{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"products-popover":{"en":"Products","de":"die produkte","ru":"Продукты","_type":"localeString"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"_type":"localeString","en":"Update profile","ru":"Обновить профиль"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"user-implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"categories":{"_type":"localeString","en":"Categories","ru":"Компетенции"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"en":"User","ru":"Пользователь","_type":"localeString"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"_type":"localeString","en":"Partnership with suppliers","ru":"Партнерство с поставщиками"},"reference-bonus":{"_type":"localeString","en":"Bonus 4 reference","ru":"Бонус за референс"},"partner-status":{"en":"Partner status","ru":"Статус партнёра","_type":"localeString"},"country":{"_type":"localeString","en":"Country","ru":"Страна"},"partner-types":{"_type":"localeString","en":"Partner types","ru":"Типы партнеров"},"branch-popover":{"_type":"localeString","en":"branch","ru":"область деятельности"},"employees-popover":{"_type":"localeString","en":"number of employees","ru":"количество сотрудников"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"ru":"Партнерские скидки","_type":"localeString","en":"Partner discounts"},"registered-discounts":{"en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"_type":"localeString","en":"Partner level requirements","ru":"Требования к уровню партнера"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"en":"Partners-suppliers","ru":"Партнеры-поставщики","_type":"localeString"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"_type":"localeString","en":"Produced deployments","ru":"Производимые внедрения"},"supplier-implementations":{"ru":"Поставляемые внедрения","_type":"localeString","en":"Supplied deployments"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"ru":"Регистрация ","_type":"localeString","en":"Register"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"_type":"localeString","en":"To view company events please log in or register on the sit.","ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт."},"company-presentation":{"en":"Company presentation","ru":"Презентация компании","_type":"localeString"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"_type":"localeString","en":"logout","ru":"Выйти"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Calculate ROI and price","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"translatable_meta":[{"translations":{"_type":"localeString","en":"Company","ru":"Компания"},"name":"title"},{"name":"description","translations":{"_type":"localeString","en":"Company description","ru":"Описание компании"}},{"name":"keywords","translations":{"ru":"Ключевые слова для компании","_type":"localeString","en":"Company keywords"}}],"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"devicelock-smart-lain-ink":{"id":2841,"title":"DeviceLock (SmartLine Inc)","logoURL":"https://old.b4r.io/uploads/roi/company/DeviceLock.png","alias":"devicelock-smart-lain-ink","address":"","roles":[{"id":3,"type":"vendor"}],"description":"Established in 1996, DeviceLock is a leading provider of endpoint device/port control and data leak prevention software for business, education and government institutions around the world.\r\n\r\nA clear leader in endpoint Data Loss Prevention (DLP) with over 70,000 licensed customers who’ve deployed on over 7 million endpoints (laptops, desktops and servers) DeviceLock enjoys a global customer presence across a wide variety of business types including: banking and finance, medical, pharmaceutical, government and defense, manufacturing, retail and more.\r\n\r\nBased in San Ramon, California (35 min. from the heart of Silicon Valley), the company is privately owned and has been financed entirely by its founders and through retained earnings. DeviceLock is an international company with personnel in California, Vancouver, London, Düsseldorf, Milan and Moscow.\r\n\r\nDeviceLock is a profitable, fast-growing business and is audited by Grant Thornton.\r\n\r\nDeviceLock, Inc. is a member of the Microsoft Independent Software Vendor Program (MSDN ISV), the Intel® Software Partner Program, the Fujitsu Siemens Computers Global Alliance, the Sun Developer Connection Program (SDC), and the Citrix Developer Network.\r\n\r\nSource: http://www.devicelock.com/company/","companyTypes":["vendor"],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[{"id":125,"title":"DeviceLock для автомобильной компании","description":"Комментируя необходимость использования подобного рода продукта, Андрей Демченко, начальник отдела информационных технологий в Группе компаний «НИКО», отметил: «Информационная безопасность стала одним из приоритетов в работе нашей организации. Мы уже вышли на тот уровень, когда возможная утечка конфиденциальных данных может нанести колоссальный финансовый ущерб. С началом использования программного продукта DeviceLock, мы сделали невозможным несанкционированное копирование информации на сменные носители (флеш-накопители, диски, мобильные устройства), печать на принтеры и, как следствие, закрыли большинство путей утечки информации».\r\n\r\nПри выборе продукта для решения данной задачи специалисты Группы компаний «НИКО» рассматривали программы от различных производителей. Причиной выбора в пользу DeviceLock стала его отличная функциональность, репутация лидера рынка и приемлемая цена. Кроме того, при тестировании решения был отмечен достаточно легкий процесс установки и первичной настройки продукта, а также профессионально оказанная помощь технических специалистов компании SPro, Ltd. – сертифицированного дилера DeviceLock в Украине.\r\n\r\nГруппа компаний «НИКО», согласно результатов рейтинга «Гвардия корпораций» в 2008 г., вошла в число 50 самых дорогих компаний Украины и является одним из лидеров отечественного автомобильного рынка. Размер ИТ инфраструктуры группы составляет около 800 компьютеров и серверов под управлением Microsoft Active Directory.\r\n\r\nDeviceLock – это средство контроля и протоколирования доступа пользователей к устройствам и портам ввода-вывода. DeviceLock позволяет контролировать весь спектр потенциально опасных устройств: USB-порты, дисководы, CD/DVD-приводы, а также FireWire, инфракрасные, параллельные и последовательные порты, WiFi- и Bluetooth-адаптеры, ленточные накопители, КПК, любые внутренние и внешние сменные накопители и жесткие диски. DeviceLock осуществляет детальный аудит и теневое копирование при обращении пользователя к вышеперечисленным устройствам и портам ввода-вывода, в том числе и локальной синхронизации КПК и смартфонов, а также контролирует доступ пользователей к печатным устройствам.\r\n\r\nDeviceLock позволяет контролировать весь спектр потенциально опасных устройств: дисководы, CD/DVD-приводы, а также FireWire, инфракрасные, параллельные, последовательные и USB-порты, WiFi- и Bluetooth-адаптеры, КПК, любые внешние сменные, внутренние накопители в т.ч. ленточные а также жесткие диски. DeviceLock осуществляет детальный аудит и теневое копирование при обращении пользователя к вышеперечисленным устройствам и портам ввода-вывода, в том числе и локальной синхронизации КПК и смартфонов, также контролирует доступ пользователей к печатным устройствам.","alias":"devicelock-dlja-avtomobilnoi-kompanii","roi":0,"seo":{"title":"DeviceLock для автомобильной компании","keywords":"DeviceLock, также, устройствам, компаний, продукта, НИКО, пользователей, накопители","description":"Комментируя необходимость использования подобного рода продукта, Андрей Демченко, начальник отдела информационных технологий в Группе компаний «НИКО», отметил:","og:title":"DeviceLock для автомобильной компании","og:description":"Комментируя необходимость использования подобного рода продукта, Андрей Демченко, начальник отдела информационных технологий в Группе компаний «НИКО», отметил:"},"deal_info":"","user":{"id":402,"title":"NIKO","logoURL":"https://old.b4r.io/uploads/roi/company/niko.jpg","alias":"niko","address":"Naberezhno-Khreshchatytska Str., berth 4, Kyiv","roles":[],"description":"'NIKO' is a Group of companies that has been successfully operating in the Ukrainian market since 1991.\r\n\r\nKey lines of activities include: \r\n\r\nau","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://niko.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"NIKO","keywords":"since, market, Ukrainian, 1991, activities, lines, include, operating","description":"'NIKO' is a Group of companies that has been successfully operating in the Ukrainian market since 1991.\r\rKey lines of activities include: \r\rau","og:title":"NIKO","og:description":"'NIKO' is a Group of companies that has been successfully operating in the Ukrainian market since 1991.\r\rKey lines of activities include: \r\rau","og:image":"https://old.b4r.io/uploads/roi/company/niko.jpg"},"eventUrl":""},"supplier":{"id":2943,"title":"SPro","logoURL":"https://old.b4r.io/uploads/roi/company/SPro.jpg","alias":"spro","address":"","roles":[],"description":"Company SPro specializes in information security segment and occupies a leading position in the field of protection from leaks of confidential data (Data Loss / Leak (age) Prevention - DLP). SPro provides a full range of information security services - from the development of information security strategy, implementation and maintenance of technical means of information-based technologies from leading manufacturers, to provide services for the prevention of computer crimes. Unique solutions portfolio allows our partners to get the most out of the company in the information security sector","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://spro.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SPro","keywords":"security, information, SPro, from, leading, services, means, prevention","description":"Company SPro specializes in information security segment and occupies a leading position in the field of protection from leaks of confidential data (Data Loss","og:title":"SPro","og:description":"Company SPro specializes in information security segment and occupies a leading position in the field of protection from leaks of confidential data (Data Loss","og:image":"https://old.b4r.io/uploads/roi/company/SPro.jpg"},"eventUrl":""},"vendors":[{"id":2841,"title":"DeviceLock (SmartLine Inc)","logoURL":"https://old.b4r.io/uploads/roi/company/DeviceLock.png","alias":"devicelock-smart-lain-ink","address":"","roles":[],"description":"Established in 1996, DeviceLock is a leading provider of endpoint device/port control and data leak prevention software for business, education and government institutions around the world.\r\n\r\nA clear leader in endpoint Data Loss Prevention (DLP) with over 70,000 licensed customers who’ve deployed on over 7 million endpoints (laptops, desktops and servers) DeviceLock enjoys a global customer presence across a wide variety of business types including: banking and finance, medical, pharmaceutical, government and defense, manufacturing, retail and more.\r\n\r\nBased in San Ramon, California (35 min. from the heart of Silicon Valley), the company is privately owned and has been financed entirely by its founders and through retained earnings. DeviceLock is an international company with personnel in California, Vancouver, London, Düsseldorf, Milan and Moscow.\r\n\r\nDeviceLock is a profitable, fast-growing business and is audited by Grant Thornton.\r\n\r\nDeviceLock, Inc. is a member of the Microsoft Independent Software Vendor Program (MSDN ISV), the Intel® Software Partner Program, the Fujitsu Siemens Computers Global Alliance, the Sun Developer Connection Program (SDC), and the Citrix Developer Network.\r\n\r\nSource: http://www.devicelock.com/company/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.devicelock.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"DeviceLock (SmartLine Inc)","keywords":"DeviceLock, Program, business, company, government, Developer, over, California","description":"Established in 1996, DeviceLock is a leading provider of endpoint device/port control and data leak prevention software for business, education and government","og:title":"DeviceLock (SmartLine Inc)","og:description":"Established in 1996, DeviceLock is a leading provider of endpoint device/port control and data leak prevention software for business, education and government","og:image":"https://old.b4r.io/uploads/roi/company/DeviceLock.png"},"eventUrl":""}],"products":[{"id":492,"logo":false,"scheme":false,"title":"DeviceLock Endpoint DLP Suite","vendorVerified":0,"rating":"2.10","implementationsCount":2,"suppliersCount":0,"alias":"devicelock-endpoint-dlp-suite","companyTypes":[],"description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players. In addition, policies can be set and enforced for copy operations via the Windows Clipboard, as well as screenshot operations on the endpoint computer.\r\nNetworkLock adds contextual-level control of user network communications via the Internet through such means as: company email, personal webmail, instant messaging services, social networks (like Facebook, Google+, Twitter), web surfing, FTP file transfers, as well as cloud-based file sharing services like Dropbox, SkyDrive and Google Drive.\r\nContentLock adds the capability to look inside files and other data objects (like emails and webmails, chats, blog posts, etc.) for sensitive information like social security numbers, credit card numbers, bank account numbers or other user-definable information and to make block-or-allow decisions based on policies having to do with file contents.\r\nDiscovery is a separately licensed component, which helps network administrators and security personnel locating certain types of content stored within and outside the limits of the corporate network. Discovering unwanted content is essential when trying to protect the company’s intellectual property, control employee activities and administer computer networks.\r\nSearch Server is an optional separately licensed component, which provides full-text searching of logged data. The full-text search functionality is especially useful in situations when you need to search for shadow copies of documents based on their contents.\r\nDeviceLock DLP Suite provides both contextual and content-based control for devices and network resources via Group Policy in an Active Directory domain The combination of all of these modules working together is the DeviceLock DLP Suite. The DLP Suite provides protection against local and network data leaks at the endpoint (laptop, desktop or server) via a wide array of threat vectors.\r\nThese include: iPhones, Androids, BlackBerry, other smart-phones, iPods, iPads, digital cameras, Wi-Fi, Bluetooth, FireWire, social media, IM, webmail, company email, printing, CD or DVD ROM, USB flash drives, Compact Flash, FTP/FTPS, HTTP/HTTPS and the clipboard.\r\nNatively integrated with Microsoft Active Directory Group Policy, the DeviceLock DLP Suite is very easy and straight-forward to install and configure. Typical installations are handled by Microsoft Network Administrators and do not require expensive, specially trained resources.\r\nThe other great customer benefit of DeviceLock’s tight integration with Active Directory is that it gives the solution virtually limitless scalability. The DeviceLock DLP Suite can effortlessly run on every endpoint listed in your Active Directory database … even if there are tens of thousands.","shortDescription":"DeviceLock DLP Suite consists of five modules that protect your organization from data leak threats","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeviceLock Endpoint DLP Suite","keywords":"network, Suite, DeviceLock, like, Directory, Active, provides, data","description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved","og:title":"DeviceLock Endpoint DLP Suite","og:description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved"},"eventUrl":"","translationId":493,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"}]}},"categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.devicelock.com/ru/news/1129.html","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":126,"title":"DeviceLock для международной компании экспресс-доставки","description":"По словам начальника ИТ-отдела TNT Express Ukraine, Игоря Толмачева, необходимость в программном продукте DeviceLock, возникла в связи с работой компании на высоко конкурентном рынке, где утечка конфиденциальных данных может нанести огромный ущерб компании. «Значительной частью брешей в информационной безопасности компании являлись, как не странно, не атаки хакеров и вредоносное ПО, а действия инсайдеров. Перед нами стала задача, взять под контроль оборот информации внутри компании», – прокомментировал Игорь Толмачев.\r\n\r\nПри выборе продукта для решения данной задачи в инфраструктуре из 350 рабочих станций и более 40 серверов и маршрутизаторов, руководство остановилось на продукте DeviceLock, выделив его среди конкурентных решений за простоту и эффективность. Внедрение DeviceLock обеспечило ИТ-отдел полным контролем над тем, какие устройства подключаются к рабочим станциям, как они используются и какая информация на них записывается. Отдельно была отмечена возможность теневого копирования переносимых на внешние носители данных, что дало администратору полное представление о том, с какими документами выполнялись те или иные операции. Также, достаточно простым был процесс установки и внедрения продукта, чему поспособствовала профессиональная техническая помощь компании SPro, Ltd.\r\n\r\nTNT Express – лидер в сфере экспресс-доставки корпоративных грузов и корреспонденции. Украинское представительство компании насчитывает более 700 сотрудников в 20-ти региональных офисах. TNT Express Ukraine обслуживает более 140 городов и выполняет порядка 10 000 операций в неделю.\r\n\r\nDeviceLock – это средство контроля и протоколирования доступа пользователей к устройствам и портам ввода-вывода. DeviceLock позволяет контролировать весь спектр потенциально опасных устройств: USB-порты, дисководы, CD/DVD-приводы, а также FireWire, инфракрасные, параллельные и последовательные порты, WiFi- и Bluetooth-адаптеры, ленточные накопители, КПК, любые внутренние и внешние сменные накопители и жесткие диски. DeviceLock осуществляет детальный аудит и теневое копирование при обращении пользователя к вышеперечисленным устройствам и портам ввода-вывода, в том числе и локальной синхронизации КПК и смартфонов, а также контролирует доступ пользователей к печатным устройствам.","alias":"devicelock-dlja-mezhdunarodnoi-kompanii-ehkspress-dostavki","roi":0,"seo":{"title":"DeviceLock для международной компании экспресс-доставки","keywords":"DeviceLock, компании, Express, устройствам, более, накопители, также, пользователей","description":"По словам начальника ИТ-отдела TNT Express Ukraine, Игоря Толмачева, необходимость в программном продукте DeviceLock, возникла в связи с работой компании на","og:title":"DeviceLock для международной компании экспресс-доставки","og:description":"По словам начальника ИТ-отдела TNT Express Ukraine, Игоря Толмачева, необходимость в программном продукте DeviceLock, возникла в связи с работой компании на"},"deal_info":"","user":{"id":2944,"title":"TNT Express","logoURL":"https://old.b4r.io/uploads/roi/company/TNT_Express.png","alias":"tnt-ehkspress","address":"","roles":[],"description":"TNT Express is an international courier delivery services company with headquarters in Hoofddorp, Netherlands. The firm has fully owned operations in 61 countries and delivers documents, parcels and pieces of freight to over 200 countries. The company recorded sales of €6.91 billion in 2015. Its major competitors include United Parcel Service (UPS) and DHL. TNT's competitor FedEx reached an agreement to buy the company in April 2015, which was completed on 25 May 2016.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.tnt.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TNT Express","keywords":"company, countries, Express, 2015, competitors, Service, Parcel, include","description":"TNT Express is an international courier delivery services company with headquarters in Hoofddorp, Netherlands. The firm has fully owned operations in 61","og:title":"TNT Express","og:description":"TNT Express is an international courier delivery services company with headquarters in Hoofddorp, Netherlands. The firm has fully owned operations in 61","og:image":"https://old.b4r.io/uploads/roi/company/TNT_Express.png"},"eventUrl":""},"supplier":{"id":2943,"title":"SPro","logoURL":"https://old.b4r.io/uploads/roi/company/SPro.jpg","alias":"spro","address":"","roles":[],"description":"Company SPro specializes in information security segment and occupies a leading position in the field of protection from leaks of confidential data (Data Loss / Leak (age) Prevention - DLP). SPro provides a full range of information security services - from the development of information security strategy, implementation and maintenance of technical means of information-based technologies from leading manufacturers, to provide services for the prevention of computer crimes. Unique solutions portfolio allows our partners to get the most out of the company in the information security sector","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://spro.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SPro","keywords":"security, information, SPro, from, leading, services, means, prevention","description":"Company SPro specializes in information security segment and occupies a leading position in the field of protection from leaks of confidential data (Data Loss","og:title":"SPro","og:description":"Company SPro specializes in information security segment and occupies a leading position in the field of protection from leaks of confidential data (Data Loss","og:image":"https://old.b4r.io/uploads/roi/company/SPro.jpg"},"eventUrl":""},"vendors":[{"id":2841,"title":"DeviceLock (SmartLine Inc)","logoURL":"https://old.b4r.io/uploads/roi/company/DeviceLock.png","alias":"devicelock-smart-lain-ink","address":"","roles":[],"description":"Established in 1996, DeviceLock is a leading provider of endpoint device/port control and data leak prevention software for business, education and government institutions around the world.\r\n\r\nA clear leader in endpoint Data Loss Prevention (DLP) with over 70,000 licensed customers who’ve deployed on over 7 million endpoints (laptops, desktops and servers) DeviceLock enjoys a global customer presence across a wide variety of business types including: banking and finance, medical, pharmaceutical, government and defense, manufacturing, retail and more.\r\n\r\nBased in San Ramon, California (35 min. from the heart of Silicon Valley), the company is privately owned and has been financed entirely by its founders and through retained earnings. DeviceLock is an international company with personnel in California, Vancouver, London, Düsseldorf, Milan and Moscow.\r\n\r\nDeviceLock is a profitable, fast-growing business and is audited by Grant Thornton.\r\n\r\nDeviceLock, Inc. is a member of the Microsoft Independent Software Vendor Program (MSDN ISV), the Intel® Software Partner Program, the Fujitsu Siemens Computers Global Alliance, the Sun Developer Connection Program (SDC), and the Citrix Developer Network.\r\n\r\nSource: http://www.devicelock.com/company/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.devicelock.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"DeviceLock (SmartLine Inc)","keywords":"DeviceLock, Program, business, company, government, Developer, over, California","description":"Established in 1996, DeviceLock is a leading provider of endpoint device/port control and data leak prevention software for business, education and government","og:title":"DeviceLock (SmartLine Inc)","og:description":"Established in 1996, DeviceLock is a leading provider of endpoint device/port control and data leak prevention software for business, education and government","og:image":"https://old.b4r.io/uploads/roi/company/DeviceLock.png"},"eventUrl":""}],"products":[{"id":492,"logo":false,"scheme":false,"title":"DeviceLock Endpoint DLP Suite","vendorVerified":0,"rating":"2.10","implementationsCount":2,"suppliersCount":0,"alias":"devicelock-endpoint-dlp-suite","companyTypes":[],"description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players. In addition, policies can be set and enforced for copy operations via the Windows Clipboard, as well as screenshot operations on the endpoint computer.\r\nNetworkLock adds contextual-level control of user network communications via the Internet through such means as: company email, personal webmail, instant messaging services, social networks (like Facebook, Google+, Twitter), web surfing, FTP file transfers, as well as cloud-based file sharing services like Dropbox, SkyDrive and Google Drive.\r\nContentLock adds the capability to look inside files and other data objects (like emails and webmails, chats, blog posts, etc.) for sensitive information like social security numbers, credit card numbers, bank account numbers or other user-definable information and to make block-or-allow decisions based on policies having to do with file contents.\r\nDiscovery is a separately licensed component, which helps network administrators and security personnel locating certain types of content stored within and outside the limits of the corporate network. Discovering unwanted content is essential when trying to protect the company’s intellectual property, control employee activities and administer computer networks.\r\nSearch Server is an optional separately licensed component, which provides full-text searching of logged data. The full-text search functionality is especially useful in situations when you need to search for shadow copies of documents based on their contents.\r\nDeviceLock DLP Suite provides both contextual and content-based control for devices and network resources via Group Policy in an Active Directory domain The combination of all of these modules working together is the DeviceLock DLP Suite. The DLP Suite provides protection against local and network data leaks at the endpoint (laptop, desktop or server) via a wide array of threat vectors.\r\nThese include: iPhones, Androids, BlackBerry, other smart-phones, iPods, iPads, digital cameras, Wi-Fi, Bluetooth, FireWire, social media, IM, webmail, company email, printing, CD or DVD ROM, USB flash drives, Compact Flash, FTP/FTPS, HTTP/HTTPS and the clipboard.\r\nNatively integrated with Microsoft Active Directory Group Policy, the DeviceLock DLP Suite is very easy and straight-forward to install and configure. Typical installations are handled by Microsoft Network Administrators and do not require expensive, specially trained resources.\r\nThe other great customer benefit of DeviceLock’s tight integration with Active Directory is that it gives the solution virtually limitless scalability. The DeviceLock DLP Suite can effortlessly run on every endpoint listed in your Active Directory database … even if there are tens of thousands.","shortDescription":"DeviceLock DLP Suite consists of five modules that protect your organization from data leak threats","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeviceLock Endpoint DLP Suite","keywords":"network, Suite, DeviceLock, like, Directory, Active, provides, data","description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved","og:title":"DeviceLock Endpoint DLP Suite","og:description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved"},"eventUrl":"","translationId":493,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"}]}},"categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://spro.com.ua/project/95-devicelock/in-the-ukraine/251-kompaniya-tnt-express-ukraine-vibrala-devicelock-dlya-predotvrashcheniya-utechki-konfidencialnih-dannih","title":"Supplier's web site"}},"comments":[],"referencesCount":0}],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{"24":{"id":24,"title":"DLP - Data Leak Prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png","alias":"dlp-data-leak-prevention"}},"branches":"Information Technology","companyUrl":"http://www.devicelock.com/","countryCodes":[],"certifications":[],"isSeller":true,"isSupplier":false,"isVendor":true,"presenterCodeLng":"","seo":{"title":"DeviceLock (SmartLine Inc)","keywords":"DeviceLock, Program, business, company, government, Developer, over, California","description":"Established in 1996, DeviceLock is a leading provider of endpoint device/port control and data leak prevention software for business, education and government","og:title":"DeviceLock (SmartLine Inc)","og:description":"Established in 1996, DeviceLock is a leading provider of endpoint device/port control and data leak prevention software for business, education and government","og:image":"https://old.b4r.io/uploads/roi/company/DeviceLock.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[{"supplier":"ISSP","partnershipLevel":"Silver","countries":"","partnersType":""}],"vendoredProducts":[{"id":492,"logoURL":"https://old.b4r.io/fileadmin/user_upload/DeviceLock.jpg","logo":true,"scheme":false,"title":"DeviceLock Endpoint DLP Suite","vendorVerified":0,"rating":"2.10","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":1,"alias":"devicelock-endpoint-dlp-suite","companyTitle":"DeviceLock (SmartLine Inc)","companyTypes":["vendor"],"companyId":2841,"companyAlias":"devicelock-smart-lain-ink","description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players. In addition, policies can be set and enforced for copy operations via the Windows Clipboard, as well as screenshot operations on the endpoint computer.\r\nNetworkLock adds contextual-level control of user network communications via the Internet through such means as: company email, personal webmail, instant messaging services, social networks (like Facebook, Google+, Twitter), web surfing, FTP file transfers, as well as cloud-based file sharing services like Dropbox, SkyDrive and Google Drive.\r\nContentLock adds the capability to look inside files and other data objects (like emails and webmails, chats, blog posts, etc.) for sensitive information like social security numbers, credit card numbers, bank account numbers or other user-definable information and to make block-or-allow decisions based on policies having to do with file contents.\r\nDiscovery is a separately licensed component, which helps network administrators and security personnel locating certain types of content stored within and outside the limits of the corporate network. Discovering unwanted content is essential when trying to protect the company’s intellectual property, control employee activities and administer computer networks.\r\nSearch Server is an optional separately licensed component, which provides full-text searching of logged data. The full-text search functionality is especially useful in situations when you need to search for shadow copies of documents based on their contents.\r\nDeviceLock DLP Suite provides both contextual and content-based control for devices and network resources via Group Policy in an Active Directory domain The combination of all of these modules working together is the DeviceLock DLP Suite. The DLP Suite provides protection against local and network data leaks at the endpoint (laptop, desktop or server) via a wide array of threat vectors.\r\nThese include: iPhones, Androids, BlackBerry, other smart-phones, iPods, iPads, digital cameras, Wi-Fi, Bluetooth, FireWire, social media, IM, webmail, company email, printing, CD or DVD ROM, USB flash drives, Compact Flash, FTP/FTPS, HTTP/HTTPS and the clipboard.\r\nNatively integrated with Microsoft Active Directory Group Policy, the DeviceLock DLP Suite is very easy and straight-forward to install and configure. Typical installations are handled by Microsoft Network Administrators and do not require expensive, specially trained resources.\r\nThe other great customer benefit of DeviceLock’s tight integration with Active Directory is that it gives the solution virtually limitless scalability. The DeviceLock DLP Suite can effortlessly run on every endpoint listed in your Active Directory database … even if there are tens of thousands.","shortDescription":"DeviceLock DLP Suite consists of five modules that protect your organization from data leak threats","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeviceLock Endpoint DLP Suite","keywords":"network, Suite, DeviceLock, like, Directory, Active, provides, data","description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved","og:title":"DeviceLock Endpoint DLP Suite","og:description":"DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved","og:image":"https://old.b4r.io/fileadmin/user_upload/DeviceLock.jpg"},"eventUrl":"","translationId":493,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[],"partnershipProgramme":{"levels":[{"id":1098,"level":"Reseller"},{"id":1100,"level":"Silver"},{"id":1102,"level":"Gold"},{"id":1104,"level":"Distributor"}],"partnerDiscounts":{"Reseller":"","Silver":"","Gold":"","Distributor":""},"registeredDiscounts":{"Reseller":"","Silver":"","Gold":"","Distributor":""},"additionalBenefits":[],"salesPlan":{"Reseller":"","Silver":"","Gold":"","Distributor":""},"additionalRequirements":[]}}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}