{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementationDetail":{"description":{"ru":"Описание","_type":"localeString","en":"Description"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"show":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"details":{"ru":"Подробности","_type":"localeString","en":"Details"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"additional-info":{"en":"Additional information","ru":"Дополнительная информация","_type":"localeString"},"project-was-put":{"ru":"Проект был сдан в срок","_type":"localeString","en":"The project has been delivered on schedule"},"budget-not-exceeded":{"ru":"Бюджет не был превышен","_type":"localeString","en":"The budget has not been exceeded"},"functionally-task-assignment":{"_type":"localeString","en":"Functionality complies with task","ru":"Функциональность соответствует задаче"},"similar-implementations":{"ru":"Схожие внедрения","_type":"localeString","en":"Similar deployments"},"source":{"_type":"localeString","en":"Source:","ru":"Источник:"},"price":{"ru":"Цена:","_type":"localeString","en":"Price: "},"pluses":{"ru":"Плюсы","_type":"localeString","en":"Advantages"},"raiting":{"ru":"Общая оценка","_type":"localeString","en":"Raiting"},"user":{"en":"User","ru":"Пользователь","_type":"localeString"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"product":{"ru":"Продукт","_type":"localeString","en":"Product"},"canceled":{"_type":"localeString","en":"Canceled","ru":"Отменено"},"deal-canceled":{"en":"Deal canceled","ru":"Сделка отменена","_type":"localeString"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"en":"Finished","ru":"Завершено","_type":"localeString"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"_type":"localeString","en":"Stopped","ru":"Остановлено"},"date":{"en":"Deployment date","ru":"Дата внедрения","_type":"localeString"},"roi":{"ru":"ROI","_type":"localeString","en":"ROI"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"_type":"localeString","en":"Sign out","ru":"Выйти"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"_type":"localeString","en":"Requests","de":"References","ru":"Мои запросы"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"_type":"localeString","en":"4 vendors","ru":"поставщикам"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}},"filters":{"from":{"_type":"localeString","en":"from","ru":"от"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"en":"Filter by price","ru":"Фильтр по цене","_type":"localeString"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"en":"Delivery type","ru":"Тип поставки","_type":"localeString"},"product-categories-field":{"_type":"localeString","en":"product categories","ru":"категориz продуктаhjle"},"providers-field":{"_type":"localeString","en":"Providers","ru":"Поставщик, производитель"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"with-discounts-checkbox":{"en":"With discounts","ru":"Со скидками","_type":"localeString"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"show-all-button":{"_type":"localeString","en":"Show all","ru":"Показать все"},"suggest-product-button":{"_type":"localeString","en":"Suggest product","ru":"Предложить продукт"},"with-projects-label":{"en":"With deployments","ru":"С внедрениями","_type":"localeString"},"bonus-4-reference":{"en":"Bonus 4 Reference","ru":"Бонус за референс","_type":"localeString"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"en":"Countries","ru":"Страны","_type":"localeString"},"seller":{"_type":"localeString","en":"Seller","ru":"Продавец"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"_type":"localeString","en":" Branch","ru":"Отрасль"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"en":"With reference","ru":"С референсами","_type":"localeString"},"show-deal-checkbox":{"_type":"localeString","en":"Show deal with noname","ru":"Показывать сделки с noname"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"find":{"_type":"localeString","en":"Find","ru":"Выполнить поиск"},"deal-date":{"_type":"localeString","en":"Date","ru":"Дата"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"company-size":{"_type":"localeString","en":"Company size","ru":"Размер компании"},"add-company":{"en":"Add company","ru":"Добавить компанию","_type":"localeString"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"От Я до А"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"_type":"localeString","en":"Company type","ru":"Тип компании"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"en":"Customers","ru":"Покупатели","_type":"localeString"},"product-supplier":{"en":"Product supplier","ru":"Поставщик продукта","_type":"localeString"},"product-vendor":{"en":"Product vendor","ru":"Производитель продукта","_type":"localeString"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"en":"Canceled","ru":"Отменено","_type":"localeString"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"en":"Deal closed","ru":"Сделка закрыта","_type":"localeString"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"en":"In Process","ru":"Ведется","_type":"localeString"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"_type":"localeString","en":"Stopped","ru":"Остановлено"},"competencies":{"en":"Competencies","ru":"Компетенции","_type":"localeString"}}},"translationsStatus":{"implementationDetail":"success","filters":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"implementationDetail":{}},"pageMetaDataStatus":{"implementationDetail":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"impl-3004":{"id":746,"title":"Impl 3004","description":"","alias":"impl-3004","roi":0,"seo":{"title":"Impl 3004","keywords":"","description":"","og:title":"Impl 3004","og:description":""},"deal_info":"","user":{"id":2949,"title":"Harvey Nichols","logoURL":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg","alias":"harvey-nichols","address":"","roles":[],"description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as the UK's premier luxury fashion retailer, Harvey Nichols is internationally renowned for its expertly edited fashion and beauty merchandise, premium food and wine offer and award-winning restaurants.\r\n\r\nHarvey Nichols has seven stores within the UK and Ireland, consisting of five large-format stores in London, Edinburgh, Birmingham, Leeds and Manchester, and two small-format stores in Bristol and Dublin. A beauty concept store, Beauty Bazaar, Harvey Nichols, opened in Liverpool in November 2012.\r\n\r\nAll UK stores have luxury Foodmarkets and Restaurants, Cafés or Brasseries. Harvey Nichols also owns and operates OXO Tower Restaurant, Bar and Brasserie on the South Bank in London.\r\n\r\nIn addition to this, there are seven large-format stores overseas: two in Turkey (Istanbul and Ankara), one in Riyadh, one in Dubai, two in Hong Kong and one in Kuwait.\r\n\r\nHarvey Nichols stores offer the ultimate fashion experience. Seen as ‘the place to be’, Harvey Nichols is the club that doesn’t require a membership. Exclusive, niche and established labels sit alongside accessible everyday collections, offering customers the must-have edit for all their wardrobe needs – from everyday to extraordinary.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.harveynichols.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Harvey Nichols","keywords":"Harvey, Nichols, stores, fashion, opened, luxury, beauty, offer","description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:title":"Harvey Nichols","og:description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:image":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg"},"eventUrl":""},"supplier":{"id":2947,"title":"Bytes Technology Group UK","logoURL":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png","alias":"bytes-technology-group-uk","address":"","roles":[],"description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\n\r\nBytes is part of the £2bn Altron Group. Our UK business began in 1982 and has grown profitably each year to reach a turnover in excess of £194m in FY2015, making us one of the largest software services and solutions businesses in the country.\r\n\r\nThe most important aspect of our business is our people. We value initiative, teamwork and achievement. Together, we focus on providing the highest levels of service so we can deliver our ultimate goal – your satisfaction.\r\n\r\nOur customers include leading brands, such as Marks & Spencer, BBC, Specsavers, NHS, Clifford Chance, BUPA, United Utilities, Hiscox, Allen & Overy LLP and thousands more across retail, media, finance, manufacturing, legal, the NHS and the public sector.\r\n\r\nWe also work closely with the majority of IT vendors and are delighted to have received honours, including Microsoft Worldwide Partner of the Year Winner three times in four years, and CheckPoint European Partner of the Year, to name a few of our recent awards.\r\n\r\nNeed to know more? Please explore our website and get in touch with any questions. We'll be delighted to help.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.bytes.co.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Bytes Technology Group UK","keywords":"Bytes, Group, with, business, Partner, more, delighted, Year","description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:title":"Bytes Technology Group UK","og:description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:image":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png"},"eventUrl":""},"vendors":[{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":""}],"products":[{"id":499,"logo":false,"scheme":false,"title":"Juniper Networks IDP Series","vendorVerified":0,"rating":"1.80","implementationsCount":2,"suppliersCount":0,"alias":"juniper-networks-idp-series","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Stateful signature</span>\r\nThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.\r\n<span style=\"font-weight: bold;\">Protocol anomaly</span>\r\nThe IDP rulebase attack objects detect protocol usages that violate published RFCs. This method protects your network from undiscovered vulnerabilities.\r\n<span style=\"font-weight: bold;\">Traffic anomaly</span>\r\nThe Traffic Anomalies rulebase uses heuristic rules to detect unexpected traffic patterns that might indicate reconnaissance or attacks. This method blocks distributed denial-of-service (DDoS) attacks and prevents reconnaissance activities.\r\n<span style=\"font-weight: bold;\">Backdoor</span>\r\nThe Backdoor rulebase uses heuristic-based anomalous traffic patterns and packet analysis to detect Trojans and rootkits. These methods prevent proliferation of malware in case other security measures have been compromised.\r\n<span style=\"font-weight: bold;\">IP spoofing</span>\r\nThe IDP appliance checks the validity of allowed addresses inside and outside the network, permitting only authentic traffic and blocking traffic with a disguised source.\r\n<span style=\"font-weight: bold;\">Layer 2 attacks</span>\r\nThe IDP appliance prevents Layer 2 attacks using rules for Address Resolution Protocol (ARP) tables, fragment handling, connection timeouts, and byte/length thresholds for packets. These methods prevent a compromised host from polluting an internal network using methods such as ARP cache poisoning.\r\n<span style=\"font-weight: bold;\">Denial of service (DoS)</span>\r\nThe SYN Protector rulebase provides two, alternative methods to prevent SYN-flood attacks.\r\n<span style=\"font-weight: bold;\">Network honeypot</span>\r\nThe IDP appliance impersonates vulnerable ports so you can track attacker reconnaissance activity.","shortDescription":"Juniper Networks IDP Series Intrusion Detection and Prevention Appliances.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Series","keywords":"attacks, rulebase, traffic, methods, method, detect, network, reconnaissance","description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.","og:title":"Juniper Networks IDP Series","og:description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives."},"eventUrl":"","translationId":499,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"references":[],"referencesCount":0,"similarImplementations":[{"id":129,"title":"Check Point Intrusion Prevention System Software Blade for logistics provider","description":"Unipart receive the flexibility and control of an in-house solution backed by technical specialists and strategic thought leaders\r\n\r\nOverview\r\nGlobal logistics provider Unipart operates across a range of market sectors including automotive, leisure, marine, manufacturing, mobile telecoms, rail, retail and technology.\r\n\r\nCustomers include Vodafone, Sainsbury’s, Sky, Homebase, Jaguar and Network Rail.\r\n\r\nFaced with an aging firewall estate that required increasing attention, Unipart, after exploring a fully managed service, engaged Bytes Security Partnerships (BSP) due to their ability to minimise capital expenditure and deliver tangible TCO savings without the need to outsource and lose in-house skills.\r\n\r\nChallenge\r\nBytes Security Partnerships (BSP) were invited to tender for the managed service business and decided to reassess Unipart’s requirements.\r\n\r\nBSP proposed a new and unique approach which would not only minimise capital expenditure but would deliver tangible TCO savings over a 3 year period with no need for a managed service or loss of in-house skills.\r\n\r\nThis proposal created a three year partnership, a co-managed service to provide Unipart the flexibility and control of a full in-house solution backed up by BSP’s technical specialists and strategic thought leadership..\r\n\r\nSolution\r\nBSP provided a central security solution to support Unipart’s firewall replacement programme which included: Re-organisation of the firewall estate so that only the 8 end of life firewalls needed replacement instead of the 22 quoted in alternative offerings.\r\n\r\nThis significantly reduced the capital cost of replacements and provided Unipart with commonsense advice on Check Point lifecycle management."Built in” upgrades over the life of the partnership which ensures Unipart will not face an end of life situation during the life of the contract.The introduction of the Check Point IPS and Event Correlation Blades coupled with a range of quarterly audit and health check services to assist Unipart in addressing their ongoing requirements for PCI compliance and rule based management.\r\n\r\nThis ensures that Unipart reduces its exposure to security risks and can leverage compliance in their bid to acquire new clients.SPARC Monitor gives Unipart an early warning system which enables them to be more proactive through being able to avoid downtime weeks in advance.\r\n\r\nThe service also provides capacity planning information which will give Unipart a competitive advantage in new business acquisitions.The project deliverables were up and running in under 6 months, this being a challenging implementation for a project of this scale and complexity.\r\n\r\nThe latest releases of software were also rolled out quickly.\r\n\r\nOver the life of the project the Bytes managed system refreshes will future proof Unipart’s security systems. The solution mirrors the simplicity of a managed service at reduced cost and with less internal administration which embraces the principles of the Unipart Way. .\r\n\r\nBenefits\r\nBy taking on the full range of BSP services (SPARC, SPARC Audit and SPARC Monitor) Unipart has a reduced TCO and leveraged a competitive advantage through working with the right partner.\r\n\r\nBytes Security Partnerships and Unipart have developed a close working relationship and the solution has delivered all the key elements of a fully managed service in the most cost effective way whilst taking advantage of the investments that Unipart had already made..\r\n\r\nBy choosing Bytes SP to be our security partner, we have gained TCO savings and financial benefits and now have the confidence in our security systems to be able to support our compliance needs.\r\nServices Integration Manager, Unipart Group","alias":"check-point-programmnyi-bleid-ips-dlja-logisticheskoi-kompanii","roi":0,"seo":{"title":"Check Point Intrusion Prevention System Software Blade for logistics provider","keywords":"Unipart, service, managed, with, which, life, Bytes, solution","description":"Unipart receive the flexibility and control of an in-house solution backed by technical specialists and strategic thought leaders\r\rOverview\rGlobal logistics","og:title":"Check Point Intrusion Prevention System Software Blade for logistics provider","og:description":"Unipart receive the flexibility and control of an in-house solution backed by technical specialists and strategic thought leaders\r\rOverview\rGlobal logistics"},"deal_info":"","user":{"id":2948,"title":"Unipart Group","logoURL":"https://old.b4r.io/uploads/roi/company/Unipart_Group.png","alias":"unipart-group","address":"","roles":[],"description":"\r\nUnipart Group is a leading provider of manufacturing, logistics and consultancy services.\r\nWhy this combination? We believe that these areas of expertise provide the skills, technologies and markets for continued growth. Our proprietary business system, The Unipart Way, enables us to build a unique range of capabilities to deliver productivity improvement and innovation for all customers. At the heart of The Unipart Way is a commitment to engage employees at every level of the organisation and to provide people with the skills and knowledge to be great at whatever they do.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.unipart.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Unipart Group","keywords":"Unipart, provide, skills, Group, capabilities, range, customers, deliver","description":"\rUnipart Group is a leading provider of manufacturing, logistics and consultancy services.\rWhy this combination? We believe that these areas of expertise","og:title":"Unipart Group","og:description":"\rUnipart Group is a leading provider of manufacturing, logistics and consultancy services.\rWhy this combination? We believe that these areas of expertise","og:image":"https://old.b4r.io/uploads/roi/company/Unipart_Group.png"},"eventUrl":""},"supplier":{"id":2947,"title":"Bytes Technology Group UK","logoURL":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png","alias":"bytes-technology-group-uk","address":"","roles":[],"description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\n\r\nBytes is part of the £2bn Altron Group. Our UK business began in 1982 and has grown profitably each year to reach a turnover in excess of £194m in FY2015, making us one of the largest software services and solutions businesses in the country.\r\n\r\nThe most important aspect of our business is our people. We value initiative, teamwork and achievement. Together, we focus on providing the highest levels of service so we can deliver our ultimate goal – your satisfaction.\r\n\r\nOur customers include leading brands, such as Marks & Spencer, BBC, Specsavers, NHS, Clifford Chance, BUPA, United Utilities, Hiscox, Allen & Overy LLP and thousands more across retail, media, finance, manufacturing, legal, the NHS and the public sector.\r\n\r\nWe also work closely with the majority of IT vendors and are delighted to have received honours, including Microsoft Worldwide Partner of the Year Winner three times in four years, and CheckPoint European Partner of the Year, to name a few of our recent awards.\r\n\r\nNeed to know more? Please explore our website and get in touch with any questions. We'll be delighted to help.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.bytes.co.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Bytes Technology Group UK","keywords":"Bytes, Group, with, business, Partner, more, delighted, Year","description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:title":"Bytes Technology Group UK","og:description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:image":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png"},"eventUrl":""},"vendors":[{"id":171,"title":"Check Point","logoURL":"https://old.b4r.io/uploads/roi/company/checkpoint_logo.png","alias":"check-point","address":"","roles":[],"description":"Check Point Software Technologies Ltd. is an international provider of software and combined hardware and software products for IT security, including network security, endpoint security, data security and security management.\r\n\r\nAs of 2016 the company has approximately 3,400 employees worldwide. Headquartered in Tel Aviv, Israel, the company has development centers in Israel, California (ZoneAlarm), Sweden (Former Protect Data development centre), and Belarus. The company has main offices in the United States, in San Carlos, California, in Dallas, Texas, in Ottawa, Ontario, Canada, and Sydney Australia.\r\n\r\nCheck Point competes in the antivirus industry against AVG, Avira, ESET, F-Secure, Kaspersky, McAfee, Panda Security, Sophos and Symantec among others.","companyTypes":[],"products":{},"vendoredProductsCount":9,"suppliedProductsCount":9,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":1,"vendorPartnersCount":0,"supplierPartnersCount":76,"b4r":0,"categories":{},"companyUrl":"www.checkpoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Check Point","keywords":"security, company, Point, Check, California, Israel, development, software","description":"Check Point Software Technologies Ltd. is an international provider of software and combined hardware and software products for IT security, including network","og:title":"Check Point","og:description":"Check Point Software Technologies Ltd. is an international provider of software and combined hardware and software products for IT security, including network","og:image":"https://old.b4r.io/uploads/roi/company/checkpoint_logo.png"},"eventUrl":""}],"products":[{"id":496,"logo":false,"scheme":false,"title":"Check Point программный блейд IPS","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"check-point-programmnyi-bleid-ips","companyTypes":[],"description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по сравнению с традиционными отдельными инструментами IPS. Программный блейд обеспечивает максимальную проактивную систему борьбы с вторжениями — и все это вместе с преимуществами унифицированного фаервола нового поколения.\r\n\r\n<span style=\"font-weight: bold;\">Преимущества</span>\r\n<ul><li>Новое поколение IPS — более совершенная защита, более высокая производительность</li><li>Лидер в области защиты от вторжений и среди фаерволов по данным тестов NSS Labs. Решение содержит тысячи методов сигнатурной, поведенческой и превентивной защиты.</li><li>Решения Check Point обеспечивают наибольший охват угроз для приложений Microsoft и Adobe.</li><li>Сочетание современного фаервола, контроля приложений, фильтрации URL, DLP и многого другого в самом передовом фаерволе нового поколения сетевого класса.</li><li>Исключительно высокая многогигабитная производительность</li><li>До 15 Гб/с пропускная способность IPS и до 30 Гб/с пропускная способность фаервола.</li><li>Технологии Stateful Inspection и SecureXL обеспечивают многоуровневую проверку и ускоряют пропускную способность.</li><li>Технология CoreXL обеспечивает наиболее эффективное и производительное использование многоядерных технологий.</li><li>Низкая общая стоимость владения и быстрый возврат инвестиций</li><li>Активация в один клик IPS и фаервола на любом шлюзе Check Point.</li><li>Гибкость и возможность расширения защиты без дополнительных капиталовложений.</li><li>Интеграция с архитектурой программных блейдов для выбора защиты, соответствующей требованиям бизнеса.</li></ul>\r\n<span style=\"font-weight: bold;\">Возможности</span>\r\n\r\n<ul><li>Производительная и надежная система предотвращения вторжений</li><li>Программный блейд Intrusion Protection System дополняет защиту фаервола и прочнее защищает вашу сеть без потери производительности.</li><li>Полнофункциональная IPS</li><li>Программный блейд IPS — это полноценная система защиты от вторжений, которая обеспечивает максимальную защиту от вредоносных файлов и нежелательного сетевого трафика, включая:</li><li>Вредоносные атаки</li><li>DoS- и DDoS-атаки</li><li>Уязвимости в приложениях и серверах Application and server vulnerabilities</li><li>Инсайдерские угрозы</li><li>Нежелательный трафик в приложениях, включая IM и P2P</li></ul>\r\n\r\n\r\n\r\n\r\n\r\n<span style=\"font-weight: bold;\">Геозащита</span>\r\n\r\nГеозащита отслеживает трафик на основании источника или страны назначения. Создание правил геозащиты с исключениями позволит получать легитимный трафик и блокировать или следить за трафиком из неизвестных или недоверенных источников. Мониторинг активностей помогает осуществить программный блейд SmartEvent.\r\n\r\n<span style=\"font-weight: bold;\">Высокий уровень защиты</span>\r\n\r\nЗащита в режиме реального времени — программный блейд IPS постоянно обновляет инструментарий защиты против развивающихся угроз. Многие из этих инструментов превентивные и обеспечивают защиту до того, как уязвимости будут обнаружены, а эксплойты созданы.\r\nМаксимальное покрытие угроз для приложений Microsoft — Check Point является компанией № 1 по покрытию угроз, включая превентивную защиту против развивающихся уязвимостей и эксплойтов.\r\n<span style=\"font-weight: bold;\">Встроенная система IPS</span>\r\nПрограммный блейд со встроенной системой IPS обеспечивает максимальную защиту по более низкой цене (до 50%) по сравнению с многочисленными отдельными решениями. По соотношению цены и производительности этот блейд до десяти раз превосходит другие решения. Встроенная система IPS имеет много преимуществ, которые становятся новым стандартом в отрасли, включая:\r\n\r\nУменьшение издержек за счет консолидации многочисленных независимых решений.\r\n\r\n<span style=\"font-weight: bold;\">Благодаря интеграции IPS с cуществующим фаерволом вы экономите на:</span>\r\n\r\n<ul><li>Покупке оборудования</li><li>Свободном объеме на жестких дисках</li><li>Тренингах и повседневном управлении</li><li>Местах для стоек</li><li>Прокладке кабелей</li><li>Охлаждении</li><li>Электроэнергии</li><li>Снижение задержек</li><li>Инспекция трафика производится только один раз — сразу фаерволом и IPS.</li><li>Последовательная реализация политик</li><li>Интегрированное решение обладает едиными совместными политиками безопасности.</li><li>Упрощение управления и обучения</li><li>Снижение расходов на управление и обучение.</li><li>Уменьшение ошибок.</li><li>Простое сочетание с организационной структурой IT.</li><li>Увеличение операционной эффективности и рентабельности.</li><li>Простое развертывание</li><li>Быстрое добавление защиты IPS на шлюз безопасности без лишних проверок.</li></ul>\r\n\r\n\r\n<span style=\"font-weight: bold;\">Многогигабитная производительность</span>\r\nБлейд обеспечивает пропускную способность до 15 Гб/с с установленным по умолчанию профилем IPS. Блейд содержит высокоскоростную модель, которая обеспечивает многоуровневую проверку.\r\n\r\n<span style=\"font-weight: bold;\">Проверка защищенного SSL-трафика</span>\r\nПроверяйте и делайте безопасным защищенный SSL-трафик, проходящий через шлюз безопасности. Когда трафик проходит через шлюз, тот расшифровывает трафик с помощью публичного ключа отправителя, затем проверяет и очищает, а после повторно шифрует и посылает вновь зашифрованный контент получателю. Гранулярность позволяет устанавливать исключения для инспекции SSL, чтобы не нарушить конфиденциальность и обеспечить выполнение политик безопасности. Некоторая часть зашифрованного контента может не инспектироваться — администратор может установить исключения из правил проверки. Правила определяет администратор.\r\n\r\n<span style=\"font-weight: bold;\">Динамическое управление защитой от угроз</span>\r\nС программными блейдами IPS и SmartEvent вы получаете новую динамическую возможность для борьбы с многочисленными угрозами — в том числе с развивающимися и поступающими в режиме реального времени. Механизмы управления защитой от угроз позволяют вам быстро и эффективно производить постоянные изменения, сокращая количество ошибок и позволяя внедрять защиту оперативно и конфиденциально.\r\n\r\n<span style=\"font-weight: bold;\">Программный блейд IPS предлагает:</span>\r\n\r\n<ul><li>Защита в «песочнице» — обеспечивает уверенность благодаря запуску приложений без влияния на сеть. Автоматическая активация защиты — активация новой защиты основывается на настраиваемых параметрах (воздействие на производительность, индекс доверия, тяжесть угроз). Тем самым устраняется сложность постоянного индивидуального администрирования.</li><li>Унифицированное управление — блейд IPS настраивается и управляется через стандартный интерфейс управления Check Point, который в частности используется, чтобы управлять другими шлюзами безопасности Check Point и отдельной системой IPS.</li><li>Настраиваемый мониторинг — отслеживание событий через детальные отчеты поможет узнать о самом важном. Новый программный блейд Управление безопасностью для блейдов IPS и программный блейд Security Provisioning упрощают анализ угроз и сокращают операционные ошибки.</li><li>Бизнес-уровень — настраиваемые отчеты обеспечивают простой мониторинг критических событий безопасности, которые ассоциированы с вашими критически важными системами.</li><li>Многомерная сортировка — перетащите колонку с данными о событии, и информация будет автоматически перестроена.</li><li>Применимые на практике логи событий — редактируйте связанную защиту, создавайте исключения и просматривайте пакетные данные прямо из записей логов.</li><li>Простое развертывание. Развертывание на вашем существующем фаерволе — сократите время и уменьшите издержки за счет повышения эффективности текущей инфраструктуры.</li><li>Гранулярная защита — легкие в использовании профили позволяют администраторам создавать подписи и активировать правила, которые соответствуют специфическим потребностям ваших сетевых активов.</li><li>Преднастроенные и рекомендованные профили — позволяют вам немедленно использовать профили и легко работать с ними, оптимизируя их в соответствии с требованиями производительности.</li><li>Опционально доступный режим «только обнаружение» — вся ваша защита будет работать на обнаружение, но трафик блокировать не будет, что позволит вам работать без риска сбоев.</li><li>Защита получения обновлений. Установка обновлений — это небезопасная процедура, которая подвергает вашу сеть риску атаки. Но благодаря более глубокому подходу, сочетающему надежную функциональность IPS с продуманной стратегией установки обновлений, администраторы сети могут лучше подготовиться к установкам и обезопасить сеть.</li><li>Интеграция с архитектурой программных блейдов. Программный блейд IPS интегрирован с архитектурой программных блейдов. Он может быть легко и быстро активирован на существующих шлюзах Check Point, что экономит время и сокращает издержки за счет повышения качества защитной инфраструктуры.</li></ul>\r\n\r\n\r\n\r\n\r\n","shortDescription":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по сравнению с традиционными отдельными инструментами IPS.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point программный блейд IPS","keywords":"блейд, защиты, угроз, защиту, Point, Check, обеспечивает, трафик","description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по","og:title":"Check Point программный блейд IPS","og:description":"Программный блейд Система предотвращения вторжений (IPS) сочетает передовую защиту от вторжений с высочайшей производительностью по более выгодной цене по"},"eventUrl":"","translationId":2402,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":497,"logo":false,"scheme":false,"title":"Check Point Intrusion Prevention System Software Blade","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"check-point-intrusion-prevention-system-software-blade","companyTypes":[],"description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. The IPS Software Blade delivers complete and proactive intrusion prevention – all with the deployment and management advantages of a unified and extensible next-generation firewall solution.\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n<ul><li>Next-generation security prevention, protection and performance</li><li>Industry-leading intrusion protection and firewall—as tested NSS Labs—delivers 1,000s of signature, behavioral and preemptive protections</li><li>Check Point is ranked #1 in Microsoft and Adobe threat coverage</li><li>Combines with best-of-breed firewall, application control, URL filtering, DLP and more on the most comprehensive, network-class next gen firewall</li><li>Unrivaled, multi-Gigabit performance in an integrated IPS</li><li>Up to 15 Gbps of IPS and 30 Gbps of firewall throughput</li><li>Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection and accelerated IPS throughput</li><li>CoreXL technology provides the most efficient and high-performance use of multi-core technologies</li><li>Lowest TCO and fastest ROI of any enterprise-class firewall solution</li><li>One-click activation of IPS and firewall protection on any Check Point gateway</li><li>Delivers unmatched extensibility and flexibility—all without adding CapEx</li><li>Integrated into Check Point Software Blade Architecture for on-demand security</li></ul>\r\nThe Check Point IPS Software Blade is delivering better security than our previous IPS software solution and at a lower cost. Check Point has designed the IPS software blade for efficient resource utilization, which improves performance, mission critical availability, and uptime.\r\n<span style=\"font-weight: bold;\">Complete Intrusion Prevention System (IPS) Functionality</span>\r\nThe Intrusion Protection System Software Blade complements firewall protection, further securing your network without degrading gateway performance.\r\n<span style=\"font-weight: bold;\">Full-featured IPS</span>\r\nThe IPS Software Blade provides a complete Intrusion Prevention System security solution, providing comprehensive network protection against malicious and unwanted network traffic, including:\r\n<ul><li>Malware attacks</li><li>Dos and DDoS attacks</li><li>Application and server vulnerabilities</li><li>Insider threats</li><li>Unwanted application traffic, including IM and P2P</li><li>Geo-protections</li></ul>\r\nGeo-protections enforce or monitor traffic based on the source or destination country. Create a geo-protection policy with exceptions to allow legitimate traffic through while blocking or monitoring traffic from unknown and untrusted sources. Monitor activity with the SmartEvent Software Blade.\r\n<span style=\"font-weight: bold;\">Trusted Security</span>\r\nReal-Time protections – The IPS Software Blade is constantly updated with new defenses against emerging threats. Many of the IPS protections are pre-emptive, providing defenses before vulnerabilities are discovered or exploits are even created.\r\nMicrosoft vulnerability coverage – Check Point is ranked #1 in Microsoft threat coverage, including preemptive protections against emerging vulnerabilities and exploits.\r\n<span style=\"font-weight: bold;\">Multi-gigabit Integrated IPS Performance</span>\r\nDelivers up to 15 Gbps of IPS throughput with the default IPS profile. The IPS Software Blade incorporates a high-speed pattern matching engine that does multi-layered, 2-tier inspection for maximum performance with thousands of protections enabled.\r\n<span style=\"font-weight: bold;\">Dynamic Threat Management</span>\r\nWith the IPS Software Blade and the SmartEvent Software Blade you gain a new, dynamic management paradigm for today’s high volume, real-time and evolving threat environment.\r\nCheck Point threat management workflows allow you to handle constant change quickly and efficiently, reducing your management overhead and allowing you to confidently and promptly deploy protections.\r\n<span style=\"font-weight: bold;\">The IPS Software Blade offers:</span>\r\n<ul><li>New protections sandbox – Build confidence in a ‘sandbox’ environment with no impact on your network.</li><li>Automatic protection activation – Activation of new protections, based on configurable parameters (performance impact, confidence index, threat severity). The difficulties of constant, individual management of thousands of protections are eliminated.</li><li>Unified Management – The IPS blade is configured and managed through a common Check Point management interface—the same one used to manage other security gateway Software Blades and Check Point dedicated IPS.</li><li>Configurable, actionable monitoring – Track events through detailed reports and logs of what is most important. The new Security Management Software Blade for IPS and Security Provisioning Software Blade simplify threat analysis and reduce operational overhead.</li><li>Business-level views – Customizable reports provide easy monitoring of critical security events associated with your business-critical systems.</li><li>Multi-dimensional sorting – Drag-and-drop columns of event data and the information will be automatically re-ordered.</li><li>Actionable event logs – Edit the associated protection, create an exception or view packet data directly from log entries.</li></ul>","shortDescription":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Check Point Intrusion Prevention System Software Blade","keywords":"Software, Blade, Point, with, Check, protections, protection, security","description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than","og:title":"Check Point Intrusion Prevention System Software Blade","og:description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than"},"eventUrl":"","translationId":497,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":74,"title":"United Kingdom","name":"GBR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":281,"title":"No IT security guidelines"},{"id":178,"title":"No control over data access"}]}},"categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":50,"title":"IPC - Information Protection and Control","alias":"ipc-information-protection-and-control","description":"Information Protection and Control (IPC) — технология защиты конфиденциальной информации от внутренних угроз. Решения класса IPC предназначены для защиты информации от внутренних угроз, предотвращения различных видов утечек информации, корпоративного шпионажа и бизнес-разведки. Термин IPC соединяет в себе две основные технологии: шифрование носителей информации на всех точках сети и контроль технических каналов утечки информации с помощью технологий Data Loss Prevention (DLP). Контроль доступа к сети, приложениям и данным является возможной третьей технологией в системах класса IPC. IPC включает в себя решения класса Data Loss Prevention (DLP), системы шифрования корпоративной информации и контроля доступа к ней. \r\n\r\nИсточник: https://ru.wikipedia.org/wiki/Information_Protection_and_Control","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.bytes.co.uk/sectors/case-studies/unipart-group","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":131,"title":"Juniper Networks IDP Series for Luxury lifestyle retail chain","description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\n\r\nLuxury lifestyle retail chain, Harvey Nichols, engaged Bytes Security Partnerships to provide a cost effective solution to meet PCI Compliance standards and implement an Intrusion Prevention System (IPS) which complimented existing SSL VPN and fire-wall technology..\r\n\r\nChallenge\r\nLike most retailers within the UK, Harvey Nichols was looking to further secure their network in line with PCI DSS standards.\r\n\r\nIn particular they had a requirement to implement Intrusion Prevention Systems (IPS).\r\n\r\nHarvey Nichols was not a firm believer in the benefits of implementing an IPS solution but understood that this was key to becoming PCI Compliant.\r\n\r\nThe task Bytes Security Partnerships (BSP) faced was to recommend a solution that was not simply a ‘tick in the box’ solution but also offered added benefits to the business.\r\n\r\nBSP needed to find a solution that not only satisfied their business requirements but also further developed into a sound investment that was easily cost- justifiable.\r\n\r\nSolution\r\nBSP presented a number of flexible solutions to Harvey Nichols who entered into consultation with a range of BSP technical experts in order to make an effective decision.As a result, Harvey Nichols and Bytes selected Juniper Networks IDP Series which also complimented existing SSL VPN and fire-wall technology deployed within the company.\r\n\r\nJuniper Networks IDP Series appliances offer the latest capabilities in network intrusion prevention to protect the network from a wide range of attacks.\r\n\r\nUsing industry-recognised stateful inspection techniques, the IDP Series provides zero-day protection against worms, trojans, spyware, keyloggers, and other malware.\r\n\r\nAdditional benefits included a centralised management tool, which allowed Harvey Nichols to configure multiple devices from one interface, as well as giving quick visibility of network issues, which were previously difficult to trace.\r\n\r\nBenefits\r\nBSP met the requirements of Harvey Nichols within the timescales given, by providing a best-fit solution, proactive and responsive account management and direct access to second line engineers for technical enquiries.\r\n\r\nThe reliable and professional support and consultancy framework offered by BSP ensured the smooth introduction of the Juniper Networks appliances.\r\n\r\nOverall the project has created a valued relationship between BSP and Harvey Nichols built on trust and professional understanding..\r\n\r\nBytes SP provided the know-how and expertise which helped us in turning around perceptions of PCI Compliance from a poisoned chalice to a useful business investment.\r\nInfrastructure Manager, Harvey Nichols","alias":"juniper-networks-idp-series-for-luxury-lifestyle-retail-chain","roi":0,"seo":{"title":"Juniper Networks IDP Series for Luxury lifestyle retail chain","keywords":"Nichols, Harvey, solution, which, that, network, from, Networks","description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\rLuxury lifestyle retail chain, Harvey Nichols,","og:title":"Juniper Networks IDP Series for Luxury lifestyle retail chain","og:description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\rLuxury lifestyle retail chain, Harvey Nichols,"},"deal_info":"","user":{"id":2949,"title":"Harvey Nichols","logoURL":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg","alias":"harvey-nichols","address":"","roles":[],"description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as the UK's premier luxury fashion retailer, Harvey Nichols is internationally renowned for its expertly edited fashion and beauty merchandise, premium food and wine offer and award-winning restaurants.\r\n\r\nHarvey Nichols has seven stores within the UK and Ireland, consisting of five large-format stores in London, Edinburgh, Birmingham, Leeds and Manchester, and two small-format stores in Bristol and Dublin. A beauty concept store, Beauty Bazaar, Harvey Nichols, opened in Liverpool in November 2012.\r\n\r\nAll UK stores have luxury Foodmarkets and Restaurants, Cafés or Brasseries. Harvey Nichols also owns and operates OXO Tower Restaurant, Bar and Brasserie on the South Bank in London.\r\n\r\nIn addition to this, there are seven large-format stores overseas: two in Turkey (Istanbul and Ankara), one in Riyadh, one in Dubai, two in Hong Kong and one in Kuwait.\r\n\r\nHarvey Nichols stores offer the ultimate fashion experience. Seen as ‘the place to be’, Harvey Nichols is the club that doesn’t require a membership. Exclusive, niche and established labels sit alongside accessible everyday collections, offering customers the must-have edit for all their wardrobe needs – from everyday to extraordinary.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.harveynichols.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Harvey Nichols","keywords":"Harvey, Nichols, stores, fashion, opened, luxury, beauty, offer","description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:title":"Harvey Nichols","og:description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:image":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg"},"eventUrl":""},"supplier":{"id":2947,"title":"Bytes Technology Group UK","logoURL":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png","alias":"bytes-technology-group-uk","address":"","roles":[],"description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\n\r\nBytes is part of the £2bn Altron Group. Our UK business began in 1982 and has grown profitably each year to reach a turnover in excess of £194m in FY2015, making us one of the largest software services and solutions businesses in the country.\r\n\r\nThe most important aspect of our business is our people. We value initiative, teamwork and achievement. Together, we focus on providing the highest levels of service so we can deliver our ultimate goal – your satisfaction.\r\n\r\nOur customers include leading brands, such as Marks & Spencer, BBC, Specsavers, NHS, Clifford Chance, BUPA, United Utilities, Hiscox, Allen & Overy LLP and thousands more across retail, media, finance, manufacturing, legal, the NHS and the public sector.\r\n\r\nWe also work closely with the majority of IT vendors and are delighted to have received honours, including Microsoft Worldwide Partner of the Year Winner three times in four years, and CheckPoint European Partner of the Year, to name a few of our recent awards.\r\n\r\nNeed to know more? Please explore our website and get in touch with any questions. We'll be delighted to help.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.bytes.co.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Bytes Technology Group UK","keywords":"Bytes, Group, with, business, Partner, more, delighted, Year","description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:title":"Bytes Technology Group UK","og:description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:image":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png"},"eventUrl":""},"vendors":[{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":""}],"products":[{"id":499,"logo":false,"scheme":false,"title":"Juniper Networks IDP Series","vendorVerified":0,"rating":"1.80","implementationsCount":2,"suppliersCount":0,"alias":"juniper-networks-idp-series","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Stateful signature</span>\r\nThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.\r\n<span style=\"font-weight: bold;\">Protocol anomaly</span>\r\nThe IDP rulebase attack objects detect protocol usages that violate published RFCs. This method protects your network from undiscovered vulnerabilities.\r\n<span style=\"font-weight: bold;\">Traffic anomaly</span>\r\nThe Traffic Anomalies rulebase uses heuristic rules to detect unexpected traffic patterns that might indicate reconnaissance or attacks. This method blocks distributed denial-of-service (DDoS) attacks and prevents reconnaissance activities.\r\n<span style=\"font-weight: bold;\">Backdoor</span>\r\nThe Backdoor rulebase uses heuristic-based anomalous traffic patterns and packet analysis to detect Trojans and rootkits. These methods prevent proliferation of malware in case other security measures have been compromised.\r\n<span style=\"font-weight: bold;\">IP spoofing</span>\r\nThe IDP appliance checks the validity of allowed addresses inside and outside the network, permitting only authentic traffic and blocking traffic with a disguised source.\r\n<span style=\"font-weight: bold;\">Layer 2 attacks</span>\r\nThe IDP appliance prevents Layer 2 attacks using rules for Address Resolution Protocol (ARP) tables, fragment handling, connection timeouts, and byte/length thresholds for packets. These methods prevent a compromised host from polluting an internal network using methods such as ARP cache poisoning.\r\n<span style=\"font-weight: bold;\">Denial of service (DoS)</span>\r\nThe SYN Protector rulebase provides two, alternative methods to prevent SYN-flood attacks.\r\n<span style=\"font-weight: bold;\">Network honeypot</span>\r\nThe IDP appliance impersonates vulnerable ports so you can track attacker reconnaissance activity.","shortDescription":"Juniper Networks IDP Series Intrusion Detection and Prevention Appliances.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Series","keywords":"attacks, rulebase, traffic, methods, method, detect, network, reconnaissance","description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives.","og:title":"Juniper Networks IDP Series","og:description":"Stateful signature\rThe IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives."},"eventUrl":"","translationId":499,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":281,"title":"No IT security guidelines"}]}},"categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.bytes.co.uk/application/files/4914/7144/0532/Harvey_Nichols_PFD.pdf","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":745,"title":"Внед 3004","description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\n\r\nрусс русс русс","alias":"vned-3004","roi":0,"seo":{"title":"Внед 3004","keywords":"","description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\n\r\nрусс русс русс","og:title":"Внед 3004","og:description":"Gaining wider business benefits from PCI Compliance and a technical support package to remain proactive.\r\n\r\nрусс русс русс"},"deal_info":"","user":{"id":2949,"title":"Harvey Nichols","logoURL":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg","alias":"harvey-nichols","address":"","roles":[],"description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as the UK's premier luxury fashion retailer, Harvey Nichols is internationally renowned for its expertly edited fashion and beauty merchandise, premium food and wine offer and award-winning restaurants.\r\n\r\nHarvey Nichols has seven stores within the UK and Ireland, consisting of five large-format stores in London, Edinburgh, Birmingham, Leeds and Manchester, and two small-format stores in Bristol and Dublin. A beauty concept store, Beauty Bazaar, Harvey Nichols, opened in Liverpool in November 2012.\r\n\r\nAll UK stores have luxury Foodmarkets and Restaurants, Cafés or Brasseries. Harvey Nichols also owns and operates OXO Tower Restaurant, Bar and Brasserie on the South Bank in London.\r\n\r\nIn addition to this, there are seven large-format stores overseas: two in Turkey (Istanbul and Ankara), one in Riyadh, one in Dubai, two in Hong Kong and one in Kuwait.\r\n\r\nHarvey Nichols stores offer the ultimate fashion experience. Seen as ‘the place to be’, Harvey Nichols is the club that doesn’t require a membership. Exclusive, niche and established labels sit alongside accessible everyday collections, offering customers the must-have edit for all their wardrobe needs – from everyday to extraordinary.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.harveynichols.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Harvey Nichols","keywords":"Harvey, Nichols, stores, fashion, opened, luxury, beauty, offer","description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:title":"Harvey Nichols","og:description":"Since Harvey Nichols first opened in Knightsbridge in 1831, it has led the way in sourcing the most desirable and cutting-edge designer brands. Recognised as","og:image":"https://old.b4r.io/uploads/roi/company/Harvey_Nichols.jpg"},"eventUrl":""},"supplier":{"id":2947,"title":"Bytes Technology Group UK","logoURL":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png","alias":"bytes-technology-group-uk","address":"","roles":[],"description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\n\r\nBytes is part of the £2bn Altron Group. Our UK business began in 1982 and has grown profitably each year to reach a turnover in excess of £194m in FY2015, making us one of the largest software services and solutions businesses in the country.\r\n\r\nThe most important aspect of our business is our people. We value initiative, teamwork and achievement. Together, we focus on providing the highest levels of service so we can deliver our ultimate goal – your satisfaction.\r\n\r\nOur customers include leading brands, such as Marks & Spencer, BBC, Specsavers, NHS, Clifford Chance, BUPA, United Utilities, Hiscox, Allen & Overy LLP and thousands more across retail, media, finance, manufacturing, legal, the NHS and the public sector.\r\n\r\nWe also work closely with the majority of IT vendors and are delighted to have received honours, including Microsoft Worldwide Partner of the Year Winner three times in four years, and CheckPoint European Partner of the Year, to name a few of our recent awards.\r\n\r\nNeed to know more? Please explore our website and get in touch with any questions. We'll be delighted to help.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":4,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.bytes.co.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Bytes Technology Group UK","keywords":"Bytes, Group, with, business, Partner, more, delighted, Year","description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:title":"Bytes Technology Group UK","og:description":"Bytes Technology Group UK provides you with leading insights, expertise and practical help across Software Services and Security Solutions.\r\rBytes is part of","og:image":"https://old.b4r.io/uploads/roi/company/Bytes_Technology_Group_UK.png"},"eventUrl":""},"vendors":[{"id":2784,"title":"Juniper Networks","logoURL":"https://old.b4r.io/uploads/roi/company/juniper.png","alias":"juniper-networks","address":"","roles":[],"description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.\r\nJuniper was founded in 1996 by Pradeep Sindhu. The company received several rounds of funding from venture capitalists and telecommunications companies before going public in 1999. Juniper grew to $673 million in annual revenues by 2000. By 2001 it had a 37 percent share of the core routers market, challenging Cisco's once-dominant market-share.[3][4] It grew to $4 billion in revenues by 2004 and $4.63 billion in 2014. Juniper appointed Kevin Johnson as CEO in 2008, Shaygan Kheradpir in 2013 and Rami Rahim in 2014.\r\nJuniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, Juniper entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper entered the IT security market with its own JProtect security toolkit in 2003, before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy under suspicion allegedly putting backdoors into its ScreenOS products.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.juniper.net","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Juniper Networks","keywords":"Juniper, products, security, routers, 2014, market, revenues, company","description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:title":"Juniper Networks","og:description":"Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products","og:image":"https://old.b4r.io/uploads/roi/company/juniper.png"},"eventUrl":""}],"products":[{"id":498,"logo":false,"scheme":false,"title":"Juniper Networks IDP Серии","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"alias":"juniper-networks-idp-serii","companyTypes":[],"description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием безопасности сети.","shortDescription":"Juniper Networks IDP Серии - межсетевой экран.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Juniper Networks IDP Серии","keywords":"сети, минимизация, ущерб, причинен, временных, материальных, поддержанием, безопасности","description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием","og:title":"Juniper Networks IDP Серии","og:description":"Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием"},"eventUrl":"","translationId":2404,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":252,"title":"Increase Customer Base"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":174,"title":"No unified email system"},{"id":281,"title":"No IT security guidelines"}]}},"categories":[{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":111,"title":"Межсетевой экран нового поколения Palo Alto Networks для автомобильной компании","description":"ЗАО «КомпьюВэй» реализовало новый подход к системе сетевой безопасности на базе межсетевого экрана нового поколения Palo Alto.\r\nОбычно разработчики от классической клиент-серверной архитектуры переходят к «бесклиентным» web-приложениям, которые не работают по строго определенному порту, а используют стандартные web порты (80 и 443) или выбирают порт динамически. В таких условиях обычный межсетевой экран становится бесполезен, т.к. его работа основывается на разрешении и запрете трафика по определенным портам. Политики безопасности в межсетевом экране нового поколения применяются не к портам и зонам (или IP-адресам), а к конкретным пользователям служб каталогов и приложениям.\r\nСпециалисты ЗАО «КомпьюВэй» внедрили решение по сетевой безопасности, используя 3 инновационные технологии Palo Alto:\r\n- App-ID – технология, которая позволяет идентифицировать более 900 приложений в сети, независимо от их порта и протокола (в т.ч. web приложения, работающие на порту 80). Технология может распознавать приложения даже внутри SSL туннеля, дешифруя его;\r\n- User-ID – технология, которая интегрирует межсетевой экран нового поколения со службой Active Directory (а также LDAPи Novell eDirectory), тем самым идентифицируя каждого пользователя каждого приложения;\r\n- Content-ID – технология, которая обеспечивает защиту от множества угроз (вирусы, трояны, ботнеты, шпионские программы), блокирует неавторизованную передачу файлов по сети и контролирует web серфинг.\r\nВ результате применения этих технологий специалисты ЗАО «КомпьюВэй» предоставили «Пежо Ситроен» беспрецедентный контроль над сетевым трафиком, что позволило гибко настроить политики безопасности, сделать сеть прозрачной и управляемой. Кроме того, выполнение всех перечисленных функций производится на скорости 10 Гбит/с с очень маленькой задержкой.\r\nИсточник: Пресс-служба компании «КомпьюВэй»","alias":"mezhsetevoi-ehkran-novogo-pokolenija-palo-alto-networks-dlja-avtomobilnoi-kompanii","roi":0,"seo":{"title":"Межсетевой экран нового поколения Palo Alto Networks для автомобильной компании","keywords":"безопасности, КомпьюВэй, поколения, нового, приложения, которая, технология, экран","description":"ЗАО «КомпьюВэй» реализовало новый подход к системе сетевой безопасности на базе межсетевого экрана нового поколения Palo Alto.\rОбычно разработчики от","og:title":"Межсетевой экран нового поколения Palo Alto Networks для автомобильной компании","og:description":"ЗАО «КомпьюВэй» реализовало новый подход к системе сетевой безопасности на базе межсетевого экрана нового поколения Palo Alto.\rОбычно разработчики от"},"deal_info":"","user":{"id":2933,"title":"PSA Peugeot Citroen Russia","logoURL":"https://old.b4r.io/uploads/roi/company/PSA_Peugeot_Citroen_Russia.png","alias":"psa-peugeot-citroen-russia","address":"","roles":[],"description":"Groupe PSA (informally PSA; known as PSA Peugeot Citroën from 1991 to 2016) is a French multinational manufacturer of automobiles and motorcycles sold under the Peugeot, Citroën and DS Automobiles brands. PSA is listed on the Euronext Paris stock exchange and is again a constituent of the CAC 40 index (2015) after having been removed in 2012.\r\n\r\nHeadquartered in the 16th arrondissement of Paris, PSA (with 2.9 million units) was in 2012 the second-largest Europe-based automaker, and the ninth largest in the world, measured by unit production (sixth in 2009).","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://psa-peugeot-citroen-russia.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"PSA Peugeot Citroen Russia","keywords":"Peugeot, Paris, 2012, Citroën, Headquartered, 16th, arrondissement, sixth","description":"Groupe PSA (informally PSA; known as PSA Peugeot Citroën from 1991 to 2016) is a French multinational manufacturer of automobiles and motorcycles sold under","og:title":"PSA Peugeot Citroen Russia","og:description":"Groupe PSA (informally PSA; known as PSA Peugeot Citroën from 1991 to 2016) is a French multinational manufacturer of automobiles and motorcycles sold under","og:image":"https://old.b4r.io/uploads/roi/company/PSA_Peugeot_Citroen_Russia.png"},"eventUrl":""},"supplier":{"id":664,"title":"Compuway","logoURL":"https://old.b4r.io/uploads/roi/company/Compuway.png","alias":"compuway","address":"","roles":[],"description":"Compuway provides its customers with technological and innovative solutions in the field of information technologies, based on best international practices. Compuway uses a careful and balanced approach in the choice of solutions, providing a stable and efficient operation of client IT environment.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":142,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":7,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://compuway.ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Compuway","keywords":"Compuway, solutions, client, balanced, careful, environment, approach, choice","description":"Compuway provides its customers with technological and innovative solutions in the field of information technologies, based on best international practices.","og:title":"Compuway","og:description":"Compuway provides its customers with technological and innovative solutions in the field of information technologies, based on best international practices.","og:image":"https://old.b4r.io/uploads/roi/company/Compuway.png"},"eventUrl":""},"vendors":[{"id":2061,"title":"Palo Alto Networks","logoURL":"https://old.b4r.io/uploads/roi/company/palo_alto_networks.png","alias":"palo-alto-networks","address":"","roles":[],"description":"Palo Alto Networks, Inc. is a network and enterprise security company based in Santa Clara, California. The company’s core products are a platform that includes advanced firewalls designed to provide network security, visibility and granular control of network activity based on application, user, and content identification and cloud-based offerings that extend those firewalls to cover other aspects of security. Palo Alto Networks competes against traditional firewall, IPS and IDS, and UTM vendors including Cisco, Fortinet, Cyberoam, Check Point, Juniper Networks, Allot and others.\r\n\r\nSource:https://en.wikipedia.org/wiki/Palo_Alto_Networks","companyTypes":[],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":1,"vendorPartnersCount":0,"supplierPartnersCount":5,"b4r":0,"categories":{},"companyUrl":"www.paloaltonetworks.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Palo Alto Networks","keywords":"Networks, Palo, network, Alto, security, that, firewalls, based","description":"Palo Alto Networks, Inc. is a network and enterprise security company based in Santa Clara, California. The company’s core products are a platform that","og:title":"Palo Alto Networks","og:description":"Palo Alto Networks, Inc. is a network and enterprise security company based in Santa Clara, California. The company’s core products are a platform that","og:image":"https://old.b4r.io/uploads/roi/company/palo_alto_networks.png"},"eventUrl":""}],"products":[{"id":185,"logo":false,"scheme":false,"title":"PA-500 next-generation firewall","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"pa-500-next-generation-firewall","companyTypes":[],"description":"Key Security Features:\r\nClassifies all applications, on all ports, all the time\r\n• Identifies the application, regardless of port, encryption (SSL\r\nor SSH), or evasive technique employed.\r\n• Uses the application, not the port, as the basis for all\r\nof your safe enablement policy decisions: allow, deny,\r\nschedule, inspect and apply traffic-shaping.\r\n• Categorizes unidentified applications for policy control,\r\nthreat forensics or App-ID™ development.\r\nEnforces security policies for any user, at any location\r\n• Deploys consistent policies to local and remote users\r\nrunning on the Windows®, Mac® OS X®, Linux®, Android®,\r\nor Apple® iOS platforms.\r\n• Enables agentless integration with Microsoft® Active\r\nDirectory® and Terminal Services, LDAP, Novell®\r\neDirectory™ and Citrix®.\r\n• Easily integrates your firewall policies with 802.1X wireless,\r\nproxies, NAC solutions, and any other source of user\r\nidentity information.\r\nPrevents known and unknown threats\r\n• Blocks a range of known threats, including exploits,\r\nmalware and spyware, across all ports, regardless of\r\ncommon threat-evasion tactics employed.\r\n• Limits the unauthorized transfer of files and sensitive data,\r\nand safely enables non-work-related web surfing.\r\n• Identifies unknown malware, analyzes it based on\r\nhundreds of malicious behaviors, and then automatically\r\ncreates and delivers protection.\r\n\r\nThe controlling element of the PA-500 is PAN-OS®,\r\na security-specific operating system that natively\r\nclassifies all traffic, inclusive of applications, threats\r\nand content, and then ties that traffic to the user, regardless\r\nof location or device type. The application, content,\r\nand user – in other words, the business elements that\r\nrun your business –mare then used as the basis of\r\nyour security policies, resulting in an improved security\r\nposture and a reduction in incident response time. ","shortDescription":"Palo Alto Networks® PA-500 is a next-generation firewall appliance for enterprise branch offices and midsize businesses.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"PA-500 next-generation firewall","keywords":"user, your, policies, then, that, security, regardless, application","description":"Key Security Features:\rClassifies all applications, on all ports, all the time\r• Identifies the application, regardless of port, encryption (SSL\ror SSH), or","og:title":"PA-500 next-generation firewall","og:description":"Key Security Features:\rClassifies all applications, on all ports, all the time\r• Identifies the application, regardless of port, encryption (SSL\ror SSH), or"},"eventUrl":"","translationId":186,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"},{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":281,"title":"No IT security guidelines"},{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"},{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.cnews.ru/news/line/kompyuvej__vnedrila_ibreshenie_ot","title":"Media"}},"comments":[],"referencesCount":0}]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}