{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"_type":"localeString","en":"Offer a reference bonus","ru":"Предложить бонус за референс"},"configurator":{"_type":"localeString","en":"Сonfigurator","ru":"Конфигуратор"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"_type":"localeString","en":"I use it","ru":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"en":"Selling","ru":"Продают","_type":"localeString"},"using":{"en":"Using","ru":"Используют","_type":"localeString"},"show-more-button":{"en":"Show more","ru":"Показать еще","_type":"localeString"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"supplier-popover":{"en":"supplier","ru":"поставщик","_type":"localeString"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"_type":"localeString","en":"manufacturer","ru":"производитель"},"short-description":{"ru":"Краткое описание","_type":"localeString","en":"Pitch"},"i-use-it-popover":{"ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier."},"details":{"en":"Details","ru":"Детальнее","_type":"localeString"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"product-features":{"ru":"Особенности продукта","_type":"localeString","en":"Product features"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"solutions":{"ru":"Проблемы которые решает","_type":"localeString","en":" Problems that solves"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"testing":{"_type":"localeString","en":"Testing","ru":"Тестирование"},"compare":{"en":"Compare with competitors","ru":"Сравнить с конкурентами","_type":"localeString"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":" Characteristics"},"transaction-features":{"en":"Transaction Features","ru":"Особенности сделки","_type":"localeString"},"average-discount":{"ru":"Средняя скидка партнера","_type":"localeString","en":"Partner average discount"},"deal-protection":{"ru":"Защита сделки","_type":"localeString","en":"Deal protection"},"average-deal":{"en":"Average deal size","ru":"Средний размер сделки","_type":"localeString"},"average-time":{"en":"Average deal closing time","ru":"Средний срок закрытия сделки","_type":"localeString"},"login":{"ru":"Войти","_type":"localeString","en":"Login"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"to-know-more":{"en":"To know more","ru":"Чтобы узнать больше","_type":"localeString"},"scheme":{"ru":"Схема работы","_type":"localeString","en":" Scheme of work"},"competitive-products":{"ru":"Конкурентные продукты","_type":"localeString","en":" Competitive products"},"implementations-with-product":{"ru":"Внедрения с этим продуктом","_type":"localeString","en":"Deployments with this product"},"user-features":{"en":"User features","ru":"Особенности пользователей","_type":"localeString"},"job-roles":{"_type":"localeString","en":" Roles of Interested Employees","ru":"Роли заинтересованных сотрудников"},"organizational-features":{"en":"Organizational Features","ru":"Организационные особенности","_type":"localeString"},"calculate-price":{"ru":"Рассчитать цену продукта","_type":"localeString","en":" Calculate product price"},"selling-stories":{"_type":"localeString","en":" Selling stories","ru":"Продающие истории"},"materials":{"ru":"Материалы","_type":"localeString","en":"Materials"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"_type":"localeString","en":"or","ru":"или"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"en":"Calculate Product ROI","ru":"Рассчитать ROI продукта","_type":"localeString"},"complementary-categories":{"en":"Complementary Categories","ru":"Схожие категории","_type":"localeString"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"rebate-for-poc":{"_type":"localeString","en":"Bonus 4 POC","ru":"Бонус 4 POC"},"configurator-content":{"en":"Calculate price for this product here","ru":"Рассчитайте стоимость продукта","_type":"localeString"},"configurator-link":{"_type":"localeString","en":"here","ru":"тут"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"ru":"выбрать продукт для презентации","_type":"localeString","en":"select product for presentation"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You have to register or login."},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"ru":"Рассчитайте ROI для данного продукта","_type":"localeString","en":"Calculate ROI for this product here"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."},"videos":{"_type":"localeString","en":"Videos","ru":"Видео"},"vendor-verified":{"en":"Vendor verified","ru":"Подтверждено производителем","_type":"localeString"},"event-schedule":{"_type":"localeString","en":"Events schedule","ru":"Расписание событий"},"scheduling-tip":{"ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event."},"register-to-schedule":{"_type":"localeString","en":"To register for the event please log in or register on the site.","ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт."},"comparison-matrix":{"ru":"Матрица сравнений","_type":"localeString","en":"Comparison matrix"},"compare-with-competitive":{"ru":"Сравнить с конкурентными","_type":"localeString","en":" Compare with competitive"},"avg-deal-closing-unit":{"en":"months","ru":"месяцев","_type":"localeString"},"under-construction":{"ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString","en":"Current feature is still developing to become even more useful for you."},"product-presentation":{"_type":"localeString","en":"Product presentation","ru":"Презентация продукта"},"go-to-comparison-table":{"_type":"localeString","en":" Go to comparison table","ru":"Перейти к таблице сравнения"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"meta":[{"name":"og:type","content":"website"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}],"translatable_meta":[{"name":"og:title","translations":{"_type":"localeString","en":"Example product","ru":"Конкретный продукт"}},{"name":"og:description","translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"}},{"name":"title","translations":{"_type":"localeString","en":"Product","ru":"Продукт"}},{"name":"description","translations":{"ru":"Описание продукта","_type":"localeString","en":"Product description"}},{"name":"keywords","translations":{"en":"Product keywords","ru":"Ключевые слова продукта","_type":"localeString"}}],"title":{"ru":"ROI4CIO: Продукт","_type":"localeString","en":"ROI4CIO: Product"}}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"friday111":{"id":2143,"logoURL":"https://old.b4r.io/fileadmin/content/slytherin_dorm_room_by_facegrater-d8jpbuu.jpg","logo":true,"scheme":false,"title":"Friday111","vendorVerified":0,"rating":"4.50","implementationsCount":5,"suppliersCount":0,"supplierPartnersCount":5,"alias":"friday111","companyTitle":"ROI4CIO","companyTypes":["supplier","vendor"],"companyId":4231,"companyAlias":"roi4cio","description":null,"shortDescription":null,"type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Friday111","keywords":"","description":"","og:title":"Friday111","og:description":"","og:image":"https://old.b4r.io/fileadmin/content/slytherin_dorm_room_by_facegrater-d8jpbuu.jpg"},"eventUrl":"","translationId":2929,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":36,"title":"Endpoint Security"}],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[{"id":533,"title":"Anti-malware","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":535,"title":"File Reputation Scanning","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":537,"title":"URL filtering","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":539,"title":"HIPS","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":541,"title":"Firewall","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":543,"title":"Sandbox","required":0,"type":"select","templateId":36,"value":"Есть","options":["YES","NO","Yes, if there is the McAfee Threat Intelligence Exchange module"]},{"id":545,"title":"User behavior Analytics","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":547,"title":"Application Control","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":549,"title":"Device & Port Control","required":0,"type":"select","templateId":36,"value":"Есть","options":["YES","NO","USB only"]},{"id":551,"title":"Application Vulnerability Managment","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":553,"title":"Data Loss Prevention","required":0,"type":"select","templateId":36,"value":"Есть","options":["YES","NO","YES, for Microsoft Exchange and SharePoint servers only"]},{"id":555,"title":"Device Configuration Management","required":0,"type":"select","templateId":36,"value":"Есть","options":["YES","NO","USB only"]},{"id":557,"title":"Disk Encryption","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":559,"title":"File Encryption","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":561,"title":"Windows support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":563,"title":"Linux support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":565,"title":"MS Sharepoint support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":567,"title":"MS Exchange Support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":569,"title":"IBM Lotus Domino support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":571,"title":"Unix Support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":573,"title":"Mac OS X Support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":575,"title":"Android Support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":577,"title":"iOS Support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":579,"title":"Windows Mobile Support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":582,"title":"Vmware support","required":0,"type":"select","templateId":36,"value":"Есть","options":["YES","NO","Yes, if there is VDI-Module"]},{"id":585,"title":"Huper-V Support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":587,"title":"Citrix Support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":589,"title":"Windows Server Support","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":591,"title":"Patch Management","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":593,"title":"Threat Intelligence Feeds","required":0,"type":"select","templateId":36,"value":"Есть","options":["YES","NO","Yes, if there is McAfee Threat Intelligence Exchange module"]},{"id":595,"title":"SIEM","required":0,"type":"select","templateId":36,"value":"Есть","options":["YES","NO","Yes, if there is McAfee Threat Intelligence Exchange module"]},{"id":599,"title":"Endpoint Management","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}},{"id":597,"title":"NAC","required":0,"type":"binary","templateId":36,"value":true,"options":{"values":null,"defaults":null}}],"concurentProducts":[{"id":1287,"logoURL":"https://old.b4r.io/fileadmin/user_upload/BeyondTrust.png","logo":true,"scheme":false,"title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"beyondtrust-powerbroker-endpoint-protection-platform","companyTitle":"BeyondTrust","companyTypes":["supplier","vendor"],"companyId":4098,"companyAlias":"beyondtrust","description":"<span style=\"font-weight: bold;\">Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment</span>\r\nTargeted attacks can easily bypass antivirus solutions and other individual lines of defense, necessitating multi-layered endpoint protection. The PowerBroker Endpoint Protection Platform eliminates the need to implement and manage multiple point products by combining system and application firewalls, intrusion prevention, anti-malware, antivirus, and local vulnerability assessment capabilities. PowerBroker Endpoint Protection secures systems from entire classes of attack, without constant rule or signature updates.\r\n<ul><li>Protect critical endpoints with an all-in-one firewall, IPS, anti-malware, antivirus solution</li><li>Conduct local vulnerability assessments of air-gapped and otherwise disconnected systems</li><li>Protect web servers and web applications against exploits, zero-days, and unauthorized access (optional)</li><li>Reduce system management costs with a “no-touch” solution that eliminates the need for constant updates</li><li>Rely on updates from the renowned BeyondTrust Security Research Team</li></ul>","shortDescription":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM - Unified Firewall, IPS, Anti-Malware and Anti-Virus\r\nIntegrated multi-layered endpoint protection in a single, lightweight client that replaces multiple security agents, protecting against Advanced Persistent Threats (APTs), known exploits, zero-days, and all other attack vectors.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","keywords":"antivirus, need, Protection, PowerBroker, Endpoint, eliminates, BeyondTrust, updates","description":"Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment\rTargeted attacks can easily bypass antivirus solutions and other individual","og:title":"BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM","og:description":"Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment\rTargeted attacks can easily bypass antivirus solutions and other individual","og:image":"https://old.b4r.io/fileadmin/user_upload/BeyondTrust.png"},"eventUrl":"","translationId":1288,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1289,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Avast_Business_Antivirus_Pro_Plus.jpg","logo":true,"scheme":false,"title":"Avast Business Antivirus Pro Plus","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"avast-business-antivirus-pro-plus","companyTitle":"Avast","companyTypes":["supplier","vendor"],"companyId":4099,"companyAlias":"avast","description":"<span style=\"font-weight: bold;\">The ultimate security for your business</span>\r\nIntellectual property, customer data, your business strategy; you have everything to protect, and we have the all-in-one solution ready to protect it. Make the most of our award-winning antivirus enhanced with server, email, and VPN protection for complete security, even on the go.\r\n\r\n<span style=\"font-weight: bold;\">Your business can’t afford to stay defenseless</span>\r\nWith over 4,000 attacks a day, it’s only a matter of time until your business becomes a target. Fight back with the best — Avast Business Antivirus Pro Plus offers exceptional protection with a 100% malware detection rate.\r\n\r\n<span style=\"font-weight: bold;\">Light on resources, heavy on threats</span>\r\nThe best antivirus should work as hard as you do. Avast performs lightning-fast analyses of unknown files in the Cloud, for a lightweight solution that won’t slow down your employees or your business.\r\n\r\n<span style=\"font-weight: bold;\">Keep spies and snoops off your webcam</span>\r\nCan hackers really hijack your webcam? Yes — until now. Webcam Shield makes anything and anyone get your permission before they can use it so nobody takes a peek unless you say so. You can even disable your camera for good — and enable it again.\r\n\r\n<span style=\"font-weight: bold;\">Full identity protection with an easy-to-use VPN</span>\r\nSecure your employees’ ability to work safely on public Wi-Fi. Avast Business Antivirus Pro Plus comes with an easy-to-use VPN, so you can keep all your business communication — including employee and customer data, private.\r\n\r\n<span style=\"font-weight: bold;\">Don’t let weak points in your security become points of attack</span>\r\nComplete data protection takes more than keeping your PCs malware-free. Stop cybercriminals using vulnerabilities in out-of-date software to access your network, safely delete confidential documents so they can’t be recovered, and protect inboxes and sharepoints from infection.\r\n\r\n<span style=\"font-weight: bold;\">Everything you need to protect your business</span>\r\nAvast Business Antivirus Pro Plus combines powerful data, identity, and server protection with the award-winning features of Avast Business Antivirus. Take a look.\r\n\r\n<span style=\"font-weight: bold;\">Antivirus</span>\r\nActively scans files, URLs, and email attachments to protect your business from malware, spyware, ransomware and more.\r\n\r\n<span style=\"font-weight: bold;\">File Shield</span>\r\nAutomatically scans files that are opened on a PC to make sure they’re malware-free, without slowing users down or getting in their way.\r\n\r\n<span style=\"font-weight: bold;\">Web Shield</span>\r\nEnsures every website visited is trustworthy by checking the URL and website certificate, before any risky connections are made to your network.\r\n\r\n<span style=\"font-weight: bold;\">Email Shield</span>\r\nOpen every email and download every attachment confidently. We’ll check both incoming and outgoing emails to ensure they’re completely malware-free.\r\n\r\n<span style=\"font-weight: bold;\">Behavior Shield</span>\r\nDeeply-rooted malware can hide inside your running programs. Behavior Shield monitors them all for any suspicious activity to shut down attacks.\r\n\r\n<span style=\"font-weight: bold;\">CyberCapture</span>\r\nWhen an unrecognized file is downloaded onto one of your PCs, a copy will be sent to our experts at the Avast Threat Labs to identify if it's safe or not.\r\n\r\n<span style=\"font-weight: bold;\">Software Defender</span>\r\nDon’t waste time updating application after application. Let Software Defender update your software automatically.\r\n\r\n<span style=\"font-weight: bold;\">Passwords</span>\r\nDefend employees’ login details with a secure master password. Comes with a browser add-on for easy and secure auto-filling of online login forums.\r\n\r\n<span style=\"font-weight: bold;\">SecureLine VPN</span>\r\nMake every connection private no matter what network or WiFi your employees use to prevent their identities, or your data, from being seen and stolen online.\r\n\r\n<span style=\"font-weight: bold;\">Webcam Shield</span>\r\nStop webcam spying for good. Now apps have to ask you for permission to use your webcam, so you always know who’s watching.","shortDescription":"Avast Business Antivirus Pro Plus - everything your business needs in one package. Leave nothing to chance with powerful antivirus, data, and identity protection.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avast Business Antivirus Pro Plus","keywords":"your, business, with, Avast, Shield, Antivirus, protection, protect","description":"The ultimate security for your business\rIntellectual property, customer data, your business strategy; you have everything to protect, and we have the","og:title":"Avast Business Antivirus Pro Plus","og:description":"The ultimate security for your business\rIntellectual property, customer data, your business strategy; you have everything to protect, and we have the","og:image":"https://old.b4r.io/fileadmin/user_upload/Avast_Business_Antivirus_Pro_Plus.jpg"},"eventUrl":"","translationId":1290,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":5,"title":"EndPoint Security"}],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1291,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Panda_Security.png","logo":true,"scheme":false,"title":"Panda Endpoint Protection","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"panda-endpoint-protection","companyTitle":"Panda Security","companyTypes":["supplier","vendor"],"companyId":4100,"companyAlias":"panda-security","description":"<span style=\"font-weight: 700; \">Contextual Intelligence</span>\r\nThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter known and unknown threats.\r\nIt analyzes, categorizes and correlates all the data obtained about cyber-threats in order to initiate prevention, detection, response and remediation routines.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Next-Generation Endpoint Security</span>\r\nAdvanced cyber-security to counter malware, with prevention, detection and remediation capabilities.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Endpoint Detection and Response</span>\r\nMonitoring, collecting and categorization of 100% of the active processes on all the organization’s endpoints\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Malware Intelligence Platform</span>\r\nThe correlation of data on cyber-threats configures a security intelligence system able to uncover patterns of malicious behavior.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Advanced threats are gone</span>\r\nThe Platform connects contextual intelligence with defensive operations to pre-empt malicious behavior and data leaks.\r\nThis way, protection systems can be activated before threats are executed.\r\nComplete advanced protection for endpoints and servers to eradicate the malware.\r\n","shortDescription":"Panda Endpoint Protection is the intelligent cyber-security platform designed to eradicate advanced threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Panda Endpoint Protection","keywords":"malicious, behavior, threats, Endpoint, intelligence, data, protection, malware","description":"Contextual Intelligence\rThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter","og:title":"Panda Endpoint Protection","og:description":"Contextual Intelligence\rThe platform leverages contextual intelligence to reveal patterns of malicious behavior and generate defensive strategies to counter","og:image":"https://old.b4r.io/fileadmin/user_upload/Panda_Security.png"},"eventUrl":"","translationId":1292,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1293,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Bitdefender.png","logo":true,"scheme":false,"title":"Bitdefender Gravity Zone Ultra Security (XDR)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"bitdefender-gravity-zone-ultra-security-xdr","companyTypes":[],"description":"<span style=\"font-weight: bold;\">UNCOVER AND STOP ELUSIVE THREATS WITH EDR THAT WORKS.</span>\r\nEasy-to-Use, High-Fidelity EDR Is Part of our Comprehensive and Integrated Endpoint Protection Platform.\r\nGravityZone XDR excels where pure-play EDR products are too complex and noisy, preventing, detecting and responding to attacks that evade traditional anti-malware. A single solution reduces the attack surface with hardening and controls, stopping malware at pre-execution.\r\nThe new endpoint data recorder and threat analytics automate detection and allow easy investigation and in-place remediation. XDR’s seamless threat prevention, accurate detection and smart response minimize infection exposure and stop breaches.\r\n\r\n<span style=\"font-weight: bold;\">EDR SO EASY, YOU CAN ACTUALLY USE IT</span>\r\nWith clear visibility into indicators of compromise (IOCs), and threat investigation and incident response workflows, GravityZone Ultra reduces resource and skill requirements for security operations.\r\n\r\n<ul><li>Real-time endpoint visibility</li><li>Expose (insight into) suspicious activities</li><li>One-click investigation</li><li>Alert triage and incident analysis visualization</li><li>Track live attacks and lateral movements</li><li>Rapid response</li><li>Reduce dwell time with fast resolution, containment and remediation</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">HIGH-FIDELITY DETECTION MEANS ENHANCED SECURITY OPTICS AND FREEDOM FROM ALERT FATIGUE</span>\r\nFree up your security resources to focus on real threats.\r\n\r\n<ul><li>Minimize noise and distraction from false alarms</li><li>Reduce the volume of incidents with effective threat prevention</li><li>Eliminate manual remediation of blocked attacks with automatic remediation and repair</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">COMPREHENSIVE ENDPOINT SECURITY PLATFORM IN ONE AGENT AND CONSOLE</span>\r\nGravityZone Ultra comes with all the hardening and next-generation prevention controls included in GravityZone HD and the Elite suite.\r\n\r\n<ul><li>Minimize exposure with strong prevention</li><li>Machine-learning and behavior-based detection stops unknown threats at pre-execution and on-execution</li><li>Detect and block script-based, fileless, obfuscated and custom malware with automatic remediation</li><li>Memory protection to prevent exploits</li><li>Reduce attack surface by enabling IT security controls</li><li>Integrated client firewall, device control, web content filtering, app control, patch management and more.</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">SMART RESPONSE MEANS EVOLVED PREVENTION</span>\r\nBecause GravityZone Ultra is an integrated prevent-detect-respond solution, it lets you quickly respond and restore endpoints to a “better-than-before” stage.\r\nLeveraging threat intelligence gathered from endpoints during the investigation, you can in one interface adjust policy immediately and patch vulnerabilities, improving the security posture of your environment.","shortDescription":"Bitdefender Gravity Zone Ultra Security (XDR) - LAYERED NEXT-GENERATION ENDPOINT SECURITY NOW WITH EDR","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Bitdefender Gravity Zone Ultra Security (XDR)","keywords":"with, GravityZone, threat, remediation, security, Ultra, investigation, detection","description":"UNCOVER AND STOP ELUSIVE THREATS WITH EDR THAT WORKS.\rEasy-to-Use, High-Fidelity EDR Is Part of our Comprehensive and Integrated Endpoint Protection Platform.","og:title":"Bitdefender Gravity Zone Ultra Security (XDR)","og:description":"UNCOVER AND STOP ELUSIVE THREATS WITH EDR THAT WORKS.\rEasy-to-Use, High-Fidelity EDR Is Part of our Comprehensive and Integrated Endpoint Protection Platform.","og:image":"https://old.b4r.io/fileadmin/user_upload/Bitdefender.png"},"eventUrl":"","translationId":1294,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1297,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Avira_GmbH___Co._KG.jpg","logo":true,"scheme":false,"title":"Avira Antivirus Pro - Business Edition","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"avira-antivirus-pro-business-edition","companyTitle":"Avira GmbH & Co. KG","companyTypes":["supplier","vendor"],"companyId":4103,"companyAlias":"avira-gmbh-co-kg","description":"<span style=\"font-weight: bold;\">Antivirus Protection</span>\r\n\r\n<span style=\"font-weight: bold;\">Real-Time Threat Prevention</span>\r\nSignature-based detection, heuristic analysis and cloud-based scanning offer you complete protection from malware.\r\n\r\n<span style=\"font-weight: bold;\">Enhanced Network Drive Protection</span>\r\nAntivirus Pro prevents malware from being stored or spread via your internal network or a shared cloud storage solution.\r\n\r\n<span style=\"font-weight: bold;\">Advanced Web Protection</span>\r\nPhishing scams, infected websites, drive-by downloads… Antivirus Pro ensures employees never land on harmful websites.\r\n\r\n<span style=\"font-weight: bold;\">Email Protection</span>\r\nAntivirus Pro scans locally installed email clients so that employees neither receive malware nor spread it to colleagues, customers or patients.\r\n\r\n<span style=\"font-weight: bold;\">Management Console</span>\r\n\r\n<span style=\"font-weight: bold;\">Centralized Management</span>\r\nAll Avira-secured devices can effortlessly be managed from an intuitive an online dashboard.\r\n<span style=\"font-weight: bold;\">Mobile Device Management</span>\r\nSmartphones equipped with an Avira mobile app can be tracked from the dashboard, while antitheft safeguards can be triggered remotely.\r\n<span style=\"font-weight: bold;\">System Information</span>\r\nThe dashboard offers you helpful information on PC components, hard drive partitions and available disk space of your corporate devices.\r\n\r\n<span style=\"font-weight: bold;\">Features</span>\r\n\r\n<span style=\"font-weight: bold;\">Antivirus Scanner</span>\r\nAward-winning protection from malware (viruses, Trojans, worms, etc.)\r\n<span style=\"font-weight: bold;\">Protection Cloud Technology</span>\r\nScans unknown files in real time for malware and exploits.\r\n<span style=\"font-weight: bold;\">Smart A.I.</span>\r\nUnique, deep-learning algorithms protect you from the latest threats.\r\n<span style=\"font-weight: bold;\">Anti-ransomware</span>\r\nIdentifies, blocks, and removes ransomware before it encrypts your files.\r\n<span style=\"font-weight: bold;\">Email Protection</span>\r\nProtects your unsecured, non-encrypted email traffic.\r\n<span style=\"font-weight: bold;\">Avira Intelligent Repair System</span>\r\nBest-in-class technology that repairs damage caused by malware to your files.\r\n<span style=\"font-weight: bold;\">Self-Defense</span>\r\nPrevents malware from altering or even disabling your antivirus protection.\r\n<span style=\"font-weight: bold;\">Device control</span>\r\nThwarts malware intrusions by scanning removable devices connected to your USB ports\r\n\r\n<span style=\"font-weight: bold;\">System Requirements</span>\r\nYou really don’t need much! Here are the essentials:\r\n<ul><li>A PC running Windows 7 or higher (with Service Pack 1 and the latest updates)</li><li>Or a Mac running OSX 10.11 (El Capitan) or higher.</li><li>2 GB of RAM, over 2 GB of hard disk space, and an internet connection</li><li>Android: Android 4.0.3 or later</li></ul>","shortDescription":"Avira Antivirus Pro - Business Edition\r\nSimple yet sophisticated security – ideal for small and midsize businesses.\r\n- Powerful plug and play protection\r\n- Resource-light with zero maintenance costs\r\n- Runs on both Windows and macOS\r\n- Manage your customers remotely using premium on premise and cloud management consoles.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avira Antivirus Pro - Business Edition","keywords":"malware, from, your, Antivirus, Protection, protection, System, devices","description":"Antivirus Protection\r\rReal-Time Threat Prevention\rSignature-based detection, heuristic analysis and cloud-based scanning offer you complete protection from","og:title":"Avira Antivirus Pro - Business Edition","og:description":"Antivirus Protection\r\rReal-Time Threat Prevention\rSignature-based detection, heuristic analysis and cloud-based scanning offer you complete protection from","og:image":"https://old.b4r.io/fileadmin/user_upload/Avira_GmbH___Co._KG.jpg"},"eventUrl":"","translationId":1298,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1301,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cybowall.png","logo":true,"scheme":false,"title":"Cybonet Cybowall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cybonet-cybowall","companyTitle":"Cybonet","companyTypes":["supplier","vendor"],"companyId":2085,"companyAlias":"cybonet","description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all endpoints. Cybowall protects your network in real time; detecting and reacting to threats as they arise. Cybowall combines multiple cybersecurity tools and capabilities in one solution - securing networks of all sizes and providing unified defense against a continuously evolving threat landscape. \r\n<span style=\"font-weight: bold;\">Solution Benefits</span>\r\n\r\n<ul><li>Stop Endpoint Tampering and Malware - Leverage network and endpoint detection of Advanced Persistent Threats </li><li>Map Network Assets - Increase visibility with a map of all endpoints connected to your network to gain insight into your environment</li><li>Identify Vulnerabilities - Stay informed of vulnerabilities for patch deployment prioritization</li><li>Detect Lateral Movement - Trap attackers that have already breached perimeter defenses</li><li>Detect Active Breaches - Discover network breaches quickly to reduce damaging effects</li><li>Meet Compliance Requirements - Adhere to compliance standards; GDPR, ISO, PCI-DSS, HIPAA etc.</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Breach Detection</span>\r\n\r\n<ul><li>Intrusion Detection - Breach detection capabilities without network interference.</li><li>Network Traps - Insight into lateral movement between endpoints and detects threats by serving as a trip wire for active attacks.</li><li>Network Forensics - Discover and analyze the source of security attacks and incidents.</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Network Visibility</span>\r\nAsset Mapping - Dynamic asset map of all endpoints, including port profiles and activities.\r\nWMI - Leverage WMI and continuous endpoint scanning for full network visibility.\r\nSIEM - Log management, event management, event correlation and reporting to help identify policy violations and enable response procedures.\r\n\r\n<span style=\"font-weight: bold;\">Vulnerability Management</span>\r\n\r\n<ul><li>Vulnerability Assessment - Monitor business assets and identify vulnerable systems inside the network, including risk level, for patch deployment prioritization.</li><li>Default Passwords - Pinpoint and change default passwords to reduce risks.</li><li>Malware Hunter - Identify malicious files and where they reside in the network.</li></ul>\r\n</p>\r\n","shortDescription":"Cybowall combines multiple cybersecurity tools and capabilities in one solution - securing networks of all sizes and providing unified defense against a continuously evolving threat landscape","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cybonet Cybowall","keywords":"network, your, endpoints, Network, Cybowall, threats, endpoint, Leverage","description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all","og:title":"Cybonet Cybowall","og:description":"Cybowall is a non-intrusive, agentless solution that provides complete and continuous monitoring of your network across all protocols and extending to all","og:image":"https://old.b4r.io/fileadmin/user_upload/Cybowall.png"},"eventUrl":"","translationId":1302,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1265,"logoURL":"https://old.b4r.io/fileadmin/user_upload/WEBROOT_SECUREANYWHERE_R__BUSINESS_ENDPOINT_PROTECTION.png","logo":true,"scheme":false,"title":"Webroot SecureAnywhere® Small Business AntiVirus","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"webroot-secureanywherer-small-business-antivirus","companyTitle":"WEBROOT","companyTypes":["supplier","vendor"],"companyId":4091,"companyAlias":"webroot","description":"Benefits\r\n\r\n<span style=\"font-weight: bold;\">Complete protection</span>\r\nStops threats from email, web browsers, files, URLs, ads, apps, and more in real time.\r\n\r\n<span style=\"font-weight: bold;\">1-click installation</span>\r\nInstalls and is fully operational in less time than it takes to refill your coffee. It's that easy.\r\n\r\n<span style=\"font-weight: bold;\">No more slowdowns</span>\r\nReal-time protection from the cloud means your devices don’t get bogged down with bulky updates.\r\n\r\n<span style=\"font-weight: bold;\">No software conflicts</span>\r\nWon't conflict with other software or security. No need to uninstall your programs to give us a try.\r\n\r\n<span style=\"font-weight: bold;\">Lightning fast scans</span>\r\nAt under 1 MB, our security client only takes a few seconds to scan and secure your devices.\r\n\r\n<span style=\"font-weight: bold;\">Ransomware protection</span>\r\nRevolutionary rollback technology can unlock and restore various files that have been infected and held for ransom.\r\n\r\n<span style=\"font-weight: bold;\">Real-time anti-phishing</span>\r\nBlocks fake sites that try to steal your data by disguising themselves as websites you trust.\r\n\r\n<span style=\"font-weight: bold;\">Online management</span>\r\nNo matter where you are, you can manage the security of your devices from one simple dashboard console.","shortDescription":"Webroot SecureAnywhere® Small Business AntiVirus protects your small business or home office from viruses and other online threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Webroot SecureAnywhere® Small Business AntiVirus","keywords":"your, security, protection, from, devices, that, more, time","description":"Benefits\r\rComplete protection\rStops threats from email, web browsers, files, URLs, ads, apps, and more in real time.\r\r1-click installation\rInstalls and is","og:title":"Webroot SecureAnywhere® Small Business AntiVirus","og:description":"Benefits\r\rComplete protection\rStops threats from email, web browsers, files, URLs, ads, apps, and more in real time.\r\r1-click installation\rInstalls and is","og:image":"https://old.b4r.io/fileadmin/user_upload/WEBROOT_SECUREANYWHERE_R__BUSINESS_ENDPOINT_PROTECTION.png"},"eventUrl":"","translationId":1266,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1736,"logoURL":"https://old.b4r.io/fileadmin/user_upload/sophos.jpg","logo":true,"scheme":false,"title":"Sophos Endpoint Protection","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"sophos-endpoint-protection","companyTitle":"Sophos","companyTypes":["vendor"],"companyId":2791,"companyAlias":"sophos","description":"So Long Malware Remove detected malware automatically or isolate compromised devices in order to prevent damage. <span style=\"font-weight: bold;\">Isolate</span> Part of remediating a problem is putting it in quarantine so it can’t keep spreading. When necessary, we’ll even isolate compromised devices until we can be sure they’re safe. <span style=\"font-weight: bold;\">Threat Removal</span> If we find something malicious, we’ll go ahead and remove it for you. It’s the least we could do. We make it simple and automatic. <span style=\"font-weight: bold;\">Synchronized Security</span> By automating threat discovery, investigation, and response, Synchronized Security revolutionizes threat detection. Incident response times are reduced exponentially and tactical resources can be refocused on strategic analysis. <span style=\"font-weight: bold;\">Next-Gen Protection</span> We’re taking a new approach to protection. Sophos Endpoint blocks malware and infections by identifying and preventing the handful of techniques and behaviors used in almost every exploit. Sophos Endpoint doesn’t rely on signatures to catch malware, which means it catches zero-day threats without adversely affecting the performance of your device. So you get protection before those exploits even arrive. By correlating threat indicators, Sophos Endpoint can block web and application exploits, dangerous URLs, potentially unwanted apps, and malicious code from ever touching your endpoints. <span style=\"font-weight: bold;\">Decloaking Malware</span> Sophos Endpoint works on the device and in conjunction with the firewall to detect and isolate compromised devices. Synchronized Security gives you additional context providing information from the network. <span style=\"font-weight: bold;\">Behavioral Analytics</span> Determines suspicious behaviors, allowing for the detection of malware specifically designed to evade traditional solutions. <span style=\"font-weight: bold;\">Traffic Detection</span> Pre-filters all HTTP traffic and tracks suspicious traffic as well as the file path of the process sending malicious traffic. <span style=\"font-weight: bold;\">Integrated Endpoint and Network</span> Instant and automatic communication between the Endpoint and Network alerts the suspected system of exactly what the firewall is detecting, allowing the endpoint protection agent immediate use of that information to discover the process behind the threat. <span style=\"font-weight: bold;\">Complete Control</span> Enforce your web, application, device, and data policies with ease, thanks to seamless integration within the endpoint agent and the management console.\r\n<ul>\r\n<li>Web Control Category-based web filtering enforced both on and off the corporate network</li>\r\n<li>Application Control Point-and-click blocking of applications by category or by name</li>\r\n<li>Device Control Managed access to removable media and mobile devices</li>\r\n<li>Data Control Data-loss prevention (DLP) using prebuilt or custom rules</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Sophisticated Simplicity</span> Like your favorite smartphone or web application, Sophos Endpoint Protection delivers sophisticated functionality coupled with a simple, intuitive user experience.\r\n<ul>\r\n<li>Quick and easy deployment from the cloud or on-premises</li>\r\n<li>Default policies configured to balance protection, usability, and performance</li>\r\n<li>Automatic removal of third-party endpoint security products</li>\r\n<li>Point-and-click configuration of advanced features like HIPS and device control, made possible by continually updated data from SophosLabs</li>\r\n</ul>\r\n","shortDescription":"Sophos Endpoint Protection - Simple security for your business: Protect all your devices, One simplified management console, On-premises or in the cloud\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Sophos Endpoint Protection","keywords":"Endpoint, Sophos, Control, your, device, protection, devices, threat","description":"So Long Malware Remove detected malware automatically or isolate compromised devices in order to prevent damage. Isolate Part of remediating a problem is","og:title":"Sophos Endpoint Protection","og:description":"So Long Malware Remove detected malware automatically or isolate compromised devices in order to prevent damage. Isolate Part of remediating a problem is","og:image":"https://old.b4r.io/fileadmin/user_upload/sophos.jpg"},"eventUrl":"","translationId":1737,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":36,"title":"Endpoint Security"}],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1178,"logoURL":"https://old.b4r.io/fileadmin/user_upload/ivanti_IT_SERVICE_MANAGER.png","logo":true,"scheme":false,"title":"ivanti ENDPOINT SECURITY","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"ivanti-endpoint-security","companyTitle":"Ivanti (LANDESK)","companyTypes":["supplier","vendor"],"companyId":3047,"companyAlias":"ivanti-landesk","description":"Get a comprehensive solution to reduce complexity, cost, and chaos\r\nRelying on multiple, point-based endpoint security technologies? Then you already know how this impacts IT time and budget, while opening the door to security gaps between solutions.\r\nIvanti Endpoint Security, powered by Heat, reduces the known exploitable surface area on your endpoints, detects exploits targeting your environment, and responds to threats before they can wreak havoc on your organization. And all of this takes place in one platform. \r\nELEVATE YOUR SECURITY POSTURE\r\nImprove your security stance fast, when you can manage your endpoints using a single vendor solution for prevention, detection, and remediation. \r\nPrevention, detection, and remediation are all critical to protecting your organization, so why manage them in separate, severed tools? Free up IT, reduce human error, and harden your security stance when you can do it all in a single solution.\r\nPREVENTION\r\nMinimize your attack surface. Lock down unauthorized use of devices and stop the execution of unknown apps.\r\nDETECTION\r\nYou can’t always plan for zero-day attacks, but you can get ahead of them faster with discover and protection capabilities in one console.\r\nRESPONSE AND REMEDIATION\r\nYou’ve been breached. Now what? Respond faster when you can remediate configurations on the fly.\r\nPROACTIVE APPROACH\r\nReduce your attack surface, detect threats, and respond to malware with a single solution. No need to get a new point product every time a new attack makes the news.\r\nFULL DISK ENCRYPTION\r\nUpgrade your encryption policy to protect data at rest and in motion (when being transferred onto removable devices / media).\r\nANTIVIRUS\r\nStay healthy with multiple detection techniques to identify and block unknown malware.\r\nPATCH MANAGEMENT\r\nUpgrade the way you patch with an automated solution using the largest patch catalog available.\r\nDEVICE AND PORT CONTROL\r\nLock down endpoints to prevent illicit use of removable devices and ports.\r\nAPPLICATION WHITELISTING\r\nEnforce a comprehensive list of approved apps to protect against malware and untrusted changes.\r\nWAKE-ON-LAN\r\nEnsure that your offline machines awaken to receive critical patches and software updates.\r\nCONTENT WIZARD\r\nFree up time and resources with easier deployment for removing software, remediating configurations, performing systems management tasks, and more.\r\nREAL-TIME REPORTING\r\nMake smarter decisions with critical insights from a single dashboard. Break down unwieldly data silos and gain a holistic view of your organization. ","shortDescription":"Patch, application and device control, and more from one console","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ivanti ENDPOINT SECURITY","keywords":"your, with, solution, when, single, security, attack, down","description":"Get a comprehensive solution to reduce complexity, cost, and chaos\rRelying on multiple, point-based endpoint security technologies? Then you already know how","og:title":"ivanti ENDPOINT SECURITY","og:description":"Get a comprehensive solution to reduce complexity, cost, and chaos\rRelying on multiple, point-based endpoint security technologies? Then you already know how","og:image":"https://old.b4r.io/fileadmin/user_upload/ivanti_IT_SERVICE_MANAGER.png"},"eventUrl":"","translationId":1181,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":143,"logoURL":"https://old.b4r.io/fileadmin/user_upload/ESET_NOD32_Secure_Enterprise.jpg","logo":true,"scheme":false,"title":"ESET NOD32 Secure Enterprise","vendorVerified":0,"rating":"1.80","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":3,"alias":"eset-nod32-secure-enterprise","companyTitle":"Eset","companyTypes":["vendor"],"companyId":315,"companyAlias":"eset","description":"ESET NOD32 Secure Enterprise – комплексное кроссплатформенное решение, которое надежно защищает каждый узел корпоративной сети и позволяет централизованно подойти к вопросу обеспечения безопасности на всех уровнях системы в организациях любого масштаба.\r\n\r\nГибкая система лицензирования предоставляет возможность собрать комплекс безопасности под задачи каждой компании с учетом всех особенностей ИТ-инфраструктуры.\r\n\r\nРешение включает все типы антивирусного программного обеспечения для оптимизированной работы и эффективной защиты каждого узла сети, вне зависимости от операционной системы.\r\n\r\n","shortDescription":"ESET NOD32 Secure Enterprise – комплексное кроссплатформенное решение, надежно защищает каждый узел корпоративной сети, централизованно обеспечивает безопасность на всех уровнях системы в организациях любого масштаба.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET NOD32 Secure Enterprise","keywords":"системы, обеспечения, сети, безопасности, всех, ESET, Secure, Enterprise","description":"ESET NOD32 Secure Enterprise – комплексное кроссплатформенное решение, которое надежно защищает каждый узел корпоративной сети и позволяет централизованно","og:title":"ESET NOD32 Secure Enterprise","og:description":"ESET NOD32 Secure Enterprise – комплексное кроссплатформенное решение, которое надежно защищает каждый узел корпоративной сети и позволяет централизованно","og:image":"https://old.b4r.io/fileadmin/user_upload/ESET_NOD32_Secure_Enterprise.jpg"},"eventUrl":"","translationId":2347,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":144,"logoURL":"https://old.b4r.io/fileadmin/user_upload/ESET_NOD32_Secure_Enterprise.jpg","logo":true,"scheme":false,"title":"ESET Secure Enterprise","vendorVerified":0,"rating":"1.80","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":3,"alias":"eset-secure-enterprise","companyTitle":"Eset","companyTypes":["vendor"],"companyId":315,"companyAlias":"eset","description":"ESET Secure Enterprise is a comprehensive cross-platform solution that protects corporate network each node and allows a centralized approach to the issue of safety at all levels of the system in organizations of all sizes. Flexible licensing system provides the ability to collect security under the complex task of each company with all the features of the IT infrastructure. The solution includes all types of anti-virus software to optimize performance and effective protection of each node, regardless of the operating system.\r\n \r\n ","shortDescription":"ESET Secure Enterprise is a comprehensive cross-platform solution that protects corporate network","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":13,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET Secure Enterprise","keywords":"system, each, Secure, node, ESET, NOD32, solution, Enterprise","description":"ESET Secure Enterprise is a comprehensive cross-platform solution that protects corporate network each node and allows a centralized approach to the issue of","og:title":"ESET Secure Enterprise","og:description":"ESET Secure Enterprise is a comprehensive cross-platform solution that protects corporate network each node and allows a centralized approach to the issue of","og:image":"https://old.b4r.io/fileadmin/user_upload/ESET_NOD32_Secure_Enterprise.jpg"},"eventUrl":"","translationId":144,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1730,"logoURL":"https://old.b4r.io/fileadmin/user_upload/ESET_ENDPOINT_PROTECTION_ADVANCED.png","logo":true,"scheme":false,"title":"ESET Endpoint Protection advanced","vendorVerified":0,"rating":"1.80","implementationsCount":4,"suppliersCount":0,"supplierPartnersCount":3,"alias":"eset-endpoint-protection-advanced","companyTitle":"Eset","companyTypes":["vendor"],"companyId":315,"companyAlias":"eset","description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection against ransomware</li> <li>Prevention of fileless attacks</li> <li>Remote management</li> </ul>\r\n<span style=\"font-weight: bold;\">Endpoint security</span> ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives. <span style=\"font-weight: bold;\">File server security</span> Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity. <span style=\"font-weight: bold;\">Manage products via on-premise console</span> ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.\r\n<ul> <li>Complete network visibility</li> <li>Full security management</li> <li>Flexible reporting</li> <li>Automated security management</li> </ul>\r\n<span style=\"font-style: italic;\">"ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally." - Richard Ford, Head of IT at SWFC</span>","shortDescription":"ESET ENDPOINT PROTECTION ADVANCED is a complete multilayered protection with remote security management: On-premise management, endpoint security, file server security\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":18,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET Endpoint Protection advanced","keywords":"ESET, security, management, Protection, protection, Endpoint, servers, advanced","description":"ESET Endpoint Protection Advanced Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r","og:title":"ESET Endpoint Protection advanced","og:description":"ESET Endpoint Protection Advanced Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r","og:image":"https://old.b4r.io/fileadmin/user_upload/ESET_ENDPOINT_PROTECTION_ADVANCED.png"},"eventUrl":"","translationId":1731,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":36,"title":"Endpoint Security"}],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":261,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Dr.Web_Enterprise_Security_Suite.png","logo":true,"scheme":false,"title":"Dr.Web Enterprise Security Suite","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":6,"alias":"drweb-enterprise-security-suite","companyTitle":"Dr.Web","companyTypes":["vendor"],"companyId":2794,"companyAlias":"drweb","description":"Criminals target personnal employees' devices they use for work as well as office PCs.\r\nWherever a company's confidential information is stored, Dr.Web will never leave it unprotected.\r\nA single protected environment powered by Dr.Web Enterprise Security Suite has many advantages:\r\n\r\nLess expensive and streamlined protection.\r\nIt's possible to control all protected computers from one location.\r\nEmployees can work all over the world with the same level of protection.\r\nGuarantee of data safety (including personal data) at any given time.\r\nReduction of downtimes caused by infection.","shortDescription":"Dr.Web Enterprise Security Suite - Centrally managed end-point security for all hosts in your corporate network","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dr.Web Enterprise Security Suite","keywords":"protected, Security, data, work, Suite, protection, Enterprise, Employees","description":"Criminals target personnal employees' devices they use for work as well as office PCs.\rWherever a company's confidential information is stored, Dr.Web will","og:title":"Dr.Web Enterprise Security Suite","og:description":"Criminals target personnal employees' devices they use for work as well as office PCs.\rWherever a company's confidential information is stored, Dr.Web will","og:image":"https://old.b4r.io/fileadmin/user_upload/Dr.Web_Enterprise_Security_Suite.png"},"eventUrl":"","translationId":262,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":538,"logoURL":"https://old.b4r.io/fileadmin/content/csm_McAfee.png","logo":true,"scheme":false,"title":"McAfee Complete Endpoint Threat Protection","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-complete-endpoint-threat-protection","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: #53565a; font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;\">McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.</p>\r\n<p style=\"margin: 0px 10px 15px 0px; padding: 0px; border: 0px; outline: 0px; color: #53565a; font-family: intel_clear_wregular, Tahoma, Arial, Helvetica, sans-serif; font-size: 14px;\">Core endpoint protection, including anti-malware, firewall, device control, email and web security works together with machine learning and dynamic application containment to detect zero-day threats in near real time, and classify and halt them before they can execute on your systems. Actionable forensic data and easy-to-read reports keep you informed and help you make the move from responding to outbreaks, to investigating and hardening your defenses. And, because McAfee Complete Endpoint Threat Protection is built using an extensible framework, you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.</p>","shortDescription":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Complete Endpoint Threat Protection","keywords":"McAfee, Complete, defenses, your, Threat, Endpoint, Protection, zero-day","description":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and","og:title":"McAfee Complete Endpoint Threat Protection","og:description":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and","og:image":"https://old.b4r.io/fileadmin/content/csm_McAfee.png"},"eventUrl":"","translationId":595,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":832,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Complete_EndPoint_Protection_-_Business__CEB_.png","logo":true,"scheme":false,"title":"McAfee Complete EndPoint Protection - Business (CEB)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-complete-endpoint-protection-business-ceb","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"Core endpoint protection\r\nMcAfee Complete Endpoint Threat Protection includes anti-malware, firewall, device control, and email and web security.\r\nPowered by machine learning\r\nWith integrated machine learning and dynamic application containment, detect zero-day threats in near real time, and classify and halt them before they can execute on your systems.\r\nActionable forensic data\r\nEasy-to-read reports help you make the move from responding to outbreaks to investigating and hardening your defenses.\r\nAn adaptable security framework\r\nMcAfee Complete Endpoint Threat Protection is built using an extensible framework, so you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.\r\n\r\nIntegrated, advanced threat defenses built with productivity in mind\r\nAutomate advanced threat defenses\r\nStay ahead of threats with reputation analysis and machine learning that evolves to pinpoint and streamline responses to zero-day threats by automatically stopping and containing greyware, ransomware, and other advanced threats.\r\nReduce security complexity\r\nEliminate multiple security management consoles and user interfaces. One console provides a single pane of glass to manage your environment so you can rapidly ramp up deployments and leverage cross-platform policies for Windows, Mac, and Linux environments.\r\nBuild a flexible and collaborative security framework\r\nEnsure your defenses work together to defeat threats and provide actionable threat forensics. Our purpose-built framework connects multiple defenses and allows for easy adoption of new advanced security technologies as the threat landscape changes.\r\n\r\nSystem requirements\r\nMcAfee Complete Endpoint Threat Protection is a suite that is supported on Windows, Mac, and Linux systems. For complete technical specifications for all of the products included in this suite, please review the minimum system requirements.\r\n","shortDescription":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate and contain zero-day threats and sophisticated attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Complete EndPoint Protection - Business (CEB)","keywords":"security, threat, defenses, your, advanced, threats, McAfee, framework","description":"Core endpoint protection\rMcAfee Complete Endpoint Threat Protection includes anti-malware, firewall, device control, and email and web security.\rPowered by","og:title":"McAfee Complete EndPoint Protection - Business (CEB)","og:description":"Core endpoint protection\rMcAfee Complete Endpoint Threat Protection includes anti-malware, firewall, device control, and email and web security.\rPowered by","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Complete_EndPoint_Protection_-_Business__CEB_.png"},"eventUrl":"","translationId":833,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":43,"title":"Data Encryption","alias":"data-encryption","description":"Шифрова́ние — обратимое преобразование информации в целях сокрытия от неавторизованных лиц, с предоставлением, в это же время, авторизованным пользователям доступа к ней. Главным образом, шифрование служит задачей соблюдения конфиденциальности передаваемой информации. Важной особенностью любого алгоритма шифрования является использование ключа, который утверждает выбор конкретного преобразования из совокупности возможных для данного алгоритма[1][2].\r\n\r\nПользователи являются авторизованными, если они обладают определенным аутентичным ключом. Вся сложность и, собственно, задача шифрования состоит в том, как именно реализован этот процесс[1].\r\n\r\nВ целом, шифрование состоит из двух составляющих — зашифрование и расшифрование.\r\n\r\nС помощью шифрования обеспечиваются три состояния безопасности информации[1]:\r\n\r\nКонфиденциальность.\r\nШифрование используется для скрытия информации от неавторизованных пользователей при передаче или при хранении.\r\nЦелостность.\r\nШифрование используется для предотвращения изменения информации при передаче или хранении.\r\nИдентифицируемость.\r\nШифрование используется для аутентификации источника информации и предотвращения отказа отправителя информации от того факта, что данные были отправлены именно им.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/data-encryption.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":834,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Protection_-_Advanced_Suite.jpg","logo":true,"scheme":false,"title":"McAfee Endpoint Protection — Advanced Suite","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-endpoint-protection-advanced-suite","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"Обеспечение всесторонней защиты конечных точек\r\nВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от вредоносных программ в режиме реального времени позволяют блокировать вирусы, троянских коней, червей, рекламные, шпионские и другие потенциально нежелательные программы.\r\nОбеспечение безопасности и нормативно-правового соответствия систем\r\nИспользование централизованного механизма управления и аудита на основе политик позволяет повысить надежность защиты.\r\nОбеспечение комплексного контроля над устройствами\r\nМониторинг и ограничение копирования данных на съемные устройства и носители позволяет упреждать утечки данных и обеспечивать сохранность конфиденциальной информации.\r\nСкорость и легкость развертывания\r\nНаличие единой консоли централизованного управления позволяет устанавливать средства защиты за считанные минуты всего несколькими щелчками мышью, а также обеспечивать более подробный сбор информации о происходящем и более эффективный контроль над средствами защиты и мерами обеспечения нормативно-правового соответствия.\r\nОптимизация процессов управления защитой конечных точек\r\n\r\nБлокирование угроз «нулевого дня»\r\nИнтегрированная в данное решение технология McAfee Host Intrusion Prevention for Desktop обеспечивает защиту от новых уязвимостей и сокращает необходимость срочной установки исправлений.\r\nКонтроль за использованием сети Интернет\r\nАдминистраторы могут ограничивать доступ пользователей, находящихся в корпоративной сети и вне ее, к веб-сайтам неуместного содержания и запрещать запуск нежелательных программ на системах путем блокирования приложений.\r\nАвтоматизация выполнения требований политик\r\nMcAfee Policy Auditor позволяет интегрировать отчеты о соответствии требованиям стандартов HIPAA, PCI и других нормативно-правовых документов.\r\n\r\nТребования к системе\r\nКомплект McAfee Endpoint Protection — Advanced Suite поддерживается в операционных системах Windows и Mac.","shortDescription":"Комплексная система упреждающей защиты, позволяющая блокировать вредоносные программы и угрозы «нулевого дня»\r\nКомплект McAfee Endpoint Protection — Advanced Suite обеспечивает защиту систем Windows, Mac и Linux, находящихся внутри вашей сети и за пределами.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Endpoint Protection — Advanced Suite","keywords":"защиты, McAfee, позволяет, сети, управления, Обеспечение, политик, точек","description":"Обеспечение всесторонней защиты конечных точек\rВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от","og:title":"McAfee Endpoint Protection — Advanced Suite","og:description":"Обеспечение всесторонней защиты конечных точек\rВы сможете защитить от угроз системы, данные, электронную почту, веб-трафик и сети. Средства защиты от","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Protection_-_Advanced_Suite.jpg"},"eventUrl":"","translationId":2519,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/4_blackwhite_icons_business_flow_original_vect.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Предотвращение утечек (англ. Data Leak Prevention, DLP) — технологии предотвращения утечек конфиденциальной информации из информационной системы вовне, а также технические устройства (программные или программно-аппаратные) для такого предотвращения утечек.\r\n\r\nDLP-системы строятся на анализе потоков данных, пересекающих периметр защищаемой информационной системы. При детектировании в этом потоке конфиденциальной информации срабатывает активная компонента системы, и передача сообщения (пакета, потока, сессии) блокируется.\r\n\r\nИспользуются также следующие термины, обозначающие приблизительно то же самое:\r\n\r\nData Loss Prevention (DLP);\r\nData Leak Prevention (DLP);\r\nData Leakage Protection (DLP);\r\nInformation Protection and Control (IPC);\r\nInformation Leak Prevention (ILP);\r\nInformation Leak Protection (ILP);\r\nInformation Leak Detection & Prevention (ILDP);\r\nContent Monitoring and Filtering (CMF);\r\nExtrusion Prevention System (EPS).","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":120,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Kaspersky_Security_dlja_biznesa.png","logo":true,"scheme":false,"title":"Kaspersky Endpoint Security for Business","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":172,"alias":"kaspersky-endpoint-security-for-business","companyTitle":"Kaspersky Lab","companyTypes":["vendor"],"companyId":173,"companyAlias":"kaspersky-lab","description":"<p style=\"margin: 0px; padding: 3px 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; line-height: 1.6em; text-align: justify;\"><span style=\"color: #555555; font-family: 'Trebuchet MS'; font-size: 14px;\">Kaspersky Endpoint Security for Business ensures the security of corporate information network, allows you to view, monitor and protect your IT-infrastructure.</span></p>\r\n<p style=\"margin: 0px; padding: 3px 0px; outline: 0px; vertical-align: baseline; box-sizing: content-box; line-height: 1.6em; text-align: justify;\">Kaspersky Endpoint Security is an integrated digital security solution for businesses, that protects devices running Microsoft Windows, Mac OS X or Linux from malware and other threats. It is centrally controlled from an online management console, and its client applications are designed for both desktop and server devices. It contains features for remote administration, remote deployment and includes strong cryptography for data encryption, with file-level encryption (FLE) and full disk encryption (FDE). It contains special features for mobile devices, allows separation of corporate data and personal data, and includes anti-theft features.</p>\r\n<ul>\r\n<li>Kaspersky Endpoint Security | Cloud - Strong on protection. Easy on management.</li>\r\n<li>Developed specifically for small and medium-sized businesses, Kaspersky Endpoint Security Cloud lets you manage security for multiple endpoints, mobile devices and file servers remotely, from anywhere.</li>\r\n<li>Kaspersky Endpoint Security for Business | Select - Endpoint protection, controls & mobile security</li>\r\n<li>Kaspersky Endpoint Security for Business | Advanced - World-class security – extended IT management</li>\r\n<li>Kaspersky Total Security for Business - Our ultimate security & systems management solution</li>\r\n<li>Kaspersky Total Security is the company's most comprehensive PC security product to date, and adds further to the features in Internet Security.</li>\r\n</ul>","shortDescription":"Kaspersky Endpoint Security for Business ensures the security of corporate information network, allows you to view, monitor and protect your IT-infrastructure.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Kaspersky Endpoint Security for Business","keywords":"Security, Endpoint, security, Kaspersky, Business, features, devices, mobile","description":"Kaspersky Endpoint Security for Business ensures the security of corporate information network, allows you to view, monitor and protect your IT-infrastructure.","og:title":"Kaspersky Endpoint Security for Business","og:description":"Kaspersky Endpoint Security for Business ensures the security of corporate information network, allows you to view, monitor and protect your IT-infrastructure.","og:image":"https://old.b4r.io/fileadmin/user_upload/Kaspersky_Security_dlja_biznesa.png"},"eventUrl":"","translationId":120,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":36,"title":"Endpoint Security"}],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":122,"logoURL":"https://old.b4r.io/fileadmin/user_upload/kaspersky_logo.png","logo":true,"scheme":false,"title":"Kaspersky Virtualization Security","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":172,"alias":"kaspersky-virtualization-security","companyTitle":"Kaspersky Lab","companyTypes":["vendor"],"companyId":173,"companyAlias":"kaspersky-lab","description":"Kaspersky Security for Virtualization provides a single solution to secure both virtual servers and VDI. Because it supports all the most commonly used platforms – including VMware vSphere, Citrix XenServer, Microsoft Hyper-V and KVM – Kaspersky Security for Virtualization is ideal for heterogeneous environments. The solution offers two different approaches to specialized virtualization security – both of which can be run simultaneously on different parts of your infrastructure.\r\n<span style=\"font-weight: bold;\">Agentless</span>\r\nOne Security Virtual Appliance per host performs malware scanning of all VMs\r\n<span style=\"font-weight: bold;\">Light Agent</span>\r\nA lightweight security agent on each VM significantly boosts protection\r\n<span style=\"font-weight: bold;\">Single Console</span>\r\nA single console means that physical and virtual machines, and mobile devices, can all be managed together","shortDescription":"Kaspersky Virtualization Security - Efficient security for all kinds of virtual environments","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Kaspersky Virtualization Security","keywords":"Security, Kaspersky, Virtualization, different, security, single, solution, virtual","description":"Kaspersky Security for Virtualization provides a single solution to secure both virtual servers and VDI. Because it supports all the most commonly used","og:title":"Kaspersky Virtualization Security","og:description":"Kaspersky Security for Virtualization provides a single solution to secure both virtual servers and VDI. Because it supports all the most commonly used","og:image":"https://old.b4r.io/fileadmin/user_upload/kaspersky_logo.png"},"eventUrl":"","translationId":122,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":41,"title":"Antispam","alias":"antispam","description":"Технологии борьбы со спамом предназначены для предотвращения попадания нежелательной для пользователя информации (спама) в почтовые программы, программы обмена мгновенными сообщениями или на страницы, отображаемые в веб-браузере. Для этого могут применяться как аппаратные, так и программные средства и компоненты, как непосредственно на компьютере пользователя, так и в инфраструктуре провайдера Интернета, на серверах и маршрутизаторах.\r\n\r\nПрименяемые технологии для борьбы со спамом можно разделить на следующие категории, охватывающие широкий спектр конкретных методов фильтрации нежелательной информации:\r\n\r\nМетоды, применяемые конечными пользователями, такие как антиспамовые фильтры в почтовых программах или специализированные программы защиты от спама\r\nАвтоматизированные методы, применяемые администраторами почтовых серверов при приеме и отправке сообщений\r\nТехнологии, применяемые специализированными компаниями и организациями, занимающимися борьбой со спамом\r\nПравовые меры и нормы, устанавливающие юридическую ответственность отправителей спама\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A2%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8_%D0%B1%D0%BE%D1%80%D1%8C%D0%B1%D1%8B_%D1%81%D0%BE_%D1%81%D0%BF%D0%B0%D0%BC%D0%BE%D0%BC","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/spam.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1732,"logoURL":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Security.png","logo":true,"scheme":false,"title":"McAfee Endpoint Security","vendorVerified":0,"rating":"2.00","implementationsCount":4,"suppliersCount":0,"supplierPartnersCount":270,"alias":"mcafee-endpoint-security","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<span style=\"font-weight: bold;\">Advanced, consolidated endpoint defense</span> McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint environment. <span style=\"font-weight: bold;\">Core threat prevention</span> Essential anti-virus, exploit prevention, firewall, and web control communicate with each other. <span style=\"font-weight: bold;\">Machine learning</span> State-of-the art techniques identify malicious code based on appearance and behavior. <span style=\"font-weight: bold;\">Application containment</span> Limit the impact of suspicious files and zero-day malware by blocking behaviors and containing them before they can infect or spread in your environment. <span style=\"font-weight: bold;\">Endpoint detection and response</span> Our integrated, automated, and adaptable endpoint detection and response (EDR) technology is easy to use and makes incident response as simple as a single click. <span style=\"font-weight: bold;\">Product features</span>\r\n<ul>\r\n<li>Centralized management. The McAfee ePolicy Orchestrator management console can be deployed on premises or in the cloud. It provides greater visibility, simplifies operations, boosts IT productivity, unifies security, and reduces costs.</li>\r\n<li>Advanced anti-malware protection. Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.</li>\r\n<li>Machine learning analysis. Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.</li>\r\n<li>Dynamic application containment. Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.</li>\r\n<li>Proactive web security. Ensure safe browsing with web protection and filtering for endpoints.</li>\r\n<li>Actionable threat forensics. Quickly see where infections are, why they are occurring, and the length of exposure to understand the threat and react more quickly.</li>\r\n</ul>\r\n","shortDescription":"McAfee Endpoint Security is an integrated, centrally managed, advanced defenses","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Endpoint Security","keywords":"McAfee, threat, protection, response, detection, Endpoint, they, endpoint","description":"Advanced, consolidated endpoint defense McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint","og:title":"McAfee Endpoint Security","og:description":"Advanced, consolidated endpoint defense McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint","og:image":"https://old.b4r.io/fileadmin/user_upload/McAfee_Endpoint_Security.png"},"eventUrl":"","translationId":1733,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":36,"title":"Endpoint Security"}],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2294,"logoURL":"https://old.b4r.io/fileadmin/user_upload/71a0097cf851c21c82e3c3afb19f97e9f4889be6.jpg","logo":true,"scheme":false,"title":"Secur01","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":6,"alias":"zashchita01","companyTitle":"Adobe","companyTypes":["vendor"],"companyId":181,"companyAlias":"adobe","description":null,"shortDescription":null,"type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Secur01","keywords":"","description":"","og:title":"Secur01","og:description":"","og:image":"https://old.b4r.io/fileadmin/user_upload/71a0097cf851c21c82e3c3afb19f97e9f4889be6.jpg"},"eventUrl":"","translationId":2295,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":3,"title":"CRM"},{"id":17,"title":"CAD for architecture and construction - Computer-Aided Design"},{"id":36,"title":"Endpoint Security"},{"id":92,"title":"NC04"}],"testingArea":"","categories":[{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/CAD__2_.png"},{"id":339,"title":"Marketing","alias":"marketing","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/internet_marketing.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"Endpoint security is a technology that takes an upper hand to protect computer networks that are remotely bridged to users' devices. The use of laptops, tablets, mobile devices and other wireless gadgets connected with corporate networks creates vulnerability paths for security threats.[1] Endpoint security attempts to ensure that such devices follow a definite level of compliance and standards.\r\n\r\nSource : https://en.wikipedia.org/wiki/Endpoint_security","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antivirus.png"},{"id":834,"title":"New catecory 04","alias":"new-catecory-04","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/1_1.jpg"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[{"id":612,"title":"Название проекта1","url":"https://old.b4r.io/vnedrenija/vnedrenie/nazvanie-proekta1/"},{"id":613,"title":"Название проекта2","url":"https://old.b4r.io/vnedrenija/vnedrenie/nazvanie-proekta2/"},{"id":614,"title":"Название проекта3","url":"https://old.b4r.io/vnedrenija/vnedrenie/nazvanie-proekta3/"},{"id":615,"title":"Название проекта4","url":"https://old.b4r.io/vnedrenija/vnedrenie/nazvanie-proekta4/"},{"id":616,"title":"Название проекта5","url":"https://old.b4r.io/vnedrenija/vnedrenie/nazvanie-proekta5/"}],"presenterCodeLng":"","productImplementations":[{"id":612,"title":"Название проекта1","description":"","alias":"nazvanie-proekta1","roi":125,"seo":{"title":"Название проекта1","keywords":"","description":"","og:title":"Название проекта1","og:description":""},"deal_info":"","user":{"id":203,"title":"State Savings Bank of Ukraine","logoURL":"https://old.b4r.io/uploads/roi/company/oschadbank.png","alias":"oshchadbank","address":"","roles":[],"description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21, 1999, N 866","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":88,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.oschadbank.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"State Savings Bank of Ukraine","keywords":"Ukraine, Decree, Cabinet, Ministers, 1999, with, established, Company","description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:title":"State Savings Bank of Ukraine","og:description":"The Public Joint-Stock Company “State Savings Bank of Ukraine” was established in compliance with Decree of the Cabinet of Ministers of Ukraine of May 21,","og:image":"https://old.b4r.io/uploads/roi/company/oschadbank.png"},"eventUrl":""},"supplier":{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""},"vendors":[{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":613,"title":"Название проекта2","description":"","alias":"nazvanie-proekta2","roi":0,"seo":{"title":"Название проекта2","keywords":"","description":"","og:title":"Название проекта2","og:description":""},"deal_info":"","user":{"id":452,"title":"112.ua","logoURL":"https://old.b4r.io/uploads/roi/company/112.ua.png","alias":"112ua","address":"04119, Киев, Дегтяревская, 21-г","roles":[],"description":"Everyday 112.UA News Agency brings you breaking news from Ukraine: Donbas conflict in facts, political and economic events, sport and lifestyle highlights, best of Ukrainian social nets.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":32,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://112.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"112.ua","keywords":"events, economic, sport, political, lifestyle, social, nets, Ukrainian","description":"Everyday 112.UA News Agency brings you breaking news from Ukraine: Donbas conflict in facts, political and economic events, sport and lifestyle highlights,","og:title":"112.ua","og:description":"Everyday 112.UA News Agency brings you breaking news from Ukraine: Donbas conflict in facts, political and economic events, sport and lifestyle highlights,","og:image":"https://old.b4r.io/uploads/roi/company/112.ua.png"},"eventUrl":""},"supplier":{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""},"vendors":[{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":614,"title":"Название проекта3","description":"","alias":"nazvanie-proekta3","roi":0,"seo":{"title":"Название проекта3","keywords":"","description":"","og:title":"Название проекта3","og:description":""},"deal_info":"","user":{"id":2897,"title":"1+1 media","logoURL":"https://old.b4r.io/uploads/roi/company/1_1_media.png","alias":"1-1-media","address":"","roles":[],"description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши корпоративные ценности: СМЕЛОСТЬ. ЧЕСТНОСТЬ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":39,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://media.345aanonstop1plus1.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"1+1 media","keywords":"media","description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши","og:title":"1+1 media","og:description":"Группа 1+1 медиа — один из крупнейших медиахолдингов Украины. Видение группы — создание контента, который меняет представление людей о мире и о себе. Наши","og:image":"https://old.b4r.io/uploads/roi/company/1_1_media.png"},"eventUrl":"https://calendly.com/anastasia-filatova19/nea-event"},"supplier":{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""},"vendors":[{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":615,"title":"Название проекта4","description":"","alias":"nazvanie-proekta4","roi":0,"seo":{"title":"Название проекта4","keywords":"","description":"","og:title":"Название проекта4","og:description":""},"deal_info":"","user":{"id":4271,"title":"Olvia","logoURL":"https://old.b4r.io/uploads/roi/company/Olvija.jpeg","alias":"olvija","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Established in 1997, the Trade and Production Corporation "Olvia" has partner relations with individual legal entities that carry out production and trade business in various sectors of the foreign and domestic markets:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<ul><li>development;</li><li>construction of industrial and civil facilities;</li><li>management of commercial real estate;</li><li>providing a range of warehouse logistics services;</li><li>distribution of consumer goods;</li><li>retail trade in food products, household goods, household chemicals, cosmetic and perfume products;</li><li>production of mining and metallurgical equipment;</li><li>production and trade of raw chemical products and products of organic synthesis;</li><li>growing vegetables in a closed ground, plant growing.</li></ul>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://olvia.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Olvia","keywords":"products, production, trade, household, goods, Olvia, growing, services","description":"Established in 1997, the Trade and Production Corporation "Olvia" has partner relations with individual legal entities that carry out production and","og:title":"Olvia","og:description":"Established in 1997, the Trade and Production Corporation "Olvia" has partner relations with individual legal entities that carry out production and","og:image":"https://old.b4r.io/uploads/roi/company/Olvija.jpeg"},"eventUrl":""},"supplier":{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""},"vendors":[{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":616,"title":"Название проекта5","description":"","alias":"nazvanie-proekta5","roi":0,"seo":{"title":"Название проекта5","keywords":"","description":"","og:title":"Название проекта5","og:description":""},"deal_info":"","user":{"id":335,"title":"Adidas Ukraine","logoURL":"https://old.b4r.io/uploads/roi/company/adidas.png","alias":"adidas-ukraine","address":"","roles":[],"description":"Today, adidas-Group is the undisputed leader in the sporting goods market of Ukraine and CIS. The ability to purchase our goods from Lviv to Yalta in our stores, as well as cooperation with a lar","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.global.adidas.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Adidas Ukraine","keywords":"goods, from, Lviv, purchase, Yalta, cooperation, with, stores","description":"Today, adidas-Group is the undisputed leader in the sporting goods market of Ukraine and CIS. The ability to purchase our goods from Lviv to Yalta in our","og:title":"Adidas Ukraine","og:description":"Today, adidas-Group is the undisputed leader in the sporting goods market of Ukraine and CIS. The ability to purchase our goods from Lviv to Yalta in our","og:image":"https://old.b4r.io/uploads/roi/company/adidas.png"},"eventUrl":""},"supplier":{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""},"vendors":[{"id":4231,"title":"ROI4CIO","logoURL":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg","alias":"roi4cio","address":"","roles":[],"description":"About companyAbout companyAbout companyAbout companyAbout company","companyTypes":[],"products":{},"vendoredProductsCount":16,"suppliedProductsCount":21,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":31,"vendorImplementationsCount":53,"vendorPartnersCount":1,"supplierPartnersCount":5,"b4r":1,"categories":{},"companyUrl":"http://roi-redesign.my-dev.org/moi","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ROI4CIO","keywords":"компании, компанииОписание, Описание, ROI4CIO","description":"Описание компании Описание компании","og:title":"ROI4CIO","og:description":"Описание компании Описание компании","og:image":"https://old.b4r.io/uploads/roi/company/bellatrix_lestrange_wallpaper_by_fundamentumstudios_1.jpg"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0}]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"36":{"id":36,"title":"Endpoint Security"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}