{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"en":"Products","de":"die produkte","ru":"Продукты","_type":"localeString"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"en":"partners","ru":"партнеры","_type":"localeString"},"update-profile-button":{"en":"Update profile","ru":"Обновить профиль","_type":"localeString"},"read-more-button":{"_type":"localeString","en":"Show more","ru":"Показать ещё"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"_type":"localeString","en":"Categories","ru":"Компетенции"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"_type":"localeString","en":"Partnership with suppliers","ru":"Партнерство с поставщиками"},"reference-bonus":{"_type":"localeString","en":"Bonus 4 reference","ru":"Бонус за референс"},"partner-status":{"en":"Partner status","ru":"Статус партнёра","_type":"localeString"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"en":"branch","ru":"область деятельности","_type":"localeString"},"employees-popover":{"en":"number of employees","ru":"количество сотрудников","_type":"localeString"},"partnership-programme":{"_type":"localeString","en":"Partnership program","ru":"Партнерская программа"},"partner-discounts":{"ru":"Партнерские скидки","_type":"localeString","en":"Partner discounts"},"registered-discounts":{"en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString"},"additional-advantages":{"_type":"localeString","en":"Additional Benefits","ru":"Дополнительные преимущества"},"additional-requirements":{"ru":"Требования к уровню партнера","_type":"localeString","en":"Partner level requirements"},"certifications":{"ru":"Сертификация технических специалистов","_type":"localeString","en":"Certification of technical specialists"},"sales-plan":{"_type":"localeString","en":"Annual Sales Plan","ru":"Годовой план продаж"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"en":"All countries","ru":"Все страны","_type":"localeString"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"en":"Produced products","ru":"Производимые продукты","_type":"localeString"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"en":"Supplied deployments","ru":"Поставляемые внедрения","_type":"localeString"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"register":{"ru":"Регистрация ","_type":"localeString","en":"Register"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"logout"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My Profile","ru":"Мои Данные"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"_type":"localeString","en":"4 vendors","ru":"поставщикам"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"translatable_meta":[{"name":"title","translations":{"en":"Company","ru":"Компания","_type":"localeString"}},{"name":"description","translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"}},{"name":"keywords","translations":{"en":"Company keywords","ru":"Ключевые слова для компании","_type":"localeString"}}],"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"mcafee":{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[{"id":3,"type":"vendor"}],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":["vendor"],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[{"id":543,"title":"McAfee Endpoint Security for educational organization in Brazil","description":"SOMOS Educação, the largest K through 12 educational organization in Brazil, with more than 50 sites across Brazil, looked to McAfee for a robust, scalable endpoint security solution; simple, centralized management; and stronger protection for sensitive business and personal data.\r\n<span style=\"font-weight: bold; \"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">SOMOS Educação/</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Customer Profile</span></span>\r\n<ul><li>Incorporated in 2011, SOMOSEducação (SEDU3:BZ) is thelargest K through 12 group inBrazil. It has a broad portfolioof integrated educationalsolutions (textbooks, digitalproducts, and services) andalso administers proprietaryschools and preparatorycourses.</li><li>Industry:Education</li><li>IT Environment:3,000 nodes, 5,000 employees,50 sites</li></ul>\r\n<span style=\"font-weight: bold; \">Challenges</span>\r\n<ul><li>Prevent both internal business data and personal data from being exfiltrated</li><li>Reduce security management complexity in a distributed environment</li><li>Find a security vendor that offers robust, integrated solutions and reliable support at an affordable price</li><li>Accelerate threat detection and mitigation</li><li>Raise security awareness among employees</li></ul>\r\n<span style=\"font-weight: bold; \">McAfee Solution</span>\r\n<ul><li>McAfee® Complete Endpoint Protection</li><li>McAfee® DLP Endpoint</li><li>McAfee® Drive Encryption</li><li>McAfee® ePolicy Orchestrator® (McAfee ePO™)</li><li>McAfee® Web Protection</li></ul>\r\n<span style=\"font-weight: bold; \">Results</span>\r\n<ul><li>An integrated, single-vendor security architecture</li><li>Centralized and scalable single-console management</li><li>Comprehensive, full-coverage endpoint protection</li><li>Improved protection for sensitive data</li><li>Greater peace of mind for parents, students, schools, and employees</li><li>Simplified deployment </li></ul>\r\nFor Juliano Pereira, CIO, and his IT colleagues at SOMOS Educação, securing sensitive data and the infrastructure is paramount to his organization’s greater mission, which is to elevate the nation of Brazil by contributing an important intangible asset: education. With the full support of the board and executive team, Pereira and his team have embarked on a journey to solidify and stabilize their cybersecurity strategy in order to better protect student information and business data and allow employees to work safely and without interruption.\r\nWith a lean and efficient security team overseeing 50 sites, 3,000 nodes, and 5,000 employees distributed across Brazil, SOMOS needed a reliable vendor that could offer robust, scalable solutions, centralized management, and excellent service and support. Chief among the organization’s cybersecurity concerns are protecting against advanced threats like WannaCry ransomware, which hit several government agencies in Brazil in 2017; safeguarding business information; and preserving the privacy of the students SOMOS serves. Dissatisfied with their previous vendor because of poor service, a limited feature set, and implementation complexity, the IT leadership team at SOMOS selected McAfee as the organization’s primary security vendor based on the reputation of the McAfee brand; its connected, integrated portfolio; and the affordability of its solutions. The organization implemented McAfee endpoint security, data protection, and single-console security management. As Ricardo Costa, IT governance manager, notes,<span style=\"font-style: italic; \"> “Because many IT team members had positive experiences with McAfee in the past, it was an easy decision.”</span>\r\n<span style=\"font-weight: bold; \">Single-Agent Endpoint Security Platform Reduces Infections and Improves Detection</span>\r\nPereira and his team deployed McAfee® Complete Endpoint Protection to its 3,000 endpoints in several phases over a period of only three months. The deployment was smooth and straightforward, with “zero errors,” as Marco Aurelio, IT infrastructure manager, asserts.\r\nWith its single-agent architecture, McAfee Complete Endpoint Protection provides SOMOS with a single, consolidated platform that brings together multiple defenses. So far, the security team has deployed four modules. The Threat Prevention module provides intelligent, on-demand scanning and coverage for vulnerabilities and exploits. The Web Control module ensures that employees are safe when browsing the web and downloading files. And, the Firewall module leverages McAfee® Global Intelligence reputation scores to protect users from network attacks. The team has also implemented Real Protect, which uses real-time behavioral analysis and machine learning to detect advanced and zero-day threats. According to Pereira, the organization has significantly improved its ability to quickly detect malware and suspicious activities and neutralize threats.\r\n<span style=\"font-weight: bold;\">McAfee DLP Endpoint Technology Safeguards Business and Personal Information</span>\r\nTo address data protection and privacy concerns, the organization implemented McAfee DLP Endpoint, which protects data at rest, in use, and in motion across all endpoints. McAfee DLP Endpoint capabilities make it easy to categorize and map out the data that flows through the organization and apply appropriate controls and policies to relevant assets. Additionally, drive encryption combined with strong access control prevents employees from unauthorized access to confidential data on all endpoints—from desktops and laptops to tablets and USB drives. Pereira has made a point to inform employees about these new data security controls and believes that this has helped instill a greater sense of vigilance about handling sensitive data across the organization.\r\n<span style=\"font-style: italic;\">“One of our biggest issues is possible damage to our reputation should a breach occur. I believe that implementing McAfee DLP will have a positive effect on everyone. Students and their parents will feel more at ease, and employees will be more mindful about the way they use and transmit data,” points out Willians Santos, IT security leader.</span>\r\n<span style=\"font-weight: bold;\">McAfee ePO Simplifies Management and Increases Security Effectiveness</span>\r\nTying it all together is the McAfee ePO management console. Pereira’s staff can now maximize their time and efficiency by getting visibility into the organization’s entire infrastructure from a centralized single pane of glass. The easy-to-use McAfee ePO console enables the team to monitor the security health of endpoints and servers and to create and enforce data protection policies.\r\nThey regularly check both built-in and customized dashboards that provide them with valuable data and statistics like the number of threat events within a defined timeframe, including names of affected hosts and types of threats. Just recently, for example, they discovered that, via the McAfee ePO console, McAfee intercepted 1,065 threats in the course of a week.\r\nFundamental to the McAfee connected ecosystem, the McAfee ePO console has simplified security management at SOMOS Educação and has empowered its security professionals to be more effective through automation.\r\n<span style=\"font-style: italic;\">“The single greatest benefit we’ve experienced from McAfee is the ability to use a single tool for security management, which makes it easy to scale as required. Now everyone everywhere can enjoy the same level of security,” relates Pereira.</span>\r\n<span style=\"font-weight: bold;\">McAfee Helps Drive Technology Innovation</span>\r\nThe company has big plans for the next two years. Migration of educational services to the cloud is currently in the works. SOMOS Educação has two major instructional systems in the cloud and is negotiating with partners to implement new modules and updated versions of existing systems. They have also migrated several applications focused on student assessment, tutoring, and other learning activities. McAfee® Web\r\nProtection provides a unified defense, including antimalware, web filtering with reputation scoring, cloud application control, and real-time behavioral analysis to help prevent against zero-day threats. It provides the organization with consistent protection and policy enforcement in the cloud as well as on premises.\r\nPereira explains that the organization is doing everything possible to strengthen its security architecture: updating and stabilizing the environment overall; investing in cutting-edge defenses for endpoints, servers, and databases; streamlining, evaluating, and testing every new security tool against potential threats; and improving technology processes.\r\n<span style=\"font-style: italic;\">“We are at the beginning of our journey, and we still </span><span style=\"font-style: italic;\">have far to go before we achieve all our goals, but we </span><span style=\"font-style: italic;\">take pride in the fact that we are leading the way when </span><span style=\"font-style: italic;\">it comes to cybersecurity. When our schools hear that </span><span style=\"font-style: italic;\">we are providing them with stronger security, they are</span><span style=\"font-style: italic;\">really pleased and receptive. Compared to 99% of the</span><span style=\"font-style: italic;\">educational organizations in Brazil, we are way ahead of</span><span style=\"font-style: italic;\">the game,” Pereira affirms.</span>","alias":"mcafee-endpoint-security-for-educational-organization-in-brazil","roi":0,"seo":{"title":"McAfee Endpoint Security for educational organization in Brazil","keywords":"McAfee, security, data, with, that, team, SOMOS, organization","description":"SOMOS Educação, the largest K through 12 educational organization in Brazil, with more than 50 sites across Brazil, looked to McAfee for a robust, scalable","og:title":"McAfee Endpoint Security for educational organization in Brazil","og:description":"SOMOS Educação, the largest K through 12 educational organization in Brazil, with more than 50 sites across Brazil, looked to McAfee for a robust, scalable"},"deal_info":"","user":{"id":4371,"title":"SOMOS Educação","logoURL":"https://old.b4r.io/uploads/roi/company/SOMOS_Educacao.png","alias":"somos-educacao","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">SOMOS Educação is the main group of basic education in Brazil.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our schools, education systems, publishers and educational solutions for Elementary, Technical and Higher Education impact the day to day and transform the lives of thousands of educators and millions of students nationwide.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The brands that make up the SOMOS Educação group are quality references and empower the group's ability to form a better prepared society.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Building on all this, there is a team of restless professionals who share the commitment to form generations of Brazilians ever better.</span>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.somoseducacao.com.br/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOMOS Educação","keywords":"SOMOS, group, Educação, better, form, education, prepared, empower","description":"SOMOS Educação is the main group of basic education in Brazil.\r\rOur schools, education systems, publishers and educational solutions for Elementary, Technical","og:title":"SOMOS Educação","og:description":"SOMOS Educação is the main group of basic education in Brazil.\r\rOur schools, education systems, publishers and educational solutions for Elementary, Technical","og:image":"https://old.b4r.io/uploads/roi/company/SOMOS_Educacao.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":1732,"logo":false,"scheme":false,"title":"McAfee Endpoint Security","vendorVerified":0,"rating":"2.00","implementationsCount":4,"suppliersCount":0,"alias":"mcafee-endpoint-security","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Advanced, consolidated endpoint defense</span> McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint environment. <span style=\"font-weight: bold;\">Core threat prevention</span> Essential anti-virus, exploit prevention, firewall, and web control communicate with each other. <span style=\"font-weight: bold;\">Machine learning</span> State-of-the art techniques identify malicious code based on appearance and behavior. <span style=\"font-weight: bold;\">Application containment</span> Limit the impact of suspicious files and zero-day malware by blocking behaviors and containing them before they can infect or spread in your environment. <span style=\"font-weight: bold;\">Endpoint detection and response</span> Our integrated, automated, and adaptable endpoint detection and response (EDR) technology is easy to use and makes incident response as simple as a single click. <span style=\"font-weight: bold;\">Product features</span>\r\n<ul>\r\n<li>Centralized management. The McAfee ePolicy Orchestrator management console can be deployed on premises or in the cloud. It provides greater visibility, simplifies operations, boosts IT productivity, unifies security, and reduces costs.</li>\r\n<li>Advanced anti-malware protection. Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.</li>\r\n<li>Machine learning analysis. Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.</li>\r\n<li>Dynamic application containment. Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.</li>\r\n<li>Proactive web security. Ensure safe browsing with web protection and filtering for endpoints.</li>\r\n<li>Actionable threat forensics. Quickly see where infections are, why they are occurring, and the length of exposure to understand the threat and react more quickly.</li>\r\n</ul>\r\n","shortDescription":"McAfee Endpoint Security is an integrated, centrally managed, advanced defenses","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Endpoint Security","keywords":"McAfee, threat, protection, response, detection, Endpoint, they, endpoint","description":"Advanced, consolidated endpoint defense McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint","og:title":"McAfee Endpoint Security","og:description":"Advanced, consolidated endpoint defense McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint"},"eventUrl":"","translationId":1733,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":400,"title":"High costs"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.mcafee.com/enterprise/en-us/assets/case-studies/cs-somos.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":542,"title":"McAfee Endpoint Security for global software company","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Integrating McAfee® Advanced Threat Defense and the Bro open-source network </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">security platform widens the scope of threat detection to include unmanaged devices</span>\r\n<span style=\"font-weight: bold; \">Multinational Software Company</span>\r\n<ul><li>Large global software company</li><li>Industry: Technology</li><li>Environment: Fluid environment with up to 150,000 endpoints at any given time, many of them virtual, across 20 countries</li></ul>\r\n<span style=\"font-weight: bold; \">Challenges</span>\r\n<ul><li>Protect against zero-day threats across extended global enterprise</li><li>Shrink detection to remediation gap</li></ul>\r\n<span style=\"font-weight: bold; \">McAfee solution</span>\r\n<ul><li>McAfee® Advanced Threat Defense</li><li>McAfee® Complete Endpoint Threat Protection</li><li>McAfee® ePolicy Orchestrator®</li><li>McAfee® Threat Intelligence Exchange</li></ul>\r\n<span style=\"font-weight: bold; \">Results</span>\r\n<ul><li>Accelerates time to protection, thanks to automation</li><li>Augments threat reputation information shared across</li><li>McAfee ePO softwaremanaged devices with information gleaned from incidents involving unmanaged devices</li><li>Facilitates endpoint incident forensics and accelerates response</li><li>Saves security operations time and hassle</li></ul>\r\nAutomated submission of threat information to McAfee Advanced Threat Defense and automated sharing of that information across the enterprise improves protection while saving security operations time and hassle.\r\nThis large global software company with more than 20,000 employees in 20 countries has implemented an IT infrastructure that is highly virtual and fluid. Systems come and go daily on the company’s network. For instance, in a recent week, 45,000 systems, including virtual machines, connected to the corporate network. However, during peak periods, up to 150,000 endpoints can be connected. For the company’s senior manager of security engineering, who oversees the team responsible for deployment of all security tools across the global enterprise, this environment poses distinct challenges.\r\n<span style=\"font-weight: bold; \">Challenge: Close Gaps to Block Zero-Day Attacks</span>\r\nAlthough the company employs the McAfee Complete Endpoint Threat Protection suite on all its high-risk physical and virtual endpoints, it also has many virtual endpoints connecting to its network that do not have a McAfee agent installed and are therefore not updated with the latest threat protection via the McAfee ePolicy Orchestrator (McAfee® ePO™) management console. The company’s more important virtual machines host a McAfee agent but many “low-risk” systems do not. Until recently, if one of these unmanaged endpoints downloaded a malicious file, the McAfee ePO softwaremanaged endpoints would be at risk because they had no way of knowing of the existence of that threat within the environment.\r\n<span style=\"font-style: italic; \">“Zero-day threats are our biggest concern,” remarks the senior manager of security engineering. “If any of our endpoints—managed or unmanaged—downloads a zero-day threat, we want our whole environment to know about it, and we want to be able to react appropriately as fast as possible.”</span>\r\nIn addition, if a managed endpoint became infected, security analysts would receive an alert, but, because of the fluidity of systems coming on and off the network, by the time an analyst has logged in and has attempted to find the suspicious payload, the system could easily have moved offline, essentially removing the information needed to understand what had transpired. As a result, security operations center (SOC) engineers found that they had to spend extra time tracking down infected systems and remediating them.\r\n<span style=\"font-weight: bold; \">Hunting and Blocking Zero-Day Threats with McAfee Advanced Threat Defense</span>\r\nAlong with McAfee Complete Endpoint Threat Protection, the company had implemented the Data Exchange Layer (DXL) communication fabric and McAfee Threat Intelligence Exchange. DXL connects and optimizes security actions across multiple vendor products, as well as internally developed and open source solutions, and McAfee Threat Intelligence Exchange leverages DXL to bi-directionally share threat information across all DXL-connected systems. To this automated threat reputation-sharing framework, the company added McAfee Advanced Threat Defense for “zero-day hunting,” as the senior manager of security engineering describes the appliance’s main role. \r\n<span style=\"font-style: italic;\">“If an unknown or suspicious file comes across one of</span><span style=\"font-style: italic;\">our endpoints protected by McAfee Endpoint Security, </span><span style=\"font-style: italic;\">the file is automatically sent to McAfee Advanced Threat</span><span style=\"font-style: italic;\">Defense for sophisticated static and dynamic behavioral</span><span style=\"font-style: italic;\">analysis,” explains the senior manager of security</span><span style=\"font-style: italic;\">engineering. “If McAfee Advanced Threat Defense</span><span style=\"font-style: italic;\">deems the file to be malicious, its reputation is then</span><span style=\"font-style: italic;\">automatically broadcast via McAfee Threat Intelligence</span><span style=\"font-style: italic;\">Exchange to all the endpoints connected to DXL. This</span><span style=\"font-style: italic;\">automatic distribution of threat reputation information</span><span style=\"font-style: italic;\">helps us block zero-day threats before they can harm</span><span style=\"font-style: italic;\">our environment.”</span>\r\n<span style=\"font-weight: bold;\">Enhancing Intrusion Detection with Bro</span>\r\nBut what about threats entering the environment through the company’s many unmanaged endpoints? To extend detection to these systems, the company turned to the open-source Bro network security monitoring platform. Bro ingests the company’s network traffic off a span or inline tap and converts the traffic data into logs and metadata in binary format. In a typical week, Bro submits approximately 6,000 files to McAfee Advanced Threat Defense for analysis. Of those, approximately 10% to 20% end up in the McAfee Threat Intelligence Exchange threat reputation database and are subsequently shared throughout the enterprise.\r\n<span style=\"font-style: italic;\">“Bro gives us the ability to retain network traffic in a searchable format, which is extremely useful,” the senior manager of security engineering explains. “For instance, using Bro, we can search for source or distributed IP so we can easily conduct lightweight investigations— discover who or what connected to a specific IP address, what the payload looks like, determine the packet size, and so on.”</span>\r\nThe information captured by Bro supplements the threat information delivered via the McAfee Global Threat Intelligence cloud and disseminated via McAfee Threat Intelligence Exchange. With the Bro script and advice provided by McAfee (now available as a deployment kit), the senior manager of security engineering’s team integrated Bro with McAfee Advanced Threat Defense so that the Bro traffic data is automatically submitted to McAfee Advanced Threat Defense, just as suspicious files from McAfee Endpoint Security are automatically submitted through McAfee Threat Intelligence Exchange.\r\nSince the team was already very familiar with Bro, the integration was straightforward. \r\n<span style=\"font-weight: bold;\">Automatic Immunization Against Threats that Hit Unmanaged Endpoints</span>\r\n<span style=\"font-style: italic;\">“If one of our unmanaged endpoints downloads a malicious file, Bro will capture that event among the </span><span style=\"font-style: italic;\">network traffic and submit it to McAfee Advanced</span><span style=\"font-style: italic;\">Threat Defense for analysis,” notes the senior manager</span><span style=\"font-style: italic;\">of security engineering. “If McAfee Advanced Threat</span><span style=\"font-style: italic;\">Defense determines the file is malicious, then that</span><span style=\"font-style: italic;\">malicious reputation will be shared automatically with</span><span style=\"font-style: italic;\">every McAfee ePO software-managed system in our</span><span style=\"font-style: italic;\">entire enterprise—in other words, with all the systems</span><span style=\"font-style: italic;\">we care about. Put another way, if one of our unmanaged</span><span style=\"font-style: italic;\">virtual machines downloads a malicious file, all of our</span><span style=\"font-style: italic;\">managed devices automatically receive an immune shot.”</span>\r\n<span style=\"font-weight: bold;\">Facilitating and Accelerating Incident Response</span>\r\nWith the McAfee Advanced Threat Defense/Bro integration and threat reputation information automatically disseminated across endpoints via McAfee Threat Intelligence Exchange, inoculation of endpoints happens much faster than it did before. Consequently, there is a much greater likelihood that a system will “receive the immune shot” before it goes offline. In addition, because the actual event and surrounding intelligence is captured by Bro, even if the system goes offline, McAfee Advanced Threat Defense, as well as security analysts, have a great deal more information to help determine appropriate action, and, if necessary, to remediate more quickly.\r\n<span style=\"font-style: italic;\">“With the McAfee automated threat framework and supporting intelligence from the Bro integration, plus automated remediation that we have also set up, our SOC very rarely needs to pay attention to endpoint incidents,” points out the senior manager of security engineering. “The Bro integration and all that automation save a ton of time.”</span>\r\nTo fortify its defenses further, the company continues to build upon its DXL-based integrated security framework. For instance, the company is currently in the process of adding McAfee DLP Monitor to gather, track, and report on data in motion across its entire network and augment its McAfee DLP Endpoint host-based data protection.\r\n<span style=\"font-style: italic;\">“The more we can integrate our systems and automate </span><span style=\"font-style: italic;\">responses, the safer we will be,” says the senior manager</span><span style=\"font-style: italic;\">of security engineering.</span>","alias":"mcafee-endpoint-security-for-global-software-company","roi":0,"seo":{"title":"McAfee Endpoint Security for global software company","keywords":"McAfee, Threat, security, Advanced, threat, endpoints, that, information","description":"Integrating McAfee® Advanced Threat Defense and the Bro open-source network security platform widens the scope of threat detection to include unmanaged","og:title":"McAfee Endpoint Security for global software company","og:description":"Integrating McAfee® Advanced Threat Defense and the Bro open-source network security platform widens the scope of threat detection to include unmanaged"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":13,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":1732,"logo":false,"scheme":false,"title":"McAfee Endpoint Security","vendorVerified":0,"rating":"2.00","implementationsCount":4,"suppliersCount":0,"alias":"mcafee-endpoint-security","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Advanced, consolidated endpoint defense</span> McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint environment. <span style=\"font-weight: bold;\">Core threat prevention</span> Essential anti-virus, exploit prevention, firewall, and web control communicate with each other. <span style=\"font-weight: bold;\">Machine learning</span> State-of-the art techniques identify malicious code based on appearance and behavior. <span style=\"font-weight: bold;\">Application containment</span> Limit the impact of suspicious files and zero-day malware by blocking behaviors and containing them before they can infect or spread in your environment. <span style=\"font-weight: bold;\">Endpoint detection and response</span> Our integrated, automated, and adaptable endpoint detection and response (EDR) technology is easy to use and makes incident response as simple as a single click. <span style=\"font-weight: bold;\">Product features</span>\r\n<ul>\r\n<li>Centralized management. The McAfee ePolicy Orchestrator management console can be deployed on premises or in the cloud. It provides greater visibility, simplifies operations, boosts IT productivity, unifies security, and reduces costs.</li>\r\n<li>Advanced anti-malware protection. Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.</li>\r\n<li>Machine learning analysis. Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.</li>\r\n<li>Dynamic application containment. Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.</li>\r\n<li>Proactive web security. Ensure safe browsing with web protection and filtering for endpoints.</li>\r\n<li>Actionable threat forensics. Quickly see where infections are, why they are occurring, and the length of exposure to understand the threat and react more quickly.</li>\r\n</ul>\r\n","shortDescription":"McAfee Endpoint Security is an integrated, centrally managed, advanced defenses","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Endpoint Security","keywords":"McAfee, threat, protection, response, detection, Endpoint, they, endpoint","description":"Advanced, consolidated endpoint defense McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint","og:title":"McAfee Endpoint Security","og:description":"Advanced, consolidated endpoint defense McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint"},"eventUrl":"","translationId":1733,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":397,"title":"Insufficient risk management"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.mcafee.com/enterprise/en-us/assets/case-studies/cs-multinational-software-company.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":541,"title":"McAfee Endpoint Security for marketing company","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">With McAfee® Endpoint Security, McAfee Advanced Threat Defense, and McAfee Threat </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Intelligence Exchange, this CIO can focus on his main job, using technology to</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">keep his company thriving and to increase value for his company’s customers, not</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">information security. </span>\r\n<span style=\"font-weight: bold; \">Challenges</span>\r\nSimplify security management for small information security team\r\nMinimize impact of security on business end users\r\nKeep organization secure, avoid unwanted appearances in the boardroom \r\n<span style=\"font-weight: bold; \">McAfee Solution</span>\r\n<ul><li>McAfee® Advanced ThreatDefense</li><li>McAfee Complete Endpoint Threat Protection</li><li>McAfee Endpoint Security</li><li>McAfee ePolicy Orchestrator</li><li>McAfee Threat Intelligence Exchange</li></ul>\r\n<span style=\"font-weight: bold; \">Results</span>\r\n<ul><li>Elimination of ransomware</li><li>Superior endpoint protection experience for both end users and administrators</li><li>Ability to focus on business rather than security issues</li><li>Trusted partnership with company focused solely on security</li></ul>\r\nHarry Folloder loves his job as Chief Information Officer of Waypoint, the premier sales and marketing agency for foodservice (as well as non-foods channels) in North America. As CIO, he oversees the use of technology within the company and across its 1,500 endpoints and three data centers. <span style=\"font-style: italic;\">“It’s fun,” he says. “I get to spend a lot of my time innovating and looking for ways to use technology to increase the value we provide our customers.”</span>\r\n<span style=\"font-weight: bold;\">No News is Good News</span>\r\nFolloder’s job was a lot less fun and his phone a lot less quiet a few years ago. <span style=\"font-style: italic;\">“So much of my security staff’s time was spent dealing with false positives and other program problems; they would end up calling me and griping about the problems,” recalls Folloder, who is also CIO of Marlin Networks, the leading marketing agency in the food service industry.</span>\r\n<span style=\"font-style: italic;\">“Sometimes the security issues would even take salespeople out of the field for a day or two while waiting for the issue to be resolved. Ultimately, I decided we needed a security partner focused solely on security, with products that do what they’re supposed to do, so I don’t have to hear about them and, more importantly, so our end users can keep focusing on doing their part to serve our customers and grow our business.”</span>\r\nFolloder says his top priority as CIO is to be an ambassador to clients and customers and to keep the business moving forward. “Keeping security running is not my job,” he says. “When security is running smoothly and my phone is quiet, with no unwanted calls from my security team or my Board, then I can focus on my real job.”\r\n<span style=\"font-weight: bold;\">Result of Migrating to McAfee Endpoint Security: Better User Experience and Reduced TCO</span>\r\nFolloder found in McAfee the security partner he was looking for. After replacing Waypoint’s previous endpoint protection software with McAfee Complete Endpoint Protection Enterprise (now called McAfee Complete Endpoint Threat Protection), phone calls from his staff decreased significantly. When Folloder and his staff heard that McAfee was introducing a new, more intelligent, more collaborative endpoint protection framework, McAfee Endpoint Security, they couldn’t wait to take advantage of it. After running McAfee Endpoint Security version 10.2 briefly in a test environment, they used the McAfee ePolicy Orchestrator® (McAfee ePO™) central console to push it out across all of Waypoint’s approximately 1,500 nodes. The migration of the virus scanning engine, McAfee VirusScan® Enterprise, and McAfee SiteAdvisor® software from the McAfee Complete Endpoint Threat Protection to McAfee Endpoint Security took place within a two-and-a-half-week period that also included deployment of McAfee Threat Intelligence Exchange across all endpoints and McAfee Advanced Threat Defense for sandbox analysis.\r\n<span style=\"font-style: italic;\">“Migrating to McAfee Endpoint Security was one of the easiest platform migrations ever,” notes Folloder. “It went off without a hitch. The only calls received were from a handful of users who had shut down or rebooted in the middle of the upgrade process. Folloder and his staff have been extremely pleased with the results. “McAfee Endpoint Security is a much better experience for our administrative staff, providing better protection with less management time,” says Folloder.</span>\r\n<span style=\"font-style: italic;\">“It allows us to better serve our business with higher quality levels, lower total cost of ownership, and lower cost of administration. It also allows our business users to focus on their jobs rather than issues caused by security software.”</span>\r\n<span style=\"font-weight: bold;\">No Ransomware. Period.</span>\r\nFolloder was most excited to integrate McAfee Endpoint Security with McAfee Advanced Threat Defense via McAfee Threat Intelligence Exchange, for even greater ability to combat advanced threats and deliver actionable threat forensics. Leveraging the McAfee Data Exchange Layer (DXL), McAfee Threat Intelligence Exchange combines multiple internal and external threat information sources and instantly shares this data along the DXL backbone that extends to all of the company’s nearly 1,500 nodes. Integration of McAfee Endpoint Security with Threat Intelligence Exchange enables information generated by McAfee Advanced Threat Defense to be shared immediately with all endpoints.\r\n<span style=\"font-style: italic;\">“McAfee Threat Intelligence Exchange is information sharing at its best; you’re aggregating everything that McAfee and all of its customers are seeing in a way that helps crowdsource the good info,” explains Folloder.</span>\r\n<span style=\"font-style: italic;\">“It gives us comprehensive, near real-time threat intelligence and shares it with all our machines to make them safer.”</span>\r\n<span style=\"font-style: italic;\">As for McAfee Advanced Threat Defense, Folloder says: “One of the initial things that caught my eye was the inspection methodology and in-depth analysis that Advanced Threat Defense does, that I just didn’t see elsewhere. Its simple packet inspection, which is what a lot of malware targets, and in-depth analysis of disassembled raw code drew me in immediately. Then when I found out what else it did, I became a true believer. Best of all, it fulfills its promise to detect zeroday, zero-hour attacks, and does so in a very elegant way with minimal end-user impact.”</span>\r\n“Since implementing McAfee Endpoint Security, Threat Intelligence Exchange, and Advanced Threat Defense, we haven’t had a single case of ransomware,” says Folloder.\r\n“Period.” McAfee Advanced Threat Defense also catches many undesirable files that try to install on users’ browsers, such as adware, the Mindspark toolbar, fake utilities like Optimizer Pro and PC Accelerator, and plugins for music players, coupons, and online games.\r\n<span style=\"font-weight: bold;\">Experience Improved for Both Business Users and Security Administrators</span>\r\nWaypoint’s legacy endpoint protection—McAfee VirusScan Enterprise software—although many times better than the company’s previous antivirus solution, still required some heavy processor usage at times. With the upgrade to McAfee Endpoint Security, however, the impact of malware scanning on CPU utilization has diminished significantly. \r\n“Our end users have a much better experience,” says Folloder. “Whether or not their personal computer has experienced a significant change in processor usage, all of our users perceive less interference and faster computing. Since the rollout of McAfee Endpoint Security, we haven’t heard a single complaint about corporate virus scans.”\r\nThe user experience for Waypoint’s two information security administrators has also improved with the migration to McAfee Endpoint Security. “I don’t have to interact with [Endpoint Security] much, which is a good thing,” says Folloder, “but my techs say that it has a much nicer, more modern interface than before.”\r\n<span style=\"font-weight: bold;\">Quiet and Peace of Mind “Worth Every Penny” </span>\r\n<span style=\"font-style: italic;\">“At my level, the measure of success for a product is that I haven’t had to hear about it or worry about it,” says Folloder. “I haven’t had to mess with McAfee Endpoint Security. I haven’t had to hear from anyone in the C-suite or their direct reports. It is doing exactly what we paid for it to do and I love it.” Furthermore, adds Folloder, since the migration to McAfee Endpoint Security, endpoint protection has not interrupted a single associate or sales person’s work. “The less interruptions of business and service to our customers, the better,” he states. “That’s really my overarching goal. That’s why I invest in products like McAfee Endpoint Security. It’s worth every penny.”</span>\r\n<span style=\"font-weight: bold;\">A True Security Partner</span>\r\nBut it’s not just the quality of products that count. “I look for partners, not vendors,’ says Folloder. “At the end of the day we’re a service company. Partnering with the best allows us to focus on our core competency.”\r\n<span style=\"font-style: italic;\">“I know I sound like an ad for McAfee, but I really do love that I can sleep at night, knowing that Waypoint’s IT infrastructure is protected by a company that is focused on protecting my environment and not distracted by backup or storage or whatnot,” continues Folloder. “Ask yourself, ‘Is my security vendor focused specifically on securing my environment? Does it have leading researchers and state-of-the-art resources to protect my infrastructure and users, and to keep innovating and evolving to face new threats?’ Take a hard look. My experience with McAfee has been everything a partnership should be and more.”</span>","alias":"mcafee-endpoint-security-for-marketing-company","roi":0,"seo":{"title":"McAfee Endpoint Security for marketing company","keywords":"McAfee, Endpoint, Security, with, Folloder, Threat, security, that","description":"With McAfee® Endpoint Security, McAfee Advanced Threat Defense, and McAfee Threat Intelligence Exchange, this CIO can focus on his main job, using","og:title":"McAfee Endpoint Security for marketing company","og:description":"With McAfee® Endpoint Security, McAfee Advanced Threat Defense, and McAfee Threat Intelligence Exchange, this CIO can focus on his main job, using"},"deal_info":"","user":{"id":4370,"title":"Waypoint","logoURL":"https://old.b4r.io/uploads/roi/company/Waypoint.png","alias":"waypoint","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Waypoint is the premier national sales and marketing agency for Foodservice and Non-Foods channels and beyond.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Succeeding in today’s competitive marketplace begins with gaining the advantage, and at Waypoint we stay ahead of the curve. Our partners rely on our unparalleled strategic insights, channel-specific expertise and resources, and innovative culinary support to deliver that competitive advantage. But helping our partners gain the advantage is not enough for us – we make it our business to maximize it through our pioneering technology and big data mining capabilities. We help position our partners to consistently beat their competition and to grow their business.</span>\r\n","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://asmwaypoint.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Waypoint","keywords":"advantage, partners, Waypoint, competitive, their, business, enough, make","description":"Waypoint is the premier national sales and marketing agency for Foodservice and Non-Foods channels and beyond.\r\rSucceeding in today’s competitive marketplace","og:title":"Waypoint","og:description":"Waypoint is the premier national sales and marketing agency for Foodservice and Non-Foods channels and beyond.\r\rSucceeding in today’s competitive marketplace","og:image":"https://old.b4r.io/uploads/roi/company/Waypoint.png"},"eventUrl":""},"supplier":{},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":1732,"logo":false,"scheme":false,"title":"McAfee Endpoint Security","vendorVerified":0,"rating":"2.00","implementationsCount":4,"suppliersCount":0,"alias":"mcafee-endpoint-security","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Advanced, consolidated endpoint defense</span> McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint environment. <span style=\"font-weight: bold;\">Core threat prevention</span> Essential anti-virus, exploit prevention, firewall, and web control communicate with each other. <span style=\"font-weight: bold;\">Machine learning</span> State-of-the art techniques identify malicious code based on appearance and behavior. <span style=\"font-weight: bold;\">Application containment</span> Limit the impact of suspicious files and zero-day malware by blocking behaviors and containing them before they can infect or spread in your environment. <span style=\"font-weight: bold;\">Endpoint detection and response</span> Our integrated, automated, and adaptable endpoint detection and response (EDR) technology is easy to use and makes incident response as simple as a single click. <span style=\"font-weight: bold;\">Product features</span>\r\n<ul>\r\n<li>Centralized management. The McAfee ePolicy Orchestrator management console can be deployed on premises or in the cloud. It provides greater visibility, simplifies operations, boosts IT productivity, unifies security, and reduces costs.</li>\r\n<li>Advanced anti-malware protection. Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.</li>\r\n<li>Machine learning analysis. Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.</li>\r\n<li>Dynamic application containment. Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.</li>\r\n<li>Proactive web security. Ensure safe browsing with web protection and filtering for endpoints.</li>\r\n<li>Actionable threat forensics. Quickly see where infections are, why they are occurring, and the length of exposure to understand the threat and react more quickly.</li>\r\n</ul>\r\n","shortDescription":"McAfee Endpoint Security is an integrated, centrally managed, advanced defenses","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Endpoint Security","keywords":"McAfee, threat, protection, response, detection, Endpoint, they, endpoint","description":"Advanced, consolidated endpoint defense McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint","og:title":"McAfee Endpoint Security","og:description":"Advanced, consolidated endpoint defense McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint"},"eventUrl":"","translationId":1733,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":397,"title":"Insufficient risk management"},{"id":400,"title":"High costs"},{"id":384,"title":"Risk of attacks by hackers"},{"id":356,"title":"High costs of routine operations"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.mcafee.com/enterprise/en-us/assets/case-studies/cs-waypoint.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":32,"title":"McAfee Enterprise Security Manager для пивоваренной компании","description":"О заказчике\r\n\r\nEfes Rus — пивоваренная компания, входящая в четверку крупнейших игроков на российском рынке, подразделение международной пивоваренной компании Anadolu Efes. На сегодняшний день в активах Efes Rus шесть пивоваренных заводов — в Калуге, Уфе, Казани, Новосибирске, Ульяновске и Владивостоке и 1 солодовенный комплекс.\r\n\r\nПроблематика\r\n\r\nПостоянное развитие ИТ-инфраструктуры, увеличение числа пользователей, расширение спектра приложений привело к увеличению объема требующих анализа данных и практической невозможности контролировать состояние информационной безопасности (ИБ) компании без использования дополнительных средств, поэтому руководством компании Efes Rus было приняло решение о внедрении системы мониторинга событий информационной безопасности (SIEM).\r\n\r\nДля реализации этого проекта была выбрана компания «Андэк».\r\n\r\nКроме того, сотрудниками «Андэк» ранее был проведен аудит обработки персональных данных в компании Efes Rus. Внедрение системы SIEM было одной из рекомендаций по результатам этого проекта, призванной реализовать требования по управлению событиями информационной безопасности в информационных системах персональных данных.\r\n\r\nЗадачи\r\n\r\nПеред специалистами компании «Андэк» стояла задача не просто внедрить SIEM систему, необходимо было обеспечить подключение специфических источников событий, а также реализовать мониторинг действий привилегированных пользователей и контроль использования приложений SAP. Кроме этого, необходимо было подключить источники событий (элементы ИТ-инфраструктуры, СУБД, приложения SAP), настроить мониторинг прав привилегированных пользователей, провести настройку корреляции событий от различных источников с целью автоматического выявления инцидентов ИБ и провести настройку отчетов и панелей мониторинга для использования специалистами по ИБ компании Efes Rus.\r\n\r\nОписание проекта\r\n\r\nК моменту начала реализации проекта в московском офисе Efes Rus еще не были внедрены средства автоматизированного централизованного мониторинга событий ИБ. После консультаций было принято решение реализовать систему мониторинга событий на базе McAfee ESM, развернув ее в виртуальной среде Заказчика.\r\n\r\nСпециалистами Андэка были разработаны кастомизированные парсеры журналов для нескольких систем: аудита СУБД DB2, журналов аудита приложений SAP и журналов трафика системы MS Exchange 2013, позволяющие собирать события с источников. Для контроля привилегированных пользователей была выполнена глубокая интеграция системы с несколькими доменами Active Directory.\r\n\r\nВо внедренной SIEM системе был реализован мониторинг назначения и использования привилегий (ролей) SAP, а также мониторинг запуска критичных бизнес-транзакций, в реальном времени и генерация исторической отчетности в соответствие с требованиями Заказчика. Были настроены правила корреляции, позволяющие выявлять критичные инциденты ИБ автоматически и уведомлять о них ответственный персонал компании-заказчика.\r\n\r\nРезультат\r\n\r\nВнедрение SIEM системы повысило уровень защиты от внешних угроз, реализованный проект позволяет специалистам Efes Rus получить целостную картинку ситуации в корпоративной сети, визуализированную и упорядоченную, так как SIEM осуществляет централизованный сбор, обработку и хранение событий информационной безопасности. Кроме этого, система предоставляет возможности использования отчетности разной степени детализации и периода, что облегчает проведение расследований инцидентов.\r\n\r\nКомментарий заказчика\r\n\r\n«Система автоматического информирования зарекомендовала себя положительно. Она позволяет выстраивать автоматический превентивный контроль по ряду транзакций и процессов, которые могут быть сочтены критическими, позволяет в режиме online реагировать на возникающие угрозы в части возникновения критического совмещения полномочий. Внедренная SIEM-система является дополнительным, но не лишним инструментом контроля» — подчеркнул Павел Шветц, менеджер по внутреннему контролю компании Efes Rus.\r\n\r\nКомментарий специалиста компании «Андэк»\r\n\r\nДмитрий Никифоров, руководитель дирекции реализации проектов компании «Андэк» прокомментировал данный проект: «Мы рады, что нам представилась возможность участвовать в этом проекте, нашими специалистами был получен уникальный опыт прямого подключения журналов аудита SAP без помощи сторонних средств. Надеемся, что наше давнее и плодотворное сотрудничество в части внедрения и развития систем обеспечения информационной безопасности продолжится и в дальнейшем».","alias":"mcafee-enterprise-security-manager-dlja-pivovarennoi-kompanii","roi":0,"seo":{"title":"McAfee Enterprise Security Manager для пивоваренной компании","keywords":"компании, Efes, событий, SIEM, использования, системы, было, Андэк","description":"О заказчике\r\rEfes Rus — пивоваренная компания, входящая в четверку крупнейших игроков на российском рынке, подразделение международной пивоваренной компании","og:title":"McAfee Enterprise Security Manager для пивоваренной компании","og:description":"О заказчике\r\rEfes Rus — пивоваренная компания, входящая в четверку крупнейших игроков на российском рынке, подразделение международной пивоваренной компании"},"deal_info":"","user":{"id":2876,"title":"Efes Rus","logoURL":"https://old.b4r.io/uploads/roi/company/Efes_Rus.png","alias":"efes-rus","address":"","roles":[],"description":"Efes Rus - brewing company, part of the four largest players in the Russian market, a division of the international brewing company Anadolu Efes. To date, the assets of Efes Rus six breweries - in Kaluga, Ufa, Kazan, Novosibirsk, Ulyanovsk and Vladivostok and 1 malthouse development.\r\n \r\nHistory Efes Rus is rooted in the history of the two brewing giants - Anadolu Efes and SABMiller. The company was founded by Anadolu Efes in Turkey in 1969. Currently, Anadolu Efes ranks 6th among brewing companies in Europe and 11th in the world. The company's assets - 15 active breweries, located in Turkey, Russia, Kazakhstan, Moldova, Georgia and Ukraine. In each country where the enterprise, the company is presented as a major international brands and local grocery brands that are leaders in their local markets. Shipments of beer and other products, which is produced at these plants are produced in more than 65 countries.\r\nIn Russia, Anadolu Efes company operates since 1997. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://efesrus.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Efes Rus","keywords":"Efes, company, Anadolu, brewing, assets, produced, Turkey, breweries","description":"Efes Rus - brewing company, part of the four largest players in the Russian market, a division of the international brewing company Anadolu Efes. To date, the","og:title":"Efes Rus","og:description":"Efes Rus - brewing company, part of the four largest players in the Russian market, a division of the international brewing company Anadolu Efes. To date, the","og:image":"https://old.b4r.io/uploads/roi/company/Efes_Rus.png"},"eventUrl":""},"supplier":{"id":632,"title":"Андэк","logoURL":"https://old.b4r.io/uploads/roi/company/Andehk.png","alias":"andehk","address":"","roles":[],"description":"Команда «Андэк» объединила уникальных экспертов в области экономической и информационной безопасности.\r\n\r\nВ компании собраны специалисты из отдельных отраслей, которые хорошо разбираются в специфике задач не только с позиции интегратора, но и с позиции клиента. Наша команда состоит из опытных и сертифицированных экспертов: консультантов, аудиторов, аналитиков, архитекторов, инженеров, специалистов по решениям разработчиков средств защиты информации, менеджеров по управлению проектами и работе с клиентами.\r\n\r\nВысокая квалификация, опыт наших экспертов, а также знание отраслевой специфики позволяют нам вместе с нашими заказчиками внедрять решения, снижающие риски, применять целесообразные меры по построению, модификации и управлению системами информационной и экономической безопасности компании.\r\n\r\nНаши сотрудники имеют действующие сертификаты крупнейших мировых поставщиков решений по безопасности: Check Point Software Technologies, Cisco, McAfee, HP/ArcSight, McAfee, Oracle, Microsoft и др.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.andek.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Андэк","keywords":"безопасности, экспертов, компании, управлению, McAfee, Андэк, позиции, экономической","description":"Команда «Андэк» объединила уникальных экспертов в области экономической и информационной безопасности.\r\rВ компании собраны специалисты из отдельных отраслей,","og:title":"Андэк","og:description":"Команда «Андэк» объединила уникальных экспертов в области экономической и информационной безопасности.\r\rВ компании собраны специалисты из отдельных отраслей,","og:image":"https://old.b4r.io/uploads/roi/company/Andehk.png"},"eventUrl":""},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":79,"logo":false,"scheme":false,"title":"McAfee Enterprise Security Manager","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"mcafee-enterprise-security-manager","companyTypes":[],"description":"<h3 style=\"margin: 0px 10px 5px 0px; padding: 0px; border: 0px; outline: 0px; font-weight: normal; font-family: intel_clear_wbold, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px; line-height: 20px; color: rgb(83, 86, 90); \">Real-time visibility into all activity on systems, networks, databases, and applications</h3>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: rgb(83, 86, 90); font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; \">McAfee Enterprise Security Manager delivers a real-time understanding of the world outside—threat data, reputation feeds, and vulnerability status—as well as a view of the systems, data, risks, and activities inside your enterprise.</p>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: rgb(83, 86, 90); font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; \">As the foundation of our security information and event management (SIEM) solution, McAfee Enterprise Security Manager delivers the performance, actionable intelligence, and real-time situational awareness required for organizations to identify, understand, and respond to stealthy threats, while the embedded compliance framework simplifies compliance.</p>\r\n<h3 style=\"margin: 0px 10px 5px 0px; padding: 0px; border: 0px; outline: 0px; font-weight: normal; font-family: intel_clear_wbold, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px; line-height: 20px; color: rgb(83, 86, 90); \">Advanced threat intelligence</h3>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: rgb(83, 86, 90); font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; \">Get actionable information on all collected events with contextual information, such as vendor threat feeds and shared indicators of compromise (IOC), to deliver prioritized, actionable information in minutes.</p>\r\n<h3 style=\"margin: 0px 10px 5px 0px; padding: 0px; border: 0px; outline: 0px; font-weight: normal; font-family: intel_clear_wbold, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px; line-height: 20px; color: rgb(83, 86, 90); \">Critical facts in minutes, not hours</h3>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: rgb(83, 86, 90); font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; \">Store billions of events and flows, keeping information available for immediate ad hoc queries, forensics, rules validation, and compliance. Access long-term event data storage to investigate attacks, search for indications of advanced persistent threats (APTs) or IOC, and remediate a failed compliance audit.</p>\r\n<h3 style=\"margin: 0px 10px 5px 0px; padding: 0px; border: 0px; outline: 0px; font-weight: normal; font-family: intel_clear_wbold, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px; line-height: 20px; color: rgb(83, 86, 90); \">Optimize security management and operations</h3>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: rgb(83, 86, 90); font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; \">Centralize the view of your organization’s security posture, compliance status, and prioritized security issues that require investigation. Access hundreds of reports, views, rules, alerts, and dashboards.</p>","shortDescription":"McAfee Enterprise Security Manager delivers a real-time understanding of the world outside—threat data, reputation feeds, and vulnerability status—as well as a view of the systems, data, risks, and activities inside your enterprise.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Enterprise Security Manager","keywords":"compliance, information, security, McAfee, data, actionable, Security, Enterprise","description":"Real-time visibility into all activity on systems, networks, databases, and applications\rMcAfee Enterprise Security Manager delivers a real-time understanding","og:title":"McAfee Enterprise Security Manager","og:description":"Real-time visibility into all activity on systems, networks, databases, and applications\rMcAfee Enterprise Security Manager delivers a real-time understanding"},"eventUrl":"","translationId":84,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":77,"title":"SOC - Situation Centre","alias":"soc-situation-centre","description":"Ситуационный/диспетчерский центр — это помещение (зал, комната, кабинет), оснащённое средствами коммуникаций (видеоконференцсвязь, конференц-связь и другими средствами интерактивного представления информации), предназначенное для оперативного принятия управленческих решений, контроля и мониторинга объектов различной природы, ситуаций и других функций.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%82%D1%83%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D1%8B%D0%B9_%D1%86%D0%B5%D0%BD%D1%82%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SOC.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"ITSM (IT Service Management, управление ИТ-услугами) — подход к управлению и организации ИТ-услуг, направленный на удовлетворение потребностей бизнеса. Управление ИТ-услугами реализуется поставщиками ИТ-услуг путём использования оптимального сочетания людей, процессов и информационных технологий. Для содействия реализации подхода к управлению ИТ-услугами используется серия документов ITIL.\r\n\r\nВ отличие от более традиционного технологического подхода, ITSM рекомендует сосредоточиться на клиенте и его потребностях, на услугах, предоставляемых пользователю информационными технологиями, а не на самих технологиях. При этом процессная организация предоставления услуг и наличие заранее оговоренных в соглашениях об уровне услуг параметров эффективности (KPI) позволяет ИТ-отделам предоставлять качественные услуги, измерять и улучшать их качество.\r\n\r\nВажным моментом при изложении принципов ITSM является системность. При изложении каждого составного элемента ITSM (управление инцидентами, управление конфигурациями, управление безопасностью и т. д.) в обязательном порядке прослеживается его взаимосвязь и координация с остальными элементами (службами, процессами) и при этом даются необходимые практические рекомендации.\r\n\r\nITIL не является конкретным алгоритмом или руководством к действию, но она описывает передовой опыт (best practices) и предлагает рекомендации по организации процессного подхода и управления качеством предоставления услуг. Это позволяет оторваться от особенностей данного конкретного предприятия в данной конкретной отрасли. Вместе с тем, несмотря на определённую абстрактность, ITIL всячески нацелено на практическое использование. В каждом разделе библиотеки приводятся ключевые факторы успеха внедрения того или иного процесса, практические рекомендации при этом превалируют над чисто теоретическими рассуждениями.\r\nИсточник: https://ru.wikipedia.org/wiki/ITSM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ITSM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"},{"id":177,"title":"Decentralized IT systems"}]}},"categories":[{"id":77,"title":"SOC - Situation Centre","alias":"soc-situation-centre","description":"Ситуационный/диспетчерский центр — это помещение (зал, комната, кабинет), оснащённое средствами коммуникаций (видеоконференцсвязь, конференц-связь и другими средствами интерактивного представления информации), предназначенное для оперативного принятия управленческих решений, контроля и мониторинга объектов различной природы, ситуаций и других функций.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%82%D1%83%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D1%8B%D0%B9_%D1%86%D0%B5%D0%BD%D1%82%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SOC.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"ITSM (IT Service Management, управление ИТ-услугами) — подход к управлению и организации ИТ-услуг, направленный на удовлетворение потребностей бизнеса. Управление ИТ-услугами реализуется поставщиками ИТ-услуг путём использования оптимального сочетания людей, процессов и информационных технологий. Для содействия реализации подхода к управлению ИТ-услугами используется серия документов ITIL.\r\n\r\nВ отличие от более традиционного технологического подхода, ITSM рекомендует сосредоточиться на клиенте и его потребностях, на услугах, предоставляемых пользователю информационными технологиями, а не на самих технологиях. При этом процессная организация предоставления услуг и наличие заранее оговоренных в соглашениях об уровне услуг параметров эффективности (KPI) позволяет ИТ-отделам предоставлять качественные услуги, измерять и улучшать их качество.\r\n\r\nВажным моментом при изложении принципов ITSM является системность. При изложении каждого составного элемента ITSM (управление инцидентами, управление конфигурациями, управление безопасностью и т. д.) в обязательном порядке прослеживается его взаимосвязь и координация с остальными элементами (службами, процессами) и при этом даются необходимые практические рекомендации.\r\n\r\nITIL не является конкретным алгоритмом или руководством к действию, но она описывает передовой опыт (best practices) и предлагает рекомендации по организации процессного подхода и управления качеством предоставления услуг. Это позволяет оторваться от особенностей данного конкретного предприятия в данной конкретной отрасли. Вместе с тем, несмотря на определённую абстрактность, ITIL всячески нацелено на практическое использование. В каждом разделе библиотеки приводятся ключевые факторы успеха внедрения того или иного процесса, практические рекомендации при этом превалируют над чисто теоретическими рассуждениями.\r\nИсточник: https://ru.wikipedia.org/wiki/ITSM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ITSM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.andek.ru/ehkspertiza/istorii-uspexa/detail.php?ID=490","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":76,"title":"McAfee ePolicy Orchestrator (McAfee ePO) для Айбокс Банк","description":"Как показывает опыт последних лет, использование лишь одного антивируса на всех рабочих станциях корпоративной сети, как единственной средства для информационной защиты, уже не является достаточной и эффективной мерой для обеспечения высокого уровня информационной безопасности. На сегодняшний день, наиболее эффективным способом является комплексный подход к защите конечных точек. В связи с ежедневным повышением риска утери данных на рабочих станциях и серверах, офицеры информационной безопасности Айбокс Банка (АгроКомбанка) принялись за поиск решения для комплексной защиты рабочих станций.\r\nПродукты компании McAfee ежегодно признаются мировыми экспертами как одни из лучших решений на рынке. А линейка продуктов для защиты конечных точек по предоставлению непрерывной, обновляемой и мощной защиты от самых разных угроз - McAfee Endpoint Protection Suite и McAfee Total Protection for Data постоянно является лидером мировых рейтингов продуктов для защиты рабочих станций и серверов.\r\nСпециалистами компании ISSP была изучена сетевая инфраструктура банка и предложен вариант внедрения решений от компании McAfee. Универсальный инструмент McAfee ePolicy Orchestrator (McAfee ePO) – это масштабируемый под любую сетевую инфраструктуру механизм «все-в-одном» для централизованного управления, контроля и отчетности. еРО разработан для среды уровня «Энтерпрайз» благодаря чему за короткое время, были развернуты все продукты для комплексной защиты конечных точек: анти-вирус, анти-спам, межсетевой экран на рабочих станциях, продукт для безопасной работы в интернете, контроль портов, шифрования дисков, шифрование файлов и папок, шифрование съемных носителей.\r\nПо результатам проекта инфраструктура Айбокс Банка (АгроКомбанка) получила защищенные рабочие станции посредством установки продуктов для защиты конечных точек с возможностью управления ими с единой консоли еРО. Это позволяет удобно и централизовано вести постоянный контроль над всеми компьютерами в сети организации.","alias":"mcafee-epolicy-orchestrator-mcafee-epo-dlja-aiboks-bank","roi":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO) для Айбокс Банк","keywords":"McAfee, защиты, рабочих, точек, конечных, компании, является, Айбокс","description":"Как показывает опыт последних лет, использование лишь одного антивируса на всех рабочих станциях корпоративной сети, как единственной средства для","og:title":"McAfee ePolicy Orchestrator (McAfee ePO) для Айбокс Банк","og:description":"Как показывает опыт последних лет, использование лишь одного антивируса на всех рабочих станциях корпоративной сети, как единственной средства для"},"deal_info":"","user":{"id":2900,"title":"Ibox Bank","logoURL":"https://old.b4r.io/uploads/roi/company/Aiboks_Bank.png","alias":"aiboks-bank","address":"","roles":[],"description":"Ibox Bank operates in the Ukrainian market for over 20 years. During this time it has repeatedly been recognized as one of the most stable banks in Ukraine according to many experts, rating agencies in the banking industry.\r\n\r\nIn particular, in 2013 Ibox Bank was recognized the \"Most reliable and stable bank of the year\" at the First International Competition \"Trusted Bank\". In addition, the \"Bankir\" Magazine recognized the Ibox Bank as the \"Most customer-oriented bank\" in 2013.\r\n\r\nFor 20 years we have been entrusted the savings from more than 1,000 domestic investors. Also, the Ibox Bank became the bank of choice among 4000 thousands of successful companies, including 100 foreign ones.\r\n\r\nIbox Bank is a traditional universal bank that provides all kinds of services to individuals and legal entities of any type of ownership, with an emphasis on comfort and prompt service.\r\n\r\nIbox Bank obtains income through prudent investment in stable Ukrainian companies with an impeccable reputation and high profitability level, including the agricultural sector of Ukraine.\r\n\r\nOver the past 10 years Ibox Bank assets increased by 800%, confirming the right choice of Bank's strategy and demonstrating its continued successful development.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.iboxbank.online/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Ibox Bank","keywords":"Bank, Ibox, bank, recognized, stable, years, Ukraine, companies","description":"Ibox Bank operates in the Ukrainian market for over 20 years. During this time it has repeatedly been recognized as one of the most stable banks in Ukraine","og:title":"Ibox Bank","og:description":"Ibox Bank operates in the Ukrainian market for over 20 years. During this time it has repeatedly been recognized as one of the most stable banks in Ukraine","og:image":"https://old.b4r.io/uploads/roi/company/Aiboks_Bank.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":429,"logo":false,"scheme":false,"title":"McAfee ePolicy Orchestrator (McAfee ePO)","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"mcafee-epolicy-orchestrator-mcafee-epo","companyTypes":[],"description":"A single console for all your security management\r\nMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.\r\n\r\nGet a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks. \r\nSimplify security operations with streamlined workflows for proven efficiencies.\r\nFlexible security management options allow you to select either a traditional premises-based or a cloud-based management version of McAfee ePO.\r\nLeverage your existing third-party IT infrastructure from a single security management console with our extensible architecture.\r\n\r\nQuick deployment for maximum efficiency\r\n\r\nDeploy quickly and easily\r\nEnsure broad-based security and risk management solutions work together to reduce security gaps and complexity. Single agent deployment and customizable policy enforcement secure your environment quickly.\r\n\r\nGain efficiencies\r\nStreamline security and compliance workflows with automations and a personalized workspace. McAfee ePO offers an enterprise-class security management architecture that scales for organizations of all sizes, significantly reducing the number of servers to deploy.\r\n\r\nFuture-proof your security infrastructure\r\nProtect your organization from today’s—and tomorrow’s—threats. Real-time threat intelligence from McAfee Labs proactively guards your infrastructure. The open platform facilitates rapid adoption of security innovations as new threat categories emerge.","shortDescription":"McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO)","keywords":"security, your, management, McAfee, with, from, infrastructure, threat","description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security","og:title":"McAfee ePolicy Orchestrator (McAfee ePO)","og:description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security"},"eventUrl":"","translationId":430,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":5,"title":"Enhance Staff Productivity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"}]}},"categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=ru&id=94","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":69,"title":"McAfee ePolicy Orchestrator (McAfee ePO) для банка","description":"Проект по миграции сервера управления программным обеспечением McAfee, используется в банке на новую версию McAfee ePolicy Orchestrator 4.6 начался после окончания действия поддержки поставщиком старой версии Эро 4.5. В рамках этого проекта специалисты банка также решили реализовать некоторые изменения архитектуры работы решения с целью улучшения его производительности, а именно перенос базы данных на отдельный сервер.\r\nУчитывая, что ОАО «Альфа-Банк» - имеет большую инфраструктуру, а миграция требует углубленных знаний и работы с программным обеспечением (ПО) McAfee к проекту были привлечены специалисты компании-интегратора ООО «Информейшн Системс Секьюрити Партнерс» (ISSP).\r\nВ рамках проекта были проведены следующие этапы:\r\nДетальное исследование, анализ архитектуры и инфраструктуры заказчика\r\nОбщее определение плана процесса миграции и плана резервного копирования и восстановления ПО McAfee;\r\nПроверка выбранной модели реализации в тестовой среде;\r\nРаботы по переходу программного обеспечения.\r\nПо окончании основной части проекта для специалистов банка компания ISSP провела двухдневное обучение по администрированию обновленной системы.\r\nВ результате проекта банк получил программное обеспечение, поддерживается современными производителями ПО, а также обогатился новыми и усовершенствованными функциями управления защитой рабочих станций и серверов. В целом ОАО «Альфа-Банк» оптимизировал использование своих ресурсов, которые необходимы для обеспечения защиты конечных точек инфраструктуры банка.","alias":"mcafee-epolicy-orchestrator-mcafee-epo-dlja-banka","roi":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO) для банка","keywords":"McAfee, банка, проекта, также, архитектуры, специалисты, инфраструктуры, рамках","description":"Проект по миграции сервера управления программным обеспечением McAfee, используется в банке на новую версию McAfee ePolicy Orchestrator 4.6 начался после","og:title":"McAfee ePolicy Orchestrator (McAfee ePO) для банка","og:description":"Проект по миграции сервера управления программным обеспечением McAfee, используется в банке на новую версию McAfee ePolicy Orchestrator 4.6 начался после"},"deal_info":"","user":{"id":342,"title":"Alfa-Bank Ukraine","logoURL":"https://old.b4r.io/uploads/roi/company/alfabank.png","alias":"alfa-bank-ukraina","address":"","roles":[],"description":"Alfa-Bank Ukraine - a major Ukrainian commercial bank with international capital, which is a private investment holding company ABH Holdings SA (ABHH)with headquarters in Luxembourg. The holding compa","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://alfabank.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Alfa-Bank Ukraine","keywords":"Alfa-Bank, with, holding, Ukraine, company, Holdings, headquarters, compa","description":"Alfa-Bank Ukraine - a major Ukrainian commercial bank with international capital, which is a private investment holding company ABH Holdings SA (ABHH)with","og:title":"Alfa-Bank Ukraine","og:description":"Alfa-Bank Ukraine - a major Ukrainian commercial bank with international capital, which is a private investment holding company ABH Holdings SA (ABHH)with","og:image":"https://old.b4r.io/uploads/roi/company/alfabank.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":429,"logo":false,"scheme":false,"title":"McAfee ePolicy Orchestrator (McAfee ePO)","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"mcafee-epolicy-orchestrator-mcafee-epo","companyTypes":[],"description":"A single console for all your security management\r\nMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.\r\n\r\nGet a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks. \r\nSimplify security operations with streamlined workflows for proven efficiencies.\r\nFlexible security management options allow you to select either a traditional premises-based or a cloud-based management version of McAfee ePO.\r\nLeverage your existing third-party IT infrastructure from a single security management console with our extensible architecture.\r\n\r\nQuick deployment for maximum efficiency\r\n\r\nDeploy quickly and easily\r\nEnsure broad-based security and risk management solutions work together to reduce security gaps and complexity. Single agent deployment and customizable policy enforcement secure your environment quickly.\r\n\r\nGain efficiencies\r\nStreamline security and compliance workflows with automations and a personalized workspace. McAfee ePO offers an enterprise-class security management architecture that scales for organizations of all sizes, significantly reducing the number of servers to deploy.\r\n\r\nFuture-proof your security infrastructure\r\nProtect your organization from today’s—and tomorrow’s—threats. Real-time threat intelligence from McAfee Labs proactively guards your infrastructure. The open platform facilitates rapid adoption of security innovations as new threat categories emerge.","shortDescription":"McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO)","keywords":"security, your, management, McAfee, with, from, infrastructure, threat","description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security","og:title":"McAfee ePolicy Orchestrator (McAfee ePO)","og:description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security"},"eventUrl":"","translationId":430,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.issp.ua/resource_descr.php?l=ru&id=204","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":72,"title":"McAfee Web Gateway для ВТБ Банк Москвы","description":"Внедрение комплексной системы доступа и контроля интернет-трафика для Банка Москвы\r\n<span style=\"font-weight: bold;\">Заказчик</span>\r\nОАО «Банк Москвы» - один из крупнейших универсальных банков России (входит в топ-5), предоставляющий диверсифицированный спектр финансовых услуг как для юридических, так и для частных лиц. Основным акционером Банка является Группа ВТБ (95,53%). Стратегией развития Банка определено, что Банк Москвы будет развиваться как самостоятельный универсальный коммерческий банк в составе Группы ВТБ. В настоящее время Банк Москвы обслуживает более 100 тыс. корпоративных и свыше 9 млн частных клиентов. Среди клиентов-юридических лиц – крупнейшие отраслевые предприятия, предприятия среднего и малого бизнеса.\r\n<span style=\"font-weight: bold;\">Описание проекта</span>\r\nЭксперты ведущего российского системного интегратора «Ай-Теко», получив право на выполнение работ в результате конкурса, создали информационную систему, обеспечивающую пользователям Банка Москвы безопасный доступ к сети Интернет. В ходе проекта с использованием решения McAfee Web Gateway была организована эффективная многослойная защита web-трафика: при обработке пользовательских запросов производится анализ разрешенных к просмотру web-страниц с целью проверки не только их содержимого, но и находящегося в них активного кода. Внедренный комплекс сочетает в себе локально развертываемые и облачные средства безопасности корпоративных ресурсов банка.\r\nПомимо этого, компанией «Ай-Теко» проведено обучение профильных специалистов заказчика, предоставлены техническая поддержка и сопровождение оборудования и программного обеспечения.\r\n<span style=\"font-weight: bold;\">Результат</span>\r\nНа данный момент информационная система переведена в режим промышленной эксплуатации, а пользователи Банка Москвы получили возможность посещать необходимые web-страницы без риска заражения компьютера вирусом или попадания на вредоносный сайт. Дополнительная настройка списков одобренных категорий ресурсов позволила банку значительно сократить нецелевое использование сети Интернет.\r\n<span style=\"font-weight: bold;\">Комментарии</span>\r\nДенис Антонов, начальник отдела защиты телекоммуникационных систем Банка Москвы: «В связи с выявлением инцидентов информационной безопасности перед нами была поставлена достаточно непростая и актуальная для бизнеса задача – обеспечить защиту данных пользователей и корпоративных ресурсов банка от угроз и различных вредоносных программ во время доступа к сети Интернет. Для выполнения работ мы выбрали современное эффективное средство обеспечения безопасности McAfee Web Gateway и надежного подрядчика в лице компании «Ай-Теко», обширный опыт и квалификация специалистов которой гарантируют наивысшее качество развертываемого решения».\r\nАндрей Шамаев, директор по развитию бизнеса компании «Ай-Теко»: «Всего за два с половиной месяца проектная команда департамента информационной безопасности «Ай-Теко» при активной поддержке экспертов McAfee и участии специалистов заказчика справилась с поставленными задачами, реализовав контроль трафика при использовании «всемирной паутины» в рамках столичных подразделений и региональных филиалов Банка Москвы. Результаты совместной работы позволяют говорить о дальнейшем расширении сотрудничества с банком, включая возможности внедрения перспективных технологий от компании McAfee».","alias":"mcafee-web-gateway-dlja-vtb-bank-moskvy","roi":0,"seo":{"title":"McAfee Web Gateway для ВТБ Банк Москвы","keywords":"Москвы, Банка, Ай-Теко, McAfee, безопасности, Банк, сети, бизнеса","description":"Внедрение комплексной системы доступа и контроля интернет-трафика для Банка Москвы\rЗаказчик\rОАО «Банк Москвы» - один из крупнейших универсальных банков России","og:title":"McAfee Web Gateway для ВТБ Банк Москвы","og:description":"Внедрение комплексной системы доступа и контроля интернет-трафика для Банка Москвы\rЗаказчик\rОАО «Банк Москвы» - один из крупнейших универсальных банков России"},"deal_info":"","user":{"id":2898,"title":"ВТБ Банк Москвы","logoURL":"https://old.b4r.io/uploads/roi/company/VTB_Bank_Moskvy.png","alias":"vtb-bank-moskvy","address":"","roles":[],"description":"с 10 мая 2016 года Банк Москвы реорганизован в форме присоединения к банку ВТБ.\r\n\r\nМы позаботились о том, чтобы все лучшее, к чему Вы привыкли в Банке Москвы, оставалось доступным и после объединения. Банк ВТБ взял на себя исполнение всех обязательств, ранее принятых Банком Москвы, и готов предоставить Вам сервис самого высокого уровня под брендом ВТБ Банк Москвы.\r\n\r\n","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.bm.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ВТБ Банк Москвы","keywords":"Москвы, Банк, обязательств, всех, исполнение, после, объединения, взял","description":"с 10 мая 2016 года Банк Москвы реорганизован в форме присоединения к банку ВТБ.\r\rМы позаботились о том, чтобы все лучшее, к чему Вы привыкли в Банке Москвы,","og:title":"ВТБ Банк Москвы","og:description":"с 10 мая 2016 года Банк Москвы реорганизован в форме присоединения к банку ВТБ.\r\rМы позаботились о том, чтобы все лучшее, к чему Вы привыкли в Банке Москвы,","og:image":"https://old.b4r.io/uploads/roi/company/VTB_Bank_Moskvy.png"},"eventUrl":""},"supplier":{"id":226,"title":"I-Teco","logoURL":"https://old.b4r.io/uploads/roi/company/Aiteko.png","alias":"ai-teko","address":"117036, г. Москва, ул. Кедрова, 15 Телефон: +7 (495) 777-10-95 Факс: +7 (495) 777-10-96","roles":[],"description":"I-Teco Company is a leading Russian systems integrator and provider of information technologies for corporations. It provides systems of information security, integration services, consulting, service support and outsourcing, implements complex, integrated IT-infrastructure solutions and the informatization of major state structures, industrial and telecommunications companies, financial and insurance companies, small and medium businesses. The multiband approach allows I-Teco to create custom integrated solutions for each client in any field of businesses automation.\r\n\r\nI-Teco was established in 1997. The turnover of I-Teco group of companies totaled 23,81 bln rubles in 2014, it has now more than 15 regional offices in Russia and divisions in Kazakhstan, Uzbekistan, Azerbaijan. The company’s staff is 2723 employees. The high qualifications of I-Teco’s IT-personnel are confirmed by more than 2100 received certificates, including unique ones in Russia.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":196,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":0,"vendorPartnersCount":10,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://i-teco.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"I-Teco","keywords":"I-Teco, companies, Russia, solutions, more, businesses, than, integrated","description":"I-Teco Company is a leading Russian systems integrator and provider of information technologies for corporations. It provides systems of information security,","og:title":"I-Teco","og:description":"I-Teco Company is a leading Russian systems integrator and provider of information technologies for corporations. It provides systems of information security,","og:image":"https://old.b4r.io/uploads/roi/company/Aiteko.png"},"eventUrl":""},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":431,"logo":false,"scheme":false,"title":"McAfee Web Gateway","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"mcafee-web-gateway","companyTypes":[],"description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost of remediation and minimize the chance of data loss in an attack. Sharing web threat information can make other security tools more intelligent. None of this should disrupt the productivity of a large workforce.\r\n\r\nGateway technology for the world’s most demanding IT environments\r\n\r\nBest-in-class threat prevention\r\nProtect against highly sophisticated malware and targeted attacks that evade URL filtering and antivirus signatures. This secure web gateway provides industry-leading, proactive detection of zero-day malware with full coverage of web traffic, including SSL.\r\n\r\nThreat information sharing\r\nMcAfee Web Gateway is integrated with the Security Connected platform to enable more effective threat detection, reduce incident response times, and improve operational efficiency. Learn about key integration points, McAfee Advanced Threat Defense and McAfee Threat Intelligence Exchange.\r\n\r\nPowerful rules-based policy engine\r\nTake action on any element of the web request-response cycle, allowing limitless flexibility and web security crafted for your organization.","shortDescription":"McAfee Web Gateway delivers high-performance web security through an on-premises appliance that can be deployed both as dedicated hardware and a virtual machine. McAfee Web Gateway is part of the McAfee Web Protection solution alongside McAfee Web Gateway Cloud Service, available together to provide optimal protection for users everywhere.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Web Gateway","keywords":"McAfee, threat, Threat, Gateway, malware, security, more, information","description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost","og:title":"McAfee Web Gateway","og:description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost"},"eventUrl":"","translationId":432,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://i-teco.ru/press/news/2796/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":71,"title":"McAfee Web Gateway для ПроКредит Банк","description":"После того, как Microsoft прекратила развитие своего продукта Forefront TMG, многим пользователям этого решения пришлось начать процедуру поиска замены. Среди таких клиентов оказался и ПроКредит Банк. Перед банком встала задача интеграции нового прокси-сервера. И уже летом 2013 года специалистами ПроКредит Банка были проведены сравнительные тестирования лидирующих решений этого рынка с частичным привлечением компании ISSP - специализированного экспертного интегратора систем информационной безопасности. Результатом тестирования стал выбор в пользу McAfee Web Gateway.\r\nДля предоставления услуг внедрения и настройки работы McAfee Content Security Suite (модуля McAfee Web Gateway) также была задействована компания ISSP, которая прекрасно проявила себя во время тестирования, продемонстрировав высокие компетенции и богатый опыт работы с продуктами McAfee.\r\nВнедрение шлюза по обеспечению защиты Интернет-доступа состояло из этапа миграции существующих настроек прокси-сервера с Microsoft ISA на McAfee Web Gateway и этапа настройки новых функций.\r\nКомпания ISSP совместно со специалистами департамента информационных технологий Банка по согласованной схеме установили и настроили базовые фильтры - аутентификацию, доступ сотрудников Банка к важным ресурсам, фильтрацию типов данных, а также проверили корректности выполненных изменений.\r\nДополнительно было настроено сервер отчетности и интегрувано прокси-сервер с системой резервного копирования конфигурационных данных. Специалистам обеих компаний удалось провести интеграцию McAfee Web Gateway таким образом, чтобы минимизировать изменения в существующей инфраструктуре Банка.\r\nВ результате выполнения этой части проекта, ПроКредит Банк не просто изменил систему для предоставления интернет-доступа, а получил решение высокого класса для фильтрации веб 2.0 и как результат - безопасный доступ к сети Интернет от лидера сегмента рынка - компании Intel Security (McAfee). Кроме того, с автоматической проверкой категории сайтов, отпала необходимость тратить инженерные ресурсы на ручную проверку классов веб-ресурсов, оптимизировала работу IT департамента.","alias":"mcafee-web-gateway-dlja-prokredit-bank","roi":0,"seo":{"title":"McAfee Web Gateway для ПроКредит Банк","keywords":"McAfee, Gateway, Банка, ПроКредит, ISSP, Банк, тестирования, рынка","description":"После того, как Microsoft прекратила развитие своего продукта Forefront TMG, многим пользователям этого решения пришлось начать процедуру поиска замены. Среди","og:title":"McAfee Web Gateway для ПроКредит Банк","og:description":"После того, как Microsoft прекратила развитие своего продукта Forefront TMG, многим пользователям этого решения пришлось начать процедуру поиска замены. Среди"},"deal_info":"","user":{"id":540,"title":"ProCredit Bank","logoURL":"https://old.b4r.io/uploads/roi/company/ProCredit_Bank.png","alias":"prokredit-bank","address":"","roles":[],"description":"ProCredit Bank is a development-oriented commercial bank. We offer excellent customer service to small and medium enterprises and to private individuals who would like to save.\r\n\r\nProCredit Bank is pa","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.procreditbank.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ProCredit Bank","keywords":"ProCredit, Bank, enterprises, private, medium, individuals, would, save","description":"ProCredit Bank is a development-oriented commercial bank. We offer excellent customer service to small and medium enterprises and to private individuals who","og:title":"ProCredit Bank","og:description":"ProCredit Bank is a development-oriented commercial bank. We offer excellent customer service to small and medium enterprises and to private individuals who","og:image":"https://old.b4r.io/uploads/roi/company/ProCredit_Bank.png"},"eventUrl":""},"supplier":{"id":186,"title":"ISSP","logoURL":"https://old.b4r.io/uploads/roi/company/issp_logo.png","alias":"issp","address":"","roles":[],"description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software solutions and guided by world`s best practice, international standards, wide experience and deep expertise of its own team of certified engineers and project managers.\r\nISSP is a preferred integration partner with high-level statuses of the world`s top vendors of information security technologies to provide its customers with best in class solutions, integration, maintenance and information security consulting services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":161,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":25,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"www.isspgroup.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ISSP","keywords":"information, best, ISSP, solutions, with, world, integration, class","description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:title":"ISSP","og:description":"ISSP provides best in class products and services for securing organizational information and information systems based on world’s top hardware and software","og:image":"https://old.b4r.io/uploads/roi/company/issp_logo.png"},"eventUrl":""},"vendors":[{"id":184,"title":"McAfee","logoURL":"https://old.b4r.io/uploads/roi/company/McAfee.png","alias":"mcafee","address":"","roles":[],"description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.\r\n\r\nThe company has been a wholly owned subsidiary of Intel since February 2011, and now forms part of its Intel Security division.\r\n\r\nOn 7 September 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between Intel and TPG Capital called McAfee. TPG Capital will be the majority owner with 51% of McAfee.","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{},"companyUrl":"https://www.mcafee.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":""}],"products":[{"id":431,"logo":false,"scheme":false,"title":"McAfee Web Gateway","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"mcafee-web-gateway","companyTypes":[],"description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost of remediation and minimize the chance of data loss in an attack. Sharing web threat information can make other security tools more intelligent. None of this should disrupt the productivity of a large workforce.\r\n\r\nGateway technology for the world’s most demanding IT environments\r\n\r\nBest-in-class threat prevention\r\nProtect against highly sophisticated malware and targeted attacks that evade URL filtering and antivirus signatures. This secure web gateway provides industry-leading, proactive detection of zero-day malware with full coverage of web traffic, including SSL.\r\n\r\nThreat information sharing\r\nMcAfee Web Gateway is integrated with the Security Connected platform to enable more effective threat detection, reduce incident response times, and improve operational efficiency. Learn about key integration points, McAfee Advanced Threat Defense and McAfee Threat Intelligence Exchange.\r\n\r\nPowerful rules-based policy engine\r\nTake action on any element of the web request-response cycle, allowing limitless flexibility and web security crafted for your organization.","shortDescription":"McAfee Web Gateway delivers high-performance web security through an on-premises appliance that can be deployed both as dedicated hardware and a virtual machine. McAfee Web Gateway is part of the McAfee Web Protection solution alongside McAfee Web Gateway Cloud Service, available together to provide optimal protection for users everywhere.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Web Gateway","keywords":"McAfee, threat, Threat, Gateway, malware, security, more, information","description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost","og:title":"McAfee Web Gateway","og:description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost"},"eventUrl":"","translationId":432,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"}]}},"categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.issp.ua/resource_descr.php?l=en&id=209","title":"Supplier's web site"}},"comments":[],"referencesCount":0}],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":270,"b4r":0,"categories":{"5":{"id":5,"title":"Security Software","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data_security.png","alias":"security-software"}},"branches":"Information Technology","companySizes":"1001 to 2000 Employees","companyUrl":"https://www.mcafee.com/","countryCodes":[],"partnerTypes":"Distributor and Reseller","certifications":[{"id":506,"company_id":184,"title":"McAfee Product Specialist—ENS","type":"technical"},{"id":507,"company_id":184,"title":"McAfee Product Specialist—ATD","type":"technical"},{"id":508,"company_id":184,"title":"McAfee Product Specialist—ePO","type":"technical"},{"id":509,"company_id":184,"title":"McAfee Product Specialist—NSP","type":"technical"},{"id":510,"company_id":184,"title":"McAfee Product Specialist—HIPs","type":"technical"},{"id":511,"company_id":184,"title":"McAfee Product Specialist—DLPe","type":"technical"},{"id":512,"company_id":184,"title":"McAfee Product Specialist—SIEM","type":"technical"}],"isSeller":true,"isSupplier":false,"isVendor":true,"presenterCodeLng":"","seo":{"title":"McAfee","keywords":"Intel, Security, company, Capital, McAfee, security, with, between","description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:title":"McAfee","og:description":"Intel Security Group (previously McAfee, Inc.) is an American global computer security software company headquartered in Santa Clara, California, and the","og:image":"https://old.b4r.io/uploads/roi/company/McAfee.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[{"supplier":"ISSP","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"BMS Consulting","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Allta","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"MMI Group","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Avalis","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"AMI","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"I.T.Pro","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"SI Center","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"I-Teco","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"E-consulting","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"IT INTEGRATOR","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Integrity Systems","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Infobezpeka","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"IT Land","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Softprom by ERC (supplier)","partnershipLevel":"Distributor","countries":"Republic of Armenia, Republic of Azerbaijan, Republic of Belarus, Georgia","partnersType":"Distributor and Reseller"},{"supplier":"NAVIGATOR","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ASSOCIATION YUG","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"COMPAREX","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"RIM2000","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"SVIT IT","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"NVision Group","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Wise IT","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"TECHNOSERV","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ICL-KME CS","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Legal-Soft","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"TopS Business Integrator (TopS BI)","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"AMT Group Russia","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ANGARA Technologies Group","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Андэк","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"AST","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Belmont","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Bell Integrator","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Wintegra Security","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Gazinformservice","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Germes.IT","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"DataSystem","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Jet Infosystems","partnershipLevel":"Platinum","countries":"","partnersType":""},{"supplier":"IBS","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Informzaschita","partnershipLevel":"Platinum","countries":"","partnersType":""},{"supplier":"Infozashchita","partnershipLevel":"Platinum","countries":"","partnersType":""},{"supplier":"ITELON","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Compuway","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Compulink","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"CROC","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"LANIT – LAboratory of New Information Technologies","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Microtest","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Oberon","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"OLLY IT","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Open Technologies","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"System Software","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"СОВИТ","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Softline","partnershipLevel":"Platinum","countries":"","partnersType":""},{"supplier":"DialogNauka","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Trinity","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ELVIS-PLUS","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Southern Software Company","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"RedSys","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Corporate Business Systems (CBS)","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"S&T Ukraine","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Winncom Technologies","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ATINUM","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Sharifa.Com","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"MARS SOLUTIONS","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Light Technology","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"INLINE GROUP","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"MERLION","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Systematic","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"LightNet","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"AT Consulting","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"R-Style","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"OFT Group","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"TELECOM-GUARD","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"NTC KAMI Company","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"HOST","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"4by4","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"PRIME GROUP","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"BCC","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"DEPO Computers","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Aquarius","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"STG","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Crona CS","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"WIZARD Russia","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Regnans","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Scientific-Technical Center Galex","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"CNS","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Optima Group","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Maksoft","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ALSI (User)","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Life2Win","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Technoservice group","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"NEWTECH DISTRIBUTION","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Asia InterCommunications","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"UTeL.KZ","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Global Services International","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Halyk Telecom","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"InSpe","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Drakar","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"UGT","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Orient Logic","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Asseco Group","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"GREENNET","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"SOLVIT","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Softline","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"SQUALIO (squalio.by)","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"CASPEL","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"AtaTechnology","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Bakinity","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Unicomp","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Bi Line","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"R.I.S.K.","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"IT Solutions Azerbaijan","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"IBA Group","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Novacom","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Delta-Comm","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"BAS (Business Applications Solutions)","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Astana-New Technologies-2008","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Corvus Technologies","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ITECO","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"CTI","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Softline","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"IFS","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"KORUS Consulting","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"I.T. Group","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"RAMEC","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"CSBI IT-Service","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Azon","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Sibintek","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"1C:North-West","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Avilex","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ComLogic","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"DCLogic","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"LOGIS","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"MONT","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":"Distributor and Reseller"},{"supplier":"NII Sokb","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Smart IT","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Softkey.ru","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"A-Systems","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Capital Soft","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Display Group","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"KOGORTA","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"SOFT-WEST","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"USSC","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"CCA","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"KABEST","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"SoftwareONE","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Atos","partnershipLevel":"Platinum","countries":"","partnersType":""},{"supplier":"Insight","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Servionika","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ITPS","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"MICROS","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"BTS Pro","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"SKB Kontur","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Asterit","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ASP","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Extreme Pro","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ARinteg","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Amtel-SERVICE","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"METREX","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"INFOTRADE","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"LWCOM","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Superwave Group","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"GENDALF","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Digital Design","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"AstroSoft","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"RAMAX International","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Polikom Pro","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"CS IT","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ABISoft","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Upiter","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"SeaExpress","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Dynamics","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"VIST","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"High Tech for Human","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Kvarta (kvarta.kz)","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Computers & Networking","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Softline","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Seabak","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Bever","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"INCO","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ARBYTE","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Intech","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"RRS Baltika","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"AIM SYSTEMS","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"VERITech","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Infoservice","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"AVK","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"CPS (Center of Professional Solutions)","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ASBIS","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ANT-Inform","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"D-Facto","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"7000","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Pointlane","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Aladdin R.D.","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Spectrasoft","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Datastream","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"TEGRUS","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Webzavod","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"SPro","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"QuadroSoft","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Docsvision","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Turkmen Transit","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Green Light","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Pixel","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"SEMTEC","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"NGS Group","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Orange Business Services","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"MASCOM","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"A-security","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Infocell","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Reliable Solutions Distributor","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Sintegra Group","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"GHESAR","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"RTSolutions","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Dom-Daniel","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"REDINET","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"CyberSec","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"AZEL Systems","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Computers and Peripherals","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Varzia","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"GRENA","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ITCS","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"R.I.S.K. Georgia","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"SYNTAX","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Pacifica Kazakhstan","partnershipLevel":"Platinum","countries":"","partnersType":""},{"supplier":"Esentai System Integration","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"LimeOn Global Company","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Keremet","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ALATAU INNOVATIONS","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Comp Solutions","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ICORE-Integration","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"KMA","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"MS MAX","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Norsec Delta Projects","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Trisad","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Data Expert","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Center of System Integration","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Associates","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"LETA","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"AKON Technologies","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Altell","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Altirix systems","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Center","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"BiznesTech","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"National Innovation Center","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Confident","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Global IT (itglobal.su)","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"InfoKube","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ITERANET","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"GEOIS","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ZIСS","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Lanta-Group","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"NPO VS","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"STC EVRAAS","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Setec","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"TerraLink Russia","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Step integrator","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Tehcentr","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Abiton","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ASKU","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"ABRIKOS GROUP","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"IT Smart Company","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ITCS Russia","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"BITCOM SOFTware","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"AiTek","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"MAYKOR","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"R-Style Softlab","partnershipLevel":"Gold","countries":"","partnersType":""},{"supplier":"Softline Uzbekistan","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Softline Armenia","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"Softline Georgia","partnershipLevel":"Silver","countries":"","partnersType":""}],"vendoredProducts":[{"id":538,"logoURL":"https://old.b4r.io/fileadmin/content/csm_McAfee.png","logo":true,"scheme":false,"title":"McAfee Complete Endpoint Threat Protection","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-complete-endpoint-threat-protection","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: #53565a; font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;\">McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.</p>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: #53565a; font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;\">Core endpoint protection, including anti-malware, firewall, device control, email and web security works together with machine learning and dynamic application containment to detect zero-day threats in near real time, and classify and halt them before they can execute on your systems. Actionable forensic data and easy-to-read reports keep you informed and help you make the move from responding to outbreaks, to investigating and hardening your defenses. And, because McAfee Complete Endpoint Threat Protection is built using an extensible framework, you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.</p>","shortDescription":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Complete Endpoint Threat Protection","keywords":"McAfee, Complete, defenses, your, Threat, Endpoint, Protection, zero-day","description":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and","og:title":"McAfee Complete Endpoint Threat Protection","og:description":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and","og:image":"https://old.b4r.io/fileadmin/content/csm_McAfee.png"},"eventUrl":"","translationId":595,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2084,"logoURL":"https://old.b4r.io/fileadmin/content/MCAfee_Email.jpg","logo":true,"scheme":false,"title":"McAfee Email Gateway","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-email-gateway","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<p>McAfee Email Gateway consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single, easy-to-deploy and user-friendly appliance. As a comprehensive email security solution, Email Gateway can stand alone or work in tandem with McAfee SaaS Email Protection & Continuity. It eliminates ineffective piecemeal defenses, simplifies multivendor security environments, and reduces operating costs — while significantly strengthening email security. Email Gateway delivers:</p>\r\n<p><span style=\"font-weight: bold;\">Total inbound protection</span> — Email Gateway provides the most complete protection available against inbound threats. Powerful antispam scanning technologies identify and block incoming spam with over 99% accuracy. And it protects your network from viruses, malware, phishing, directory harvest, denial of service (DoS), bounceback attacks, zero-hour threats, and spam surges.</p>\r\n<p><span style=\"font-weight: bold;\">Total outbound protection</span> — Available at no extra charge are push, pull, and TLS encryption and built-in data loss prevention (DLP) capabilities that utilize the same text-matching dictionaries found in McAfee Data Loss Prevention. These DLP capabilities are fully administrable from the Email Gateway user interface or McAfee ePolicy Orchestrator (ePO). Using sophisticated content-scanning technologies, multiple encryption techniques, and granular, policy-based message handling, Email Gateway prevents outbound data loss and keeps sensitive data secure.</p>\r\n<p><span style=\"font-weight: bold;\">Simple, powerful administration from within McAfee ePO</span> — With Email Gateway, administrators can deliver superior email protection and document it with customizable, enterprise-class reporting, exportable report logs, real-time dashboards, and alerts. Email Gateway combines performance, scalability, and stability with a flexible delivery model to ensure maximum ROI.</p>\r\n<p><span style=\"font-weight: bold;\">A virtualized solution</span> — The Email Gateway appliance is also available as a virtual appliance, so you can reap the benefits of virtualization. With lower costs than a physical appliance, a virtual appliance also provides maximum flexibility, including the ability to consolidate solutions on a single server.</p>\r\n<p><span style=\"font-weight: bold;\">Enhanced security powered by McAfee Global Threat Intelligence (GTI)</span> — McAfee GTI is a comprehensive cloud-based threat intelligence service. Integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Email Gateway uses the message reputation service to identify email messages carrying malicious payloads.</p>","shortDescription":"MEG consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single, easy-to-deploy and user-friendly appliance.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Email Gateway","keywords":"Email, Gateway, McAfee, data, security, appliance, protection, email","description":"McAfee Email Gateway consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single,","og:title":"McAfee Email Gateway","og:description":"McAfee Email Gateway consolidates inbound threat protection, outbound data loss prevention, encryption, advanced compliance, and administration into a single,","og:image":"https://old.b4r.io/fileadmin/content/MCAfee_Email.jpg"},"eventUrl":"","translationId":2085,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":832,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Complete_EndPoint_Protection_-_Business__CEB_.png","logo":true,"scheme":false,"title":"McAfee Complete EndPoint Protection - Business (CEB)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-complete-endpoint-protection-business-ceb","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"Core endpoint protection\r\nMcAfee Complete Endpoint Threat Protection includes anti-malware, firewall, device control, and email and web security.\r\nPowered by machine learning\r\nWith integrated machine learning and dynamic application containment, detect zero-day threats in near real time, and classify and halt them before they can execute on your systems.\r\nActionable forensic data\r\nEasy-to-read reports help you make the move from responding to outbreaks to investigating and hardening your defenses.\r\nAn adaptable security framework\r\nMcAfee Complete Endpoint Threat Protection is built using an extensible framework, so you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.\r\n\r\nIntegrated, advanced threat defenses built with productivity in mind\r\nAutomate advanced threat defenses\r\nStay ahead of threats with reputation analysis and machine learning that evolves to pinpoint and streamline responses to zero-day threats by automatically stopping and containing greyware, ransomware, and other advanced threats.\r\nReduce security complexity\r\nEliminate multiple security management consoles and user interfaces. One console provides a single pane of glass to manage your environment so you can rapidly ramp up deployments and leverage cross-platform policies for Windows, Mac, and Linux environments.\r\nBuild a flexible and collaborative security framework\r\nEnsure your defenses work together to defeat threats and provide actionable threat forensics. Our purpose-built framework connects multiple defenses and allows for easy adoption of new advanced security technologies as the threat landscape changes.\r\n\r\nSystem requirements\r\nMcAfee Complete Endpoint Threat Protection is a suite that is supported on Windows, Mac, and Linux systems. For complete technical specifications for all of the products included in this suite, please review the minimum system requirements.\r\n","shortDescription":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate and contain zero-day threats and sophisticated attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Complete EndPoint Protection - Business (CEB)","keywords":"security, threat, defenses, your, advanced, threats, McAfee, framework","description":"Core endpoint protection\rMcAfee Complete Endpoint Threat Protection includes anti-malware, firewall, device control, and email and web security.\rPowered by","og:title":"McAfee Complete EndPoint Protection - Business (CEB)","og:description":"Core endpoint protection\rMcAfee Complete Endpoint Threat Protection includes anti-malware, firewall, device control, and email and web security.\rPowered by","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Complete_EndPoint_Protection_-_Business__CEB_.png"},"eventUrl":"","translationId":833,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":43,"title":"Data Encryption","alias":"data-encryption","description":"Шифрова́ние — обратимое преобразование информации в целях сокрытия от неавторизованных лиц, с предоставлением, в это же время, авторизованным пользователям доступа к ней. Главным образом, шифрование служит задачей соблюдения конфиденциальности передаваемой информации. Важной особенностью любого алгоритма шифрования является использование ключа, который утверждает выбор конкретного преобразования из совокупности возможных для данного алгоритма[1][2].\r\n\r\nПользователи являются авторизованными, если они обладают определенным аутентичным ключом. Вся сложность и, собственно, задача шифрования состоит в том, как именно реализован этот процесс[1].\r\n\r\nВ целом, шифрование состоит из двух составляющих — зашифрование и расшифрование.\r\n\r\nС помощью шифрования обеспечиваются три состояния безопасности информации[1]:\r\n\r\nКонфиденциальность.\r\nШифрование используется для скрытия информации от неавторизованных пользователей при передаче или при хранении.\r\nЦелостность.\r\nШифрование используется для предотвращения изменения информации при передаче или хранении.\r\nИдентифицируемость.\r\nШифрование используется для аутентификации источника информации и предотвращения отказа отправителя информации от того факта, что данные были отправлены именно им.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-encryption.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":834,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Protection_-_Advanced_Suite.jpg","logo":true,"scheme":false,"title":"McAfee Endpoint Protection — Advanced Suite","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-endpoint-protection-advanced-suite","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"Обеспечение всесторонней защиты конечных точек\r\nВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от вредоносных программ в режиме реального времени позволяют блокировать вирусы, троянских коней, червей, рекламные, шпионские и другие потенциально нежелательные программы.\r\nОбеспечение безопасности и нормативно-правового соответствия систем\r\nИспользование централизованного механизма управления и аудита на основе политик позволяет повысить надежность защиты.\r\nОбеспечение комплексного контроля над устройствами\r\nМониторинг и ограничение копирования данных на съемные устройства и носители позволяет упреждать утечки данных и обеспечивать сохранность конфиденциальной информации.\r\nСкорость и легкость развертывания\r\nНаличие единой консоли централизованного управления позволяет устанавливать средства защиты за считанные минуты всего несколькими щелчками мышью, а также обеспечивать более подробный сбор информации о происходящем и более эффективный контроль над средствами защиты и мерами обеспечения нормативно-правового соответствия.\r\nОптимизация процессов управления защитой конечных точек\r\n\r\nБлокирование угроз «нулевого дня»\r\nИнтегрированная в данное решение технология McAfee Host Intrusion Prevention for Desktop обеспечивает защиту от новых уязвимостей и сокращает необходимость срочной установки исправлений.\r\nКонтроль за использованием сети Интернет\r\nАдминистраторы могут ограничивать доступ пользователей, находящихся в корпоративной сети и вне ее, к веб-сайтам неуместного содержания и запрещать запуск нежелательных программ на системах путем блокирования приложений.\r\nАвтоматизация выполнения требований политик\r\nMcAfee Policy Auditor позволяет интегрировать отчеты о соответствии требованиям стандартов HIPAA, PCI и других нормативно-правовых документов.\r\n\r\nТребования к системе\r\nКомплект McAfee Endpoint Protection — Advanced Suite поддерживается в операционных системах Windows и Mac.","shortDescription":"Комплексная система упреждающей защиты, позволяющая блокировать вредоносные программы и угрозы «нулевого дня»\r\nКомплект McAfee Endpoint Protection — Advanced Suite обеспечивает защиту систем Windows, Mac и Linux, находящихся внутри вашей сети и за пределами.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Endpoint Protection — Advanced Suite","keywords":"защиты, McAfee, позволяет, сети, управления, Обеспечение, политик, точек","description":"Обеспечение всесторонней защиты конечных точек\rВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от","og:title":"McAfee Endpoint Protection — Advanced Suite","og:description":"Обеспечение всесторонней защиты конечных точек\rВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Protection_-_Advanced_Suite.jpg"},"eventUrl":"","translationId":2519,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1732,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Security.png","logo":true,"scheme":false,"title":"McAfee Endpoint Security","vendorVerified":0,"rating":"2.00","implementationsCount":4,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-endpoint-security","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<span style=\"font-weight: bold;\">Advanced, consolidated endpoint defense</span> McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint environment. <span style=\"font-weight: bold;\">Core threat prevention</span> Essential anti-virus, exploit prevention, firewall, and web control communicate with each other. <span style=\"font-weight: bold;\">Machine learning</span> State-of-the art techniques identify malicious code based on appearance and behavior. <span style=\"font-weight: bold;\">Application containment</span> Limit the impact of suspicious files and zero-day malware by blocking behaviors and containing them before they can infect or spread in your environment. <span style=\"font-weight: bold;\">Endpoint detection and response</span> Our integrated, automated, and adaptable endpoint detection and response (EDR) technology is easy to use and makes incident response as simple as a single click. <span style=\"font-weight: bold;\">Product features</span>\r\n<ul>\r\n<li>Centralized management. The McAfee ePolicy Orchestrator management console can be deployed on premises or in the cloud. It provides greater visibility, simplifies operations, boosts IT productivity, unifies security, and reduces costs.</li>\r\n<li>Advanced anti-malware protection. Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.</li>\r\n<li>Machine learning analysis. Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.</li>\r\n<li>Dynamic application containment. Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.</li>\r\n<li>Proactive web security. Ensure safe browsing with web protection and filtering for endpoints.</li>\r\n<li>Actionable threat forensics. Quickly see where infections are, why they are occurring, and the length of exposure to understand the threat and react more quickly.</li>\r\n</ul>\r\n","shortDescription":"McAfee Endpoint Security is an integrated, centrally managed, advanced defenses","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Endpoint Security","keywords":"McAfee, threat, protection, response, detection, Endpoint, they, endpoint","description":"Advanced, consolidated endpoint defense McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint","og:title":"McAfee Endpoint Security","og:description":"Advanced, consolidated endpoint defense McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Security.png"},"eventUrl":"","translationId":1733,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":36,"title":"Endpoint Security"}],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":79,"logoURL":"https://old.b4r.io/fileadmin/content/McAfee_Enterprise_Security_Manager.png","logo":true,"scheme":false,"title":"McAfee Enterprise Security Manager","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-enterprise-security-manager","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<h3 style=\"margin: 0px 10px 5px 0px; padding: 0px; border: 0px; outline: 0px; font-weight: normal; font-family: intel_clear_wbold, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px; line-height: 20px; color: rgb(83, 86, 90); \">Real-time visibility into all activity on systems, networks, databases, and applications</h3>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: rgb(83, 86, 90); font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; \">McAfee Enterprise Security Manager delivers a real-time understanding of the world outside—threat data, reputation feeds, and vulnerability status—as well as a view of the systems, data, risks, and activities inside your enterprise.</p>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: rgb(83, 86, 90); font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; \">As the foundation of our security information and event management (SIEM) solution, McAfee Enterprise Security Manager delivers the performance, actionable intelligence, and real-time situational awareness required for organizations to identify, understand, and respond to stealthy threats, while the embedded compliance framework simplifies compliance.</p>\r\n<h3 style=\"margin: 0px 10px 5px 0px; padding: 0px; border: 0px; outline: 0px; font-weight: normal; font-family: intel_clear_wbold, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px; line-height: 20px; color: rgb(83, 86, 90); \">Advanced threat intelligence</h3>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: rgb(83, 86, 90); font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; \">Get actionable information on all collected events with contextual information, such as vendor threat feeds and shared indicators of compromise (IOC), to deliver prioritized, actionable information in minutes.</p>\r\n<h3 style=\"margin: 0px 10px 5px 0px; padding: 0px; border: 0px; outline: 0px; font-weight: normal; font-family: intel_clear_wbold, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px; line-height: 20px; color: rgb(83, 86, 90); \">Critical facts in minutes, not hours</h3>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: rgb(83, 86, 90); font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; \">Store billions of events and flows, keeping information available for immediate ad hoc queries, forensics, rules validation, and compliance. Access long-term event data storage to investigate attacks, search for indications of advanced persistent threats (APTs) or IOC, and remediate a failed compliance audit.</p>\r\n<h3 style=\"margin: 0px 10px 5px 0px; padding: 0px; border: 0px; outline: 0px; font-weight: normal; font-family: intel_clear_wbold, Tahoma, Arial, Helvetica, sans-serif; font-size: 15px; line-height: 20px; color: rgb(83, 86, 90); \">Optimize security management and operations</h3>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: rgb(83, 86, 90); font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px; \">Centralize the view of your organization’s security posture, compliance status, and prioritized security issues that require investigation. Access hundreds of reports, views, rules, alerts, and dashboards.</p>","shortDescription":"McAfee Enterprise Security Manager delivers a real-time understanding of the world outside—threat data, reputation feeds, and vulnerability status—as well as a view of the systems, data, risks, and activities inside your enterprise.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Enterprise Security Manager","keywords":"compliance, information, security, McAfee, data, actionable, Security, Enterprise","description":"Real-time visibility into all activity on systems, networks, databases, and applications\rMcAfee Enterprise Security Manager delivers a real-time understanding","og:title":"McAfee Enterprise Security Manager","og:description":"Real-time visibility into all activity on systems, networks, databases, and applications\rMcAfee Enterprise Security Manager delivers a real-time understanding","og:image":"https://old.b4r.io/fileadmin/content/McAfee_Enterprise_Security_Manager.png"},"eventUrl":"","translationId":84,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":77,"title":"SOC - Situation Centre","alias":"soc-situation-centre","description":"Ситуационный/диспетчерский центр — это помещение (зал, комната, кабинет), оснащённое средствами коммуникаций (видеоконференцсвязь, конференц-связь и другими средствами интерактивного представления информации), предназначенное для оперативного принятия управленческих решений, контроля и мониторинга объектов различной природы, ситуаций и других функций.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A1%D0%B8%D1%82%D1%83%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D1%8B%D0%B9_%D1%86%D0%B5%D0%BD%D1%82%D1%80","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SOC.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"ITSM (IT Service Management, управление ИТ-услугами) — подход к управлению и организации ИТ-услуг, направленный на удовлетворение потребностей бизнеса. Управление ИТ-услугами реализуется поставщиками ИТ-услуг путём использования оптимального сочетания людей, процессов и информационных технологий. Для содействия реализации подхода к управлению ИТ-услугами используется серия документов ITIL.\r\n\r\nВ отличие от более традиционного технологического подхода, ITSM рекомендует сосредоточиться на клиенте и его потребностях, на услугах, предоставляемых пользователю информационными технологиями, а не на самих технологиях. При этом процессная организация предоставления услуг и наличие заранее оговоренных в соглашениях об уровне услуг параметров эффективности (KPI) позволяет ИТ-отделам предоставлять качественные услуги, измерять и улучшать их качество.\r\n\r\nВажным моментом при изложении принципов ITSM является системность. При изложении каждого составного элемента ITSM (управление инцидентами, управление конфигурациями, управление безопасностью и т. д.) в обязательном порядке прослеживается его взаимосвязь и координация с остальными элементами (службами, процессами) и при этом даются необходимые практические рекомендации.\r\n\r\nITIL не является конкретным алгоритмом или руководством к действию, но она описывает передовой опыт (best practices) и предлагает рекомендации по организации процессного подхода и управления качеством предоставления услуг. Это позволяет оторваться от особенностей данного конкретного предприятия в данной конкретной отрасли. Вместе с тем, несмотря на определённую абстрактность, ITIL всячески нацелено на практическое использование. В каждом разделе библиотеки приводятся ключевые факторы успеха внедрения того или иного процесса, практические рекомендации при этом превалируют над чисто теоретическими рассуждениями.\r\nИсточник: https://ru.wikipedia.org/wiki/ITSM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/ITSM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":429,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_ePolicy_Orchestrator__McAfee_ePO_.jpg","logo":true,"scheme":false,"title":"McAfee ePolicy Orchestrator (McAfee ePO)","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-epolicy-orchestrator-mcafee-epo","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"A single console for all your security management\r\nMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.\r\n\r\nGet a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks. \r\nSimplify security operations with streamlined workflows for proven efficiencies.\r\nFlexible security management options allow you to select either a traditional premises-based or a cloud-based management version of McAfee ePO.\r\nLeverage your existing third-party IT infrastructure from a single security management console with our extensible architecture.\r\n\r\nQuick deployment for maximum efficiency\r\n\r\nDeploy quickly and easily\r\nEnsure broad-based security and risk management solutions work together to reduce security gaps and complexity. Single agent deployment and customizable policy enforcement secure your environment quickly.\r\n\r\nGain efficiencies\r\nStreamline security and compliance workflows with automations and a personalized workspace. McAfee ePO offers an enterprise-class security management architecture that scales for organizations of all sizes, significantly reducing the number of servers to deploy.\r\n\r\nFuture-proof your security infrastructure\r\nProtect your organization from today’s—and tomorrow’s—threats. Real-time threat intelligence from McAfee Labs proactively guards your infrastructure. The open platform facilitates rapid adoption of security innovations as new threat categories emerge.","shortDescription":"McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee ePolicy Orchestrator (McAfee ePO)","keywords":"security, your, management, McAfee, with, from, infrastructure, threat","description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security","og:title":"McAfee ePolicy Orchestrator (McAfee ePO)","og:description":"A single console for all your security management\rMcAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_ePolicy_Orchestrator__McAfee_ePO_.jpg"},"eventUrl":"","translationId":430,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":45,"title":"SIEM - Security Information and Event Management","alias":"siem-security-information-and-event-management","description":"SIEM (Security information and event management) — объединение двух терминов, обозначающих область применения ПО: SIM (Security information management) — управление информационной безопасностью и SEM (Security event management) — управление событиями безопасности. Технология SIEM обеспечивает анализ в реальном времени событий (тревог) безопасности, исходящих от сетевых устройств и приложений. SIEM представлено приложениями, приборами или услугами, и используется также для журналирования данных и генерации отчетов в целях совместимости с прочими бизнес-данными.\r\n\r\nАкронимы SEM, SIM и SIEM иногда используются в контексте взаимозаменяемости. Сегмент систем управления безопасностью имеющий дело с мониторингом в реальном времени, корреляцией событий, извещениями и отображением на конечных устройствах обычно называют управлением событиями (SEM). Вторая область обеспечивает долговременное хранение, анализ и отчетность по накопленным данных известна как управление ИБ (SIM). По мере роста потребностей в дополнительных возможностях непрерывно расширяется и дополняется функциональность данной категории продуктов. Например, потребность в безопасности голосовых данных (vSIEM).\r\n\r\nПонятие управление событиями информационной безопасности (SIEM), введенное Марком Николеттом и Амритом Вильямсом из компании Gartner в 2005 г., описывает функциональность сбора, анализа и представления информации от сетевых устройств и устройств безопасности, приложений идентификации (управления учетными данными) и управления доступом, инструментов поддержания политики безопасности и отслеживания уязвимостей, операционных систем, баз данных и журналов приложений, а также сведений о внешних угрозах. Основное внимание уделяется управлению привилегиями пользователей и служб, сервисам директорий и другим изменениям конфигурации, а также обеспечению аудита и обзора журналов, реакциям на инциденты.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/SIEM","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/SIEM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":431,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Web_Gateway.jpg","logo":true,"scheme":false,"title":"McAfee Web Gateway","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-web-gateway","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost of remediation and minimize the chance of data loss in an attack. Sharing web threat information can make other security tools more intelligent. None of this should disrupt the productivity of a large workforce.\r\n\r\nGateway technology for the world’s most demanding IT environments\r\n\r\nBest-in-class threat prevention\r\nProtect against highly sophisticated malware and targeted attacks that evade URL filtering and antivirus signatures. This secure web gateway provides industry-leading, proactive detection of zero-day malware with full coverage of web traffic, including SSL.\r\n\r\nThreat information sharing\r\nMcAfee Web Gateway is integrated with the Security Connected platform to enable more effective threat detection, reduce incident response times, and improve operational efficiency. Learn about key integration points, McAfee Advanced Threat Defense and McAfee Threat Intelligence Exchange.\r\n\r\nPowerful rules-based policy engine\r\nTake action on any element of the web request-response cycle, allowing limitless flexibility and web security crafted for your organization.","shortDescription":"McAfee Web Gateway delivers high-performance web security through an on-premises appliance that can be deployed both as dedicated hardware and a virtual machine. McAfee Web Gateway is part of the McAfee Web Protection solution alongside McAfee Web Gateway Cloud Service, available together to provide optimal protection for users everywhere.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Web Gateway","keywords":"McAfee, threat, Threat, Gateway, malware, security, more, information","description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost","og:title":"McAfee Web Gateway","og:description":"Analyzing all web traffic, even when it's encrypted, is a baseline security practice. Detecting malware before it is delivered to an endpoint can save the cost","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Web_Gateway.jpg"},"eventUrl":"","translationId":432,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/gateway.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[],"partnershipProgramme":{"levels":[{"id":433,"level":"Silver"},{"id":435,"level":"Gold"},{"id":437,"level":"Platinum"},{"id":439,"level":"Distributor"}],"partnerDiscounts":{"Silver":"","Gold":"","Platinum":"","Distributor":""},"registeredDiscounts":{"Silver":"","Gold":"","Platinum":"","Distributor":""},"additionalBenefits":[],"salesPlan":{"Silver":"","Gold":"","Platinum":"","Distributor":""},"additionalRequirements":[]}}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}