged Session Manager® isolates, controls, and monitors privileged user access as well as activities for critical Unix, Linux, and Windows-based systems, databases, and virtual machines. Privileged Threat Analytics™ analyzes and alerts on previously undetectable malicious privileged user behavior enabling incident response teams to disrupt and quickly respond to an attack. Application Identity Manager™ eliminates hard-coded passwords and locally stored SSH keys from applications, service accounts and scripts with no impact on application performance. CyberArk Viewfinity enables organizations to remove local administrator privileges from business users and control applications on Windows endpoints and servers. On-Demand Privileges Manager™ allows for control and continuous monitoring of the commands super-users run based on their role and task.</p>","shortDescription":"CyberArk Privileged Account Security Solution is a complete solution to protect, monitor, detect, alert, and respond to privileged account activity","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CyberArk Privileged Account Security Solution","keywords":"privileged, security, Privileged, CyberArk, accounts, controls, access, Manager™","description":"Privileged accounts represent the largest security vulnerability an organization faces today. In the hands of an external attacker or malicious insider,","og:title":"CyberArk Privileged Account Security Solution","og:description":"Privileged accounts represent the largest security vulnerability an organization faces today. In the hands of an external attacker or malicious insider,"},"eventUrl":"","translationId":454,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"}]}},"categories":[{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://elvis.ru/about/project_experience/banksoyuz/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":177,"title":"CyberArk PRIVILEGED IDENTITY MANAGEMENT (PIM) для банка","description":"Внедрение решения Cyber-Ark PIM для контроля и управления удаленным доступом к информационным системам банка ВТБ 24\r\n\r\nразработка проекта: июль 2013\r\nКомпания ARinteg выполнила проект по внедрению решения Cyber-Ark PIM для контроля и управления удаленным доступом к информационным системам банка ВТБ 24\r\n\r\nЦель проекта\r\nОсновной целью проекта являлось снижение рисков для бизнес-процессов в информационных системах банка ВТБ 24, связанных с неконтролируемыми действиями специалистов, осуществляющих эксплуатацию и обслуживание элементов ИТ-инфраструктуры.\r\n\r\nЗадачи проекта:\r\n— Повышение эффективности производственной деятельности специалистов, осуществляющих эксплуатацию и обслуживание элементов ИТ-инфраструктуры;\r\n— Сведение к минимуму угроз, связанных с осуществлением удаленного доступа к соответствующим элементам ИТ-инфраструктуры;\r\n— Создать возможность осуществления доступа только тех специалистов, которым разрешен такой доступ, и только к тем элементам ИТ-инфраструктуры, к которым им доступ разрешен.\r\nО продукте\r\n\r\nПодсистема регистрации операций управления информационными системами для банка ВТБ 24 создана на базе решения Cyber-Ark PIM. Cyber-Ark Privileged Identity Manager - система управления привилегированными учётными записями, которая обеспечивает единую точку входа в ИТ-системы, исключающей разглашение идентификационной и аутентификационной информации конечным пользователям (администраторам). Система имеет прозрачный механизм обработки и согласования заявок на предоставление доступа.\r\n\r\nРешение предназначено для организации защищенного доступа персонала, осуществляющего обслуживание элементов ИТ-инфраструктуры, а также регистрации всех действий, осуществляемых в процессе выполнения работ по обслуживанию.\r\n\r\nИтоги проекта\r\nПроект был выполнен в запланированные сроки. В результате внедрения решения удалось достигнуть поставленных целей: была усилена информационная безопасность, увеличена продуктивность управления информационными системами и значительно снижены инсайдерские угрозы. Созданная система полностью оправдала ожидания клиента.","alias":"cyberark-privileged-identity-management-pim-dlja-banka","roi":0,"seo":{"title":"CyberArk PRIVILEGED IDENTITY MANAGEMENT (PIM) для банка","keywords":"банка, управления, ИТ-инфраструктуры, проекта, Cyber-Ark, решения, доступа, элементов","description":"Внедрение решения Cyber-Ark PIM для контроля и управления удаленным доступом к информационным системам банка ВТБ 24\r\rразработка проекта: июль 2013\rКомпания","og:title":"CyberArk PRIVILEGED IDENTITY MANAGEMENT (PIM) для банка","og:description":"Внедрение решения Cyber-Ark PIM для контроля и управления удаленным доступом к информационным системам банка ВТБ 24\r\rразработка проекта: июль 2013\rКомпания"},"deal_info":"","user":{"id":783,"title":"ВТБ 24 (ПАО)","logoURL":"https://old.b4r.io/uploads/roi/company/VTB_24__PAO_.png","alias":"vtb-24-pao","address":"","roles":[],"description":"ВТБ 24 (ПАО) — один из крупнейших участников российского рынка банковских услуг. Мы входим в международную финансовую группу ВТБ и специализируемся на обслуживании физических лиц, индивидуальных предпринимателей и предприятий малого бизнеса.\r\n\r\nСеть банка формируют 1062 офиса в 72 регионах страны. Мы предлагаем клиентам основные банковские продукты, принятые в международной финансовой практике.\r\n\r\nВ числе предоставляемых услуг: выпуск банковских карт, ипотечное и потребительское кредитование, автокредитование, услуги дистанционного управления счетами, кредитные карты с льготным периодом, срочные вклады, аренда сейфовых ячеек, денежные переводы. Часть услуг доступна нашим клиентам в круглосуточном режиме, для чего используются современные телекоммуникационные технологии.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.vtb24.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ВТБ 24 (ПАО)","keywords":"услуг, клиентам, банковских, управления, дистанционного, счетами, кредитные, льготным","description":"ВТБ 24 (ПАО) — один из крупнейших участников российского рынка банковских услуг. Мы входим в международную финансовую группу ВТБ и специализируемся на","og:title":"ВТБ 24 (ПАО)","og:description":"ВТБ 24 (ПАО) — один из крупнейших участников российского рынка банковских услуг. Мы входим в международную финансовую группу ВТБ и специализируемся на","og:image":"https://old.b4r.io/uploads/roi/company/VTB_24__PAO_.png"},"eventUrl":""},"supplier":{"id":2010,"title":"ARinteg","logoURL":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png","alias":"arinteg","address":"","roles":[],"description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software solutions for information security services. Impeccable work, you have all the necessary competencies and adherence to professional ethics principles have allowed us to gain a high reputation in the market. Among our clients - major Russian companies and government organizations, including leading banks and industrial enterprises, multinational corporations and governments. ARinteg company provides a full range of services in the field of information security and the creation of effective IT infrastructures. The results of projects carried out ARinteg, are as follows: - construction of effective information security systems businesses - bringing the customer information systems to meet the requirements of regulatory authorities of the Russian Federation - the formation of the IT infrastructure of any level of complexity. In the course of experts ARinteg projects meet all the necessary expert-analytical, technical and consulting services: - audit of information systems and business processes, expertise in information security solutions, expert information systems of enterprises to meet the requirements of regulatory authorities, to develop sets of organizational and administrative documentation information security - the supply, installation, configuration and maintenance of IT systems - advice, training experts of customers.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":76,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":5,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.arinteg.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ARinteg","keywords":"information, ARinteg, systems, security, services, meet, regulatory, authorities","description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:title":"ARinteg","og:description":"Company «ARinteg» - security-oriented IT-company. Our advantage is the provision of a full range of development and implementation of complex software","og:image":"https://old.b4r.io/uploads/roi/company/ARinteg_01.png"},"eventUrl":""},"vendors":[{"id":174,"title":"CyberArk","logoURL":"https://old.b4r.io/uploads/roi/company/cyber-ark_logo.png","alias":"cyberark","address":"","roles":[],"description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial services, energy, retail and healthcare markets. As of September 2014, CyberArk had nearly 1,600 customers, including over 30 Fortune 100 companies and approximately 15% of the Global 2000. The company has offices in the US, Israel, UK, France, Germany, the Netherlands, and Singapore, with local sales presence in more than 20 countries.","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"www.cyberark.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CyberArk","keywords":"company, CyberArk, security, Fortune, offices, Global, approximately, companies","description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial","og:title":"CyberArk","og:description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial","og:image":"https://old.b4r.io/uploads/roi/company/cyber-ark_logo.png"},"eventUrl":""}],"products":[{"id":109,"logo":false,"scheme":false,"title":"CyberArk Privileged Identity Management (PIM)","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"cyberark-privileged-identity-management-pim","companyTypes":[],"description":"Privileged Identity Management is an area of Identity Management that focuses solely on privileged accounts, powerful accounts used by IT administrators, select business users and even some applications. Organizations considering Privileged Identity Management solutions must prioritize security as a requirement because privileged accounts are frequently targeted by external attackers and malicious insiders to access sensitive data and gain control of the IT infrastructure. Responding to the need for security, Privileged Account Security solutions approach Privileged Identity Management with a laser focus on securing the most sought-after accounts in an organization. Built from the ground up with security in mind, Privileged Account Security delivers unmatched protection, detection and response to cyber attacks when compared to Privileged Identity Management.\r\n\r\nTamper-proof storagefor credentials, log files and recordings ensures sensitive information is protected from unauthorized access and misuse.\r\nHigh availability and disaster recovery modules include built-in fail-safe measures, secure backup and simple recovery to meet disaster recovery requirements.\r\nSupport for strong authenticationincluding multi-factor solutions enables companies to leverage existing authentication solutions for privileged accounts.\r\nFIPS 140-2 validated cryptographyaddresses compliance and security requirements.\r\nCustomizable “request workflows” for credential access approval including dual controls, integration with helpdesk ticketing systems and multiple additional parameters\r\nSegregation of duties to ensure that ensure privileged credentials can only be accessed by authorized users for approved business reasons\r\nReal-time behavioral analytics to detect and disrupt in-progress attacks","shortDescription":"Privileged Identity Management Suite (PIM) -Providing access to critical systems, devices, and user accounts","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CyberArk Privileged Identity Management (PIM)","keywords":"Privileged, Identity, Management, accounts, solutions, privileged, security, recovery","description":"Privileged Identity Management is an area of Identity Management that focuses solely on privileged accounts, powerful accounts used by IT administrators,","og:title":"CyberArk Privileged Identity Management (PIM)","og:description":"Privileged Identity Management is an area of Identity Management that focuses solely on privileged accounts, powerful accounts used by IT administrators,"},"eventUrl":"","translationId":110,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":254,"title":"Centralize management"},{"id":10,"title":"Ensure Compliance"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"}]}},"categories":[{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://antiviruspro.ru/projects/detail.php?ID=131557","title":"Supplier's web site"}},"comments":[],"referencesCount":0}],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{"5":{"id":5,"title":"Security Software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png","alias":"security-software"},"7":{"id":7,"title":"Storage - General-Purpose Disk Arrays","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_store.png","alias":"storage-general-purpose-disk-arrays"}},"branches":"Information Technology","companySizes":"101 to 500 Employees","companyUrl":"www.cyberark.com","countryCodes":[],"certifications":[],"isSeller":true,"isSupplier":false,"isVendor":true,"presenterCodeLng":"","seo":{"title":"CyberArk","keywords":"company, CyberArk, security, Fortune, offices, Global, approximately, companies","description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial","og:title":"CyberArk","og:description":"CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial","og:image":"https://old.b4r.io/uploads/roi/company/cyber-ark_logo.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[{"supplier":"ISSP","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"Softprom by ERC (supplier)","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"SVIT IT","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"ANGARA Technologies Group","partnershipLevel":"","countries":"","partnersType":""}],"vendoredProducts":[{"id":562,"logoURL":"https://old.b4r.io/fileadmin/user_upload/CyberArk.png","logo":true,"scheme":false,"title":"CyberArk Enterprise Password Vault","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"cyberark-enterprise-password-vault","companyTitle":"CyberArk","companyTypes":["vendor"],"companyId":174,"companyAlias":"cyberark","description":"Secure, rotate and control access to privileged account passwords\r\n\r\nPrivileged accounts provide access to an organization’s most sensitive data and critical systems, and when left unsecured, the passwords used to access these accounts can easily be lost, stolen or shared with unauthorized users. Without controls in place to proactively secure and manage privileged credentials, organizations can face an increased risk of data breaches, irreparable system damage, failed audits and fines.\r\n\r\nCyberArk Enterprise Password Vault, a component of the CyberArk Privileged Account Security Solution, is designed to discover, secure, rotate and control access to privileged account passwords used to access systems throughout the enterprise IT environment. The solution enables organizations to understand the scope of their privileged account risks and put controls in place to mitigate those risks. Flexible policies enable organizations to enforce granular privileged access controls, automate workflows and rotate passwords at a regular cadence without requiring manual IT effort. To demonstrate compliance, organizations can easily report on which users accessed what privileged accounts, when and why.\r\n\r\n\r\nCyberArk Enterprise Password Vault offered a best practice approach to compliance, enabling us to better enforce policies and automate password replacement.\r\nJethro Cornelissen\r\nGlobal Lead & Head of Global Security Operations Center Rabobank International\r\nFeatures\r\nBenefits\r\nPrivileged account discovery finds and inventories privileged accounts throughout the IT environments\r\nCentralized, secure storage protects privileged account passwords used in on-premises, cloud and OT environments behind multiple layers of built-in security\r\nAutomated password rotation updates and synchronizes privileged account passwords at regular intervals or on-demand, based on policy\r\nGranular privileged access controls prevent unauthorized users from accessing privileged account credentials\r\nAutomated workflows enable users to request access to accounts with elevated privileges when needed for business purposes\r\nDetailed audit and reporting provides security and audit teams with a clear view of which individual users accessed which privileged or shared accounts, when and why\r\nBroad system support enables organizations to secure privileged account passwords used to access the vast majority of enterprise systems, including virtual and physical servers, databases, network devices, hypervisors, security appliances, SaaS and business applications and more\r\nIntegration with CyberArk Privileged Threat Analytics enables the solution to receive alerts on potentially compromised accounts and automatically rotate the impacted credentials\r\nTechnology integrations enable organizations to extend policies from existing solutions, such as ticketing, strong authentication, and identity and access management, to their privileged account security solution, as well as send privileged account data to SIEM solutions","shortDescription":"CyberArk Enterprise Password Vault, a component of the CyberArk Privileged Account Security Solution, is designed to discover, secure, rotate and control access to privileged account passwords used to access systems throughout the enterprise IT environment. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CyberArk Enterprise Password Vault","keywords":"privileged, account, access, passwords, accounts, organizations, CyberArk, users","description":"Secure, rotate and control access to privileged account passwords\r\rPrivileged accounts provide access to an organization’s most sensitive data and critical","og:title":"CyberArk Enterprise Password Vault","og:description":"Secure, rotate and control access to privileged account passwords\r\rPrivileged accounts provide access to an organization’s most sensitive data and critical","og:image":"https://old.b4r.io/fileadmin/user_upload/CyberArk.png"},"eventUrl":"","translationId":563,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":111,"logoURL":"https://old.b4r.io/fileadmin/user_upload/CyberArk.png","logo":true,"scheme":false,"title":"Privileged Session Management Suite (PSM)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"privileged-session-management-suite-psm","companyTitle":"CyberArk","companyTypes":["vendor"],"companyId":174,"companyAlias":"cyberark","description":"Isolate, monitor and control privileged access to enterprise assets\r\n\r\nIn today’s collaborative environment, organizations must support a range of end-users accessing privileged accounts including third party vendors, contractors, temporary employees and more. To mitigate external and internal risks, organizations must manage and monitor privileged account sessions without impacting the end-user experience.\r\n\r\nDetailed monitoring and recording\r\n\r\nCyberArk Privileged Session Manager, part of the CyberArk Privileged Account Security Solution, enables organizations to isolate, monitor, record and control privileged sessions on critical systems including Unix and Windows-based systems, databases and virtual machines. The solution acts as a jump server and single access control point, prevents malware from jumping to a target system, and records keystrokes and commands for continuous monitoring. The resulting detailed session recordings and audit logs are used to simplify compliance audits and accelerate forensics investigations.\r\n\r\nEnterprise-class scalability and security\r\n\r\nPrivileged Session Manager is an agentless solution designed for maximum security including tamper-proof audit logs, enforcement of monitoring and recording, and session isolation to prevent the spread of malware. A universal connector allows organizations to extend session management to virtually any component of the IT infrastructure. The solution is built on the CyberArk Shared Technology Platform, delivering scalability, high availability and centralized management and reporting.\r\n\r\nReal-time monitoring enables security teams to track user activity and detect suspicious events in real-time.\r\nRemote session termination enables security teams to immediately terminate suspicious privileged sessions directly from the CyberArk administrative console.\r\nSearchable detailed session audit logs and video recordings enable security teams to pinpoint the moment an incident started, understand how the incident began, and quickly assess any damage.\r\nProxy-based, agentless architecture provides a single access control point and enforces monitoring and recording of all privileged activity.\r\nSecure proxy server creates an isolated, secure environment by separating the end user machine from the target system.\r\nOptional secure SSH server acts as the proxy for privileged Unix sessions, providing a native Unix user experience.\r\nA tamper-proof digital vault stores session recordings and audit logs to prevent users from editing their activity history.\r\nIntegrations with Enterprise Password Vault and SSH Key Manager enable organizations to mask privileged credentials from users and ensure that these credentials never reach endpoints.\r\nOut-of-the-box integrations combined with a Universal Connector enable organizations to protect privileged accounts on Unix and Windows systems, network devices, databases, mainframes and virtual infrastructures with minimal deployment and operational costs.\r\nEnterprise-class scalability and reliability ensure that the solution can meet business requirements of even the largest organizations.","shortDescription":"CyberArk Privileged Session Manager, part of the CyberArk Privileged Account Security Solution, enables organizations to isolate, monitor, record and control privileged sessions on critical systems including Unix and Windows-based systems, databases and virtual machines.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Privileged Session Management Suite (PSM)","keywords":"privileged, organizations, session, security, monitoring, from, Unix, control","description":"Isolate, monitor and control privileged access to enterprise assets\r\rIn today’s collaborative environment, organizations must support a range of end-users","og:title":"Privileged Session Management Suite (PSM)","og:description":"Isolate, monitor and control privileged access to enterprise assets\r\rIn today’s collaborative environment, organizations must support a range of end-users","og:image":"https://old.b4r.io/fileadmin/user_upload/CyberArk.png"},"eventUrl":"","translationId":112,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":437,"title":"PSM - Privileged Session Management","alias":"psm-privileged-session-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PSM.png"},{"id":150,"title":"Workforce Performance Management","alias":"workforce-performance-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/employee-performance-management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":451,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Sensitive_Information_Management_Solution.png","logo":true,"scheme":false,"title":"CyberArk Sensitive Information Management Solution","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"cyberark-sensitive-information-management-solution","companyTitle":"CyberArk","companyTypes":["vendor"],"companyId":174,"companyAlias":"cyberark","description":"Securely store and share sensitive files and business passwords\r\n\r\nIn today’s dynamic business environment that includes mobile, web and cloud-based interactions, users require convenient access to information wherever and whenever they need it. The ability for users to confidentially share files internally and externally, as well as securely keep track of login credentials to an ever-increasing number of business applications are critical requirements to maintain user productivity without compromising security. At the same time, IT and security teams are tasked with securing sensitive information shared in automated business processes while reducing costs to ensure business efficiency.\r\n\r\nThe CyberArk Sensitive Information Management Solution is a complete platform for securely storing, sharing and distributing information between users and systems. Developed with a focus on security, the solution includes patented digital vault technology, military-grade encryption and tamper-resistant auditing designed to help enterprise organizations meet compliance requirements. Organizations use the CyberArk Sensitive Information Management Solution to enable individuals to securely store and share sensitive files and business passwords, as well as automate business processes to securely collect, distribute and access sensitive information.\r\n\r\nFeatures:\r\nSingle-platform solution for file sharing between enterprise users, systems and business processes\r\nSecure repository in which users can store and share personal business passwords such as those used to access CRM systems, HR applications or expense management systems\r\nGranular access controls restrict which users are able to download, forward or print documents and ensure that only one user may edit a document at a time\r\nSegregation of duties between IT teams and content owners prevents IT teams from viewing content that is securely stored and transferred\r\nFlexible connectors enable seamless integration with existing business applications and complementary security tools such as content filtering or data loss prevention solutions\r\nTamper-resistant audit logs can be used to report on who accessed what information and if any changes were made\r\nBuilt-in FIPS 140-2 compliant encryption secures data at-rest and in-transit\r\nChoice of on-premises or cloud-based deployments enables organizations to select the option that best fits their organizational requirements\r\nHigh availability and disaster recovery help organizations ensure reliability in complex, enterprise IT environments\r\n\r\nBenefits\r\nReduce the risk of unauthorized access to sensitive data by centrally storing and granularly controlling access to confidential files\r\nFacilitate productivity by enabling secure anytime, anywhere sharing of files between authorized internal and external users\r\nReduce the risk of password loss or theft by providing a central, secure repository in which users can store and manage personal business passwords\r\nSimplify the user experience by eliminating the need for users to manually write down, save or remember login credentials for dozens of disparate business applications\r\nReduce help desk costs associated with password resets by encouraging users to centrally and securely store credentials needed to access business applications\r\nSupport cross-functional efficiency by automatically preventing multiple users from duplicating efforts and editing the same document at once\r\nReduce administrative costs associated with file transfer processes by leveraging a single platform to secure interactive and automated file transfers throughout the enterprise\r\nAutomatically encrypt sensitive data at-rest and in-transit without having to manage encryption keys or purchase a separate encryption solution\r\nMore easily demonstrate compliance by reporting on which users accessed what sensitive information and if any changes were made\r\nEasily expand the solution with changing business needs and meet enterprise requirements for scalability and reliability","shortDescription":"The CyberArk Sensitive Information Management Solution is a complete platform for securely storing, sharing and distributing information between users and systems. Developed with a focus on security, the solution includes patented digital vault technology, military-grade encryption and tamper-resistant auditing designed to help enterprise organizations meet compliance requirements.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CyberArk Sensitive Information Management Solution","keywords":"business, users, access, sensitive, securely, information, with, applications","description":"Securely store and share sensitive files and business passwords\r\rIn today’s dynamic business environment that includes mobile, web and cloud-based","og:title":"CyberArk Sensitive Information Management Solution","og:description":"Securely store and share sensitive files and business passwords\r\rIn today’s dynamic business environment that includes mobile, web and cloud-based","og:image":"https://old.b4r.io/fileadmin/user_upload/Sensitive_Information_Management_Solution.png"},"eventUrl":"","translationId":452,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":109,"logoURL":"https://old.b4r.io/fileadmin/user_upload/CyberArk.png","logo":true,"scheme":false,"title":"CyberArk Privileged Identity Management (PIM)","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":4,"alias":"cyberark-privileged-identity-management-pim","companyTitle":"CyberArk","companyTypes":["vendor"],"companyId":174,"companyAlias":"cyberark","description":"Privileged Identity Management is an area of Identity Management that focuses solely on privileged accounts, powerful accounts used by IT administrators, select business users and even some applications. Organizations considering Privileged Identity Management solutions must prioritize security as a requirement because privileged accounts are frequently targeted by external attackers and malicious insiders to access sensitive data and gain control of the IT infrastructure. Responding to the need for security, Privileged Account Security solutions approach Privileged Identity Management with a laser focus on securing the most sought-after accounts in an organization. Built from the ground up with security in mind, Privileged Account Security delivers unmatched protection, detection and response to cyber attacks when compared to Privileged Identity Management.\r\n\r\nTamper-proof storagefor credentials, log files and recordings ensures sensitive information is protected from unauthorized access and misuse.\r\nHigh availability and disaster recovery modules include built-in fail-safe measures, secure backup and simple recovery to meet disaster recovery requirements.\r\nSupport for strong authenticationincluding multi-factor solutions enables companies to leverage existing authentication solutions for privileged accounts.\r\nFIPS 140-2 validated cryptographyaddresses compliance and security requirements.\r\nCustomizable “request workflows” for credential access approval including dual controls, integration with helpdesk ticketing systems and multiple additional parameters\r\nSegregation of duties to ensure that ensure privileged credentials can only be accessed by authorized users for approved business reasons\r\nReal-time behavioral analytics to detect and disrupt in-progress attacks","shortDescription":"Privileged Identity Management Suite (PIM) -Providing access to critical systems, devices, and user accounts","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CyberArk Privileged Identity Management (PIM)","keywords":"Privileged, Identity, Management, accounts, solutions, privileged, security, recovery","description":"Privileged Identity Management is an area of Identity Management that focuses solely on privileged accounts, powerful accounts used by IT administrators,","og:title":"CyberArk Privileged Identity Management (PIM)","og:description":"Privileged Identity Management is an area of Identity Management that focuses solely on privileged accounts, powerful accounts used by IT administrators,","og:image":"https://old.b4r.io/fileadmin/user_upload/CyberArk.png"},"eventUrl":"","translationId":110,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":453,"logoURL":"https://old.b4r.io/fileadmin/user_upload/cyber-ark_logo.png","logo":true,"scheme":false,"title":"CyberArk Privileged Account Security Solution","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":4,"alias":"cyberark-privileged-account-security-solution","companyTitle":"CyberArk","companyTypes":["vendor"],"companyId":174,"companyAlias":"cyberark","description":"<p>Privileged accounts represent the largest security vulnerability an organization faces today. In the hands of an external attacker or malicious insider, privileged accounts allow attackers to take full control of an organization’s IT infrastructure, disable security controls, steal confidential information, commit financial fraud and disrupt operations. Stolen, abused or misused privileged credentials are used in nearly all breaches. With this growing threat, organizations need controls put in place to proactively protect against, detect and respond to in-progress cyber attacks before they strike vital systems and compromise sensitive data. CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry’s most comprehensive Privileged Account Security Solution. Each product can be managed independently or combined for a cohesive and complete solution for operating systems, databases, applications, hypervisors, network devices, security appliances and more. The solution is designed for on-premise, hybrid cloud and OT/SCADA environments. The CyberArk Privileged Account Security Solution is based on CyberArk Shared Technology Platform™, which combines an isolated vault server, a unified policy engine, and a discovery engine to provide scalability, reliability and unmatched security for privileged accounts. <span style=\"font-weight: bold;\">Product list:</span> Enterprise Password Vault® fully protects privileged passwords based on privileged account security policies and controls who can access which passwords when. SSH Key Manager™ secures, rotates and controls access to SSH keys in accordance with policy to prevent unauthorized access to privileged accounts. Privileged Session Manager® isolates, controls, and monitors privileged user access as well as activities for critical Unix, Linux, and Windows-based systems, databases, and virtual machines. Privileged Threat Analytics™ analyzes and alerts on previously undetectable malicious privileged user behavior enabling incident response teams to disrupt and quickly respond to an attack. Application Identity Manager™ eliminates hard-coded passwords and locally stored SSH keys from applications, service accounts and scripts with no impact on application performance. CyberArk Viewfinity enables organizations to remove local administrator privileges from business users and control applications on Windows endpoints and servers. On-Demand Privileges Manager™ allows for control and continuous monitoring of the commands super-users run based on their role and task.</p>","shortDescription":"CyberArk Privileged Account Security Solution is a complete solution to protect, monitor, detect, alert, and respond to privileged account activity","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":2,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CyberArk Privileged Account Security Solution","keywords":"privileged, security, Privileged, CyberArk, accounts, controls, access, Manager™","description":"Privileged accounts represent the largest security vulnerability an organization faces today. In the hands of an external attacker or malicious insider,","og:title":"CyberArk Privileged Account Security Solution","og:description":"Privileged accounts represent the largest security vulnerability an organization faces today. In the hands of an external attacker or malicious insider,","og:image":"https://old.b4r.io/fileadmin/user_upload/cyber-ark_logo.png"},"eventUrl":"","translationId":454,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"Организация доступа к критически важным системам, устройствам и учетным записям - крупная головная боль любой большой компании. Пароли к этим системам являются ключами к конфиденциальной информации, а значит и к финансовой стабильности. Управление доступом и контроль использования административных полномочий - вот главные риски безопасности предприятия.\r\nТысячи серверов, сетевых устройств, административных учетных записей и паролей - стандартная ситуация для современного предприятия. Ручное изменение и управление такой инфраструктурой отнимает огромное количество времени, денег и человеческих ресурсов","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/PAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[],"partnershipProgramme":{"levels":[{"id":719,"level":"Silver"},{"id":721,"level":"Gold"},{"id":723,"level":"Platinum"},{"id":725,"level":"Distributor"}],"partnerDiscounts":{"Silver":"","Gold":"","Platinum":"","Distributor":""},"registeredDiscounts":{"Silver":"","Gold":"","Platinum":"","Distributor":""},"additionalBenefits":[],"salesPlan":{"Silver":"","Gold":"","Platinum":"","Distributor":""},"additionalRequirements":[]}}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}