View

Sorting

Products found: 16

logo
Offer a reference bonus
3.40

11a11

ROI-
-
11
17
logo
Offer a reference bonus
3.70

1IT service product

The "way" originates from the samurai moral values, most commonly stressing some combination of sincerity, frugality, loyalty, martial arts mastery, and honour until death. Born from Neo-Confucianism during times of peace in the Edo period (1600–1878) and following Confucian texts, while also being influenced by Shinto and Zen Buddhism, allowing the violent existence of the samurai to be tempered by wisdom, patience and serenity. Bushidō developed between the 16th and 20th centuries, debated by pundits who believed they were building on a legacy dating back to the 10th century, although some scholars have noted that the term bushidō itself is "rarely attested in pre-modern literature".[3]

Under the Tokugawa shogunate, some aspects of warrior values became formalized into Japanese feudal law.[4]

The word bushidō was first used in Japan during the 17th century in Kōyō Gunkan,[5][6][7] but did not come into common usage until after the 1899 publication of Nitobe Inazō's Bushido: The Soul of Japan.[8] In Bushido (1899), Nitobe wrote:

 

 

Bushidō, then, is the code of moral principles which the samurai were required or instructed to observe ... More frequently it is a code unuttered and unwritten ... It was an organic growth of decades and centuries of military career. In order to become a samurai this code has to be mastered.[9]

 

Nitobe was the first to document Japanese chivalry in this way. In Feudal and Modern Japan (1896), historian Arthur May Knapp wrote:

 

 

The samurai of thirty years ago had behind him a thousand years of training in the law of honor, obedience, duty, and self-sacrifice ... It was not needed to create or establish them. As a child he had but to be instructed, as indeed he was from his earliest years, in the etiquette of self-immolation.[10]

 

... Learn more
ROI-
-
16
7
logo
Offer a reference bonus
3.80

Autodesk Revit

What does Revit do? Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage buildings and infrastructure. Revit supports a multidiscipline design process for collaborative design.

  • Design. Model building components, analyze and simulate systems and structures, and iterate designs. Generate documentation from Revit models.
  • Collaborate. Multiple project contributors can access centrally shared models. This results in better coordination, which helps reduce clashes and rework.
  • Visualize. Communicate design intent more effectively to project owners and team members by using models to create high-impact 3D visuals.

One multidiscipline BIM platform Revit has features for all disciplines involved in a building project. When architects, engineers, and construction professionals work on one unified platform, the risk of data translation errors can be reduced and the design process can be more predictable. Interoperability Revit helps you work with members of an extended project team. It imports, exports, and links your data with commonly used formats, including IFC, DWG™ and DGN.  Tools created expressly for your discipline Whether you’re an architect; a mechanical, electrical, or plumbing (MEP) engineer; a structural engineer; or a construction professional, Revit offers BIM features specifically designed for you. For architects Use Revit to take an idea from conceptual design to construction documentation within a single software environment. Optimize building performance and create stunning visualizations. For structural engineers Use tools specific to structural design to create intelligent structure models in coordination with other building components. Evaluate how well they conform to building and safety regulations. For MEP engineers Design MEP building systems with greater accuracy and in better coordination with architectural and structural components, using the coordinated and consistent information inherent in the intelligent model. For construction professionals Evaluate constructability and design intent before construction begins. Gain a better understanding of the means, methods, and materials, and how they all come together. Connect teams with Collaboration for Revit Extend Revit worksharing to project teams in almost any location with this service, which lets multiple users co-author Revit models in the cloud. Increase communication, centralize efforts of distributed teams, and let entire teams take part in the BIM process. Better team communication Use real-time chat within project models. Know who’s working in the model and what they’re doing. Extended team integration Subscribe to Collaboration for Revit and receive a subscription to BIM 360 Team, an integrated, cloud-based web service that provides centralized team access to project data. Access more projects Extend your reach and participate in projects or joint venture partnerships, wherever they’re located. Better allocate team talents and resources Assign the best team members with the strongest skill sets. Let designers work on multiple projects based in different locations at the same time. Minimize in-person meetings or co-location of teams Help lower travel expenses and support greater work-life balance for team members. Visualization and rendering. Show how your product will look with visualization and rendering tools.

... Learn more
ROI-
-
17
16
logo
Offer a reference bonus
3.00

Barracuda NextGen Firewall (NGFW)

Next-Generation Firewalls for the Cloud Era In the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications. The Barracuda NextGen Firewall F-Series is a family of hardware, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control. In addition, the F-Series combines highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network. The F-Series cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures. Security for the Cloud Era Security paradigms are shifting—and securing your network perimeter is no longer good enough. In the cloud era, workloads happen everywhere, users are increasingly mobile, and potential attack surfaces are multiplying. Barracuda NextGen Firewall F-Series is purpose-built to deal with the challenges of securing widely distributed networks. Advanced Threat Protection In today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput. Secure SD-WAN.. Barracuda Cloud Era Firewalls include full next gen Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application. This enables:
  • Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance
  • VPN across multiple broadband connections and MPLs replacement
  • Up to 24 physical uplinks to create highly redundant VPN tunnels
  • Replacing network backhauling central policy enforcement architectures with direct internet break outs
  • Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic
  • Guaranteed users' access to critical applications through granular policy controls
  • Increased available bandwidth with built-in traffic compression and data deduplication
  • Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic
Why Barracuda NextGen Firewall? When selecting security technology, it is critical that your products are supported by people who take your data security as seriously as you do. The Barracuda NextGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data. The Barracuda NextGen Firewall is part of a comprehensive line of data protection, network firewall, and security products and services designed for organizations seeking robust yet affordable protection from ever-increasing cyber threats. Source: https://www.barracuda.com/products/nextgenfirewall_f
... Learn more
ROI-
-
19
13
logo
Offer a reference bonus
3.00

Forcepoint NGFW

  As IDC has reported, customers who switch to Forcepoint NGFW enjoy dramatic improvements in both operations and security efficiencies that cut network expenses as much as 50%, slash downtime and reduce IT risk The Forcepoint Advantage Boost business productivity and cut the cost of providing safe, reliable access to applications and data, with secure SD-WAN built right in. High Availability Slash network downtime and keep your business running with uniquely efficient resilience integrated at all levels: firewalls, network and management. Unrivaled Security Protect data and apps throughout your data centers, edge, SD-WANs and cloud – with VPNs, IPS, anti-evasion, encrypted inspection, anti-malware, proxies and more. Massive Scalability Smoothly scale your security as your physical and virtual networks grow, without rip-and-replace upgrades or patchworks of tools. Centralized Manageability Deploy firewalls, VPNs, IPS, SD-WAN fast, across many different environments – and keep them running smoothly. 360° Visibility Gain immediate insights into what is happening across your network to accelerate incident response and streamline audit best practices. Benefits Forcepoint NGFW Appliances All Forcepoint NGFWs are built on a common software core to provide unified operation and high performance across all forms of appliances – physical, virtual, cloud. Physical – desktop, ruggedized and rack-mounted models; customizable network interfaces; firewall throughput from 1.5-120 Gbps Virtual – available for KVM and VMware ESXi Cloud – available for Amazon Web Services (AWS), Microsoft Azure (coming soon). Find out about the certifications that the Forcepoint NGFW appliances meet. NSS Labs Recommended In NSS Labs’ most recent report on Next Generation Firewall (NGFW) overall security effectiveness, Forcepoint NGFW achieved the highest rating of all 11 products tested. NSS Labs latest tests prove that Forcepoint NGFW offers the leading combination of enterprise security and low cost.
... Learn more
ROI-
-
10
15
logo
Offer a reference bonus
3.00

Forcepoint URL Filtering

With more than 120 security and filtering categories, hundreds of Web application and protocol controls, and 60-plus reports with customization and role-based access, Forcepoint URL Filtering is an easy to deploy and transparent filter and security solution that avoids the complexity of a proxy gateway. Forcepoint URL Filtering’s intuitive management and reporting is accessed via the unified TRITON Architecture user interface, simplifying provisioning and enabling role-based reporting. It includes more than 60 pre-defined reports, many easily customizable reports and administrative alerts. The TRITON architecture supports expansion to Email, Data, Mobile security products and more.
... Learn more
ROI-
-
20
8
logo
Offer a reference bonus
2.00

Hideez Key (HK)

Hideez Key — Your Only Digital Key Hideez Key will become a daily companion to your computer, smartphone and tablet Forget having to type passwords for apps, websites and services. Hideez Key will do it for you while simply laying in your pocket. Your computer will ask for password if somebody tries accessing it while you are away and will wake automatically and log you in when you come back. You phone won’t ask for passcode anymore, yet it will be securely protected from a stranger. Hideez Key can also be used to open your home, garage and office doors as a single digital key using 125 kHz RFID frequency (Em-Marine and HID compatible). Store Your Passwords in Your Pocket Still spending time and effort to recall that important password? Hideez Key stores up to 1000 passwords for your social networks, emails, cloud services and applications. Just press the button on your Hideez Key or a hotkey on the keyboard of your computer to input your password automatically. Try it, it looks like magic! Enjoy Convenient and Reliable Internet-Security Have you considered that by using a ‘simple’ password for email, banking account or social network you are risking your money and relations with the other people? Hideez Key allows using complicated passwords of any preferred length, which are difficult to brute force. And the good news are that you don’t have to input these passwords from your keyboard all the time. Your passwords aren’t stored on your computer as well, so a hacker cannot intercept them from your phone, browser or a hard drive. You might also consider using your Hideez Key as a second factor in two-factor authentication and to generate one time passwords for various applications. Let Your Smartphone Remind You When You Are About to Lose Something Place your Hideez Key in your bag and your smartphone will notify you when the signal is about to fade away together with your belongings. Even if that happens, you will be able to quickly locate your Hideez Key (and the bag in which it is placed) on the digital map. Ready for the Internet of Things More connected devices are appearing every day. Hideez Key supports over the air updates and you will be able to easily integrate it with your future devices and services. Remote Activation Want to take a selfie with a friend or start recording a conversation without touching your smartphone? Just press the multifunctional button on your Hideez Key and it will do the rest. Need an urgent help? Program the multifunctional button on your Hideez Key as your panic button to activate alarm scenario on your smartphone. For example: your smartphone will send a message with your current location to several trusted contacts from your address book. You can program any other alarm scenario with your Hideez Key. Opening Doors and Locks Hideez Key comes equipped with an RFID module, so it can be used as your RFID token for a modern door equipped with an RFID lock. You can copy the RFID credentials to your Hideez Key from your existing RFID key or access card or ask your local access service provider to do this for you, or you can add your Hideez Key to the access registry on your smart lock. Key Features ● Identify users to information systems. ● Automatic locking/unlocking of the computer, tablet or smartphone. ● External hardware password manager with automated password input that works for applications as well as for websites. ● Theft alarm for valuables like wallet, purse or keychain. ● Remote control for an user computer or smartphone using device button. ● More useful features to be delivered wirelessly via over the air updates. The use of Hideez Key reduces human factor influence on Enterprise information security field. In particular: ● To solve weak password problem ● Employees don’t have to remember passwords. ● Automatically lock PCs or apps when an user is away. ● To turn on 2FA on public or corporate resources without complicating the routine users work. ● To provide Two-hardware factor authentication for users. To authorize, the user need two devices: his/her PC and the Hideez Key. An appropriate control service Hideez Enterprise Server features: ● Eliminates control traffic between Hideez Keys and extranet. All the traffic routes are inside an enterprise perimeter. ● Basic LDAP integration (e.g Active Directory) ● End-to-end encrypted information channel between the control server and Hideez Key keyfobs. Nobody can intercept user passwords. ● Administrator can change, add and delete credentials in users keyfobs remotely. ● Strong passwords and with the limited expiration term without user inconvenience. ● Strong authorization by changing passwords to keys, which are unknown for users. Minimum system requirements Bluetooth 4.0, Windows 7 (an additional USB Bluetooth adapter is needed), Windows 8.1 +, MacOS 10,11+, Android 4.4 or newer, iOS 9.3+. Specifications Model: Hideez Key 1 (ST 101) Processor: Nordic nRF51822 RFID Module: ATMEL T5577 RFID Standards: eM-Marin and HID on 125 kHz Connectivity: Bluetooth 4.0 and higher Power: CR2032 battery, up to 6 months in active mode. User memory: 74 Kb LED Indicators: red and green Buttons: 1 multi-functional button Color: black Weight: 9 grams (package weight is 44 grams) Dimensions: 32,5 x 32,5 x 9 mm Warranty: 12 months What Is In the Box? ● Hideez Key ● Quick Start Manual ● Keychain ● CR2032 battery (installed inside your Hideez Key) ● Spare CR2032 battery ● Hideez Safe application for Windows and Android is available for free from http://hideez.com
... Learn more
-
-
ROI-
-
18
0
logo
Offer a reference bonus
4.00

Microsoft Office 365

Office 365 is the brand name Microsoft uses for a group of software and services subscriptions, which together provide productivity software and related services to subscribers. For consumers, the service allows the use of Microsoft Office apps on Windows and macOS, provides storage space on Microsoft's cloud storage service OneDrive, and grants 60 Skype minutes per month. For business users, Office 365 offers plans providing e-mail and social networking services through hosted versions of Exchange Server, Skype for Business Server, SharePoint and Office Online, integration with Yammer, as well as access to the Microsoft Office software.

... Learn more
ROI-
-
6
20
logo
Offer a reference bonus
3.30

TrapX DeceptionGrid platform

The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals. The Deception Product of Choice DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below. Console with Attack Visualization New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment. Attacker ID New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods. Automated Provisioning  Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys). Deception Tokens Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers. Active Traps New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic. Emulated Traps Medium Interaction Emulated Traps Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more. Industry Templates The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack. FullOS Traps High Interaction (Full Operating System) Traps DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.
... Learn more
ROI-
-
8
12

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.