{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"de":"die produkte","ru":"Продукты","_type":"localeString","en":"Products"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"en":"partners","ru":"партнеры","_type":"localeString"},"update-profile-button":{"en":"Update profile","ru":"Обновить профиль","_type":"localeString"},"read-more-button":{"en":"Show more","ru":"Показать ещё","_type":"localeString"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"user-implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"categories":{"ru":"Компетенции","_type":"localeString","en":"Categories"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"en":"Partnership with vendors","ru":"Партнерство с производителями","_type":"localeString"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"en":"Bonus 4 reference","ru":"Бонус за референс","_type":"localeString"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"en":"Country","ru":"Страна","_type":"localeString"},"partner-types":{"_type":"localeString","en":"Partner types","ru":"Типы партнеров"},"branch-popover":{"ru":"область деятельности","_type":"localeString","en":"branch"},"employees-popover":{"ru":"количество сотрудников","_type":"localeString","en":"number of employees"},"partnership-programme":{"_type":"localeString","en":"Partnership program","ru":"Партнерская программа"},"partner-discounts":{"ru":"Партнерские скидки","_type":"localeString","en":"Partner discounts"},"registered-discounts":{"en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"ru":"Требования к уровню партнера","_type":"localeString","en":"Partner level requirements"},"certifications":{"ru":"Сертификация технических специалистов","_type":"localeString","en":"Certification of technical specialists"},"sales-plan":{"en":"Annual Sales Plan","ru":"Годовой план продаж","_type":"localeString"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"en":"Supplied products","ru":"Поставляемые продукты","_type":"localeString"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"ru":"Поставляемые внедрения","_type":"localeString","en":"Supplied deployments"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"_type":"localeString","en":"Register","ru":"Регистрация "},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"auth-message":{"_type":"localeString","en":"To view company events please log in or register on the sit.","ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт."},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"en":"logout","ru":"Выйти","_type":"localeString"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My Profile","ru":"Мои Данные"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"title":{"en":"ROI4CIO: Company","ru":"ROI4CIO: Компания","_type":"localeString"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}],"translatable_meta":[{"name":"title","translations":{"ru":"Компания","_type":"localeString","en":"Company"}},{"name":"description","translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"}},{"name":"keywords","translations":{"ru":"Ключевые слова для компании","_type":"localeString","en":"Company keywords"}}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"symantec":{"id":175,"title":"Symantec","logoURL":"https://old.b4r.io/uploads/roi/company/symantec_logo.png","alias":"symantec","address":"","roles":[{"id":3,"type":"vendor"}],"description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company produces software for security, storage, backup and availability - and offers professional services to support its software. Netcraft assesses Symantec (including subsidiaries) as the most-used certification authority. Symantec is a Fortune 500 company and a member of the S&P 500 stock-market index. The company also has development centers in Pune, Chennai and Bengaluru (India).\r\n\r\nOn October 9, 2014, Symantec declared it would split into two independent publicly traded companies by the end of 2015. One company would focus on security, the other on information management. On January 29, 2016, the information-management business was spun-off as Veritas Technologies and sold to The Carlyle Group.\r\n\r\nThe name Symantec represents a combination of the words \"syntax\", \"semantics\" and \"technology\".","companyTypes":["vendor"],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[{"id":42,"title":"Symantec Data Loss Prevention для банка","description":"«БМС Консалтинг» внедрил Symantec Data Loss Prevention в «Райффайзен Банк Аваль», обеспечив защиту конфиденциальной информации. Целью данного проекта было внедрение средств контроля за передачей данных за пределы корпоративной сети банка по электронным каналам.\r\n\r\nВ ходе выполнения проекта, специалистами «БМС консалтинг» на уже существующей платформе СУБД Oracle 10g была настроена база данных, установлен модуль управления системой (Enforce Server), выполнена установка серверов обнаружения, а также политик и правил ответных действий, исходя из требований сотрудников банка.\r\n\r\nТеперь даже случайная отправка любой конфиденциальной информации будет отслежена и предотвращена, а в системе DLP это будет отмечено как «инцидент» и впоследствии расследовано службой безопасности банка.\r\n\r\nData Loss Prevention позволяет осуществлять контроль записей баз данных, структурированной информации, документов, комплексный контроль и поиск данных в сети. Система может отслеживать запись CD/DVD и копирование данных на съемные накопители, подключаемые через Firewire и USB.","alias":"symantec-data-loss-prevention-dlja-banka","roi":0,"seo":{"title":"Symantec Data Loss Prevention для банка","keywords":"данных, банка, Data, Prevention, информации, Loss, проекта, будет","description":"«БМС Консалтинг» внедрил Symantec Data Loss Prevention в «Райффайзен Банк Аваль», обеспечив защиту конфиденциальной информации. Целью данного проекта было","og:title":"Symantec Data Loss Prevention для банка","og:description":"«БМС Консалтинг» внедрил Symantec Data Loss Prevention в «Райффайзен Банк Аваль», обеспечив защиту конфиденциальной информации. Целью данного проекта было"},"deal_info":"","user":{"id":544,"title":"Raiffeisen Bank Aval","logoURL":"https://old.b4r.io/uploads/roi/company/Raiffeisen_Bank_Aval_Public_Joint_Stock_Company__JSC_Raiffeisen_Bank_Aval_.png","alias":"raiffaizen-bank-aval","address":"","roles":[],"description":"Raiffeisen Bank Aval Public Joint Stock Company (JSC Raiffeisen Bank Aval) was registered on 27 March 1992 (operated under the brand name of Joint Stock Postal Pension Bank Aval until 25 September 200","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.aval.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Raiffeisen Bank Aval","keywords":"Aval, Bank, Raiffeisen, Joint, Stock, name, brand, Postal","description":"Raiffeisen Bank Aval Public Joint Stock Company (JSC Raiffeisen Bank Aval) was registered on 27 March 1992 (operated under the brand name of Joint Stock Postal","og:title":"Raiffeisen Bank Aval","og:description":"Raiffeisen Bank Aval Public Joint Stock Company (JSC Raiffeisen Bank Aval) was registered on 27 March 1992 (operated under the brand name of Joint Stock Postal","og:image":"https://old.b4r.io/uploads/roi/company/Raiffeisen_Bank_Aval_Public_Joint_Stock_Company__JSC_Raiffeisen_Bank_Aval_.png"},"eventUrl":""},"supplier":{"id":202,"title":"BMS Consulting","logoURL":"https://old.b4r.io/uploads/roi/company/bms_logo.png","alias":"bms-konsalting","address":"","roles":[],"description":"Intellect provider. Security expert. Leading supplier of end-to-end IT solutions.\r\n\r\nBMS Consulting is focused on projects development and implementation for setting up IT infrastructure, IT environment operation and monitoring, and on solutions covering to application systems implementation and deployment. Our primary market segment is corporate. \r\nWe develop, deploy and implement solutions that influence and add value to IT infrastructure.\r\nOur mission is to keep pace with the technology market selecting innovative approaches to problem solution.\r\n\r\n We are building on sophisticated technologies that require fresh perspective of agenda. Armed by IT best practices we developed our own smart solutions that can be implemented online as a service helping businesses to tackle new challenges on their development route. \r\nOur trends are BigData, Cloud, Mobility, E-Solutions.\r\n \r\n\r\nQuite a few global vendors granted us numerous awards for our unique achievements in competence development, large-scale projects implementation and high standards of doing business together.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":187,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":2,"vendorImplementationsCount":0,"vendorPartnersCount":11,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.bms-consulting.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"BMS Consulting","keywords":"solutions, that, implementation, development, Consulting, market, infrastructure, projects","description":"Intellect provider. Security expert. Leading supplier of end-to-end IT solutions.\r\rBMS Consulting is focused on projects development and implementation for","og:title":"BMS Consulting","og:description":"Intellect provider. Security expert. Leading supplier of end-to-end IT solutions.\r\rBMS Consulting is focused on projects development and implementation for","og:image":"https://old.b4r.io/uploads/roi/company/bms_logo.png"},"eventUrl":""},"vendors":[{"id":175,"title":"Symantec","logoURL":"https://old.b4r.io/uploads/roi/company/symantec_logo.png","alias":"symantec","address":"","roles":[],"description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company produces software for security, storage, backup and availability - and offers professional services to support its software. Netcraft assesses Symantec (including subsidiaries) as the most-used certification authority. Symantec is a Fortune 500 company and a member of the S&P 500 stock-market index. The company also has development centers in Pune, Chennai and Bengaluru (India).\r\n\r\nOn October 9, 2014, Symantec declared it would split into two independent publicly traded companies by the end of 2015. One company would focus on security, the other on information management. On January 29, 2016, the information-management business was spun-off as Veritas Technologies and sold to The Carlyle Group.\r\n\r\nThe name Symantec represents a combination of the words \"syntax\", \"semantics\" and \"technology\".","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":11,"b4r":0,"categories":{},"companyUrl":"www.symantec.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Symantec","keywords":"Symantec, company, security, software, would, technology, companies, traded","description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company","og:title":"Symantec","og:description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company","og:image":"https://old.b4r.io/uploads/roi/company/symantec_logo.png"},"eventUrl":""}],"products":[{"id":376,"logo":false,"scheme":false,"title":"Symantec Data Loss Prevention","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"symantec-data-loss-prevention","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Extend Data Loss Prevention to the Cloud</span>\r\nDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access security broker (CASB) capabilities from Symantec CloudSOC.\r\nExtend your DLP coverage and get direct visibility of content in over sixty cloud apps - including Office 365, Box, Dropbox, Google Apps or Salesforce\r\nLeverage full CASB capabilities so you can continuously monitor content additions, changes, and access rights in cloud apps\r\nLeverage existing DLP policies and workflows for cloud apps so you don’t have to rewrite your finely-tuned rule sets\r\n\r\n<span style=\"font-weight: bold;\">Discover Where Sensitive Data Is Stored Across Your Infrastructure</span>\r\nDescribed Content Matching looks for matches on regular expressions or patterns, e.g., “block if we see a credit card pattern”\r\nExact Data Matching identifies sensitive data directly in your database, e.g., “block exfiltration of any customer name and their associated bank account number”\r\nIndexed Document Matching applies a “full file fingerprint” to identify confidential information in unstructured data including Microsoft Office documents; PDF files; as well as binary files such as JPEGs, CAD designs, and multimedia files\r\nVector Machine Learning automatically learns and identifies the layout of sensitive document types such as financial documents, source code, etc.\r\nFile Type Detection recognizes more than 330 different file types including email, graphics and encapsulated formats, and can also recognize virtually any custom file type\r\n\r\n<span style=\"font-weight: bold;\">Monitor and Protect Sensitive Data On Mobile Devices, On-Premise, and In the Cloud</span>\r\nKeep data safe on Windows and Mac endpoints by performing local scanning and real-time monitoring\r\nMonitor confidential data that is being downloaded, copied or transmitted to or from laptops and desktops, including through email or cloud storage\r\nExtend data loss prevention monitoring and protection to iOS and Android devices, whether corporate-owned or user-owned\r\nFind and protect confidential unstructured data by scanning network file shares, databases, and other enterprise data repositories\r\nMonitor and protect data in motion, including sensitive data sent via email, web and a wide range of network protocols\r\n\r\n<span style=\"font-weight: bold;\">Define and Enforce Policies Consistently Across Your Environment</span>\r\nUse a single web-based console to define data loss policies, review and remediate incidents, and perform system administration across all of your endpoints, mobile devices, cloud-based services, and on-premise network and storage systems\r\nTake advantage of more than 60 pre-built policy templates and a convenient policy builder to get your Symantec Data Loss Prevention solution up and running quickly\r\nUse robust workflow and remediation capabilities to streamline and automate incident response processes\r\nApply business intelligence to your Symantec Data Loss Prevention efforts with a sophisticated analytics tool that provides advanced reporting and ad-hoc analysis capabilities","shortDescription":"Discover, monitor and protect your sensitive data with the industry’s leading data loss prevention solution.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Symantec Data Loss Prevention","keywords":"data, Data, your, cloud, Symantec, Loss, including, Prevention","description":"Extend Data Loss Prevention to the Cloud\rDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access","og:title":"Symantec Data Loss Prevention","og:description":"Extend Data Loss Prevention to the Cloud\rDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access"},"eventUrl":"","translationId":377,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":4,"title":"Reduce Costs"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":334,"title":"Poor timing of management decision making"},{"id":282,"title":"Unaurthorized access to corporate IT systems and data"}]}},"categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://news.kompass.ua/news/bms_konsalting_zavershil_proekt_v_ao_rajffajzen_bank_aval/2010-06-03-15091","title":"Media"}},"comments":[],"referencesCount":0},{"id":35,"title":"Symantec Endpoint Protection для сети супермаркетов","description":"В качестве программной платформы для построения антивирусной системы поставлено решение Symantec Endpoint Protection. Выбор решений Symantec был осуществлен по результатам предварительных тестирования приложений заказчиком. Предпочтение данному производителю было отдано благодаря высокому качеству обнаружения вредоносного ПО, управляемости, простоте обновления, удобству работы. Также учитывались системные требования к программному и аппаратному обеспечению ПК и серверов, интеграция решения с Microsoft Active Directory, возможность построения иерархических серверов управления антивирусной защитой.\r\n\r\nСхема приобретения лицензий была оптимизирована благодаря специальной программе закупок ПО Symantec, ориентированной на крупные бизнес-структуры. Данная программа позволяет значительно сократить финансовые затраты на приобретение ПО и предоставляет гибкие возможности по дальнейшему увеличению объектов защиты.","alias":"symantec-endpoint-protection-dlja-seti-supermarketov","roi":0,"seo":{"title":"Symantec Endpoint Protection для сети супермаркетов","keywords":"Symantec, антивирусной, Endpoint, Protection, построения, серверов, благодаря, Схема","description":"В качестве программной платформы для построения антивирусной системы поставлено решение Symantec Endpoint Protection. Выбор решений Symantec был осуществлен по","og:title":"Symantec Endpoint Protection для сети супермаркетов","og:description":"В качестве программной платформы для построения антивирусной системы поставлено решение Symantec Endpoint Protection. Выбор решений Symantec был осуществлен по"},"deal_info":"","user":{"id":558,"title":"Amstor Retail Group","logoURL":"https://old.b4r.io/uploads/roi/company/Amstor_Retail_Group.png","alias":"amstor-riteil-grupp","address":"","roles":[],"description":"Amstor Retail Group (Amstor) is a commercial real estate management company in Ukraine that operates 12 shopping centres in six large cities of central and eastern Ukraine.\r\n\r\n","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://amstor.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Amstor Retail Group","keywords":"Amstor, Ukraine, Group, Retail, centres, large, cities, eastern","description":"Amstor Retail Group (Amstor) is a commercial real estate management company in Ukraine that operates 12 shopping centres in six large cities of central and","og:title":"Amstor Retail Group","og:description":"Amstor Retail Group (Amstor) is a commercial real estate management company in Ukraine that operates 12 shopping centres in six large cities of central and","og:image":"https://old.b4r.io/uploads/roi/company/Amstor_Retail_Group.png"},"eventUrl":""},"supplier":{"id":219,"title":"AMI","logoURL":"https://old.b4r.io/uploads/roi/company/AMI_logo.jpg","alias":"ami","address":"АМИ-УКРАИНА: 04070, Киев, ул.Ильинская, 14/6, тел./факс: +38(044)492-95-19","roles":[],"description":"Date of foundation of the company - October 22, 1992.\r\nOffices in Ukraine are located in Kyiv, Donetsk, Dnipropetrovsk, Zaporizhia, Lugansk, Mariupol, Odessa, Crimea, Kharkiv\r\nService network comprises of more than 60 companies throughout Ukraine.\r\nQualifications include over 80 official statuses of the company and 200 employees' certificates.\r\nLoyal customers - more than 600 businesses and organizations.\r\nHead office is located in Kyiv:\r\n\r\nAddress: 14/6, Ilyinska Str., Kyiv, 04070, Ukraine\r\nPhone/fax: (044) 492-95-19\r\nE-mail: ami@ami.ua\r\nAMI is currently one of the largest system integrators and installers of engineering systems in Ukraine. The company delivers the complete range of intellectual infrastructure development and support services for any size enterprises.\r\n\r\nAMI’s specialists have carried out thousands complex integration projects. The company acts as an exclusive provider of many known technological systems, as well as develops its own unique solutions, which give AMI a competitive advantage on the market. The company’s work has been acclaimed by the world’s leading companies including Microsoft, НР, Cisco, АРС, Intel, IBM, Reichle & De-Massari, Autodesk, 1C, Novell, and many others.\r\n\r\nHigh quality and efficiency of our work in consulting, design, implementation, technical support of system integration projects in the field of information technology (including production of computer systems), security and engineering solutions is confirmed by the international certification. Quality and environmental safety management system is certified according to international standards ISO 9001 and ISO 14001 (TÜV SÜD acted as independent certifying body).\r\n\r\nAMI Company is a member of the Ukrainian Security Industry Federation (UFIB), the Association of Information Technology Enterprises of Ukraine (AITEU), the Ukrainian Association “Computer Medicine”, Council on Competitiveness Industry Information and Communication Technologies in Ukraine and a partner of TÜV SÜD in employee training, auditing, and certification of information security systems.\r\n\r\nFor our customers, we choose the best technical solutions based on advanced developments in networking, computing, communications technologies and security technologies that meet the highest requirements for fault tolerance, reliability, manageability, and scalability.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":96,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":0,"vendorPartnersCount":4,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://ami.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"AMI","keywords":"Ukraine, company, systems, Kyiv, security, solutions, system, information","description":"Date of foundation of the company - October 22, 1992.\rOffices in Ukraine are located in Kyiv, Donetsk, Dnipropetrovsk, Zaporizhia, Lugansk, Mariupol, Odessa,","og:title":"AMI","og:description":"Date of foundation of the company - October 22, 1992.\rOffices in Ukraine are located in Kyiv, Donetsk, Dnipropetrovsk, Zaporizhia, Lugansk, Mariupol, Odessa,","og:image":"https://old.b4r.io/uploads/roi/company/AMI_logo.jpg"},"eventUrl":""},"vendors":[{"id":175,"title":"Symantec","logoURL":"https://old.b4r.io/uploads/roi/company/symantec_logo.png","alias":"symantec","address":"","roles":[],"description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company produces software for security, storage, backup and availability - and offers professional services to support its software. Netcraft assesses Symantec (including subsidiaries) as the most-used certification authority. Symantec is a Fortune 500 company and a member of the S&P 500 stock-market index. The company also has development centers in Pune, Chennai and Bengaluru (India).\r\n\r\nOn October 9, 2014, Symantec declared it would split into two independent publicly traded companies by the end of 2015. One company would focus on security, the other on information management. On January 29, 2016, the information-management business was spun-off as Veritas Technologies and sold to The Carlyle Group.\r\n\r\nThe name Symantec represents a combination of the words \"syntax\", \"semantics\" and \"technology\".","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":11,"b4r":0,"categories":{},"companyUrl":"www.symantec.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Symantec","keywords":"Symantec, company, security, software, would, technology, companies, traded","description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company","og:title":"Symantec","og:description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company","og:image":"https://old.b4r.io/uploads/roi/company/symantec_logo.png"},"eventUrl":""}],"products":[{"id":117,"logo":false,"scheme":false,"title":"Symantec Endpoint Protection","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"symantec-endpoint-protection","companyTypes":[],"description":"Stop advanced threats with intelligent security\r\n \r\nLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an all-time high. Organizations are struggling to keep up with the rapidly evolving threats. Symantec Endpoint Protection is designed to protect against advanced threats with powerful, layered protection backed by industry leading security intelligence.\r\n \r\nNetwork Threat Protection stops most threats before they can take up residence on the machine\r\nInsight reputation scoring accurately detects rapidly mutating malware and zero-day threats\r\nSONAR™ behavioral analysis stops malicious files designed to appear legitimate\r\nStrong antivirus, antispyware and firewall protection eradicate known mass malware\r\n14 Years a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms.","shortDescription":"Symantec Endpoint Protection - Proactively detect and block today’s most advanced threats with an endpoint protection solution that goes beyond antivirus.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Symantec Endpoint Protection","keywords":"threats, with, Protection, malware, Endpoint, Symantec, designed, protection","description":"Stop advanced threats with intelligent security\r \rLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an","og:title":"Symantec Endpoint Protection","og:description":"Stop advanced threats with intelligent security\r \rLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an"},"eventUrl":"","translationId":118,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":4,"title":"Reduce Costs"},{"id":7,"title":"Improve Customer Service"},{"id":5,"title":"Enhance Staff Productivity"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.symantec.com/content/ru/ru/enterprise/white_papers/b-cs_amstor_trading_house.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":51,"title":"Symantec Endpoint Protection для Чумак","description":"Softline Украина реализовала проект по внедрению комплекса решений Symantec в информационную сеть производственного предприятия «Чумак». В результате проекта заказчик получил надежную защиту ресурсов от всех видов киберугроз.\r\n\r\nАО «Чумак» – один из крупнейших производителей продуктов питания Украины. В ассортименте – кетчуп, соусы, майонез, томатная паста, соки, макаронные изделия. Продукция компании экспортируется в Канаду, Россию, США, Польшу, Казахстан, Грузию, Израиль, Испанию, страны Балтии. Головной офис компании находится в г. Каховка Херсонской области. Численность персонала составляет около 1000 тыс. человек. Предприятию потребовалось надежное решение для повышения уровня защиты конфиденциальной информации и безопасного доступа пользователей к сетевым ресурсам, а также для обеспечения безопасности виртуальных серверов и рабочих станций от вредоносного ПО.\r\n\r\nВ качестве партнера проекта была выбрана компания Softline, которая обладает статусом Symantec Silver Partner на территории Украины и зарекомендовала себя как высококвалифицированный консультант в сфере информационной безопасности. Специалисты Softline посоветовали заказчику использовать для решения задач два продукта: Symantec Endpoint Protection и Backup Exec. Данные решения легко обеспечивают защиту важнейшей информации на настольных компьютерах, ноутбуках и серверах. Гибкие варианты управления позволяют выбрать оптимальный способ защиты бизнеса без снижения производительности.\r\n\r\nВ результате проекта в IТ-ландшафт заказчика было имплементировано 190 лицензий Symantec Endpoint Protection и несколько комплектов Backup Exec 15. Эти решения обеспечили защиту инфраструктуры. Теперь у предприятия есть эффективное, гибкое и удобное средство резервного копирования и восстановления на любой платформе (виртуальной, физической или облачной) даже после сбоя.\r\n\r\n«Надежное обеспечение безопасности всего производственного процесса является приоритетом компании «Чумак». Нашу работу поддерживает масштабная информационная сеть, которая постоянно расширяется и совершенствуется. Мы тщательно подходим к вопросам защиты внутренней IT-инфраструктуры, выбирая для этих целей решения, отвечающие международным стандартам», – рассказал Евгений Еньков, руководитель группы информационных технологий АО «Чумак».\r\n\r\n«После проведения предпроектного анализа мы сделали вывод о том, что задачи компании уже не могли быть решены с помощью простого антивирусного решения: защиту от направленных атак и сложных устойчивых угроз оно уже не могло обеспечить. Для противодействия сложным угрозам требуется многоуровневая защита и интеллектуальные технологии анализа в конечных точках. Поэтому мы предложили клиенту решение Symantec Endpoint Protection 12.1.6, способное предоставить необходимый уровень защиты с помощью одного многофункционального агента. А продукт Backup Exec 15 может качественно выполнить восстановление виртуальных машин, приложений, баз данных, файлов, папок и отдельных объектов приложений», – рассказал Роман Подаев, менеджер по работе с ключевыми клиентами компании Softline Украина.","alias":"symantec-endpoint-protection-dlja-chumak","roi":0,"seo":{"title":"Symantec Endpoint Protection для Чумак","keywords":"Symantec, компании, Чумак, решения, защиту, защиты, Endpoint, Protection","description":"Softline Украина реализовала проект по внедрению комплекса решений Symantec в информационную сеть производственного предприятия «Чумак». В результате проекта","og:title":"Symantec Endpoint Protection для Чумак","og:description":"Softline Украина реализовала проект по внедрению комплекса решений Symantec в информационную сеть производственного предприятия «Чумак». В результате проекта"},"deal_info":"","user":{"id":2882,"title":"Chumak","logoURL":"https://old.b4r.io/uploads/roi/company/CHumak.png","alias":"chumak","address":"","roles":[],"description":"Chumak is a national-wide company, one of the biggest food producers of Ukraine. Chumak serves consumers with ketchup and other varieties of sauces, mayonnaise, tomato paste, juice, sunflower oil, canned vegetables, macaroni and pasta. We have been one of the industry-shaping entities in the Ukrainian food market; our many-years experience and deep understanding of consumer needs make us the experts in the sphere of foodstuff production.\r\n\r\nThe corporative slogan of Chumak is “From Field to Table”. It is not mere words — our production facilities are located next to the fields, so we are able to deliver the gathered raw material for processing in an hour only. The unique location of the Company in the environmentally sound area of Southern Ukraine secures the high quality of our products. We are proud producers of conservant-free foodstuff; all Chumak products are safe and healthy!\r\n\r\nWe are a bit younger than the state — for thirteen years, we have been growing and developing together with Ukraine. Today the Company exports its products to Canada, Russia, the USA, Kazakhstan, Georgia, Israel, Spain, the Baltic Stats, as well as many other markets around the world. Chumak has become the legend!","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.chumak.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Chumak","keywords":"Chumak, Ukraine, products, been, have, Company, production, foodstuff","description":"Chumak is a national-wide company, one of the biggest food producers of Ukraine. Chumak serves consumers with ketchup and other varieties of sauces,","og:title":"Chumak","og:description":"Chumak is a national-wide company, one of the biggest food producers of Ukraine. Chumak serves consumers with ketchup and other varieties of sauces,","og:image":"https://old.b4r.io/uploads/roi/company/CHumak.png"},"eventUrl":""},"supplier":{"id":293,"title":"Wise IT","logoURL":"https://old.b4r.io/uploads/roi/company/Softline.png","alias":"wise-it","address":"Украина, 01033, г. Киев, ул. Антоновича (Горького), 33-В, БЦ «Максим», 5 этаж","roles":[],"description":"Wise IT is a team of IT specialists that offers complex technological solutions, software licensing and related IT services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":207,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":11,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://wiseit.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Wise IT","keywords":"Wise, solutions, software, services, related, technological, licensing, offers","description":"Wise IT is a team of IT specialists that offers complex technological solutions, software licensing and related IT services.","og:title":"Wise IT","og:description":"Wise IT is a team of IT specialists that offers complex technological solutions, software licensing and related IT services.","og:image":"https://old.b4r.io/uploads/roi/company/Softline.png"},"eventUrl":""},"vendors":[{"id":175,"title":"Symantec","logoURL":"https://old.b4r.io/uploads/roi/company/symantec_logo.png","alias":"symantec","address":"","roles":[],"description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company produces software for security, storage, backup and availability - and offers professional services to support its software. Netcraft assesses Symantec (including subsidiaries) as the most-used certification authority. Symantec is a Fortune 500 company and a member of the S&P 500 stock-market index. The company also has development centers in Pune, Chennai and Bengaluru (India).\r\n\r\nOn October 9, 2014, Symantec declared it would split into two independent publicly traded companies by the end of 2015. One company would focus on security, the other on information management. On January 29, 2016, the information-management business was spun-off as Veritas Technologies and sold to The Carlyle Group.\r\n\r\nThe name Symantec represents a combination of the words \"syntax\", \"semantics\" and \"technology\".","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":11,"b4r":0,"categories":{},"companyUrl":"www.symantec.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Symantec","keywords":"Symantec, company, security, software, would, technology, companies, traded","description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company","og:title":"Symantec","og:description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company","og:image":"https://old.b4r.io/uploads/roi/company/symantec_logo.png"},"eventUrl":""}],"products":[{"id":117,"logo":false,"scheme":false,"title":"Symantec Endpoint Protection","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"symantec-endpoint-protection","companyTypes":[],"description":"Stop advanced threats with intelligent security\r\n \r\nLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an all-time high. Organizations are struggling to keep up with the rapidly evolving threats. Symantec Endpoint Protection is designed to protect against advanced threats with powerful, layered protection backed by industry leading security intelligence.\r\n \r\nNetwork Threat Protection stops most threats before they can take up residence on the machine\r\nInsight reputation scoring accurately detects rapidly mutating malware and zero-day threats\r\nSONAR™ behavioral analysis stops malicious files designed to appear legitimate\r\nStrong antivirus, antispyware and firewall protection eradicate known mass malware\r\n14 Years a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms.","shortDescription":"Symantec Endpoint Protection - Proactively detect and block today’s most advanced threats with an endpoint protection solution that goes beyond antivirus.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Symantec Endpoint Protection","keywords":"threats, with, Protection, malware, Endpoint, Symantec, designed, protection","description":"Stop advanced threats with intelligent security\r \rLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an","og:title":"Symantec Endpoint Protection","og:description":"Stop advanced threats with intelligent security\r \rLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an"},"eventUrl":"","translationId":118,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":5,"title":"Enhance Staff Productivity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":350,"title":"No monitoring of corporate IT processes"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://softline.ru/news/22952","title":"Supplier's web site"}},"comments":[],"referencesCount":0}],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":11,"b4r":0,"categories":{},"branches":"Information Technology","companySizes":"More than 2000 Employees","companyUrl":"www.symantec.com","countryCodes":[],"certifications":[],"isSeller":true,"isSupplier":false,"isVendor":true,"presenterCodeLng":"","seo":{"title":"Symantec","keywords":"Symantec, company, security, software, would, technology, companies, traded","description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company","og:title":"Symantec","og:description":"Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States. The company","og:image":"https://old.b4r.io/uploads/roi/company/symantec_logo.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[{"supplier":"ISSP","partnershipLevel":"Norton Registered","countries":"","partnersType":""},{"supplier":"BMS Consulting","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"AXOFT Ukraine","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"ANTEC PRO","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"B-soft","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"De Novo","partnershipLevel":"Silver","countries":"","partnersType":""},{"supplier":"ANGARA Technologies Group","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"MERLION","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":""},{"supplier":"MONT","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":""},{"supplier":"1C","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":""},{"supplier":"OCS Distribution","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":""}],"vendoredProducts":[{"id":1751,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Symantec.png","logo":true,"scheme":false,"title":"Symantec Email Security.cloud","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":11,"alias":"symantec-email-securitycloud","companyTitle":"Symantec","companyTypes":["vendor"],"companyId":175,"companyAlias":"symantec","description":"<span style=\"font-weight: bold;\">Stop Spear Phishing, Credential Theft, and Ransomware with Isolation</span>\r\nInsulate users from spear phishing, ransomware, and other advanced attacks, and foil credential theft with strong email threat isolation.\r\n<ul>\r\n<li>Isolate suspicious email links and execute them in a remote environment to shut down spear phishing and other advanced email threats.</li>\r\n<li>Stop credential theft by rendering suspicious websites in read-only mode, preventing users from submitting sensitive data.</li>\r\n<li>Protect against advanced email attacks such as ransomware by isolating weaponized attachments.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Block Email Threats with the Highest Effectiveness and Accuracy</span>\r\nPrevent insidious email threats such as spear phishing, ransomware, and business email compromise.\r\n<ul>\r\n<li>Stop spear phishing emails with multiple layers of email protection, threat isolation, advanced email security analytics for deep visibility into attacks, built-in user awareness and education tools, and more.</li>\r\n<li>Block the latest ransomware with content defense, sandboxing, and link protection technologies that detect emerging, stealthy, and zero-day attacks.</li>\r\n<li>Defeat business email compromise with impersonation protection, sender authentication methods, and brand protection controls.</li>\r\n<li>Apply insights gathered from the world’s largest global intelligence network—distilling telemetry from over 175 million endpoints and 57 million attack sensors in 157 countries—to expose and stop the stealthiest threats.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Stop Email Attacks with Rapid Response and Remediation</span>\r\n<ul>\r\n<li>Defend against targeted campaigns with multilayered technologies and deep threat analytics.</li>\r\n<li>Protect your business from email threats with sophisticated defenses including advanced machine learning, cloud sandboxing, and time-of-click link protection.</li>\r\n<li>Gain the deepest visibility into targeted and advanced attack campaigns with email security analytics that include 60+ data points on every clean and malicious email.</li>\r\n<li>Hunt threats and prioritize the most important email security incidents across your environment through seamless integration with the Security Operations Center.</li>\r\n<li>Quickly remediate attacks and orchestrate your response across emails and endpoints by blacklisting and quarantining threats.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Reduce Business Risk through Security Awareness</span>\r\n<ul>\r\n<li>Prepare users to avert attacks and prioritize email protection for vulnerable users.</li>\r\n<li>Evaluate employee readiness by simulating real-world email attacks that imitate the latest email threats.</li>\r\n<li>Benchmark and improve user readiness over time with detailed reporting and repeat assessments.</li>\r\n<li>Teach users to recognize email attacks through training notifications that raise security awareness.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Prevent Data Leakage Across Your Environment</span>\r\nProtect sensitive data and help address legal and compliance requirements through tight integration with Symantec Data Loss Prevention.\r\n<ul>\r\n<li>Discover, monitor, and protect sensitive data wherever it's used—in email, on endpoints, in your network, in storage, and even in cloud apps.</li>\r\n<li>Accurately identify confidential data with advanced detection technologies including vector machine learning, exact data matching, and indexed document matching.</li>\r\n<li>Migrate to cloud-based email securely by extending content-aware DLP capabilities to Microsoft Office 365, Google G Suite, and more.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Safeguard the security and privacy of confidential emails with advanced policy-based encryption controls.</span>\r\n<ul>\r\n<li>Automatically encrypt sensitive emails with a secure PDF or web pickup portal, which provide both push- and pull-based encryption.</li>\r\n<li>Gain granular control over encrypted emails through policy-driven enforcement that includes the ability to expire and recall messages.</li>\r\n<li>Increase trust in encrypted messages by customizing emails, notifications, and the web portal with your company brand.</li>\r\n</ul>\r\n","shortDescription":"Symantec Email Security.cloud - Safeguard Microsoft Office 365, Google G Suite, and on-premises email with the industry’s most complete email security solution.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Symantec Email Security.cloud","keywords":"email, with, advanced, attacks, threats, data, protection, emails","description":"Stop Spear Phishing, Credential Theft, and Ransomware with Isolation\rInsulate users from spear phishing, ransomware, and other advanced attacks, and foil","og:title":"Symantec Email Security.cloud","og:description":"Stop Spear Phishing, Credential Theft, and Ransomware with Isolation\rInsulate users from spear phishing, ransomware, and other advanced attacks, and foil","og:image":"https://old.b4r.io/fileadmin/user_upload/Symantec.png"},"eventUrl":"","translationId":1752,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway-hardware.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/email-security-gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":376,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Symantec_Data_Loss_Prevention.jpg","logo":true,"scheme":false,"title":"Symantec Data Loss Prevention","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":11,"alias":"symantec-data-loss-prevention","companyTitle":"Symantec","companyTypes":["vendor"],"companyId":175,"companyAlias":"symantec","description":"<span style=\"font-weight: bold;\">Extend Data Loss Prevention to the Cloud</span>\r\nDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access security broker (CASB) capabilities from Symantec CloudSOC.\r\nExtend your DLP coverage and get direct visibility of content in over sixty cloud apps - including Office 365, Box, Dropbox, Google Apps or Salesforce\r\nLeverage full CASB capabilities so you can continuously monitor content additions, changes, and access rights in cloud apps\r\nLeverage existing DLP policies and workflows for cloud apps so you don’t have to rewrite your finely-tuned rule sets\r\n\r\n<span style=\"font-weight: bold;\">Discover Where Sensitive Data Is Stored Across Your Infrastructure</span>\r\nDescribed Content Matching looks for matches on regular expressions or patterns, e.g., “block if we see a credit card pattern”\r\nExact Data Matching identifies sensitive data directly in your database, e.g., “block exfiltration of any customer name and their associated bank account number”\r\nIndexed Document Matching applies a “full file fingerprint” to identify confidential information in unstructured data including Microsoft Office documents; PDF files; as well as binary files such as JPEGs, CAD designs, and multimedia files\r\nVector Machine Learning automatically learns and identifies the layout of sensitive document types such as financial documents, source code, etc.\r\nFile Type Detection recognizes more than 330 different file types including email, graphics and encapsulated formats, and can also recognize virtually any custom file type\r\n\r\n<span style=\"font-weight: bold;\">Monitor and Protect Sensitive Data On Mobile Devices, On-Premise, and In the Cloud</span>\r\nKeep data safe on Windows and Mac endpoints by performing local scanning and real-time monitoring\r\nMonitor confidential data that is being downloaded, copied or transmitted to or from laptops and desktops, including through email or cloud storage\r\nExtend data loss prevention monitoring and protection to iOS and Android devices, whether corporate-owned or user-owned\r\nFind and protect confidential unstructured data by scanning network file shares, databases, and other enterprise data repositories\r\nMonitor and protect data in motion, including sensitive data sent via email, web and a wide range of network protocols\r\n\r\n<span style=\"font-weight: bold;\">Define and Enforce Policies Consistently Across Your Environment</span>\r\nUse a single web-based console to define data loss policies, review and remediate incidents, and perform system administration across all of your endpoints, mobile devices, cloud-based services, and on-premise network and storage systems\r\nTake advantage of more than 60 pre-built policy templates and a convenient policy builder to get your Symantec Data Loss Prevention solution up and running quickly\r\nUse robust workflow and remediation capabilities to streamline and automate incident response processes\r\nApply business intelligence to your Symantec Data Loss Prevention efforts with a sophisticated analytics tool that provides advanced reporting and ad-hoc analysis capabilities","shortDescription":"Discover, monitor and protect your sensitive data with the industry’s leading data loss prevention solution.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Symantec Data Loss Prevention","keywords":"data, Data, your, cloud, Symantec, Loss, including, Prevention","description":"Extend Data Loss Prevention to the Cloud\rDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access","og:title":"Symantec Data Loss Prevention","og:description":"Extend Data Loss Prevention to the Cloud\rDiscover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access","og:image":"https://old.b4r.io/fileadmin/user_upload/Symantec_Data_Loss_Prevention.jpg"},"eventUrl":"","translationId":377,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":117,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Symantec_Endpoint_Protection.jpg","logo":true,"scheme":false,"title":"Symantec Endpoint Protection","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":11,"alias":"symantec-endpoint-protection","companyTitle":"Symantec","companyTypes":["vendor"],"companyId":175,"companyAlias":"symantec","description":"Stop advanced threats with intelligent security\r\n \r\nLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an all-time high. Organizations are struggling to keep up with the rapidly evolving threats. Symantec Endpoint Protection is designed to protect against advanced threats with powerful, layered protection backed by industry leading security intelligence.\r\n \r\nNetwork Threat Protection stops most threats before they can take up residence on the machine\r\nInsight reputation scoring accurately detects rapidly mutating malware and zero-day threats\r\nSONAR™ behavioral analysis stops malicious files designed to appear legitimate\r\nStrong antivirus, antispyware and firewall protection eradicate known mass malware\r\n14 Years a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms.","shortDescription":"Symantec Endpoint Protection - Proactively detect and block today’s most advanced threats with an endpoint protection solution that goes beyond antivirus.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Symantec Endpoint Protection","keywords":"threats, with, Protection, malware, Endpoint, Symantec, designed, protection","description":"Stop advanced threats with intelligent security\r \rLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an","og:title":"Symantec Endpoint Protection","og:description":"Stop advanced threats with intelligent security\r \rLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an","og:image":"https://old.b4r.io/fileadmin/user_upload/Symantec_Endpoint_Protection.jpg"},"eventUrl":"","translationId":118,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":36,"title":"Endpoint Security"}],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[],"partnershipProgramme":{"levels":[{"id":727,"level":"Norton Registered"},{"id":729,"level":"Silver"},{"id":731,"level":"Gold"},{"id":733,"level":"Platinum"},{"id":735,"level":"Distributor"}],"partnerDiscounts":{"Norton Registered":"","Silver":"","Gold":"","Platinum":"","Distributor":""},"registeredDiscounts":{"Norton Registered":"","Silver":"","Gold":"","Platinum":"","Distributor":""},"additionalBenefits":[],"salesPlan":{"Norton Registered":"","Silver":"","Gold":"","Platinum":"","Distributor":""},"additionalRequirements":[]}}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}