View

Sorting

Products found: 14

logo
Offer a reference bonus
2.80

AgiliWay Custom Software development

  • Business requirements gathering and analysis
  • Solution architecture design
  • Development
  • Quality control strategy planning and solution testing
  • Solution deployment
  • End-users education and migration support from old systems
  • Post-implementation maintenance and user support

Products(services)

  • Custom Software development 
  • Outsourcing Consulting
  • Web Dev
  • Mobile Dev
  • BigData
  • QC
  • BPO
  • CiviCRM implementation
  • Odoo Implementation
  • E-commerce

 

... Learn more
ROI-
-
11
3
logo
Offer a reference bonus
1.80

Agiliway Услуги по комплексной разработке

Agiliway является признанным лидером рынка аутсорсинга, чьему качеству доверяют десятки клиентов в мире. Мы предлагаем такие услуги как: - консалтинг по технологиям разработки, создание архитектуры и алгоритмизация заданий - разработка web site и приложений, e-commerce решений - разработка мобильных приложений - разработка заказных приложений - администриование и поддержка веб-сайтов, баз данных - продвижение веб-проектов в Internet, SEO, написание статей, регистрация в каталогах, работа с социальными сетями - тестирование приложений - ввод и анализ данных
... Learn more
-
ROI-
-
20
16
logo
Offer a reference bonus
1.80

BPO

Qualified Business Process Outsourcing specialists can help you cover routine processes in various areas like:

  • Virtual Assistance
  • Data Entry
  • Website Content Management
  • Virtual Project Management
  • SEO/SMM and others.
... Learn more
-
ROI-
-
8
20
logo
Offer a reference bonus
1.80

Drupal

Drupal  v 7 and v8
... Learn more
ROI-
-
3
16
logo
Offer a reference bonus
1.40

FireEye Email Security

FireEye Email Security delivers dynamic defense to detect attacks from the very first time they’re seen and blocks the most dangerous cyber threats including malware-laden attachments and URLs, credential phishing sites and business email compromise attacks. Email-borne cyber attacks are targeted, automated and hidden amongst millions of messages, easily morphing before signatures can be created.

Leveraging FireEye’s extensive threat intelligence from frontline investigations and millions of sensors, FireEye Email Security prioritizes critical alerts and enables endpoint and network incident mitigation and remediation. FireEye Email Security works seamlessly with the FireEye security operations platform – FireEye Helix – providing visibility across the entire infrastructure.

Flexible deployment options

FireEye Email Security - Server Edition is an on-premises appliance that protects against advanced email attacks. Real-time updates from the entire FireEye ecosystem combined with attribution of alerts to known threat actors provide context for prioritizing and acting on critical alerts and blocking spear-phishing emails.

With nothing to install, FireEye Email Security - Cloud Edition is ideal if you’re migrating email to the cloud. It integrates seamlessly with cloud-based email systems such as Office 365 with Exchange Online Protection to stop targeted, advanced attacks faster and more accurately than Exchange Online Protection alone.

Full stack email security solution

FireEye MVX engine

Rapidly detects and blocks unknown malicious attacks.

Advanced URL defense

Inspects URLs for links to credential-phishing sites and rewrites URLs.

Impersonation detection

Stops difficult to detect malware-less attacks.

Retroactive analysis and alerting

Detects and alerts on URLs that go live after email delivery

... Learn more
-
ROI-
-
5
7
logo
Offer a reference bonus
1.00

FireEye FX

File content security, which would cover online file shares, portable file storage and services such as SharePoint, is a significant concern for your networks. Advanced cyber attackers can breach file content security and then launch advanced attacks capable of compromising key systems in an organization. FireEye File Content Security (FX Series) products help prevent, detect and respond to cyber attacks by scanning file content for signs of malicious threats. These threats might be brought into an organization from outside sources, such as online file sharing services and portable file storage devices. Benefits of File Content Security Prevent file share-based cyber attacks Block malware discovered in network file storage and content sharing systems Detect advanced malware Scan CIFS and NFS-compatible file shares, on-demand or on a schedule, without affecting server performance Leverage WebDAV protocol to proactively scan SharePoint document management systems Identify known and unknown latent malware that bypasses conventional antivirus products Respond to incidents faster Scan selected or all files, hard drives and trusted and untrusted file domains Analyze a broad set of file types, such as PDF, MS-Office, vCards, ZIP/RAR/TNEF, Quicktime, MP3, Real Player, JPG, PNG Integrate with other FireEye cyber security products, sharing and applying intelligence
... Learn more
-
ROI-
-
8
11
logo
Offer a reference bonus
1.40

FireEye NX

By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core. Ideal for next-generation networks that need flexible and scalable deployment options, FireEye Network Security offerings provide strong security for a myriad of environments and customer needs. FireEye Network Security is designed for high-performance, pervasive and consistent protection against threats across your organization with integrated security workflow and actionable contextual intelligence. It enables you to:
  • Accurately detect and immediately stop attacks that evade other security devices, including file-based sandboxes
  • Understand and prioritize critical alerts with reliable execution evidence and contextual insights
  • Proactively defend and investigate threats with tactical intelligence from FireEye or a third party using the Structured Threat Information eXpression (STIX) format as well as contextual and strategic threat intelligence
  • Deploy Network Security with integrated all-in-one hardware appliances or with a scalable and flexible on-premise or cloud-based distributed model
  • Future-proof your investment with an extensible, modular architecture
  • Provide your Microsoft Windows and Apple OS X users with the same level of threat protection
  • Achieve quick protection with machine-, attacker- and victim-based intelligence applied as updates to your defenses every 60 minutes
  • Shorten the solution payback period by eliminating the operational cost of triaging alerts manually
  • Integrate and automate your security workflow to easily prioritize, investigate and respond to alerts across different threat vectors
... Learn more
-
ROI-
-
12
20
logo
Offer a reference bonus
1.80

Java

Java
... Learn more
ROI-
-
20
6
logo
Offer a reference bonus
1.80

JavaScript

JavaScript for Web Development
... Learn more
ROI-
-
6
1
logo
Offer a reference bonus
0.80

JavaScript2

JavaScript
... Learn more
-
ROI-
-
16
1
logo
Offer a reference bonus
1.80

Magento Community Edition

Magento Community Edition v 1.9 and v2
... Learn more
-
ROI-
-
0
17
logo
Offer a reference bonus
1.80

Typo3

Typo3
... Learn more
-
ROI-
-
2
8
logo
Offer a reference bonus
1.80

VAFromEurope

Qualified Business Process Outsourcing specialists can help you cover routine processes in various areas like:

  • Virtual Assistance
  • Data Entry
  • Website Content Management
  • Virtual Project Management
  • SEO/SMM and others.
... Learn more
ROI-
-
11
1
logo
Offer a reference bonus
2.90

Корпоративный Web-site

Веб сайт, содержащий  - каталог товаров, услуг, решений - партнерская закрытая часть содержащая прайс-листы, описание продуктов
... Learn more
ROI-
-
13
8

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.