{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"en":"Products","de":"die produkte","ru":"Продукты","_type":"localeString"},"introduction-popover":{"en":"introduction","ru":"внедрения","_type":"localeString"},"partners-popover":{"_type":"localeString","en":"partners","ru":"партнеры"},"update-profile-button":{"ru":"Обновить профиль","_type":"localeString","en":"Update profile"},"read-more-button":{"_type":"localeString","en":"Show more","ru":"Показать ещё"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"en":"Categories","ru":"Компетенции","_type":"localeString"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"en":"Partnership with suppliers","ru":"Партнерство с поставщиками","_type":"localeString"},"reference-bonus":{"en":"Bonus 4 reference","ru":"Бонус за референс","_type":"localeString"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"en":"Partner types","ru":"Типы партнеров","_type":"localeString"},"branch-popover":{"_type":"localeString","en":"branch","ru":"область деятельности"},"employees-popover":{"ru":"количество сотрудников","_type":"localeString","en":"number of employees"},"partnership-programme":{"_type":"localeString","en":"Partnership program","ru":"Партнерская программа"},"partner-discounts":{"en":"Partner discounts","ru":"Партнерские скидки","_type":"localeString"},"registered-discounts":{"en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString"},"additional-advantages":{"_type":"localeString","en":"Additional Benefits","ru":"Дополнительные преимущества"},"additional-requirements":{"_type":"localeString","en":"Partner level requirements","ru":"Требования к уровню партнера"},"certifications":{"en":"Certification of technical specialists","ru":"Сертификация технических специалистов","_type":"localeString"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"_type":"localeString","en":"All countries","ru":"Все страны"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"en":"Produced deployments","ru":"Производимые внедрения","_type":"localeString"},"supplier-implementations":{"en":"Supplied deployments","ru":"Поставляемые внедрения","_type":"localeString"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"en":"Events schedule","ru":"Pасписание событий","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"_type":"localeString","en":"Register","ru":"Регистрация "},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"_type":"localeString","en":"To view company events please log in or register on the sit.","ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт."},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"en":"logout","ru":"Выйти","_type":"localeString"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Roi4Webinar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Calculate ROI and price","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"translatable_meta":[{"name":"title","translations":{"en":"Company","ru":"Компания","_type":"localeString"}},{"name":"description","translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"}},{"name":"keywords","translations":{"_type":"localeString","en":"Company keywords","ru":"Ключевые слова для компании"}}],"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"forcepoint":{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[{"id":3,"type":"vendor"}],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":["vendor"],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[{"id":278,"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a food and beverage company","description":"OVERVIEW\r\nCrediton Dairy, based in the heart of Devon in southern England, is a food and beverage company that produces a variety of milk drinks. The company is best known for its “Moo Milk” and “Dairy Pride” brands and has products in 13,500 food retail stores nationwide, making it one of the UK’s leading dairy beverage companies. Its chairman, Neil Kennedy, was presented with the prestigious SW Dairy Industry Award for his outstanding contribution towards the development of the British dairy market.\r\nIn 2012, dairy companies Arla Foods UK and Milk Link were given approval to merge by the European Commission (EC). A condition for the approval of the merger was that Crediton Dairy operate as a separate business. Benjamin Evans, formerly with Milk Link, became IT Manager for Crediton Dairy. \r\nCHALLENGE\r\nEvans’ initial task was to implement a web security solution that addressed both security and business challenges Crediton Dairy had been struggling with at the time. Its network had seen continuous attacks from external threats masking as an insider in order to in ltrate and steal sensitive data. These threats would often be in the form of sophisticated ransomware and other advanced threats, with delivery methods that shifted between web and email channels in search of a weakness. Suspicious URLs sent to employees from Director-level positions and phony invitations to download a PDF instructing users to “please pay invoice” are just a few examples Evans saw rsthand within a few weeks of joining the company.\r\nSome attacks were being successfully filtered by the Office 365 Outlook client, but only to the extent of being redirected into a “junk” folder. Nothing was in place to effectively identify or classify information. Crediton Dairy also lacked a solution that delivered real- time security ratings to web or email traffic. \r\nAfter determining the security included in Office 365 was not up to the task, the challenge was to build a security posture from the ground-up— starting with web—that wouldn’t break the budget. With only a small team to work with, Evans began searching for cloud-based security solutions. On-premises appliances were out of the question —he simply didn’t have the resources to install and manage additional hardware. \r\nSOLUTION\r\nCrediton Dairy assessed multiple web security providers, including Barracuda Networks. But according to Evans, Barracuda Networks couldn’t meet their strict functionality or budgetary requirements.\r\n“There were a few let downs on the way the Barracuda URL filtering worked. It just didn’t feel like home.”\r\n— Evans\r\nAs a former Milk Link employee, Evans was familiar with the virtualized classification capabilities and hassle-free maintenance of the Forcepoint Web Security Cloud solution; it was the company’s primary solution for web security.\r\nFollowing Evans’ recommendation, Forcepoint Web Security Cloud went through a Proof of Concept (POC) at Crediton Dairy. It exceeded all expectations. Evans noted that other cloud versions on the market were too “light” in functionality, compared to the high level of protection with Forcepoint.\r\n“The Forcepoint solution offered more options around the Cloud. Rather than just black-listing or white-listing URLs and email addresses, Forcepoint ticked all of our boxes for functionality.”\r\n— Evans\r\nDeployment was straightforward and simple and the Forcepoint support team was there for Evans whenever needed.\r\n“The Forcepoint support team was very good. When we were originally getting set up, my account manager and the support team took control, had a look where any issues might be, configured the solution, and got it up and running while taking me through some of the new features.”\r\n— Evans\r\nCrediton Dairy’s IT department has always embraced innovation and new technologies. It was one of the first to adopt Office 365 when it became available in the UK. However, because Office 365 comes with only basic security features, it doesn’t properly secure the average working email environment. This was, unfortunately, the case for Crediton Dairy.\r\n“We were starting to see a bit more spam coming through Office 365, compared to where it was when it first came out. We started to look at the email side of Forcepoint, for sure.”\r\n— Evans\r\nEvans and Crediton Dairy chose to implement Forcepoint Email Security Cloud as well as Forcepoint Advanced Malware Detection for Email, incorporating cloud-hosted protection that surpasses the capability of on-premises sandboxes. Evans admits, it was a “no- brainer” for his organization.\r\n“Forcepoint Email Security Cloud has stopped anything suspicious from coming in and I can visibly see what is being stopped and what we’re being protected from. We’re protected and it’s one of those insurance policies that every company needs.”\r\n— Evans\r\nThe Crediton Dairy team took advantage of an easy cloud deployment by simply adding the Forcepoint Email Security Cloud to an already deployed Forcepoint Web Security Cloud for coordinated defenses against advanced threats. The deployment of Forcepoint Email Security Cloud was accomplished overnight. Evans and his team began the process on a Friday evening and nished Saturday. \r\nRESULTS\r\nForcepoint Web Security Cloud solutions met all of Crediton Dairy’s functionality and quality requirements without them having to purchase additional hardware. Staying within budget has freed up resources for other projects. At the same time, Forcepoint Email Security Cloud solution has empowered Crediton Dairy to safely embrace new technologies such as Office 365 and enjoy all of its ef ciencies and cost savings.\r\nEvans recalls how well Forcepoint Cloud solutions integrate well with Active Directory and enhance and complement the Office 365 solution already in place.\r\n“Forcepoint is able to work seamlessly with Office 365. We don’t see any problems at all when we run the two together.”\r\n— Evans\r\nAn easy deployment of Forcepoint Web Security Cloud and Forcepoint Email Security Cloud solutions have paved the way for Crediton Dairy to continue to evolve and innovate with safety and con dence.\r\nCrediton Dairy has relied on Forcepoint security solutions since 2015. ","alias":"forcepoint-advanced-malware-detection-forcepoint-email-security-cloud-forcepoint-web-security-cloud-for-a-food-and-beverage-company","roi":0,"seo":{"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a food and beverage company","keywords":"Forcepoint, Evans, Crediton, Dairy, Cloud, Security, with, security","description":"OVERVIEW\rCrediton Dairy, based in the heart of Devon in southern England, is a food and beverage company that produces a variety of milk drinks. The company is","og:title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a food and beverage company","og:description":"OVERVIEW\rCrediton Dairy, based in the heart of Devon in southern England, is a food and beverage company that produces a variety of milk drinks. The company is"},"deal_info":"","user":{"id":3869,"title":"Crediton Dairy","logoURL":"https://old.b4r.io/uploads/roi/company/Crediton_Dairy.jpg","alias":"crediton-dairy","address":"","roles":[],"description":"Crediton Dairy is one of the UK’s leading dairy drinks businesses producing a comprehensive range of fresh flavoured and functional chilled milk drinks, as well as long life milks & creams. Located in the heart of Devon, we are dedicated to producing great tasting dairy products made from British milk supplied by our group of local, family-run, dairy farms.\r\n We’re independently owned, financially strong and professionally run and focused on adding value to everything we do. To this end we constantly challenge ourselves:\r\nto do better;\r\nto listen to and meet the needs of our customers and consumers;\r\nto value and build strong relationships with our people, partners and farmer suppliers; and\r\nto act responsibly, ethically and treat others as we would want to be treated.\r\nOur great tasting milk drinks are for everyone from growing families to fitness fanatics. Our products are consumed in homes, restaurants and on-the-go across the country. From retailer own-label to our fast-growing Moo brand you’ll find Crediton Dairy products in over 13,500 food retail stores nationwide. We’re also a leading supplier of milks and creams across the foodservice and wholesale sectors. But we aren’t stopping there and we’re working on exciting new product innovations and formats to move the dairy drinks category forward.\r\nAll of this comes out of our well invested dairy situated in the middle of Devon, a county which is of course synonymous with dairy farming and great tasting dairy products and at Crediton Dairy we’re incredibly proud to be continuing this tradition.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.creditondairy.co.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Crediton Dairy","keywords":"Dairy, Crediton","description":"Crediton Dairy is one of the UK’s leading dairy drinks businesses producing a comprehensive range of fresh flavoured and functional chilled milk drinks, as","og:title":"Crediton Dairy","og:description":"Crediton Dairy is one of the UK’s leading dairy drinks businesses producing a comprehensive range of fresh flavoured and functional chilled milk drinks, as","og:image":"https://old.b4r.io/uploads/roi/company/Crediton_Dairy.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":1474,"logo":false,"scheme":false,"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"forcepoint-advanced-malware-detection-forcepoint-email-security-cloud-forcepoint-web-security-cloud","companyTypes":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Email Security Cloud (formerly TRITON AP-EMAIL Cloud) - Protecting from spam, phishing & ransomware attacks wherever email is accessed</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud) - Delivering premier cloud security to protect users and data everywhere</span>","shortDescription":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","keywords":"Cloud, Forcepoint, Security, Malware, Advanced, TRITON, formerly, Email","description":"Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats\rForcepoint Email Security Cloud (formerly TRITON AP-EMAIL","og:title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","og:description":"Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats\rForcepoint Email Security Cloud (formerly TRITON AP-EMAIL"},"eventUrl":"","translationId":1474,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":74,"title":"United Kingdom","name":"GBR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":281,"title":"No IT security guidelines"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/crediton-dairy","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":282,"title":"Forcepoint Data Security for the largest individual bank","description":"Hypo Landesbank Vorarlberg uses a data loss prevention (DLP) solution. Their task is to increase data security and prevent data loss by detecting and blocking the unauthorized transmission of confidential data.\r\nSecurity E-mail\r\nFinancial institutions operating with highly sensitive data that must take all possible preventive measures so that confidential data can not be deliberately or unintentionally passed on to unauthorized persons. \r\nFollowing an initial specification of a technical solution to prevent unwanted data loss at the e-mail exit, the project team carried out a market investigation with ITS security specialists and system houses. Important: The solution had to work with the existing e-mail infrastructure, based on IBM Notes and Domino.\r\nOne of the sources of information was the Magic Quadrant for Content-Aware Data Loss Prevention by market research firm Gartner. As a result of the preliminary investigation, three suppliers remained, two of which were subjected to a detailed practice test. The project team of the IT department installed the products of both manufacturers and subsequently carried out extensive tests with the data from the e-mail archive. At the end of the day, Forcepoint ™ offered the more sophisticated and technically more elegant solution.\r\nDefine safety regulations and check them effectively\r\nThe actual technical implementation of the software - the Forcepoint Data Security Suite - and the additional measures proved to be more complex than initially estimated. From an organizational point of view, it was again examined which data are of critical importance for the Hypo Landesbank Vorarlberg and must be protected against unintentional forwarding. It was determined, for example, in which business processes the sensitive data are used and the rules for dealing with personal and sensitive data. Because all these safety rules must be considered in the DLP solution.\r\nThe main questions were: What data should be protected? Who is allowed to use, read or modify which data in which business processes? Where can sensitive data be safely sent? The works council was involved from the outset in all organizational measures affecting the Bank's employees, since the new solution analyzes mail contents, but not the behavior of the employees.\r\nThe data security suite stores the digital fingerprints of all sensitive data in a single, centralized, and encrypted form, with the help of the Forcepoint Data Security Suite, a "digital fingerprint" of the operational data to be protected , Which is updated once a day and serves as a reference for monitoring all activities carried out with the sensitive data.\r\nMisuse in time\r\nForcepoint's DLP solution then actively intervenes in the event when confidential data are intended to leave the bank via IBM Notes Mail. First, the DLP solution calculates the fingerprints of the data in the e-mail and compares the result with the values in the fingerprint database and the associated security rules. If no rule violation occurs, the data can be sent.\r\nIf, on the other hand, the sender is not allowed to send this data, he receives notification and the delivery process is stopped. At the same time, the bank's compliance department receives a message of the transaction. She asks the sender for an opinion as to why the data should be sent. ","alias":"forcepoint-data-security-for-the-largest-individual-bank","roi":0,"seo":{"title":"Forcepoint Data Security for the largest individual bank","keywords":"data, solution, with, sensitive, which, Forcepoint, security, Data","description":"Hypo Landesbank Vorarlberg uses a data loss prevention (DLP) solution. Their task is to increase data security and prevent data loss by detecting and blocking","og:title":"Forcepoint Data Security for the largest individual bank","og:description":"Hypo Landesbank Vorarlberg uses a data loss prevention (DLP) solution. Their task is to increase data security and prevent data loss by detecting and blocking"},"deal_info":"","user":{"id":3873,"title":"Hypo Landesbank Vorarlberg","logoURL":"https://old.b4r.io/uploads/roi/company/Hypo_Landesbank_Vorarlberg.png","alias":"hypo-landesbank-vorarlberg","address":"","roles":[],"description":"Since our establishment by the Vorarlberg state parliament in 1897, we have developed into a successful universal bank. In the process, we have always – even in difficult times – proven a reliable financial partner for the people and businesses in Vorarlberg and also beyond our state borders.\r\nThe reason is very simple: We have always pursued a local-based, conservative business model geared towards stability and sustainability. We deliberately choose not to engage in high-risk trading and speculative transactions.\r\nThis approach is a crucial quality factor for our bank; it gives both our customers and our employees clear goals, guidance and security.\r\nLocation and position\r\nThe headquarters of our bank are in Bregenz, the state capital of Vorarlberg. It was here, more than a hundred years ago, that we found the right place and the right conditions to become what we are today – a strong and secure regional bank.\r\nVorarlberg is a special region: with sharp contours and people with clear values and traditions that are still very much alive today. With a healthy economy and dynamic companies. All of these aspects give the region its special character.\r\nVorarlberg is a global player and a considerate neighbour. But Vorarlberg is one thing most of all: true to itself. For this reason, the state has strongly influenced our code of values (German only).","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.hypovbg.at/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hypo Landesbank Vorarlberg","keywords":"Vorarlberg, bank, state, have, special, region, very, right","description":"Since our establishment by the Vorarlberg state parliament in 1897, we have developed into a successful universal bank. In the process, we have always – even","og:title":"Hypo Landesbank Vorarlberg","og:description":"Since our establishment by the Vorarlberg state parliament in 1897, we have developed into a successful universal bank. In the process, we have always – even","og:image":"https://old.b4r.io/uploads/roi/company/Hypo_Landesbank_Vorarlberg.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":1472,"logo":false,"scheme":false,"title":"Forcepoint Data Security","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"forcepoint-data-security","companyTypes":[],"description":"Forcepoint Data Security Suite - detection, control and protection of confidential information and network end data\r\nPreventing data loss\r\nBusiness Process Security\r\nManaging Applications and Threats\r\n\r\nData Discover - Detection of confidential information stored on the network\r\nDetecting the storage of sensitive data\r\nMeasuring and reducing the risk of data loss\r\nSupport for e-discovery for controlled monitoring\r\n\r\nData Monitor - a tool for auditing and monitoring network data channels for leaks of confidential information\r\nMonitoring and blocking the leakage of confidential information\r\nConducting an audit\r\nMeasuring and reducing the risk of data loss\r\n\r\nData Protect - detection and blocking of leaks of confidential information at the level of all network channels\r\nMonitoring and blocking the leakage of confidential information\r\nConducting an audit\r\nMeasuring and reducing the risk of data loss\r\n\r\nData Endpoint - Detection and prevention of leakage of confidential information through target computers and removable media\r\nMonitoring and blocking the leakage of confidential information\r\nConducting an audit\r\nMeasuring and reducing the risk of data loss","shortDescription":"Forcepoint Data Security is a solution from leakage of confidential information (DLP)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Data Security","keywords":"information, data, confidential, Data, loss, Measuring, reducing, risk","description":"Forcepoint Data Security Suite - detection, control and protection of confidential information and network end data\rPreventing data loss\rBusiness Process","og:title":"Forcepoint Data Security","og:description":"Forcepoint Data Security Suite - detection, control and protection of confidential information and network end data\rPreventing data loss\rBusiness Process"},"eventUrl":"","translationId":1472,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":13,"title":"Austria","name":"AUT"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":4,"title":"Reduce Costs"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":336,"title":"Risk or Leaks of confidential information"}]}},"categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/node/10096","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":6,"title":"Forcepoint DLP для телекоммуникационной компании","description":"Была внедрена DLP\r\nРешения полностью удовлетворило заказчика.\r\nУникальный проект.","alias":"forcepoint-dlp-dlja-telekommunikacionnoi-kompanii","roi":0,"seo":{"title":"Forcepoint DLP для телекоммуникационной компании","keywords":"полностью, удовлетворило, Уникальный, проект, Решения, заказчика, внедрена, телекоммуникационной","description":"Была внедрена DLP\rРешения полностью удовлетворило заказчика.\rУникальный проект.","og:title":"Forcepoint DLP для телекоммуникационной компании","og:description":"Была внедрена DLP\rРешения полностью удовлетворило заказчика.\rУникальный проект."},"deal_info":"","user":{"id":503,"title":"MTS Ukraine","logoURL":"https://old.b4r.io/uploads/roi/company/MTS_Ukraina.png","alias":"mts-ukraina","address":"","roles":[],"description":"Сеть ПрАО «МТС Украина» охватывает более 98% территории Украины, на которой проживает 99% населения. Компания обслуживает более 21,59 млн. абонентов. Компания владеет лицензиями на предоставление мобильной (стандарт GSM-900/1800, CDMA-450), стационарной и международной/междугородней связи, а также предоставляет услуги международного роуминга на пяти континентах. Выручка за 2013 год составила 9,965 млрд. гривен.\r\n\r\nОАО «Мобильные ТелеСистемы» — крупнейший оператор мобильной связи в Восточной и Центральной Европе. Консолидированная абонентская база компании, без учета абонентской базы «МТС Беларусь», составляет более 100 миллионов абонентов. МТС и ее дочерние компании оказывают услуги в стандарте GSM в Армении, Беларуси, России, Украине и Туркменистане; в стандарте UMTS — в России, Армении, Беларуси; в стандарте CDMA-450 — в Украине, в стандарте LTE — в России и Армении. Компания также предоставляет услуги фиксированной связи и кабельного телевидения в России и в Украине.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://company.mts.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"MTS Ukraine","keywords":"России, стандарте, услуги, Армении, связи, Украине, Компания, более","description":"Сеть ПрАО «МТС Украина» охватывает более 98% территории Украины, на которой проживает 99% населения. Компания обслуживает более 21,59 млн. абонентов. Компания","og:title":"MTS Ukraine","og:description":"Сеть ПрАО «МТС Украина» охватывает более 98% территории Украины, на которой проживает 99% населения. Компания обслуживает более 21,59 млн. абонентов. Компания","og:image":"https://old.b4r.io/uploads/roi/company/MTS_Ukraina.png"},"eventUrl":""},"supplier":{"id":300,"title":"TECHNOSERV","logoURL":"https://old.b4r.io/uploads/roi/company/tehnoserv_logo.png","alias":"tekhnoserv","address":"111395, Москва ул. Юности, д. 13","roles":[],"description":"Technoserv, the largest Russian system integrator operating in Russia, the CIS and Europe, was founded in 1992. Technoserv’s turnover in 2015 totaled more than 51,8 billion rubles. The company’s headquarters is located in Moscow, with regional offices situated in Krasnodar, Nizhny Novgorod, Novosibirsk, St. Petersburg, Khabarovsk, Vladivostok, Volgograd, Yekaterinburg, subsidiaries in the CIS are in Almaty, Baku, Minsk, Tashkent and Yerevan. The number of Technoserv employees exceeds 2700.\r\n\r\nThe company has unique experience in implementing socially significant projects in the installation, developing and outsourcing of IT infrastructure, communications, engineering and information security systems, power systems and application platforms. Technoserv’s competencies include IT consulting, business intelligence systems, support and outsourcing.\r\n\r\nThe Technoserv Group implements and develops engineering and IT systems based both on its own technological developments and solutions of the global leaders, including APC by Schneider Electric, Avaya, Cisco Systems, EMC, Hitachi Data Systems, HPE, HP Inc, Huawei, IBM, Juniper Networks, Microsoft, Oracle, VMware, etc.\r\n\r\nThe company’s client list comprises major Russian companies and organizations from key sectors of the economy, including telecommunications, the public sector, oil and gas, manufacturing, transport and financial services. According to IDC, Technoserv is No1 at the Russian market of system integration. Also Technoserv heads the list in the IT ratings of Kommersant, Expert RA and CNews Analytics.","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":228,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":13,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.technoserv.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TECHNOSERV","keywords":"Technoserv, systems, Russian, engineering, outsourcing, list, Systems, Technoserv’s","description":"Technoserv, the largest Russian system integrator operating in Russia, the CIS and Europe, was founded in 1992. Technoserv’s turnover in 2015 totaled more than","og:title":"TECHNOSERV","og:description":"Technoserv, the largest Russian system integrator operating in Russia, the CIS and Europe, was founded in 1992. Technoserv’s turnover in 2015 totaled more than","og:image":"https://old.b4r.io/uploads/roi/company/tehnoserv_logo.png"},"eventUrl":""},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":39,"logo":false,"scheme":false,"title":"TRITON AP-DATA","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"triton-ap-data","companyTypes":[],"description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\r\n<ul><li>Предотвращение потери данных</li><li>Безопасность бизнес-процесса</li><li>Управление приложений и угроз</li></ul>\r\nData Discover - обнаружение конфиденциальной информации, хранимой в сети<br />\r\n<ul><li>Обнаружение мест хранения конфиденциальных данных</li><li>Измерение и уменьшение риска потери данных</li><li>Поддержка e-discovery для разрешаемого контроля</li></ul>\r\nData Monitor - средство аудита и мониторинга сетевых каналов передачи данных на предмет утечек конфиденциальной информации<br />\r\n<ul><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li><li>Data Protect - обнаружение и блокировка утечек конфиденциальной информации на уровне всех сетевых каналов</li><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li></ul>\r\n\r\n\r\n\r\n\r\nData Endpoint - обнаружение и предотвращение утечки конфиденциальной информации через конечные компьютеры и сменные носители\r\n<ul><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li></ul>","shortDescription":"TRITON AP-DATA - решение от утечки конфиденциальной информации (DLP)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"TRITON AP-DATA","keywords":"конфиденциальной, потери, информации, риска, уменьшение, блокировка, утечки, данных","description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\rПредотвращение потери данныхБезопасность","og:title":"TRITON AP-DATA","og:description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\rПредотвращение потери данныхБезопасность"},"eventUrl":"","translationId":2323,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":10,"title":"Ensure Compliance"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"}]}},"categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://company.mts.ua/ru/tenders/2309","title":"Information about public tenders and shopping"}},"comments":[],"referencesCount":0},{"id":280,"title":"Forcepoint Email Security Cloud","description":"\r\nDeutsche Vermögensberatung (DVAG) in Frankfurt am Main is the world's largest independent financial sales organization. The company is the market leader in essential areas of the private old market. More than 37,000 asset advisors advise and support around 5.2 million customers. In the field of e-mail security, DVAG is using a hosted solution from Forcepoint ™. This makes the employees highly effective against spam and viruses. The solution turns threats out of the Web, even before they reach the computers and the network of Deutsche Vermögensberatung.\r\nThe problem\r\nOpen source spam filter did not meet expectations\r\nLike many other companies, the IT department of Deutsche Vermögensberatung in Frankfurt am Main has already installed anti-virus software and spam filters. While the virus protection worked perfectly, the spam filter to protect the emails remained behind the expectations. "A number of colleagues from all departments were still complaining about a myriad of spam mails," reports Dirk Käs, IT Services Dept. Director at Deutsche Vermögensberatung. "The detection rate of the initially used open source application was insufficient and at the same time we had to realize that the effort to maintain the filters was too high." The consequence could therefore only be that the IT department looks for a professional solution in the form of a managed e-mail security service. "To look after the fine-tuning of spam filters is, in our opinion, not one of the core competencies of the IT department," explains Dirk Käs.\r\nThe solution\r\nMultiple protection against e-mail-based threats\r\nKäs and his team decided to carry out a pre-study with BlackSpider / SurfControl (in October 2007, Forcepoint SurfControl). In the first selection, the most important providers of hosted solutions came. The basis for the decision was a detailed list of criteria, in which BlackSpider met the requirements best. The framework for the pre-study: the software for 30 Lotus Notes mailboxes from IT staff had to prove their abilities over a period of three months. The test ran so successfully that after the conclusion the decision was made to implement the solution company-wide.\r\nToday the mailboxes of all employees of Deutsche Vermögensberatung are protected by Forcepoint Cloud Email Security - the current name for the services. This applies first and foremost to the approximately 800 internal staff members who use IBM Lotus Notes as a messaging system. In addition, there are more than 34,000 sales representatives. For e-mail communication, they use a Java application developed by Deutsche Vermögensberatung, which has been optimally adapted to the sales solution.\r\nAll e-mail traffic is now running through the data centers of Forcepoint. Technically, the MX record (MX = Mail Exchange) had to be converted to the Forcepoint Datacenter. Today all incoming and outgoing e-mails are checked. The data centers have load-sharing capabilities and are designed as redundant high-availability clusters located at eleven geographically diverse locations around the world. To ensure a high degree of global and local security, data protection and confidentiality, all data centers are certified according to ISO / IEC 27001. Through service level agreements, ie service agreements, Forcepoint guarantees the availability of the services and provides emergency plans for uninterrupted operation.\r\nThe latest findings from the Forcepoint Security Labs are continuously being integrated into the cloud security software. Here, more than 500 million e-mails are scanned per week and search for hidden security risks. In addition, the ThreatSeeker technology is used to analyze more than 600 million websites per week in order to identify known and new threat potentials. ThreatSeeker consists of a complex linking of mathematical algorithms, a profiling of the behavior patterns of attackers and a detailed analysis of malicious program codes. This is complemented by sophisticated data mining functions. The results of these security analyzes are automatically received in the form of real-time security updates in the hosted as well as in the security products used on-site.\r\nThe result\r\nCentralized security for all employees\r\nThe Deutsche Vermögensberatung uses two modules of the Cloud Email S","alias":"forcepoint-email-security-cloud","roi":0,"seo":{"title":"Forcepoint Email Security Cloud","keywords":"security, Forcepoint, Vermögensberatung, Deutsche, solution, spam, data, than","description":"Deutsche Vermögensberatung (DVAG) in Frankfurt am Main is the world's largest independent financial sales organization. The company is the market leader in","og:title":"Forcepoint Email Security Cloud","og:description":"Deutsche Vermögensberatung (DVAG) in Frankfurt am Main is the world's largest independent financial sales organization. The company is the market leader in"},"deal_info":"","user":{"id":3871,"title":"Deutsche Vermögensberatung","logoURL":"https://old.b4r.io/uploads/roi/company/Deutsche_Vermoegensberatung.jpeg","alias":"deutsche-vermoegensberatung","address":"","roles":[],"description":"Deutsche Vermögensberatung (DVAG) is a German company based in Frankfurt, Germany. The DVAG is operative in Germany, Austria and Switzerland.The company was founded in 1975 by Reinfried Pohl, controlled by Deutsche Vermögensberatung Holding and registered as a tied agent in the insurance sector according to the EU Insurance Mediation Directive with the Frankfurt am Main Chamber of Industry and Commerce.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.dvag.de/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Deutsche Vermögensberatung","keywords":"Deutsche, Vermögensberatung, Germany, Frankfurt, DVAG, company, Insurance, sector","description":"Deutsche Vermögensberatung (DVAG) is a German company based in Frankfurt, Germany. The DVAG is operative in Germany, Austria and Switzerland.The company was","og:title":"Deutsche Vermögensberatung","og:description":"Deutsche Vermögensberatung (DVAG) is a German company based in Frankfurt, Germany. The DVAG is operative in Germany, Austria and Switzerland.The company was","og:image":"https://old.b4r.io/uploads/roi/company/Deutsche_Vermoegensberatung.jpeg"},"eventUrl":""},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":938,"logo":false,"scheme":false,"title":"Forcepoint Email Security","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"forcepoint-email-security","companyTypes":[],"description":"Forcepoint’s Advanced Classification Engine (ACE) is at the heart of all Forcepoint solutions. ACE identifies malicious lures, exploit kits, emerging threats, botnet communications and other advanced threat activity across the Kill Chain. This enables Forcepoint Email Security to identify the early stages of an attack. It can even identify Zero-day malware threats using powerful assessment capabilities that include fully-integrated, file behavioral sandboxing. To prepare for a malicious insider threat or the potentially successful cyberattack, it’s vital that outbound communications be monitored. This is also necessary both for data theft compliance needs as well as for business requirements. Only Forcepoint provides the technology to stop data infiltration and exfiltration with capabilities such as:\r\n<ul>\r\n<li>OCR (Optical Character Recognition) scanning to identify sensitive data hidden in images such as scanned documents or screen shots.</li>\r\n<li>Encrypted file detection to recognize custom encrypted files designed to defy identification.</li>\r\n<li>Drip data loss prevention (DLP) monitoring to identify where sensitive data is leaked in small quantities over time.</li>\r\n<li>Advanced analysis of malicious files and macros typically embedded in with MS Office files.</li>\r\n</ul>\r\nIT departments are strained to maintain current systems while supporting an increasingly mobile workforce and the demands to adopt new technologies like Office 365. Forcepoint Email Security provides industry-leading capabilities that leverage systems and other information to control communications, such as preventing total access to sensitive email attachments on vulnerable mobile devices, while permitting full access on fully-secured laptops. These inbound and outbound defenses are all supported on Office 365. The rich data collections in Forcepoint Email Security are used by a number of policies to report and identify systems that may require special IT attention. They generate a report on Indicators of Compromise to identify infected systems, and more proactive reports on suspicious behavior, including potential insider threats, such as “disgruntled employee” activity. User feedback capabilities educate employees as mistakes are made, helping them to better learn and understand safe email best practices.","shortDescription":"Forcepoint Email Security identifies targeted attacks, high-risk users and insider threats, while empowering mobile workers and the safe adoption of new technologies like Office 365 and Box Enterprise","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Email Security","keywords":"Cloud, Forcepoint, Security, email, Email, attacks, threats, advanced","description":"Forcepoint’s Advanced Classification Engine (ACE) is at the heart of all Forcepoint solutions. ACE identifies malicious lures, exploit kits, emerging","og:title":"Forcepoint Email Security","og:description":"Forcepoint’s Advanced Classification Engine (ACE) is at the heart of all Forcepoint solutions. ACE identifies malicious lures, exploit kits, emerging"},"eventUrl":"","translationId":939,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":54,"title":"Germany","name":"DEU"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/deutsche-verm%C3%B6gensberatung","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":281,"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a global food provider","description":"Our goal was to keep everything as simple as possible, not complicated. Forcepoint™, in comparison with other systems, clearly, offered the best solution. \r\nWolfgang Allgäuer\r\nIT Infrastructure Manager OSI Food Solutions\r\nHave similar needs?\r\nOVERVIEW\r\nOSI Group, LLC (OSI) provides products and supplies for the food industry, worldwide. It supplies beef, pork, poultry and seafood, as well as vegetable, dough, fruit and cheese-based products. OSI is a well-known supplier for global food chains such as Subway, Starbucks, Pizza Hut and McDonalds. The company is based in Aurora, Illinois with additional offices in the United Kingdom, Germany and China. \r\nCHALLENGE\r\nEmail is a high-priority service for OSI due to its extensive use across all international locations. OSI experienced a strong uptick in the volume of threatening inbound emails containing malicious links or fraudulent content. These attacks were becoming more sophisticated and equally catastrophic. Employee carelessness with regards to email protocol became an easy way for hackers to inflict damage and steal confidential information. Additionally, the basic anti-spam solution that OSI had initially installed was strictly limited to on-premises protection and was unable provide the scalability necessary to protect a growing workforce of remote employees.\r\nOSI needed a solution to thwart phishing attacks, provide web protection and enforce usage policies that would ensure the security of its roaming users operating in any network. Reducing downtime while delivering a superior performance was prioritized to increase employee productivity and protect OSI’s reputation.\r\n“Our network continued to be compromised, which was significantly frustrating our administration. Therefore, we looked into the market for a new solution which would get rid of these issues once and for all.“\r\n— Wolfgang Allgäuer, IT Infrastructure Manager, OSI \r\nSOLUTION\r\nWhile searching for a new solution, OSI strived to avoid the expense of future on-site installations. With that in mind, Allgäuer and his colleagues concentrated their purchasing criteria exclusively on cloud-based security. They turned to long-term, trusted partner, EyeT Secure Technologies, in Ottobrunn, located near Munich.\r\nEyeT, specializing in IT security consulting, training and licensing, recommended the use of cloud-based email security from Forcepoint. TRITON AP-EMAIL Cloud (now Forcepoint Cloud Email Security) secures the communication channel most often used in the early stages of an advanced attack, empowering mobile workers and the safe adoption of new technologies without the need for additional hardware.\r\n“Deployment was quite simple. We only had to adjust the channels of communication to the Cloud and customize the MX records. That took a maximum of half a day to complete.”\r\n— Allgäuer\r\nEmpowering mobile workers was a large part of the Forcepoint project—about 60% of OSI’s endpoints are laptops, which are constantly connecting to third-party networks. Convinced by the success of TRITON AP-EMAIL Cloud, OSI implemented TRITON AP-WEB Cloud (now Forcepoint Cloud Web Security), which works effortlessly to protect roaming users operating out of any network.\r\n“If our employees connect from outside the corporate network, they now go through the web security solution seamlessly, as if they never left the office.”\r\n— Allgäuer\r\nThe OSI security team in Germany is responsible for securing all of OSI’s European offices. In this critical role, OSI security has the responsibility of creating uniform standards for protecting the organization’s reputation and assets. It must, therefore, deploy solutions that maximize Content Security across an entire infrastructure. TRITON AP-EMAIL Cloud and TRITON AP-WEB Cloud share a common architecture that unifies management and provides visibility into real-time global activity.\r\n“Our goal was to keep everything as simple as possible, not complicated. Forcepoint, in comparison with other systems, clearly offered the best solution.”\r\n— Allgäuer\r\nRESULTS\r\nBy deploying Forcepoint’s Cloud security solutions, OSI has drastically decreased the administrative burden on its IT team. The TRITON architecture ensures full unified management and coordination of inbound and outbound defenses across OSI gateways.\r\n“Our employees no longer receive emails that might contain malicious content and the solution requires little attention which makes a considerable difference to our IT administrators. We are very pleased with the Forcepoint solution.”\r\n— Allgäuer\r\nOSI was so convinced of these benefits that, to date, approximately 75% of its European locations now have a deployed security solution from Forcepoint. In addition, Allgäuer has confirmed that Forcepoint will be used as a pan-European standard for OSI moving forward. OSI Food Solutions has relied on Forcepoint security solutions since 2010. ","alias":"forcepoint-email-security-cloud-forcepoint-web-security-cloud-for-a-global-food-provider","roi":0,"seo":{"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a global food provider","keywords":"Forcepoint, Cloud, solution, security, Allgäuer, that, TRITON, Security","description":"Our goal was to keep everything as simple as possible, not complicated. Forcepoint™, in comparison with other systems, clearly, offered the best solution. ","og:title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud for a global food provider","og:description":"Our goal was to keep everything as simple as possible, not complicated. Forcepoint™, in comparison with other systems, clearly, offered the best solution. "},"deal_info":"","user":{"id":3872,"title":"OSI Group","logoURL":"https://old.b4r.io/uploads/roi/company/OSI_Group.png","alias":"osi-group","address":"","roles":[],"description":"As a premier global food provider, the OSI Group partners with the world’s leading foodservice and retail food brands to provide concept-to-table solutions that delight consumers around the globe.\r\n\r\nWith the infrastructure and financial resources of one of the largest privately held food providers, we offer you extensive capabilities to source, develop, produce and distribute custom food solutions anywhere in the world.\r\n\r\nAt the core of our company is an entrepreneurial passion and agility that brings curiosity and a can-do ethic to customer collaborations. You can turn to OSI for fresh, innovative ways to deliver next-generation food solutions — and turn your ideas into success.\r\nOSI offers you:\r\nCustom food solutions made to your precise specifications\r\nEfficient and trustworthy supply chain expertise\r\nExceptional culinary skill and global flavor knowledge\r\nInnovative research and design facilities that help bring your menu and meal ideas to life\r\nUnsurpassed food safety and quality assurance practices\r\nA commitment to sustainability throughout our extensive network","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.osigroup.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"OSI Group","keywords":"Group","description":"As a premier global food provider, the OSI Group partners with the world’s leading foodservice and retail food brands to provide concept-to-table solutions","og:title":"OSI Group","og:description":"As a premier global food provider, the OSI Group partners with the world’s leading foodservice and retail food brands to provide concept-to-table solutions","og:image":"https://old.b4r.io/uploads/roi/company/OSI_Group.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":1473,"logo":false,"scheme":false,"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"forcepoint-email-security-cloud-forcepoint-web-security-cloud","companyTypes":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email Security gives you the security you need by protecting you against multi-stage advanced threats that exploit email to penetrate your IT environment.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Email Security applies real-time behavioral sandboxing, enterprise-grade DLP and other advanced defense technologies to prevent leaks of sensitive information, empowering your workers — in the office or on the road — as you safely adopt technologies like Microsoft Office 365. In addition, detect phishing and secure email wherever users need access, even on mobile devices, through features like Phishing Education and URL Wrapping.</span>\r\nYour business and data are under constant attack. Traditional filtering and antivirus products no longer provide sufficient protection, and many web security solutions can’t address advanced threats as they occur.\r\n\r\nForcepoint Web Security provides advanced, real-time threat defense to stop advanced threats and prevent data loss. It provides robust protection through context- and content-aware defenses, coupled with integrated Cloud Access Security Broker (CASB) functionality, to provide control and visibility for cloud applications on both on-premises and roaming users. The combination of industry-leading web protection, CASB functionality and enterprise DLP delivers protection at a value no other vendor can match.","shortDescription":"Forcepoint Email Security Cloud (formerly TRITON AP-EMAIL Cloud) - Protecting from spam, phishing & ransomware attacks wherever email is accessed","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","keywords":"Security, advanced, Forcepoint, protection, threats, like, Email, Cloud","description":"Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email","og:title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","og:description":"Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email"},"eventUrl":"","translationId":1473,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":54,"title":"Germany","name":"DEU"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/osi-food-solutions","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":277,"title":"Forcepoint NGFW for a cloud company","description":"<span style=\"font-weight: bold;\">OVERVIEW</span>\r\nFounded in 1996, Cobweb Solutions offers a range of Cloud solutions including: Hosted Microsoft Exchange, Office 365, Enterprise Mobility Suite, Azure, Power BI, Dynamics CRM, Hosted Desktop, Email Archiving, Email Encryption and Cloud Backup.\r\nBased in Fareham, Hampshire and Canary Wharf, London Cobweb provides Cloud solutions to over 6,000 SMBs and over 320 partners through Vuzion the new cloud aggregator business for resellers. An early adopter of Microsoft Exchange, Cobweb is a long-established provider of cloud communications and a gold-status member of the Microsoft Partner Network.\r\n<span style=\"font-weight: bold;\">CHALLENGE</span>\r\nCobweb provides hosted services for over 150,000 mailboxes, managing firewalls for hundreds of locations with complex, overlapping IP schemas. The impact of overlapping schemas to Cobweb and its customers created an inability to deliver the service to customers.\r\n<span style=\"font-style: italic;\">“It’s a monumental task. Having easy-to-access insight into the whole system is a necessity. The company’s reputation hinges on its services being secure and constantly up and running.” — Julian Dyer, Chief Technical Officer, Cobweb</span>\r\nFurthermore, Cobweb has to ensure that the environment is up-todate in order to manage a continually evolving threat landscape. Visits to perform data center upgrades in Segensworth, Fareham, and one in Telehouse, London were proving to be time intensive, and the company needed a system it could rely on to upgrade automatically.\r\n<span style=\"font-weight: bold;\">SOLUTION</span>\r\nAccording to Dyer, the decision to migrate to Forcepoint Stonesoft Next Generation Firewall (NGFW)—part of the Forcepoint Security product offering—was not taken lightly. Cobweb wanted to move away from the expensive licensing model it had previously, and pay only for the features it needed. The deployment option of Stonesoft Softwareas-a-Service (SaaS) for virtual versions of Stonesoft NGFW is the affordable licensing model Cobweb was looking for.\r\nIn addition, centralized security management, combined with the flexibility to add security features such as a delegated local administrator and capacity, helped drive the decision to implement Stonesoft NGFW.\r\n<span style=\"font-style: italic;\">“We were able to replace overlapping encryption domains with site-to-site VPNs that take minutes to configure. We simply use the domain feature to logically separate the organization, delegating local administrative control if we choose.” — Dyer</span>\r\n<span style=\"font-weight: bold;\">RESULTS</span>\r\nImplementing Stonesoft NGFW has enabled Cobweb to increase bandwidth, add connections, and aggregate across network links safely and securely, giving multiple seamless failover options. The single management platform provides admins with quicker response times to all change requests and any incidents that may occur on the network.\r\nUltimately, with Stonesoft NGFW and centralized firewall management, Cobweb is now equipped with the tools to manage network security holistically in real-time mode, utilize shared network connections, and benefit from shared logging, reporting, auditing, and other tools. Ease-of-use makes Stonesoft NGFW an effective and efficient security solution, saving valuable time and resources for Cobweb.\r\n<span style=\"font-style: italic;\">“No more standing in cold data centers for hours configuring a firewall or performing upgrades. Forcepoint Stonesoft Next Generation Firewall does 99% of our network configuration, reducing what used to take hours to minutes. Everything is done through the management platform. I am one happy customer.” — Dyer</span>\r\nCobweb has relied on Forcepoint solutions since 2012.","alias":"forcepoint-ngfw-for-a-cloud-company","roi":0,"seo":{"title":"Forcepoint NGFW for a cloud company","keywords":"Cobweb, Stonesoft, NGFW, with, Forcepoint, network, Dyer, management","description":"OVERVIEW\rFounded in 1996, Cobweb Solutions offers a range of Cloud solutions including: Hosted Microsoft Exchange, Office 365, Enterprise Mobility Suite,","og:title":"Forcepoint NGFW for a cloud company","og:description":"OVERVIEW\rFounded in 1996, Cobweb Solutions offers a range of Cloud solutions including: Hosted Microsoft Exchange, Office 365, Enterprise Mobility Suite,"},"deal_info":"","user":{"id":3868,"title":"Cobweb","logoURL":"https://old.b4r.io/uploads/roi/company/Cobweb.jpg","alias":"cobweb","address":"","roles":[],"description":"We’ve been a cloud company since ‘the cloud’ began.\r\nOur cloud services and solutions have liberated businesses of all kinds; removing the restrictions of on-premise IT, so we can provide the best communication tools and services; \r\naffordably and maintenance-free.\r\nOur expertise\r\nWe go back a long way. Since 1996, our experience has grown and we’ve innovated new solutions to help our customers realise their ambitions. While the power of cloud continues to evolve, so do we. But the touchstones of our service remain:\r\nDiscovery\r\nDuring discovery we learn about your organisation and identify what the best solutions are to suit your needs.\r\nScalability\r\nWe help businesses of all sizes. As you grow, we can make sure your IT grows with you.\r\nWorld-Class Infrastructure\r\nPlatforms are hosted in Tier 3+ UK data centres; they’re ISO 27001 certified and have 24/7 physical security.\r\nSelf Care\r\nWe empower you with easy-to-use tools for straight forward user administration and configuration.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.cobweb.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cobweb","keywords":"Cobweb","description":"We’ve been a cloud company since ‘the cloud’ began.\rOur cloud services and solutions have liberated businesses of all kinds; removing the restrictions of","og:title":"Cobweb","og:description":"We’ve been a cloud company since ‘the cloud’ began.\rOur cloud services and solutions have liberated businesses of all kinds; removing the restrictions of","og:image":"https://old.b4r.io/uploads/roi/company/Cobweb.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":952,"logo":false,"scheme":false,"title":"Forcepoint NGFW","vendorVerified":1,"rating":"3.00","implementationsCount":2,"suppliersCount":0,"alias":"forcepoint-ngfw","companyTypes":[],"description":" \r\nAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network expenses as much as 50%, slash downtime and reduce IT risk\r\n<span style=\"font-weight: bold;\">The Forcepoint Advantage</span>\r\nBoost business productivity and cut the cost of providing safe, reliable access to applications and data, with secure SD-WAN built right in.\r\n<span style=\"font-weight: bold;\">High Availability</span>\r\nSlash network downtime and keep your business running with uniquely efficient resilience integrated at all levels: firewalls, network and management.\r\n<span style=\"font-weight: bold;\">Unrivaled Security</span>\r\nProtect data and apps throughout your data centers, edge, SD-WANs and cloud – with VPNs, IPS, anti-evasion, encrypted inspection, anti-malware, proxies and more.\r\n<span style=\"font-weight: bold;\">Massive Scalability</span>\r\nSmoothly scale your security as your physical and virtual networks grow, without rip-and-replace upgrades or patchworks of tools.\r\n<span style=\"font-weight: bold;\">Centralized Manageability</span>\r\nDeploy firewalls, VPNs, IPS, SD-WAN fast, across many different environments – and keep them running smoothly.\r\n<span style=\"font-weight: bold;\">360° Visibility</span>\r\nGain immediate insights into what is happening across your network to accelerate incident response and streamline audit best practices.\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n<span style=\"text-decoration-line: underline;\">Forcepoint NGFW Appliances</span> All Forcepoint NGFWs are built on a common software core to provide unified operation and high performance across all forms of appliances – physical, virtual, cloud. Physical – desktop, ruggedized and rack-mounted models; customizable network interfaces; firewall throughput from 1.5-120 Gbps Virtual – available for KVM and VMware ESXi Cloud – available for Amazon Web Services (AWS), Microsoft Azure (coming soon). Find out about the certifications that the Forcepoint NGFW appliances meet.\r\n<span style=\"text-decoration-line: underline;\">NSS Labs Recommended</span> In NSS Labs’ most recent report on Next Generation Firewall (NGFW) overall security effectiveness, Forcepoint NGFW achieved the highest rating of all 11 products tested. NSS Labs latest tests prove that Forcepoint NGFW offers the leading combination of enterprise security and low cost.","shortDescription":"With Forcepoint NGFW, you can deploy and manage thousands of firewalls, IPSs, VPNs and SD-WANs – in minutes, all from a single console.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint NGFW","keywords":"Forcepoint, NGFW, your, network, security, that, data, with","description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network","og:title":"Forcepoint NGFW","og:description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network"},"eventUrl":"","translationId":953,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":336,"title":"Risk or Leaks of confidential information"}]}},"categories":[{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/cobweb","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":279,"title":"Forcepoint NGFW for IT company","description":"The results with Forcepoint NGFW have been extraordinary – outstanding performance, lower costs, and, most important, considerably fewer invasions.\r\nHendrik Walter\r\nIT Director Avency\r\n\r\nOVERVIEW\r\nAvency is a B2B digital services provider based in Telgte, Germany. The company is an independent ISP with more than 20 years of experience in providing online and various datacenter services. Avency provides domain, mail, hosted security and cloud services and builds and designs online applications.\r\nAvency currently hosts more than 1,200 websites/applications and 7,000 domains for a wide range of businesses including retail, social media, manufacturing, and nance. Avency’s focus on data center security is a key differentiator from other hosting companies.\r\nCHALLENGE\r\nAs IT director for Avency, Hendrik Walter is also Forcepoint’s first Accredited Channel Engineer (ACE) for NGFW in Germany. Walter and his team made a large investment in a proprietary ISP system that makes it completely independent and autonomous. Naturally, high availability and security were large concerns, particularly with regard to intrusion prevention and data loss prevention.\r\nTo meet its ongoing security requirements, the company decided to migrate its data center from Check Point to a more suitable solution.\r\nSOLUTION\r\nAvency ultimately chose to implement Forcepoint Next Generation Firewall (NGFW) with the Forcepoint Security Management Center (SMC).\r\n“After an extensive market evaluation, we realized that Forcepoint NGFW would offer superior performance, evasion protection, and cost benefits. Forcepoint is the only solution that offers mature multitenant capabilities. Plus, it offers a lower total cost of ownership since the SMC license includes built-in features that competitors lack.”\r\n— Hendrik Walter, IT Director, Avency\r\nProtected by Forcepoint NGFW, Avency offers several levels of security-based services to its clients. The most comprehensive is Managed Firewall Services, in which customers rent their firewalls from Avency and have full access to the SMC. Through Forcepoint NGFW’s multitenancy capabilities, Avency is able to provide each client with its own secure, separate domain that is inaccessible to other clients. Customers can access the SMC to manage their own firewalls, or they can contract with Avency to provide firewall management as needed.\r\n“With the domain management features of Forcepoint NGFW and the well-engineered role systems in SMC, the solution is multitenant in every way. With the reporting tool, clients can automatically receive weekly or monthly reports about attacks, traf c, and all other events.”\r\n— Walter\r\nThrough Avency’s Datacenter Firewall Services, customers outsource their IT infrastructures to Avency but maintain access to their rules, policies, and logs. These capabilities are powered by the SMC’s subrule feature and Web Portal Server.\r\nAlso through the SMC’s Web Portal Server, Avency offers a Web Hosting service that enables customers to view live log data. Armed with this data, clients can troubleshoot connection/speed issues and stay informed of attacks targeting their Web applications.\r\nRESULTS\r\nWith the built-in exibility of Forcepoint NGFW, Avency is able to write its own signatures and correlations in order to provide a perfect t with customer use cases.\r\n“The solution’s extremely robust log and reporting functionality, coupled with best-in-class alert and escalation management, means we can react three times faster to incidents than we could before. Also, the centralized management, API functionality, and intelligent domain/user model mean that admins and customer can work simultaneously on their own rules and elements.”\r\n— Walter\r\nAs Avency built momentum for its in-house use of Forcepoint NGFW, customers began to take notice.\r\n“Our clients were curious as to how we could offer these efficient and flexible security services at such a competitive price point. This prompted us to use our experience and confidence in the products to become a Forcepoint NGFW reseller.”\r\n— Walter\r\nThrough its Forcepoint NGFW reseller services, Avency actively monitors the customer rewalls around the clock and contacts the clients when critical events occur.\r\n“Clients pay only a fixed monthly fee. Even with only a small budget, they’re able to get best-in-class firewall protection with expert management, and without having to make a high upfront investment. Our results with Forcepoint NGFW have been extraordinary – outstanding performance, lower costs, and, most important, considerably fewer invasions. Forcepoint is the right partner with which to grow our firewall security business.”\r\n— Walter\r\nAvency has relied on Forcepoint solutions since 2012. ","alias":"forcepoint-ngfw-for-it-company","roi":0,"seo":{"title":"Forcepoint NGFW for IT company","keywords":"Avency, Forcepoint, with, NGFW, Walter, that, clients, security","description":"The results with Forcepoint NGFW have been extraordinary – outstanding performance, lower costs, and, most important, considerably fewer invasions.\rHendrik","og:title":"Forcepoint NGFW for IT company","og:description":"The results with Forcepoint NGFW have been extraordinary – outstanding performance, lower costs, and, most important, considerably fewer invasions.\rHendrik"},"deal_info":"","user":{"id":3870,"title":"AVENCY","logoURL":"https://old.b4r.io/uploads/roi/company/AVENCY.png","alias":"avency","address":"","roles":[],"description":"AVENCY PROVIDES CONSULTING, PROGRAMMING AND INFORMATION TECHNOLOGY.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.avency.de/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"AVENCY","keywords":"AVENCY, INFORMATION, TECHNOLOGY, PROGRAMMING, PROVIDES, CONSULTING","description":"AVENCY PROVIDES CONSULTING, PROGRAMMING AND INFORMATION TECHNOLOGY.","og:title":"AVENCY","og:description":"AVENCY PROVIDES CONSULTING, PROGRAMMING AND INFORMATION TECHNOLOGY.","og:image":"https://old.b4r.io/uploads/roi/company/AVENCY.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":952,"logo":false,"scheme":false,"title":"Forcepoint NGFW","vendorVerified":1,"rating":"3.00","implementationsCount":2,"suppliersCount":0,"alias":"forcepoint-ngfw","companyTypes":[],"description":" \r\nAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network expenses as much as 50%, slash downtime and reduce IT risk\r\n<span style=\"font-weight: bold;\">The Forcepoint Advantage</span>\r\nBoost business productivity and cut the cost of providing safe, reliable access to applications and data, with secure SD-WAN built right in.\r\n<span style=\"font-weight: bold;\">High Availability</span>\r\nSlash network downtime and keep your business running with uniquely efficient resilience integrated at all levels: firewalls, network and management.\r\n<span style=\"font-weight: bold;\">Unrivaled Security</span>\r\nProtect data and apps throughout your data centers, edge, SD-WANs and cloud – with VPNs, IPS, anti-evasion, encrypted inspection, anti-malware, proxies and more.\r\n<span style=\"font-weight: bold;\">Massive Scalability</span>\r\nSmoothly scale your security as your physical and virtual networks grow, without rip-and-replace upgrades or patchworks of tools.\r\n<span style=\"font-weight: bold;\">Centralized Manageability</span>\r\nDeploy firewalls, VPNs, IPS, SD-WAN fast, across many different environments – and keep them running smoothly.\r\n<span style=\"font-weight: bold;\">360° Visibility</span>\r\nGain immediate insights into what is happening across your network to accelerate incident response and streamline audit best practices.\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n<span style=\"text-decoration-line: underline;\">Forcepoint NGFW Appliances</span> All Forcepoint NGFWs are built on a common software core to provide unified operation and high performance across all forms of appliances – physical, virtual, cloud. Physical – desktop, ruggedized and rack-mounted models; customizable network interfaces; firewall throughput from 1.5-120 Gbps Virtual – available for KVM and VMware ESXi Cloud – available for Amazon Web Services (AWS), Microsoft Azure (coming soon). Find out about the certifications that the Forcepoint NGFW appliances meet.\r\n<span style=\"text-decoration-line: underline;\">NSS Labs Recommended</span> In NSS Labs’ most recent report on Next Generation Firewall (NGFW) overall security effectiveness, Forcepoint NGFW achieved the highest rating of all 11 products tested. NSS Labs latest tests prove that Forcepoint NGFW offers the leading combination of enterprise security and low cost.","shortDescription":"With Forcepoint NGFW, you can deploy and manage thousands of firewalls, IPSs, VPNs and SD-WANs – in minutes, all from a single console.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint NGFW","keywords":"Forcepoint, NGFW, your, network, security, that, data, with","description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network","og:title":"Forcepoint NGFW","og:description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network"},"eventUrl":"","translationId":953,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":54,"title":"Germany","name":"DEU"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":281,"title":"No IT security guidelines"},{"id":336,"title":"Risk or Leaks of confidential information"}]}},"categories":[{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/avency","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":275,"title":"Forcepoint Trusted Thin Client for Air Force Central Command","description":"Overview\r\nThe Air Force Central Command (AFCENT) is responsible for supporting all air operations conducted in Southwest Asia and providing enhanced capabilities to the warfighters. In 2009, the 350th Electronic Systems Group (ESG) engaged in a project to establish a new combined air and space operations center, or CAOC. Prior to the new facility, U.S. and coalition forces utilized a "temporary" warehouse-like facility for six years.\r\nChallenge\r\nThe new CAOC had to provide more robust systems to accommodate users and improve interoperability. They also had to make the best possible use of physical space and reduce power consumption. Most importantly, the switch from the old facility to the new one had to be seamless so as not to interrupt mission operations. The CAOC was controlling air operations in two live theaters at transition time.\r\nThis project, from planning to implementation, was completed in less than two years. From the initial demonstrations and proof of concept in 2007 to receiving an Authority to Connect for Secret and Below Interoperability (SABI) in April 2009 to full-scale deployment in the summer of 2009, the project was efficiently and effectively executed. This desktop consolidation project presented other challenges for all parties because AFCENT’s mission requires 24x7 operations with 99.99 percent availability.\r\nSolution\r\nTo accomplish this large-scale effort, AFCENT selected Forcepoint™ Trusted Thin Client™ as the multilevel security component and technologies from Citrix®, NetApp®, and Avocent® to round out the solution.\r\nIn order to recover needed work space, decrease power consumption, and modernize their computing environment and network infrastructure, AFCENT’s goal was to replace 95 percent of all desktop computers with thin clients. By implementing the Trusted Thin Client software, multiple desktop systems at each user’s workstation were replaced by a single Hewlett Packard™ (HP) thin client device. Users can now view multiple networks, even at different classification levels, from a single monitor.\r\nToday, 1,648 Trusted Thin Client seats have been deployed. There are multiple Distribution Consoles on the back end to support users, load balancing, and failover. The Trusted Thin Client deployment began by providing network separation for four classified networks and is now providing secure access to six different networks. Over 120 Command and Control (C2) applications are supported with this implementation. The U.S. AOC has deployed 300 thin clients that provide access to five networks supporting C2 applications. Users at both locations can access all required networks within acceptable levels of network latency. This access also allows users to collaborate effectively with coalition forces working at differing security classifications.\r\nResults\r\nThe benefits that the Trusted Thin Client solution provides are substantial. User productivity has increased because users no longer have to switch from multiple hardware systems to access the information necessary to perform their jobs. Workspace is not only less cluttered but there is more physical workspace available. Hardware and software administration is much more efficient because most of the computing power is now centralized on the back end, where it is easily accessed by administrators and IT staff. They no longer have to worry about maintaining numerous desktop systems. Power consumption, wiring, and air conditioning have also been greatly reduced. AFCENT’s network infrastructure and overall power consumption has decreased by 22 percent, significantly reducing the Air Force’s annual cost burden.\r\nAs an added benefit to equipment reduction and modernization of software and network infrastructure, user’s audio-video display capacity has been increased by 60 percent. This capacity increase allows for the use of multiple large monitors/displays per thin client device and the ability to view simultaneous live video feeds and access mission-critical applications that require large viewable areas.\r\nSummary\r\nThe implementation of Forcepoint at the CAOC resulted in significant increases in the efficiency with which authorized personnel are able to access mission-critical information for analysis, operational capabilities, resources, readiness and sustainability. All of these areas are critical in AFCENT’s mission to control U.S. air operations in Southwest Asia as they fight the Global War on Terrorism. The 350th ESG believes that the CAOC establishes a standard for future command and control capability in other AOCs worldwide.1\r\nThe CAOC and the CAOC Annex, which is stateside, continue to add additional seats in support of a growing user base. In addition, the CAOC Annex has upgraded to the latest TTC software, allowing them to reap even greater efficiencies that will only increase as AFCENT continues to deploy TTC to the CAOC and the rest of their users.\r\n(1) The Integrator U.S. Air Force, 15 October 2009, Vol. 5, No. 40","alias":"forcepoint-trusted-thin-client-for-air-force-central-command","roi":0,"seo":{"title":"Forcepoint Trusted Thin Client for Air Force Central Command","keywords":"CAOC, access, operations, Thin, Trusted, from, Client, users","description":"Overview\rThe Air Force Central Command (AFCENT) is responsible for supporting all air operations conducted in Southwest Asia and providing enhanced","og:title":"Forcepoint Trusted Thin Client for Air Force Central Command","og:description":"Overview\rThe Air Force Central Command (AFCENT) is responsible for supporting all air operations conducted in Southwest Asia and providing enhanced"},"deal_info":"","user":{"id":3867,"title":"Air Forces Central Command United States","logoURL":"https://old.b4r.io/uploads/roi/company/Air_Forces_Central_Command_United_States.png","alias":"air-forces-central-command-united-states","address":"","roles":[],"description":"United States Air Forces Central Command is the air component of United States Central Command, a regional unified command. USAFCENT is responsible for air operations, either unilaterally or in concert with coalition partners, and developing contingency plans in support of national objectives for USCENTCOM's 20-nation area of responsibility in Southwest Asia. Additionally, USAFCENT manages an extensive supply and equipment prepositioning program at several Area of Responsibility sites.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.afcent.af.mil/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Air Forces Central Command United States","keywords":"States, United, Command, Forces, Central","description":"United States Air Forces Central Command is the air component of United States Central Command, a regional unified command. USAFCENT is responsible for air","og:title":"Air Forces Central Command United States","og:description":"United States Air Forces Central Command is the air component of United States Central Command, a regional unified command. USAFCENT is responsible for air","og:image":"https://old.b4r.io/uploads/roi/company/Air_Forces_Central_Command_United_States.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":948,"logo":false,"scheme":false,"title":"Forcepoint Trusted Thin Client","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"forcepoint-trusted-thin-client","companyTypes":[],"description":"End users working with multiple secure systems have traditionally needed multiple desktop computers on a single desk to accomplish their missions. To remain effective, they need a simplified approach with a high level of security that performs efficiently.\r\nForcepoint Trusted Thin Client provides users with secure simultaneous access to information on any number of networks from a single endpoint device. Designed for enterprise deployments, Forcepoint Trusted Thin Client provides administrators with centralized management and monitoring, scalability to easily add networks and clients, and the flexibility to enable users in offices, in-theater and in the field.\r\nThe Forcepoint Advantage\r\nAccreditation\r\nForcepoint Trusted Thin Client is an approved access cross domain solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross Domain Baseline.\r\nTop Secret/SCI and Below Interoperability (TSABI)\r\nSecret and Below Interoperability (SABI)\r\nAssessed and Authorized by authorities according to NIST guidelines in the US and Five-Eyes nations.\r\nAchieves secure simultaneous access to multiple networks/clouds from a single endpoint\r\nProvides a read-only endpoint preventing data from being stored locally. This prevents data from being transferred or copied to an external device\r\nIntegrates with common virtualization and consolidation technologies such as Citrix®, Microsoft®, and VMware®\r\nStreamlines administration through robust enterprise management capabilities\r\nAchieves significant ROI through lower ownership costs (infrastructure, office space, power consumption and administration)\r\nProvides secure multi-network access over untrusted networks with the Forcepoint Trusted Thin Client Remote deployment option\r\nSupports DoD and IC VDI initiatives such as DoD Joint Information Environment (JIE)\r\nDeployment Options\r\nBenefits\r\nMaximized security, usability and adaptability\r\nIncreased user productivity\r\nSignificant ROI through reductions in infrastructure, hardware, office space, power consumption, and administration\r\nStreamlined administration for the enterprise\r\nFlexibility to support environments with 2 networks or more than 20 networks","shortDescription":"Forcepoint Trusted Thin Client\r\nEnable Secure Simultaneous Access To Data On Multiple Networks","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Trusted Thin Client","keywords":"with, Forcepoint, networks, Trusted, Thin, Client, administration, secure","description":"End users working with multiple secure systems have traditionally needed multiple desktop computers on a single desk to accomplish their missions. To remain","og:title":"Forcepoint Trusted Thin Client","og:description":"End users working with multiple secure systems have traditionally needed multiple desktop computers on a single desk to accomplish their missions. To remain"},"eventUrl":"","translationId":949,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":531,"title":"Thin client","alias":"thin-client","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/thin-client.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":220,"title":"United States","name":"USA"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]}},"categories":[{"id":531,"title":"Thin client","alias":"thin-client","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/thin-client.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/air-force-central-command-afcent","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":274,"title":"Forcepoint Web Security for Healthcare","description":"Overview\r\nAdventist Health is a not-for-profit healthcare organization which operates facilities throughout the western U.S. states of California, Hawaii, Oregon, and Washington. It is run by the Seventh-day Adventist Church. Its heritage dates back to 1866 when the first Seventh-day Adventist health care facility opened in Battle Creek, Michigan. Currently, Adventist Health contains 20 hospitals, more than 275 clinics, 15 home care agencies and a workforce of 31,000 employees, physicians, and volunteers.\r\nChallenge\r\nFor Bruce Chitester, Security Analyst at Adventist Health, the top security dilemma is how to safely embrace new technology without putting the hospital chain’s patient database at risk. Although the healthcare sector faces some very specific regulatory and legal requirements, as well as medical technology obstacles to maintaining its data integrity, neither Adventist Health nor the healthcare sector at large are alone in having to meet this challenge. The reality is that ALL organizations face the difficulty and necessity of embracing new technology without putting their entire enterprise at risk. But as Adventist Health shows us, with the right Data Theft Prevention processes and tools in place, it can be done. The more powerful and sophisticated digital technology (and digitally-connected medical technology) becomes, the easier it is to use and save lives. Unfortunately, technological advances also make it easier for cybercriminals to access and exploit critical data. This mixed blessing of technological advancement and more sophisticated cybercrime is the new reality going forward.\r\nUnderstandably, this new reality poses formidable challenges to IT security teams. From the perspective of saving lives, technological advance is obviously a good thing. The downside of that dynamic is the rising number and complexities of threat vectors. It is not a situation where the cyber defense responses become simpler over time, but rather, just the opposite. The growth curve of the cyber threat landscape is both steep and evolutionary; thus the growth curve of cyber defense solutions that effectively address those threats must be so as well.\r\n5 DATA THEFT CHALLENGES\r\nStaying current with privacy regulations (HIPAA and Omnibus). Strict privacy laws require Adventist Health to meet a higher standard of client-privacy than most organizations outside the healthcare sector will need to meet. Healthcare providers have a federally-imposed legal obligation to protect the privacy of patient data in addition to standard consumer data, such as Social Security and credit card numbers. This vulnerability is much worse today than only a few years ago because, as Chitester observes, “Medical records are all electronic now.”\r\nStaying current and secure with new communication technology. The explosion of communication tools such as iPads, smartphones, handhelds and even wearable connected devices such as smartwatches and other innovations have greatly increased the risks of a data breach occurring. Those risks become even greater as new communication gadgets come into use among medical personnel. Elevated threat levels can result from something as common as doctors using iPads to communicate medical information, test results or issuing prescriptions, for example.\r\nStaying current and secure with new medical technology. As with wearable connected and other smart devices, medical gadgets also present an elevated risk factor to Adventist Health and other organizations in the healthcare sector.\r\n“One of the things I see very much as a threat factor is medical devices. I.V. pumps now have built-in wireless capabilities and a stripped down Linux or Windows OS. It is the same with heart monitors, and other medical devices. But the manufacturers are not particularly security-aware. The devices are built with connectivity, so they can connect with a pharmacy, but they lack any kind of firmware updates or security hole checks, and that is going to be a big (risk) factor.”\r\n— Bruce Chitester, Security Analyst, Adventist Health\r\nThose gadgets are just a small portion of what the medical industry has to deal with. Insulin pumps, I.V. pumps, and even wireless pacemakers and other medical care devices are all subject exploitation by cybercriminals. Chitester predicts that there will be a huge influx of attacks using devices like these as backdoor access to networks. Device vendors will have to scramble to put security measures in place.\r\nProtecting patient data. In addition to standard consumer data, such as Social Security and credit card numbers, healthcare providers must take a holistic approach to protecting their clients’ medical records as well. This is not only due to more stringent HIPAA and Omnibus requirements, but also because medical records are a prime target of data theft activity: A stolen driver’s license is worth about $120 on the street. Stolen medical records, however, are worth almost 10 times that. There is no mystery why medical records are a major target of cybercriminals.\r\n“That is why we have to build a Fort Knox around them.”\r\n— Bruce Chitester\r\nHe is absolutely correct.\r\nThe need for comprehensive, end-to-end identification of every threat vector. This need applies to all industries in general. In addition to medical records, Chitester notes that another serious challenge is with financial data. New federal regulations require separate networks for certain types of financial transactions, such as credit cards. To address this, Adventist Health uses multiple LATA (local access and transport area) networks:\r\n“All of (these vectors) combine to make security a very high priority and a cutting edge environment to work in, where we have to protect patient data, very specifically, and ... We have to protect privacy of patient data in addition to standard consumer data, such as Social Security and credit card numbers. When someone swipes a credit card, the transaction is carried by a secure tunnel to the credit card processor.”\r\n— Bruce Chitester\r\nAdventist Health’s data security challenge is an ongoing one, but one that is also instructive to all enterprises. As noted above, just as the threat level curve of the digital environment is steep and evolving, so are the costs involved with successful data breaches.\r\nThe recent and very public data thefts involving Home Depot, Target Stores, Nordstrom’s and Michael’s were just a few of the casualties in a year of unprecedented levels of cybercrime. Each of those breached businesses lost multiple millions of dollars in sales and market share.\r\nMuch of those losses can be directly traced to the damaged reputations caused by the breaches themselves.\r\nGoing forward, the frequency and costs of cybercrime are only going one direction, and that direction is up. Your organization’s approach to cybersecurity needs to be able to successfully meet these challenges each and every day and every minute of every day. Data Theft Prevention is that approach.\r\nSolution\r\nBruce Chitester has moved Adventist Health into the SEIM (security event and incident management) environment with strategic partners that specifically include Forcepoint™, and going forward, will involve consolidation of services and solutions as their defense strategies evolve. A foundational part of Bruce’s threat defense strategy has been to build a comprehensive infrastructure that mitigates threats:\r\n“If an end-user pulls an obfuscated Java script down via a browser because they randomly hit the wrong website and the script exploits the browser to create a back door into the network, Forcepoint — Adventist’s threat management system — catches the script in a sandbox.”\r\n— Bruce Chitester\r\nForcepoint now handles threat intelligence for Adventist Health’s web and blocks dangerous sites. Chitester has put triggers around these types of events, so that if a script or another type of threat is identified and trapped, Forcepoint issues an alert.\r\nThis appears on a portal, identifying the threat, the user and the forensics. Forcepoint will also handle this through the Cloud, heading off hundreds of threats of different types, such as obfuscated Java scripts, bot networks and unauthorized data postings. Chitester estimates that they catch at least 5 to 10 a week:\r\n“With Forcepoint, everything that Adventist sees, other Forcepoint customers also see and vice versa. (The Forcepoint network has close to 1 billion endpoints.) It is updated more frequently than other, similar networked offerings…and the amount of data that we see is enormous. … The number of threats that have been identified is enormous. In this way, the database of known threats is continually expanded. It is getting to the point that the number of threats should diminish, because the database we are checking them against continues to get larger.”\r\n— Bruce Chitester\r\nWith the Drop Box services, Forcepoint monitors usage and issues alerts if someone is using an unauthorized service provider. The service issues reports listing users who are not in compliance. Chitester talks about Forcepoint as a key security partner:\r\n“The protection is very good. End users are not happy when they get blocked from going anywhere, but the fact is they are getting blocked. They are not able to visit a site that is on a bot network, or a site that has been hacked with obfuscation code. We very much enjoy that protection.”\r\n— Bruce Chitester\r\nResults\r\nForcepoint continues to play a vital role in Adventist Health’s security plans when it comes to sandboxing potential threats:\r\n“If the device goes off our net, then it is a problem. We take this very seriously. ... These devices have to go through the same protocols as anything else in our environment to get off the net and onto the public network. If a device is given access to the public network from the private Adventist Health network, then it has to pass through the Forcepoint devices, and we know for sure where it is phoning home to and that nothing is coming back in on it.”\r\n— Bruce Chitester\r\nBruce also appreciates the efficiencies and Data Theft Prevention policies that Forcepoint delivers:\r\n“The cloud detonation is the right way to do it. Other security providers detonate locally, and they do not always have enough time to do the detonations. Forcepoint has enough time. Adventist has to pay the subscription costs, but it does not have to purchase larger servers or more machines to provide adequate resources for its security software to operate optimally. Forcepoint handles all of that, and Adventist Health likes that business model. Forcepoint is getting closer to ‘end-to-end’ than I have seen anybody do it.”\r\n— Bruce Chitester\r\nIn today’s world of advanced and targeted cyberattacks, the need for comprehensive, end-to-end identification of every threat vector must be met fully. There is no other alternative. Furthermore, HIPAA and Omnibus privacy rules require an added level of privacy for medical data. At the same time, the menu of medical devices with connectivity is constantly expanding. As Bruce Chitester accurately points out, the threat of a data breach via unprotected devices is formidable:\r\n“Your reputation is your business. A confidentiality breach means lost business.”\r\n— Bruce Chitester\r\nWhen it comes to innovation, organizations of all sizes and types have no choice in the matter: They must be able to continuously adopt new technology and adapt to the expansive communications revolution in order to compete in today’s market. Unfortunately, the evolving digital technological revolution puts powerful and discrete connectivity in the hands of everyone, everywhere, including threat actors. That means an expanded threat surface for cybercriminals and greater challenges for cybersecurity professionals. The risk of exploitation by evermore sophisticated cyber threats rises with the ascent of the digital connectivity curve.\r\nFor the foreseeable future, the dilemma of safely adopting new technology while at the same time protecting your data against rising levels of cyber threats is here to stay. As digital technology continues to rapidly evolve and cyberattack vectors multiply across all digital channels, the task of organizations being able to grow and adopt new technology with safety and confidence remains a challenge. However, these challenges can be met with the right holistic security posture that Data Theft Prevention provides so your company can enter a new era of cybersecurity.\r\nAdventist Health has relied on Forcepoint security solutions since 2006.","alias":"forcepoint-web-security-for-healthcare","roi":0,"seo":{"title":"Forcepoint Web Security for Healthcare","keywords":"that, data, Adventist, Chitester, medical, Forcepoint, with, threat","description":"Overview\rAdventist Health is a not-for-profit healthcare organization which operates facilities throughout the western U.S. states of California, Hawaii,","og:title":"Forcepoint Web Security for Healthcare","og:description":"Overview\rAdventist Health is a not-for-profit healthcare organization which operates facilities throughout the western U.S. states of California, Hawaii,"},"deal_info":"","user":{"id":3866,"title":"Adventist Health","logoURL":"https://old.b4r.io/uploads/roi/company/Adventist_Health.png","alias":"adventist-health","address":"","roles":[],"description":"Adventist Health is a faith-based, nonprofit integrated health system headquartered in Roseville, California. We serve more than 75 communities including small towns, suburbs and inner cities across the western states. Our workforce of 32,900 includes more than 23,600 employees; nearly 5,000 medical staff physicians; and 4,350 volunteers. Founded on Seventh-day Adventist heritage and values, Adventist Health provides compassionate care in 20 hospitals, more than 280 clinics (hospital-based, rural health and physician clinics), 14 home care agencies, seven hospice agencies and four joint-venture retirement centers. In addition, the Adventist Health Plan serves patients in Kings County.\r\nOur Vision\r\n\r\nCompelled by our mission to live God’s love by inspiring health, wholeness and hope, we will transform the health experience of our communities by improving physical, mental and spiritual health, enhancing interactions, and making care more accessible and affordable. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.adventisthealth.org/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Adventist Health","keywords":"Health, Adventist","description":"Adventist Health is a faith-based, nonprofit integrated health system headquartered in Roseville, California. We serve more than 75 communities including small","og:title":"Adventist Health","og:description":"Adventist Health is a faith-based, nonprofit integrated health system headquartered in Roseville, California. We serve more than 75 communities including small","og:image":"https://old.b4r.io/uploads/roi/company/Adventist_Health.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":947,"logo":false,"scheme":false,"title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"forcepoint-web-security-cloud-formerly-triton-ap-web-cloud","companyTypes":[],"description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\r\nAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while stealing your sensitive data. Insider threats—such as employee theft and internally accessed malware—are just as damaging as external threats.\r\nForcepoint Web Security Cloud provides industry-leading reporting, sandboxing and DLP capabilities, and stops more advanced, non-signature threats to your data than any other solution – including Blue Coat, Cisco, and Zscaler. Forcepoint Web Security Cloud is built on a unified platform that enables Forcepoint products to work together, and protects data everywhere– in the Cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient security.\r\nADOPT INDUSTRY-LEADING PROTECTION AGAINST ADVANCED THREATS AND DATA THEFT\r\nAdvances in cloud technology have given organizations increased flexibility and rapid collaboration capabilities. In order to reap these benefits, your organization must streamline security with an intelligent, cloud-first solution that protects in real-time and that will enable your long term mission and protect your reputation.\r\nForcepoint Web Security Cloud provides in-line protection against advanced threats that use sophisticated detection evasion techniques to steal sensitive data, as well as insider threats such as employee theft and malware. Forcepoint Web Security Cloud is a proven leader in SaaS web content security, stopping more advanced, non-signature threats to your data than any other solution.\r\nEASY TO USE DASHBOARDS\r\nSee threat levels, productivity and bandwidth in an instant\r\nDrill-down for quick analysis\r\nEasy to use dashboards\r\nREPORTING\r\nOver 80 predefined reports\r\nCreate infinite custom reports by drag and drop of 70 attributes\r\nOptional extended reporting history for up to 18 months to support Regulatory & Compliance requirements\r\nReporting\r\nINTEGRATED CLOUD SANDBOX\r\nReal-time code analysis for Advanced Threat identification.\r\nSafe execution of suspicious code away from your network resources\r\nINTEGRATED THREAT INTELLIGENCE\r\nProvides input from over 155 countries into Forcepoint Cloud Web Security\r\nAverage update rate of 3.2 pieces of threat intelligence every second","shortDescription":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)\r\nDelivering premier cloud security to protect users and data everywhere","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","keywords":"Cloud, your, Forcepoint, threats, Security, data, that, solution","description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\rAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while","og:title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","og:description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\rAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while"},"eventUrl":"","translationId":947,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":220,"title":"United States","name":"USA"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":281,"title":"No IT security guidelines"},{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/adventist-health","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":276,"title":"SureView Analytics for Arizona Financial Crimes Task Force","description":"The Arizona Financial Crimes Task Force (AZFCTF) was established to investigate and interdict the money laundering activities of complex national and international organized crime and to mitigate the violence associated with the smuggling activities that fund these organizations. In January 2014, the AZFCTF funded the creation of the Transaction Record Analysis Center (TRAC), a centralized searchable database of the financial transactions of global money services business (MSBs). TRAC now serves as the intelligence component for AZFCTF and is staffed by analyst and law enforcement professionals recognized as experts in money laundering activity. The TRAC provides data, meaningful data analysis, collaboration and training to investigators, analysts and prosecutors nationwide in their efforts to disrupt criminal organizations and dismantle their operations.\r\nChallenge\r\nTransnational criminals launder billions of dollars in illegal proceeds every year. In the Southwest Border-affected areas, over half-a-million humans are smuggled and prescription drugs, illegal drugs and intellectual property are stolen. Law enforcement agencies have been challenged to process and analyze an overwhelming amount of data that pertains to these operations. Parsing and finding the incriminating data in a vast sea of constantly expanding data sources became extremely difficult as the sheer volume of transaction data far exceeded the capability and volume capacity of typical database software. Due to the limitations and restrictions of the technology, transaction volume became the enemy, and it became harder and harder to detect money laundering patterns across the financial industry. A simple query involving multiple names, addresses or telephone numbers, for example, took hours or days to complete. Enforcement agencies were forced to invest a great deal of time searching through databases, sometimes containing millions of records each, for the suspicious activity they knew lurked among the data. In this timeframe, it was difficult to conceptualize money laundering patterns while remaining a few steps behind the criminals themselves.\r\nSolution\r\nAZFCTF needed a solution that could manage the huge volumes of data flowing into the TRAC, as well as deliver an easy-to-use analytical platform to law enforcement and regulatory users. Today, Forcepoint™ SureView® Analytics is providing AZFCTF with a turnkey analytical solution that is customized for the varied user community consisting of federal agents, analysts, state and local detectives as well as money services business regulators. For each of these stakeholders, SureView Analytics delivers complete management of the environment from data ingestion to delivery of actionable analytics. The TRAC portal offers a dashboard of easy-to-use analysis tools, training webinars and auditing functions. Through a secure private cloud, the solution avoids overhead expenses of on-site hosting, and offers scalability as needed. Queries can be returned in a matter of seconds instead of hours, which turns the increasing volume of data transactions from an enemy into an ally.\r\nResults\r\nThe SureView Analytics solution has been adopted by over 2,000 users and hosts over 100 Memorandums of Understanding (MOUs), making the TRAC a unique and unprecedented financial fraud investigative tool. Its value to the Southwest Border states and beyond is recognized daily by the number of law enforcement and regulatory agencies requesting MOUs from across the nation. The query result speed attained by today’s experienced TRAC user enables queries to be run in a timely manner, resulting in the recognition of critical activity patterns and the dismantling of criminal organizations. Additionally, the MSB data in the TRAC system is based on geographic organized crime smuggling corridors and contains more relevant data than what would be obtained in a traditional subpoena process. The data access enables investigators to geospatially visualize criminal corridors of illegal transactions, saving thousands of man hours and lengthy delays in the usual subpoena process. The TRAC system, by virtue of its MOU process and access to expert training, necessitates direct communication by law enforcement experts across the U.S. This unprecedented networking among anti-money laundering professionals creates effective multi-agency teams to attack money laundering patterns and methodologies.","alias":"sureview-analytics-for-arizona-financial-crimes-task-force","roi":0,"seo":{"title":"SureView Analytics for Arizona Financial Crimes Task Force","keywords":"data, TRAC, money, laundering, AZFCTF, enforcement, patterns, that","description":"The Arizona Financial Crimes Task Force (AZFCTF) was established to investigate and interdict the money laundering activities of complex national and","og:title":"SureView Analytics for Arizona Financial Crimes Task Force","og:description":"The Arizona Financial Crimes Task Force (AZFCTF) was established to investigate and interdict the money laundering activities of complex national and"},"deal_info":"","user":{},"supplier":{},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":950,"logo":false,"scheme":false,"title":"Forcepoint SureView Analytics","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"forcepoint-sureview-analytics","companyTypes":[],"description":"Security analysts in law enforcement, military and commercial settings spend too much time collecting and collating data across different public and private sources. Their time would be much better spent analyzing the real threats so they can respond rapidly and effectively .\r\nSureView Analytics delivers a dramatically different experience: By employing virtual data warehousing, federated search, powerful algorithms for automated information discovery and intuitive workflow tools, security analysts gain the ability to respond to cyber threats, fraud, other criminal activity and even terrorism as they’re happening — not hours, days or months later.\r\nThe Forcepoint Advantage\r\nVirtual Data Warehousing\r\nTraditional approaches to security analysis require organizations to set up data warehouses and ingest mass data — a process that taxes IT resources, triggers onerous compliance requirements, raises sticky questions of data ownership and drives up your total cost of ownership (TCO). By contrast, we avoid those pitfalls by using virtual data warehousing technology that accesses data at high speed without ever needing to copy or move it.\r\nThe result is a faster, more economical solution that is quicker and easier to set up, and that avoids putting long-term burdens on your IT and compliance resources.\r\nFederated Search\r\nThe federated search capabilities of SureView Analytics allow your analysts to quickly develop a centralized picture of threats by giving your team instant access to live data across websites, emails, social media, documents and internal or external databases (e.g., of crimes, parolees, or FBI-shared data). Besides being highly flexible and scalable, this technology eliminates the traditional need to wait on batch processes, meaning that analysis is based on near-real-time information rather than yesterday’s data. It also allows organizations to take advantage of investments they have already made on enterprise systems for a lower Total Cost of Ownership.\r\nAnalytical Workflows and Tools\r\nSureView Analytics has been designed from the ground up to be easy to use and to enable rapid collaboration across teams. Its sophisticated data visualization tools enable your analysts to interactively expose patterns, trends and anomalies hiding in large amounts of complex data:\r\nLink Analysis — Easily uncover clusters of information or key individuals and their relationship to suspicious events\r\nTemporal Analysis — Quickly recognize a change in behavioral patterns or unusual conduct needing further investigation\r\nGeospatial Analysis — Unearth an unknown relationship or the importance of information based on geographic correlations\r\nStatistical Analysis — Identify unexpected peaks in activities or values\r\nSureView Analytics also includes faceted and tactical searching for selective information discovery using visual search filters, as well as alerting functionality and an integrated intelligence database that supports secure information sharing.\r\n Now, our most important assets, people, have more time to focus on critical success tasks and objectives. The agency is now more agile and able to add data flows on demand. \r\nConfidential Government Customer\r\nForrester Total Economic Impact Study","shortDescription":"SureView Analytics\r\nRapidly Search and Analyze Large Amounts of Data to Detect Cyber and Real-World Threats","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint SureView Analytics","keywords":"data, information, that, Analytics, your, SureView, analysts, Analysis","description":"Security analysts in law enforcement, military and commercial settings spend too much time collecting and collating data across different public and private","og:title":"Forcepoint SureView Analytics","og:description":"Security analysts in law enforcement, military and commercial settings spend too much time collecting and collating data across different public and private"},"eventUrl":"","translationId":951,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"},{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":220,"title":"United States","name":"USA"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":177,"title":"Decentralized IT systems"},{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":336,"title":"Risk or Leaks of confidential information"}]}},"categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"},{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/arizona-financial-crimes-task-force","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":73,"title":"TRITON AP-DATA для торговой розничной сети","description":"ООО «Фудмережа», являясь оператором розничных сетей «Велика Кишеня», «ВК Селект», «ВК Експрес» и «Велмарт», располагает большим количеством коммерческой и торговой информацией, персональными данными о своих клиентах, и осознает всю ответственность, связанную с обеспечением достойного уровня безопасности таких активов.\r\nРешение о необходимости внедрения системы предотвращения утечки информации было принято с целью обезопасить компанию от рисков, связанных с торговыми операциями, потерей репутации, поведением пользователей.\r\nДля работы над проектом была привлечена компания-интегратор систем информационной безопасности ISSP, обладающая весомым опытом работы с продуктами Websense. Во время тестирования решение Websense AP-DATA легко интегрировалось в инфраструктуру компании, и сразу же позволяло наблюдать преимущества своего использования в организации.\r\nВнедрение системы прошло легко и без осложнений, никак не повлияв на непрерывность ведения бизнеса компании. Все этапы проекта: анализ инфраструктуры организации, согласование архитектуры, подготовка технической документации, внедрение системы предотвращения утечек информации и переход в промышленную эксплуатацию, - были завершены в установленные сроки.\r\n «Мы первые на рынке розничной торговли Украины внедрили решение Websense AP-DATA и после полуторалетнего использования системы можем с уверенностью отметить, что удовлетворены её работой. Использование системы дает нам возможность видеть полную картину того, как используется информация в организации, и основываясь на этом настраивать правильные политики к чувствительным данным», - Москалюк Андрей Антонович, начальник отдела информационной безопасности ООО «Фудмережа».","alias":"triton-ap-data-dlja-torgovoi-roznichnoi-seti","roi":0,"seo":{"title":"TRITON AP-DATA для торговой розничной сети","keywords":"системы, Websense, AP-DATA, безопасности, организации, предотвращения, информации, решение","description":"ООО «Фудмережа», являясь оператором розничных сетей «Велика Кишеня», «ВК Селект», «ВК Експрес» и «Велмарт», располагает большим количеством коммерческой и","og:title":"TRITON AP-DATA для торговой розничной сети","og:description":"ООО «Фудмережа», являясь оператором розничных сетей «Велика Кишеня», «ВК Селект», «ВК Експрес» и «Велмарт», располагает большим количеством коммерческой и"},"deal_info":"","user":{"id":462,"title":"Kviza-Trade","logoURL":"https://old.b4r.io/uploads/roi/company/Kviza-Treid____Velika_Kishenja___.png","alias":"kviza-treid","address":"Железнодорожное шоссе, 57, г. Киев, 01103","roles":[],"description":"Квиза-Трейд («Велика Кишеня») — одна из крупнейших сетей розничной торговли Украины с четырнадцатилетней историей успешной работы. \r\nНа сегодняшний день в 16 городах Украины открыт 51 магазин сети — 40 супермаркетов «Велика Кишеня», 1 магазин премиум-формата «ВК SELECT» и 9 «магазинов у дома» «ВК Експрес».\r\nШесть лет подряд «Велика Кишеня» становится лучшей сетью розничной торговли по результатам фестиваля-конкурса «Выбор года». Доверие покупателей, выбирающих «Велику Кишеню», — это самая большая награда для нас и огромный стимул развиваться дальше.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://kishenya.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Kviza-Trade","keywords":"Кишеня, Велика, Квиза-Трейд, магазин, Украины, торговли, розничной, результатам","description":"Квиза-Трейд («Велика Кишеня») — одна из крупнейших сетей розничной торговли Украины с четырнадцатилетней историей успешной работы. \rНа сегодняшний день в 16","og:title":"Kviza-Trade","og:description":"Квиза-Трейд («Велика Кишеня») — одна из крупнейших сетей розничной торговли Украины с четырнадцатилетней историей успешной работы. \rНа сегодняшний день в 16","og:image":"https://old.b4r.io/uploads/roi/company/Kviza-Treid____Velika_Kishenja___.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":39,"logo":false,"scheme":false,"title":"TRITON AP-DATA","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"triton-ap-data","companyTypes":[],"description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\r\n<ul><li>Предотвращение потери данных</li><li>Безопасность бизнес-процесса</li><li>Управление приложений и угроз</li></ul>\r\nData Discover - обнаружение конфиденциальной информации, хранимой в сети<br />\r\n<ul><li>Обнаружение мест хранения конфиденциальных данных</li><li>Измерение и уменьшение риска потери данных</li><li>Поддержка e-discovery для разрешаемого контроля</li></ul>\r\nData Monitor - средство аудита и мониторинга сетевых каналов передачи данных на предмет утечек конфиденциальной информации<br />\r\n<ul><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li><li>Data Protect - обнаружение и блокировка утечек конфиденциальной информации на уровне всех сетевых каналов</li><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li></ul>\r\n\r\n\r\n\r\n\r\nData Endpoint - обнаружение и предотвращение утечки конфиденциальной информации через конечные компьютеры и сменные носители\r\n<ul><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li></ul>","shortDescription":"TRITON AP-DATA - решение от утечки конфиденциальной информации (DLP)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"TRITON AP-DATA","keywords":"конфиденциальной, потери, информации, риска, уменьшение, блокировка, утечки, данных","description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\rПредотвращение потери данныхБезопасность","og:title":"TRITON AP-DATA","og:description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\rПредотвращение потери данныхБезопасность"},"eventUrl":"","translationId":2323,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":10,"title":"Ensure Compliance"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"}]}},"categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=207","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1,"title":"Websense WSG для Lukoil","description":"Специалисты компании ISSP совместно с специалистами ЛТС Украина провели глубокий анализ технических требований к системе и определили продукт, выполняющий все поставленные задачи – Websense Web Security Gateway (WSG). Внедрение системы Websense WSG предусматривалось в режиме повышенной доступности – “Load Balancing”. Многомодульный характер Websense Web Security Gateway и мульти-вариантность методов развертывания решения позволили обеспечить высокий уровень отказоустойчивости и распределения нагрузки в активном режиме. Благодаря поддержке различных режимов работы, специалистам ISSP и ЛТС Украина удалось внедрить решение в сложную отказоустойчивую инфраструктуру Лукойл Украина, в процессе была проведена интеграция со многими элементами инфраструктуры и синхронизация резервных модулей для отказоустойчивости. Первые несколько месяцев после развертывания система проходила период адаптации – политики ограничения действий пользователей при работе с сетью Интернет постепенно подстраивались согласно регламенту использования интернет ресурсов для пользователей и их групп. Гибкость контроля, доступная администраторам значительно возросла – теперь внутреннюю сеть и Интернет разделяет не просто кеширующий прокси, но и одно из лучших в классе решений по веб-безопасности.","alias":"websense-wsg-dlja-lukoil","roi":50,"seo":{"title":"Websense WSG для Lukoil","keywords":"Websense, Украина, Security, Интернет, пользователей, отказоустойчивости, развертывания, Gateway","description":"Специалисты компании ISSP совместно с специалистами ЛТС Украина провели глубокий анализ технических требований к системе и определили продукт, выполняющий все","og:title":"Websense WSG для Lukoil","og:description":"Специалисты компании ISSP совместно с специалистами ЛТС Украина провели глубокий анализ технических требований к системе и определили продукт, выполняющий все"},"deal_info":"http://roi-redesign.my-dev.org/","user":{"id":837,"title":"LUKOIL","logoURL":"https://old.b4r.io/uploads/roi/company/LUKOIL.png","alias":"lukoil","address":"","roles":[],"description":"LUKOIL is one of the largest oil & gas vertical integrated companies in the world accounting for over 2% of crude production and circa 1% of proved hydrocarbon reserves globally. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.lukoil.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"LUKOIL","keywords":"LUKOIL, production, crude, circa, over, reserves, hydrocarbon, proved","description":"LUKOIL is one of the largest oil & gas vertical integrated companies in the world accounting for over 2% of crude production and circa 1% of proved hydrocarbon","og:title":"LUKOIL","og:description":"LUKOIL is one of the largest oil & gas vertical integrated companies in the world accounting for over 2% of crude production and circa 1% of proved hydrocarbon","og:image":"https://old.b4r.io/uploads/roi/company/LUKOIL.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":1525,"logo":false,"scheme":false,"title":"Websense Web Security Gateway (WSG)","vendorVerified":0,"rating":"3.30","implementationsCount":2,"suppliersCount":0,"alias":"websense-web-security-gateway-wsg","companyTypes":[],"description":"<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web 2.0. </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Решение выполняет функции сканирующего прокси-сервера для анализа web- и SSL-трафика на наличие современных угроз безопасности. Кроме того, решение включает в себя службы web-репутации и </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">полный набор URL-категорий безопасности: бот-сети, шпионские программы, фишинг и мошенничество, перехватчики клавиатуры, вредоносные web-сайты, потенциально нежелательные программы.</span>\r\n<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \"></span> ","shortDescription":"Программа анализирует web-трафик в реальном времени, защищая работу c интернет-ресурсами и с современными порталами Web 2.0. Решение выполняет функции сканирующего прокси-сервера","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Websense Web Security Gateway (WSG)","keywords":"программы, безопасности, себя, включает, решение, Кроме, того, web-репутации","description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web","og:title":"Websense Web Security Gateway (WSG)","og:description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web"},"eventUrl":"","translationId":2729,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"2012-01-18","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":282,"title":"Unaurthorized access to corporate IT systems and data"}]}},"categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=81","title":"Media"}},"comments":[],"referencesCount":0},{"id":54,"title":"Websense для банка","description":"Softline объявляет о завершении проекта по внедрению решений Websense в IT-инфраструктуру «Юниаструм Банка». В результате банк предоставил сотрудникам необходимый уровень интернет-доступа, повысил эффективность их работы и безопасность при использовании web-ресурсов.\r\n\r\nОснованный в 1994 году «Юниаструм Банк» осуществляет все основные виды банковских операций, представленные на рынке финансовых услуг, специализируясь на розничном бизнесе и работе c малыми и средними предприятиями. Банк обладает разветвленной филиальной сетью, включающей более 170 офисов в 45 регионах России. Штат финансовой организации насчитывает более 2000 сотрудников.\r\n\r\nБанк стремится к расширению спектра используемых информационных технологий и web-сервисов – как в собственных бизнес-процессах, так и при взаимодействии с партнерами и клиентами. Такой подход сопряжен с рисками роста количества каналов утечки информации. IT-специалистам «Юниаструм Банка» необходим был гибкий инструмент контроля разграничения доступа для сотрудников в соответствии с их ролями. Кроме того, требовалось, чтобы такие ИБ-средства могли обнаруживать угрозы до момента их наступления.\r\n\r\nРанее для подобных целей банк использовал решение Forefront TMG, покрывающее основные потребности заказчика. Однако в связи с ожидаемым прекращением поддержки данного решения со стороны вендора встал вопрос о миграции на новый продукт. Основными требованиями к нему были: функциональные возможности решения по защите пользователей от внешних угроз, по URL категоризации, а также простота перехода к его использованию. В результате анализа рынка продуктов для превентивной ИБ-защиты, а также в силу наличия у сотрудников «Юниаструм Банка» опыта эксплуатации системы Websense в других организациях, было принято решение о выборе данного инструмента. IT-специалистов также привлекла надежность системы, удобство ее эксплуатации и простота внедрения.\r\n\r\nРешения Websense построены на базе инновационной технологии ThreatSeeker, которая обеспечивает превентивную защиту от web-угроз, закрывая пробелы безопасности, остающиеся при установленных антивирусных решениях и межсетевых экранах. ThreatSeeker еженедельно сканирует более 600 млн web-сайтов и обнаруживает угрозы в Интернете до того, как клиенты подвергнутся риску, предоставляя защиту еще до выпуска заплат и антивирусных сигнатур.\r\n\r\nВ процесс выбора системы были вовлечены эксперты и технические специалисты компании Softline, опыт и экспертиза которых позволили сузить круг рассматриваемых решений и провести пилотное тестирование в минимальные сроки. Результаты проекта и эксплуатация системы позволили IT- и ИБ-специалистам банка положительно оценить решение и корректность его работы в организации. Пилотный проект был признан успешным, и система была рекомендована к использованию во всех офисах банка.\r\n\r\nВ настоящее время любой сотрудник финансовой организации получает доступ в Интернет только через Websense. С помощью многовекторного сканирующего устройства программа в онлайн-режиме анализирует сетевой трафик, при этом распознает новые сайты и их изменяющееся содержимое, находит зоны ИБ-риска и блокирует вредоносные программы и коды.\r\n\r\n«Решение Websense позволило нам гибко предоставлять сотрудникам возможность выхода в Интернет. Удобная категоризация позволяет сузить круг интернет-ресурсов до реально необходимых в работе. Есть функция, позволяющая предоставлять служащим банка ограниченный по времени доступ к каким-то ресурсам. Например, не более 30 минут в день посвящать социальным сетям или развлекательным сайтам. Или предоставлять руководителям данные о доступе сотрудников в Сеть. Так что ИБ-система решила не только технологические, но и некоторые HR-задачи», – прокомментировал результаты проекта Сергей Галицков, директор по сопровождению IT «Юниаструм Банка».\r\n\r\n«Сотрудничество с «Юниаструм Банком» всегда было для нас интересным и продуктивным. Все организационные вопросы в рамках проекта решались оперативно, в рабочем порядке. Высокая квалификация IT-специалистов заказчика позволила реализовать проект качественно и в установленные сроки», – отметил Вячеслав Железняков, руководитель департамента информационной безопасности компании Softline.","alias":"websense-dlja-banka","roi":0,"seo":{"title":"Websense для банка","keywords":"Юниаструм, Websense, системы, сотрудников, более, проекта, Банка, банка","description":"Softline объявляет о завершении проекта по внедрению решений Websense в IT-инфраструктуру «Юниаструм Банка». В результате банк предоставил сотрудникам","og:title":"Websense для банка","og:description":"Softline объявляет о завершении проекта по внедрению решений Websense в IT-инфраструктуру «Юниаструм Банка». В результате банк предоставил сотрудникам"},"deal_info":"","user":{"id":993,"title":"Uniastrum Bank","logoURL":"https://old.b4r.io/uploads/roi/company/Uniastrum_Bank.png","alias":"juniastrum-bank","address":"","roles":[],"description":"CB \"Uniastrum Bank\" (LLC) was founded in 1994. \"Uniastrum Bank\" is a universal bank offering a full range of banking transactions in the financial services market, specializing in the SME segment comp","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.uniastrum.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Uniastrum Bank","keywords":"Uniastrum, Bank, financial, transactions, banking, services, segment, specializing","description":"CB \"Uniastrum Bank\" (LLC) was founded in 1994. \"Uniastrum Bank\" is a universal bank offering a full range of banking transactions in the financial services","og:title":"Uniastrum Bank","og:description":"CB \"Uniastrum Bank\" (LLC) was founded in 1994. \"Uniastrum Bank\" is a universal bank offering a full range of banking transactions in the financial services","og:image":"https://old.b4r.io/uploads/roi/company/Uniastrum_Bank.png"},"eventUrl":""},"supplier":{"id":701,"title":"Softline","logoURL":"https://old.b4r.io/uploads/roi/company/Softline1.png","alias":"softline-rossija","address":"","roles":[],"description":"Softline is a leading global provider of IT-solutions and services operating in Russia, the CIS, Latin America, India and Southeast Asia. We offer comprehensive technology solutions, software licensing, supply of hardware and related IT-services. Softline own cloud platform provides customers with access to public, private and hybrid cloud solutions.","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":241,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":11,"vendorImplementationsCount":0,"vendorPartnersCount":12,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://softline.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Softline","keywords":"Softline, cloud, solutions, IT-services, related, software, licensing, hardware","description":"Softline is a leading global provider of IT-solutions and services operating in Russia, the CIS, Latin America, India and Southeast Asia. We offer","og:title":"Softline","og:description":"Softline is a leading global provider of IT-solutions and services operating in Russia, the CIS, Latin America, India and Southeast Asia. We offer","og:image":"https://old.b4r.io/uploads/roi/company/Softline1.png"},"eventUrl":""},"vendors":[{"id":178,"title":"Forcepoint Company","logoURL":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software. Their security solutions are used by businesses and government institutions to protect their networks from cybercrime, malware and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters designated by the individual customer's network policy.","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":16,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":1525,"logo":false,"scheme":false,"title":"Websense Web Security Gateway (WSG)","vendorVerified":0,"rating":"3.30","implementationsCount":2,"suppliersCount":0,"alias":"websense-web-security-gateway-wsg","companyTypes":[],"description":"<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web 2.0. </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Решение выполняет функции сканирующего прокси-сервера для анализа web- и SSL-трафика на наличие современных угроз безопасности. Кроме того, решение включает в себя службы web-репутации и </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">полный набор URL-категорий безопасности: бот-сети, шпионские программы, фишинг и мошенничество, перехватчики клавиатуры, вредоносные web-сайты, потенциально нежелательные программы.</span>\r\n<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \"></span> ","shortDescription":"Программа анализирует web-трафик в реальном времени, защищая работу c интернет-ресурсами и с современными порталами Web 2.0. Решение выполняет функции сканирующего прокси-сервера","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Websense Web Security Gateway (WSG)","keywords":"программы, безопасности, себя, включает, решение, Кроме, того, web-репутации","description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web","og:title":"Websense Web Security Gateway (WSG)","og:description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web"},"eventUrl":"","translationId":2729,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":5,"title":"Enhance Staff Productivity"}]}},"categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://softline.ru/news/22875","title":"Supplier's web site"}},"comments":[],"referencesCount":0}],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":13,"vendorPartnersCount":0,"supplierPartnersCount":45,"b4r":0,"categories":{"24":{"id":24,"title":"DLP - Data Leak Prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png","alias":"dlp-data-leak-prevention"},"25":{"id":25,"title":"Web filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png","alias":"web-filtering"},"40":{"id":40,"title":"Endpoint security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png","alias":"endpoint-security"},"42":{"id":42,"title":"UTM - Unified threat management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png","alias":"utm-unified-threat-management"}},"companySizes":"More than 2000 Employees","companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[{"id":271,"company_id":178,"title":"Forcepoint Certified TRITON AP-WEB Administrator","type":"technical"},{"id":272,"company_id":178,"title":"Forcepoint Certified TRITON AP-DATA Administrator","type":"technical"},{"id":273,"company_id":178,"title":"Forcepoint Certified TRITON AP-EMAIL Administrator","type":"technical"},{"id":274,"company_id":178,"title":"Forcepoint Certified - Sureview Insider Threat Administrator","type":"technical"},{"id":275,"company_id":178,"title":"Forcepoint Certified - Threat Protection for Linux Administrator","type":"technical"},{"id":276,"company_id":178,"title":"Forcepoint Certified - Stonesoft Next Generation Firewall Administrator","type":"technical"},{"id":277,"company_id":178,"title":"Forcepoint Certified - TRITON WP-WEB System Engineer","type":"technical"},{"id":278,"company_id":178,"title":"Forcepoint Certified - TRITON WP-DATA System Engineer","type":"technical"},{"id":279,"company_id":178,"title":"Forcepoint Certified - TRITON WP-EMAIL System Engineer","type":"technical"},{"id":280,"company_id":178,"title":"Forcepoint Certified - Stonesoft Next Generation System Engineer","type":"technical"}],"isSeller":true,"isSupplier":false,"isVendor":true,"presenterCodeLng":"","seo":{"title":"Forcepoint Company","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:title":"Forcepoint Company","og:description":"Forcepoint, previously known as Websense and Raytheon|Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer","og:image":"https://old.b4r.io/uploads/roi/company/forcepoint_logo.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[{"supplier":"ISSP","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"IT Land","partnershipLevel":"Silver Reseller","countries":"","partnersType":""},{"supplier":"Softprom by ERC (supplier)","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"NVision Group","partnershipLevel":"Silver Reseller","countries":"","partnersType":""},{"supplier":"TECHNOSERV","partnershipLevel":"Silver Reseller","countries":"","partnersType":""},{"supplier":"ICL-KME CS","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"TopS Business Integrator (TopS BI)","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"IT TO BUSINESS","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"AMT Group Russia","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"ANGARA Technologies Group","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"AST","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"Jet Infosystems","partnershipLevel":"Platinum Reseller","countries":"","partnersType":""},{"supplier":"IBS Platformix","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"Informzaschita","partnershipLevel":"Platinum Reseller","countries":"","partnersType":""},{"supplier":"Infozashchita","partnershipLevel":"Platinum Reseller","countries":"","partnersType":""},{"supplier":"ITSC","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"CROC","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"LANIT – LAboratory of New Information Technologies","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"Oberon","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"OLLY IT","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"Softline","partnershipLevel":"Platinum Reseller","countries":"","partnersType":""},{"supplier":"DialogNauka","partnershipLevel":"Platinum Reseller","countries":"","partnersType":""},{"supplier":"INLINE Technologies","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"Peterson Systems","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"BCC","partnershipLevel":"Silver Reseller","countries":"","partnersType":""},{"supplier":"I.T. Group","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"Avilex","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"Intech","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"Pointlane","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"RRC","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"MASCOM","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"Data Expert","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"Associates","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"LETA","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"Altirix systems","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"BiznesTech","partnershipLevel":"Silver Reseller","countries":"","partnersType":""},{"supplier":"Confident","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"GEOIS","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"Bitronix","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"Federal State Unitary Enterprise CentrInform Nizhniy Novgorod Branch","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"INITI","partnershipLevel":"Associate Reseller","countries":"","partnersType":""},{"supplier":"IT Task","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"NGS Distribution","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"Adeline","partnershipLevel":"Gold Reseller","countries":"","partnersType":""},{"supplier":"RRC Russia","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":""}],"vendoredProducts":[{"id":1630,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Web Security","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-web-security","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Forcepoint Web Security goes beyond anti-virus defenses </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">via eight defense assessment areas, using a composite </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">scoring process with the Forcepoint ACE predictive </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">analysis. Multiple real-time content engines analyze full </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">web page content, active scripts, web links, contextual </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">profiles, files and executables.</span>\r\nThe Forcepoint Web Security advanced threat dashboard provides forensic reporting on who was attacked, what data was targeted, the data’s intended endpoint and how the attack was executed. Security incidents include data theft capture when possible. Defenses analyze inbound and outbound communications. Industry-leading integrated data theft defenses (optional) detect and intercept data theft attempts and provide regulatory compliance for data loss prevention (DLP). Examples of these capabilities include detection of custom-encrypted uploads, password file data theft, slow data leaks (Drip-DLP), optical character recognition OCR (Optical Character Recognition) of text within images and geolocation destination awareness. Learn how to better protect your company’s assets through automatic analyzing of malware behavior with the integrated sandbox service. Discover cloud applications being used within your organization and prevent users from jeopardizing your data by sending to unsanctioned cloud applications and services.","shortDescription":"Forcepoint Web Security provides robust protection through content aware defenses and cloud app discovery and monitoring, reducing risks to sensitive data for both on premise and mobile users.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":10,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Web Security","keywords":"data, Forcepoint, theft, Security, your, content, within, include","description":"Forcepoint Web Security goes beyond anti-virus defenses via eight defense assessment areas, using a composite scoring process with the Forcepoint ACE","og:title":"Forcepoint Web Security","og:description":"Forcepoint Web Security goes beyond anti-virus defenses via eight defense assessment areas, using a composite scoring process with the Forcepoint ACE","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1561,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1631,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint DLP","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-dlp","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Forcepoint DLP accelerates your compliance efforts by </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">combining pre-packaged coverage of global regulations </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">with central control across your IT environment. </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Forcepoint DLP efficiently secures sensitive customer </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">information and regulated data so you can confidently </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">prove ongoing compliance.</span> Forcepoint DLP provides critical capability addressing compliance with features such as:\r\n<ul>\r\n<li>Optical Character Recognition (OCR) identifies data imbedded in images while at rest or in motion (available with Forcepoint DLP – Network).</li>\r\n<li>Robust identification for Personally Identifiable Information (PII) offers data validation checks, real name detection, proximity analysis and context identifiers.</li>\r\n<li>Custom encryption identification exposes data hidden from discovery and applicable controls.</li>\r\n<li>Cumulative analysis for drip DLP detection (i.e., data that leaks out slowly over time).</li>\r\n<li>Integration with Microsoft Azure Information Protection analyzes encrypted files and applies appropriate DLP controls to the data.</li>\r\n</ul>\r\nForcepoint DLP applies advanced analytics to correlate seemingly unrelated DLP events into prioritized incidents. Incident Risk Ranking (IRR) provided with Forcepoint DLP fuses disparate DLP indicators into a framework of Bayesian belief networks to assess the likelihood of data risk scenarios, such as data theft and broken business processes. Forcepoint DLP includes advanced analytics and regulatory policy templates from a single point of control with every deployment. Enterprises choose the deployment options for their IT environment.","shortDescription":"Forcepoint DLP addresses human-centric risk with visibility and control everywhere your people work and everywhere your data resides.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":1,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint DLP","keywords":"Forcepoint, data, with, compliance, analytics, such, detection, advanced","description":"Forcepoint DLP accelerates your compliance efforts by combining pre-packaged coverage of global regulations with central control across your IT","og:title":"Forcepoint DLP","og:description":"Forcepoint DLP accelerates your compliance efforts by combining pre-packaged coverage of global regulations with central control across your IT","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1527,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1667,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint User and Entity Behavior Analytics (UEBA)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-user-and-entity-behavior-analytics-ueba","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"font-weight: bold;\">Identify Potential Sources of Data Exfiltration and Critical IP Loss</span> Determine users exhibiting risky behavior such as stockpiling and atypical data movement before critical IP leaves your organization. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Advanced Compromised Account Detection</span> By understanding attributes like typical access patterns, prevent bad actors from accessing your critical assets and systems with User and Entity Behavior Analytics (UEBA). <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Be a Partner to Human Resources</span> Analyze communications-based data sources to identify potential code-of-conduct infractions. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Get More Out of Your SIEM Investment</span> UEBA adds context and analytics to SIEM data and provides risk scoring to incidents organized by entity, allowing analysts to prioritize the highest risks. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Perform Context & Content-Rich Incident Response</span> Enable transparent comprehensive investigation with advanced analytics like machine learning and artificial intelligence that are tuned toward specific behavior risk. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Solve Challenges in Data Security and Regulatory Compliance</span> Analyze and detect patterns of human behavior in big data, delivering insights into enterprise risk where threats have surpassed the perimeter. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Automate DLP Policy Enforcement</span> Combine UEBA with Forcepoint DLP to utilize analytic risk scores to dynamically change DLP policies. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Transparency</span> Understandable analytics with simple explanation and context to make informed decisions about possible insider threats. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Configurability</span> There is no one-size-fits-all UEBA solution. Forcepoint allows customers to build their own use cases and develop their own analytics without the need of a data scientist. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Entity Timeline</span> View all historical activity during forensics stage with dynamic visualization. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Detect Seemingly Unrelated Threats</span> Single alerts lack context to data. UEBA uses natural language processing and sentiment analysis for a holistic view of the user. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Varied Dataset Calculations</span> Data models informed by both structured data, such as SIEM logs, and unstructured data, such as email and chat, from your disparate security tools and third-party applications.","shortDescription":"Forcepoint User and Entity Behavior Analytics (UEBA) is AI-FUELED BEHAVIOR ANALYTICS TO IDENTIFY REAL ENTITY RISK","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint User and Entity Behavior Analytics (UEBA)","keywords":"data, UEBA, with, analytics, risk, context, SIEM, behavior","description":"Identify Potential Sources of Data Exfiltration and Critical IP Loss Determine users exhibiting risky behavior such as stockpiling and atypical data movement","og:title":"Forcepoint User and Entity Behavior Analytics (UEBA)","og:description":"Identify Potential Sources of Data Exfiltration and Critical IP Loss Determine users exhibiting risky behavior such as stockpiling and atypical data movement","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1668,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":938,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Email Security","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-email-security","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Forcepoint’s Advanced Classification Engine (ACE) is at the heart of all Forcepoint solutions. ACE identifies malicious lures, exploit kits, emerging threats, botnet communications and other advanced threat activity across the Kill Chain. This enables Forcepoint Email Security to identify the early stages of an attack. It can even identify Zero-day malware threats using powerful assessment capabilities that include fully-integrated, file behavioral sandboxing. To prepare for a malicious insider threat or the potentially successful cyberattack, it’s vital that outbound communications be monitored. This is also necessary both for data theft compliance needs as well as for business requirements. Only Forcepoint provides the technology to stop data infiltration and exfiltration with capabilities such as:\r\n<ul>\r\n<li>OCR (Optical Character Recognition) scanning to identify sensitive data hidden in images such as scanned documents or screen shots.</li>\r\n<li>Encrypted file detection to recognize custom encrypted files designed to defy identification.</li>\r\n<li>Drip data loss prevention (DLP) monitoring to identify where sensitive data is leaked in small quantities over time.</li>\r\n<li>Advanced analysis of malicious files and macros typically embedded in with MS Office files.</li>\r\n</ul>\r\nIT departments are strained to maintain current systems while supporting an increasingly mobile workforce and the demands to adopt new technologies like Office 365. Forcepoint Email Security provides industry-leading capabilities that leverage systems and other information to control communications, such as preventing total access to sensitive email attachments on vulnerable mobile devices, while permitting full access on fully-secured laptops. These inbound and outbound defenses are all supported on Office 365. The rich data collections in Forcepoint Email Security are used by a number of policies to report and identify systems that may require special IT attention. They generate a report on Indicators of Compromise to identify infected systems, and more proactive reports on suspicious behavior, including potential insider threats, such as “disgruntled employee” activity. User feedback capabilities educate employees as mistakes are made, helping them to better learn and understand safe email best practices.","shortDescription":"Forcepoint Email Security identifies targeted attacks, high-risk users and insider threats, while empowering mobile workers and the safe adoption of new technologies like Office 365 and Box Enterprise","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":19,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Email Security","keywords":"Cloud, Forcepoint, Security, email, Email, attacks, threats, advanced","description":"Forcepoint’s Advanced Classification Engine (ACE) is at the heart of all Forcepoint solutions. ACE identifies malicious lures, exploit kits, emerging","og:title":"Forcepoint Email Security","og:description":"Forcepoint’s Advanced Classification Engine (ACE) is at the heart of all Forcepoint solutions. ACE identifies malicious lures, exploit kits, emerging","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":939,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":942,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint CASB (Cloud Access Security Broker)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-casb-cloud-access-security-broker","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Discover Shadow IT & Risk\r\nUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive approach to cloud app discovery and risk scoring ensures that IT can eliminate blind spots by uncovering what cloud apps are used by employees and their risk profiles.\r\nPrevent Leaks of Sensitive Data\r\nInspect files and cloud content in real-time to prevent the malicious or unintentional leakage of confidential information. Identify and analyze sensitive or regulated data stored in cloud file-sync services to understand sharing permissions exposure and ensure compliance with regulations such as PCI, SOX, and HIPAA.\r\nControl BYOD Access\r\nMinimize the risk of data proliferation to unmanaged or untrusted devices by enforcing device-based access rules. Prevent the downloading or syncing of data to unmanaged devices while allowing online access only to cloud data.\r\nDetect & Block Cyber Attacks\r\nForcepoint CASB monitors all user activity and analyzes usage patterns to rapidly detect anomalies that can indicate an account takeover. The dashboard provides a wealth of cloud analytics, highlighting suspicious activities and attempts to compromise accounts.\r\nForcepoint CASB provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use.\r\nDiscover Shadow IT & Risk\r\nUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive approach to cloud app discovery and risk scoring ensures that IT can eliminate blind spots by uncovering what cloud apps are used by employees and their risk profiles.\r\nPrevent Leaks of Sensitive Data\r\nInspect files and cloud content in real-time to prevent the malicious or unintentional leakage of confidential information. Identify and analyze sensitive or regulated data stored in cloud file-sync services to understand sharing permissions exposure and ensure compliance with regulations such as PCI, SOX, and HIPAA.\r\nControl BYOD Access\r\nMinimize the risk of data proliferation to unmanaged or untrusted devices by enforcing device-based access rules. Prevent the downloading or syncing of data to unmanaged devices while allowing online access only to cloud data.\r\nDetect & Block Cyber Attacks\r\nForcepoint CASB monitors all user activity and analyzes usage patterns to rapidly detect anomalies that can indicate an account takeover. The dashboard provides a wealth of cloud analytics, highlighting suspicious activities and attempts to compromise accounts.\r\nIdentify Security Gaps\r\nForcepoint CASB uses cloud APIs to analyze your cloud tenants, helping IT review users and admins to detect dormant accounts, external users, and ex-employees that might still have access to your cloud apps. In addition, Forcepoint CASB inspects your tenant security configurations to detect deficiencies and to recommend best-practice settings for effective cloud governance.\r\nOptimize Detection of Anomalies and Threats\r\nForcepoint CASB is the only cloud access security broker out there that protects enterprise data from theft and loss due to compromised, malicious, and careless users and that correlates activity anomalies with risky IP addresses.\r\n\r\nCLOUD GOVERNANCE\r\nCloud App Discovery\r\nUncovers cloud apps – sanctioned and unsanctioned – by inspecting data in user access logs across the enterprise. Also, Forcepoint CASB provides a searchable Cloud App Directory where customers can view details, including customized risk factors, for each cloud app discovered.\r\nCloud App Risk Scoring\r\nHarness the ability to categorize and prioritize each cloud app as high, medium, or low risk. Application risk scoring and weighting are based on several categories (Compliance, Security Settings, General Info, Data Leakage, Data Ownership, Account Termination Policy and Auditing), the consolidated results of which can help you prioritize your risk mitigation “to do” list.\r\nDetection of Compliance Gaps\r\nGain visibility into cloud app security settings and get notified when SaaS admins make critical configuration changes. Forcepoint CASB compares these settings against a set of industry best practices or compliance standards (e.g., HIPAA, PCI DSS, ISO, CSA) and highlights deficiencies that require immediate attention.\r\nData Governance\r\nScan corporate files and data stored in file-sharing services such as OneDrive, Box, Dropbox and Google Drive. See which ones are sensitive or contain regulated data so that you can initiate a remediation workflow, if necessary (e.g., alert) to meet your compliance requirements.\r\nCloud App Metrics\r\nAutomate the process of determining what cloud apps users are accessing and details the number of users, activity level, traffic volume and usage hours for each app.\r\nIdentification of Overspend\r\nReview the entitlements of your users. You could be overlooking potential areas of risk or possibly some cost savings opportunities.\r\nAUDIT & PROTECTION\r\nEnforce BYOD Access Rules to Prevent Data Proliferation\r\nPrevent data proliferation to unmanaged devices through auto-sync clients such as Outlook, OneDrive for Business and Box Sync. Forcepoint CASB distinguishes between managed and unmanaged devices so you can create granular device-based access rules to stop data proliferation.\r\nPrevent Data Leakage\r\nForcepoint CASB inspects content in real-time, scanning for keywords, phrases, regular expressions, and several other parameters, to ensure compliance with regulations such as PCI DSS, HIPAA, HITECH, GLBA and SOX by applying comprehensive data leak prevention (DLP) capabilities. Forcepoint CASB also includes an ICAP interface to integrate with 3rd-party DLP solutions.\r\nIdentify Access Anomalies and Threats\r\nForcepoint CASB strengthens cloud security by detecting access anomalies and issues that may indicate an external or insider threat targeting your data.\r\nMonitor User & Admin Activity\r\nCreate a clear and accurate picture of user activity attributes, including user ID, department, location, time, device, application actions and data objects accessed. Track, monitor, and report all administrative and privileged user activity, including data accesses, configuration changes and user permission modifications.\r\n\r\n","shortDescription":"Forcepoint CASB provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint CASB (Cloud Access Security Broker)","keywords":"cloud, data, Forcepoint, CASB, risk, that, access, apps","description":"Discover Shadow IT & Risk\rUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive","og:title":"Forcepoint CASB (Cloud Access Security Broker)","og:description":"Discover Shadow IT & Risk\rUnsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non-intrusive","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":943,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":946,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Web Security Cloud (ранее TRITON AP-WEB Cloud)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-web-security-cloud-ranee-triton-ap-web-cloud","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Усовершенствованные угрозы, связанные со сложными многоступенчатыми атаками со встроенными методами, уклоняются от обнаружения при краже ваших конфиденциальных данных. Инсайдерские угрозы, такие как внутренне доступное вредоносное ПО, так же вредны, как и внешние угрозы.\r\nForcepoint Web Security Cloud обеспечивает лидирующие в отрасли возможности создания отчетов и DLP, а также останавливает более сложные угрозы для ваших данных, чем любое другое решение, включая Blue Coat, Cisco и Zscaler. Forcepoint Web Security Cloud построена на единой платформе, которая позволяет продуктам Forcepoint работать вместе и защищает данные повсюду - в облаке, в пути, в офисе - упрощает соблюдение и обеспечивает более эффективное принятие решений и повышает безопасность.\r\n\r\nДостижения в облачных технологиях предоставили организациям повышенную гибкость и возможности быстрого сотрудничества. Чтобы воспользоваться этими преимуществами, ваша организация должна оптимизировать безопасность с помощью интеллектуального, облачного решения, которое защищает в режиме реального времени, что позволит защитить вашу репутацию.\r\nForcepoint Web Security Cloud обеспечивает встроенную защиту от передовых угроз, которые используют сложные методы предотвращения обхода, чтобы украсть конфиденциальные данные, а также инсайдерские угрозы, такие как вредоносное ПО. Forcepoint Web Security Cloud является проверенным лидером в области безопасности веб-контента SaaS.\r\n\r\nИНТЕГРИРОВАННАЯ ИНТЕЛЛЕКТУАЛЬНАЯ УГРОЗА\r\nОбеспечивает ввод данных из более чем 155 стран в Forcepoint Cloud Web Security\r\nСредняя скорость обновления 3,2 единицы информации об угрозах каждую секунду","shortDescription":"Forcepoint Web Security Cloud - предоставление первостепенной облачной безопасности для защиты пользователей и данных во всем мире","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Web Security Cloud (ранее TRITON AP-WEB Cloud)","keywords":"Forcepoint, Cloud, Security, угрозы, данных, более, обеспечивает, защищает","description":"Усовершенствованные угрозы, связанные со сложными многоступенчатыми атаками со встроенными методами, уклоняются от обнаружения при краже ваших конфиденциальных","og:title":"Forcepoint Web Security Cloud (ранее TRITON AP-WEB Cloud)","og:description":"Усовершенствованные угрозы, связанные со сложными многоступенчатыми атаками со встроенными методами, уклоняются от обнаружения при краже ваших конфиденциальных","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":2601,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":948,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Trusted Thin Client","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-trusted-thin-client","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"End users working with multiple secure systems have traditionally needed multiple desktop computers on a single desk to accomplish their missions. To remain effective, they need a simplified approach with a high level of security that performs efficiently.\r\nForcepoint Trusted Thin Client provides users with secure simultaneous access to information on any number of networks from a single endpoint device. Designed for enterprise deployments, Forcepoint Trusted Thin Client provides administrators with centralized management and monitoring, scalability to easily add networks and clients, and the flexibility to enable users in offices, in-theater and in the field.\r\nThe Forcepoint Advantage\r\nAccreditation\r\nForcepoint Trusted Thin Client is an approved access cross domain solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross Domain Baseline.\r\nTop Secret/SCI and Below Interoperability (TSABI)\r\nSecret and Below Interoperability (SABI)\r\nAssessed and Authorized by authorities according to NIST guidelines in the US and Five-Eyes nations.\r\nAchieves secure simultaneous access to multiple networks/clouds from a single endpoint\r\nProvides a read-only endpoint preventing data from being stored locally. This prevents data from being transferred or copied to an external device\r\nIntegrates with common virtualization and consolidation technologies such as Citrix®, Microsoft®, and VMware®\r\nStreamlines administration through robust enterprise management capabilities\r\nAchieves significant ROI through lower ownership costs (infrastructure, office space, power consumption and administration)\r\nProvides secure multi-network access over untrusted networks with the Forcepoint Trusted Thin Client Remote deployment option\r\nSupports DoD and IC VDI initiatives such as DoD Joint Information Environment (JIE)\r\nDeployment Options\r\nBenefits\r\nMaximized security, usability and adaptability\r\nIncreased user productivity\r\nSignificant ROI through reductions in infrastructure, hardware, office space, power consumption, and administration\r\nStreamlined administration for the enterprise\r\nFlexibility to support environments with 2 networks or more than 20 networks","shortDescription":"Forcepoint Trusted Thin Client\r\nEnable Secure Simultaneous Access To Data On Multiple Networks","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Trusted Thin Client","keywords":"with, Forcepoint, networks, Trusted, Thin, Client, administration, secure","description":"End users working with multiple secure systems have traditionally needed multiple desktop computers on a single desk to accomplish their missions. To remain","og:title":"Forcepoint Trusted Thin Client","og:description":"End users working with multiple secure systems have traditionally needed multiple desktop computers on a single desk to accomplish their missions. To remain","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":949,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":531,"title":"Thin client","alias":"thin-client","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/thin-client.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":950,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Forcepoint_SureView_Analytics.jpg","logo":true,"scheme":false,"title":"Forcepoint SureView Analytics","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-sureview-analytics","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Security analysts in law enforcement, military and commercial settings spend too much time collecting and collating data across different public and private sources. Their time would be much better spent analyzing the real threats so they can respond rapidly and effectively .\r\nSureView Analytics delivers a dramatically different experience: By employing virtual data warehousing, federated search, powerful algorithms for automated information discovery and intuitive workflow tools, security analysts gain the ability to respond to cyber threats, fraud, other criminal activity and even terrorism as they’re happening — not hours, days or months later.\r\nThe Forcepoint Advantage\r\nVirtual Data Warehousing\r\nTraditional approaches to security analysis require organizations to set up data warehouses and ingest mass data — a process that taxes IT resources, triggers onerous compliance requirements, raises sticky questions of data ownership and drives up your total cost of ownership (TCO). By contrast, we avoid those pitfalls by using virtual data warehousing technology that accesses data at high speed without ever needing to copy or move it.\r\nThe result is a faster, more economical solution that is quicker and easier to set up, and that avoids putting long-term burdens on your IT and compliance resources.\r\nFederated Search\r\nThe federated search capabilities of SureView Analytics allow your analysts to quickly develop a centralized picture of threats by giving your team instant access to live data across websites, emails, social media, documents and internal or external databases (e.g., of crimes, parolees, or FBI-shared data). Besides being highly flexible and scalable, this technology eliminates the traditional need to wait on batch processes, meaning that analysis is based on near-real-time information rather than yesterday’s data. It also allows organizations to take advantage of investments they have already made on enterprise systems for a lower Total Cost of Ownership.\r\nAnalytical Workflows and Tools\r\nSureView Analytics has been designed from the ground up to be easy to use and to enable rapid collaboration across teams. Its sophisticated data visualization tools enable your analysts to interactively expose patterns, trends and anomalies hiding in large amounts of complex data:\r\nLink Analysis — Easily uncover clusters of information or key individuals and their relationship to suspicious events\r\nTemporal Analysis — Quickly recognize a change in behavioral patterns or unusual conduct needing further investigation\r\nGeospatial Analysis — Unearth an unknown relationship or the importance of information based on geographic correlations\r\nStatistical Analysis — Identify unexpected peaks in activities or values\r\nSureView Analytics also includes faceted and tactical searching for selective information discovery using visual search filters, as well as alerting functionality and an integrated intelligence database that supports secure information sharing.\r\n Now, our most important assets, people, have more time to focus on critical success tasks and objectives. The agency is now more agile and able to add data flows on demand. \r\nConfidential Government Customer\r\nForrester Total Economic Impact Study","shortDescription":"SureView Analytics\r\nRapidly Search and Analyze Large Amounts of Data to Detect Cyber and Real-World Threats","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint SureView Analytics","keywords":"data, information, that, Analytics, your, SureView, analysts, Analysis","description":"Security analysts in law enforcement, military and commercial settings spend too much time collecting and collating data across different public and private","og:title":"Forcepoint SureView Analytics","og:description":"Security analysts in law enforcement, military and commercial settings spend too much time collecting and collating data across different public and private","og:image":"https://old.b4r.io/fileadmin/user_upload/Forcepoint_SureView_Analytics.jpg"},"eventUrl":"","translationId":951,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/user-behavior-analytics.png"},{"id":5,"title":"Security Software","alias":"security-software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":947,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-web-security-cloud-formerly-triton-ap-web-cloud","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\r\nAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while stealing your sensitive data. Insider threats—such as employee theft and internally accessed malware—are just as damaging as external threats.\r\nForcepoint Web Security Cloud provides industry-leading reporting, sandboxing and DLP capabilities, and stops more advanced, non-signature threats to your data than any other solution – including Blue Coat, Cisco, and Zscaler. Forcepoint Web Security Cloud is built on a unified platform that enables Forcepoint products to work together, and protects data everywhere– in the Cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient security.\r\nADOPT INDUSTRY-LEADING PROTECTION AGAINST ADVANCED THREATS AND DATA THEFT\r\nAdvances in cloud technology have given organizations increased flexibility and rapid collaboration capabilities. In order to reap these benefits, your organization must streamline security with an intelligent, cloud-first solution that protects in real-time and that will enable your long term mission and protect your reputation.\r\nForcepoint Web Security Cloud provides in-line protection against advanced threats that use sophisticated detection evasion techniques to steal sensitive data, as well as insider threats such as employee theft and malware. Forcepoint Web Security Cloud is a proven leader in SaaS web content security, stopping more advanced, non-signature threats to your data than any other solution.\r\nEASY TO USE DASHBOARDS\r\nSee threat levels, productivity and bandwidth in an instant\r\nDrill-down for quick analysis\r\nEasy to use dashboards\r\nREPORTING\r\nOver 80 predefined reports\r\nCreate infinite custom reports by drag and drop of 70 attributes\r\nOptional extended reporting history for up to 18 months to support Regulatory & Compliance requirements\r\nReporting\r\nINTEGRATED CLOUD SANDBOX\r\nReal-time code analysis for Advanced Threat identification.\r\nSafe execution of suspicious code away from your network resources\r\nINTEGRATED THREAT INTELLIGENCE\r\nProvides input from over 155 countries into Forcepoint Cloud Web Security\r\nAverage update rate of 3.2 pieces of threat intelligence every second","shortDescription":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)\r\nDelivering premier cloud security to protect users and data everywhere","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","keywords":"Cloud, your, Forcepoint, threats, Security, data, that, solution","description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\rAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while","og:title":"Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)","og:description":"ROBUST PROTECTION FOR USERS—WHEREVER THEY GO\rAdvanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":947,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1472,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Data Security","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-data-security","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"Forcepoint Data Security Suite - detection, control and protection of confidential information and network end data\r\nPreventing data loss\r\nBusiness Process Security\r\nManaging Applications and Threats\r\n\r\nData Discover - Detection of confidential information stored on the network\r\nDetecting the storage of sensitive data\r\nMeasuring and reducing the risk of data loss\r\nSupport for e-discovery for controlled monitoring\r\n\r\nData Monitor - a tool for auditing and monitoring network data channels for leaks of confidential information\r\nMonitoring and blocking the leakage of confidential information\r\nConducting an audit\r\nMeasuring and reducing the risk of data loss\r\n\r\nData Protect - detection and blocking of leaks of confidential information at the level of all network channels\r\nMonitoring and blocking the leakage of confidential information\r\nConducting an audit\r\nMeasuring and reducing the risk of data loss\r\n\r\nData Endpoint - Detection and prevention of leakage of confidential information through target computers and removable media\r\nMonitoring and blocking the leakage of confidential information\r\nConducting an audit\r\nMeasuring and reducing the risk of data loss","shortDescription":"Forcepoint Data Security is a solution from leakage of confidential information (DLP)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Data Security","keywords":"information, data, confidential, Data, loss, Measuring, reducing, risk","description":"Forcepoint Data Security Suite - detection, control and protection of confidential information and network end data\rPreventing data loss\rBusiness Process","og:title":"Forcepoint Data Security","og:description":"Forcepoint Data Security Suite - detection, control and protection of confidential information and network end data\rPreventing data loss\rBusiness Process","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1472,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1473,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-email-security-cloud-forcepoint-web-security-cloud","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email Security gives you the security you need by protecting you against multi-stage advanced threats that exploit email to penetrate your IT environment.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Email Security applies real-time behavioral sandboxing, enterprise-grade DLP and other advanced defense technologies to prevent leaks of sensitive information, empowering your workers — in the office or on the road — as you safely adopt technologies like Microsoft Office 365. In addition, detect phishing and secure email wherever users need access, even on mobile devices, through features like Phishing Education and URL Wrapping.</span>\r\nYour business and data are under constant attack. Traditional filtering and antivirus products no longer provide sufficient protection, and many web security solutions can’t address advanced threats as they occur.\r\n\r\nForcepoint Web Security provides advanced, real-time threat defense to stop advanced threats and prevent data loss. It provides robust protection through context- and content-aware defenses, coupled with integrated Cloud Access Security Broker (CASB) functionality, to provide control and visibility for cloud applications on both on-premises and roaming users. The combination of industry-leading web protection, CASB functionality and enterprise DLP delivers protection at a value no other vendor can match.","shortDescription":"Forcepoint Email Security Cloud (formerly TRITON AP-EMAIL Cloud) - Protecting from spam, phishing & ransomware attacks wherever email is accessed","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","keywords":"Security, advanced, Forcepoint, protection, threats, like, Email, Cloud","description":"Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email","og:title":"Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","og:description":"Today’s attempts to compromise email channels have evolved from simple spam and phishing attempts to more advanced threats like ransomware. Forcepoint Email","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1473,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1474,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-advanced-malware-detection-forcepoint-email-security-cloud-forcepoint-web-security-cloud","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Email Security Cloud (formerly TRITON AP-EMAIL Cloud) - Protecting from spam, phishing & ransomware attacks wherever email is accessed</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud) - Delivering premier cloud security to protect users and data everywhere</span>","shortDescription":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","keywords":"Cloud, Forcepoint, Security, Malware, Advanced, TRITON, formerly, Email","description":"Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats\rForcepoint Email Security Cloud (formerly TRITON AP-EMAIL","og:title":"FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud","og:description":"Forcepoint Advanced Malware Detection - Detect and Stop the Most Evasive, Advanced Malware Threats\rForcepoint Email Security Cloud (formerly TRITON AP-EMAIL","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1474,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":39,"logoURL":"https://old.b4r.io/fileadmin/content/triton_data.jpeg","logo":true,"scheme":false,"title":"TRITON AP-DATA","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":45,"alias":"triton-ap-data","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\r\n<ul><li>Предотвращение потери данных</li><li>Безопасность бизнес-процесса</li><li>Управление приложений и угроз</li></ul>\r\nData Discover - обнаружение конфиденциальной информации, хранимой в сети<br />\r\n<ul><li>Обнаружение мест хранения конфиденциальных данных</li><li>Измерение и уменьшение риска потери данных</li><li>Поддержка e-discovery для разрешаемого контроля</li></ul>\r\nData Monitor - средство аудита и мониторинга сетевых каналов передачи данных на предмет утечек конфиденциальной информации<br />\r\n<ul><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li><li>Data Protect - обнаружение и блокировка утечек конфиденциальной информации на уровне всех сетевых каналов</li><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li></ul>\r\n\r\n\r\n\r\n\r\nData Endpoint - обнаружение и предотвращение утечки конфиденциальной информации через конечные компьютеры и сменные носители\r\n<ul><li>Мониторинг и блокировка утечки конфиденциальной информации</li><li>Ведение аудита</li><li>Измерение и уменьшение риска потери данных</li></ul>","shortDescription":"TRITON AP-DATA - решение от утечки конфиденциальной информации (DLP)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"TRITON AP-DATA","keywords":"конфиденциальной, потери, информации, риска, уменьшение, блокировка, утечки, данных","description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\rПредотвращение потери данныхБезопасность","og:title":"TRITON AP-DATA","og:description":"TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети\rПредотвращение потери данныхБезопасность","og:image":"https://old.b4r.io/fileadmin/content/triton_data.jpeg"},"eventUrl":"","translationId":2323,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1614,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint URL Filtering","vendorVerified":0,"rating":"3.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-url-filtering","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">With more than 120 security and filtering categories, </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">hundreds of Web application and protocol controls, and 60-plus </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">reports with customization and role-based access, Forcepoint URL </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Filtering is an easy to deploy and transparent filter and security </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">solution that avoids the complexity of a proxy gateway.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Forcepoint URL Filtering’s intuitive management and reporting </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">is accessed via the unified TRITON Architecture user interface, </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">simplifying provisioning and enabling role-based reporting. It </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">includes more than 60 pre-defined reports, many easily customizable </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">reports and administrative alerts. The TRITON architecture supports </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">expansion to Email, Data, Mobile security products and more.</span>","shortDescription":"The Forcepoint URL Filtering solution blocks Web threats to reduce malware infections, decrease help desk incidents and free up valuable IT resources.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":8,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint URL Filtering","keywords":"Forcepoint, more, TRITON, security, than, role-based, unified, reporting","description":"With more than 120 security and filtering categories, hundreds of Web application and protocol controls, and 60-plus reports with customization and","og:title":"Forcepoint URL Filtering","og:description":"With more than 120 security and filtering categories, hundreds of Web application and protocol controls, and 60-plus reports with customization and","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":1588,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":952,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Forcepoint NGFW","vendorVerified":1,"rating":"3.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":45,"alias":"forcepoint-ngfw","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":" \r\nAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network expenses as much as 50%, slash downtime and reduce IT risk\r\n<span style=\"font-weight: bold;\">The Forcepoint Advantage</span>\r\nBoost business productivity and cut the cost of providing safe, reliable access to applications and data, with secure SD-WAN built right in.\r\n<span style=\"font-weight: bold;\">High Availability</span>\r\nSlash network downtime and keep your business running with uniquely efficient resilience integrated at all levels: firewalls, network and management.\r\n<span style=\"font-weight: bold;\">Unrivaled Security</span>\r\nProtect data and apps throughout your data centers, edge, SD-WANs and cloud – with VPNs, IPS, anti-evasion, encrypted inspection, anti-malware, proxies and more.\r\n<span style=\"font-weight: bold;\">Massive Scalability</span>\r\nSmoothly scale your security as your physical and virtual networks grow, without rip-and-replace upgrades or patchworks of tools.\r\n<span style=\"font-weight: bold;\">Centralized Manageability</span>\r\nDeploy firewalls, VPNs, IPS, SD-WAN fast, across many different environments – and keep them running smoothly.\r\n<span style=\"font-weight: bold;\">360° Visibility</span>\r\nGain immediate insights into what is happening across your network to accelerate incident response and streamline audit best practices.\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n<span style=\"text-decoration-line: underline;\">Forcepoint NGFW Appliances</span> All Forcepoint NGFWs are built on a common software core to provide unified operation and high performance across all forms of appliances – physical, virtual, cloud. Physical – desktop, ruggedized and rack-mounted models; customizable network interfaces; firewall throughput from 1.5-120 Gbps Virtual – available for KVM and VMware ESXi Cloud – available for Amazon Web Services (AWS), Microsoft Azure (coming soon). Find out about the certifications that the Forcepoint NGFW appliances meet.\r\n<span style=\"text-decoration-line: underline;\">NSS Labs Recommended</span> In NSS Labs’ most recent report on Next Generation Firewall (NGFW) overall security effectiveness, Forcepoint NGFW achieved the highest rating of all 11 products tested. NSS Labs latest tests prove that Forcepoint NGFW offers the leading combination of enterprise security and low cost.","shortDescription":"With Forcepoint NGFW, you can deploy and manage thousands of firewalls, IPSs, VPNs and SD-WANs – in minutes, all from a single console.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":15,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint NGFW","keywords":"Forcepoint, NGFW, your, network, security, that, data, with","description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network","og:title":"Forcepoint NGFW","og:description":" \rAs IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":953,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":13,"title":"NG Firewall"}],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall-1","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1525,"logoURL":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png","logo":true,"scheme":false,"title":"Websense Web Security Gateway (WSG)","vendorVerified":0,"rating":"3.30","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":45,"alias":"websense-web-security-gateway-wsg","companyTitle":"Forcepoint Company","companyTypes":["vendor"],"companyId":178,"companyAlias":"forcepoint","description":"<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web 2.0. </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">Решение выполняет функции сканирующего прокси-сервера для анализа web- и SSL-трафика на наличие современных угроз безопасности. Кроме того, решение включает в себя службы web-репутации и </span><span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \">полный набор URL-категорий безопасности: бот-сети, шпионские программы, фишинг и мошенничество, перехватчики клавиатуры, вредоносные web-сайты, потенциально нежелательные программы.</span>\r\n<span style=\"font-family: "Trebuchet MS"; line-height: 1.6em; background-color: rgb(255, 255, 255); color: rgb(85, 85, 85); margin: 0px; padding: 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; text-align: justify; \"></span> ","shortDescription":"Программа анализирует web-трафик в реальном времени, защищая работу c интернет-ресурсами и с современными порталами Web 2.0. Решение выполняет функции сканирующего прокси-сервера","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Websense Web Security Gateway (WSG)","keywords":"программы, безопасности, себя, включает, решение, Кроме, того, web-репутации","description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web","og:title":"Websense Web Security Gateway (WSG)","og:description":"Программа анализирует web-трафик в реальном времени, защищая работу не только с привычными интернет-ресурсами, но и с современными порталами Web","og:image":"https://old.b4r.io/fileadmin/user_upload/forcepoint_logo.png"},"eventUrl":"","translationId":2729,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/secure-web-gateway-hardware.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[],"partnershipProgramme":{"levels":[{"id":441,"level":"Associate Reseller"},{"id":443,"level":"Silver Reseller"},{"id":445,"level":"Gold Reseller"},{"id":447,"level":"Platinum Reseller"},{"id":449,"level":"Distributor"}],"partnerDiscounts":{"Associate Reseller":"","Silver Reseller":"","Gold Reseller":"","Platinum Reseller":"","Distributor":""},"registeredDiscounts":{"Associate Reseller":"","Silver Reseller":"","Gold Reseller":"","Platinum Reseller":"","Distributor":""},"additionalBenefits":[],"salesPlan":{"Associate Reseller":"","Silver Reseller":"","Gold Reseller":"","Platinum Reseller":"","Distributor":""},"additionalRequirements":[]}}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}