{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementations":{"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"more":{"en":"Learn more","ru":"Узнать больше","_type":"localeString"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"en":"From Z to A","ru":"от Я до А","_type":"localeString"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"_type":"localeString","en":"Rating descending","ru":"По убыванию рейтинга"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"_type":"localeString","en":"Rebate descending","ru":"По убыванию скидки"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"product":{"_type":"localeString","en":"Product","ru":"Продукт"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"with-reference":{"_type":"localeString","en":"With reference","ru":"С референсом"},"items-found":{"ru":"Внедрений найдено","_type":"localeString","en":"Deployments found"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"_type":"localeString","en":"Deal in progress","ru":"Сделка в процессе"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"_type":"localeString","en":"Finished","ru":"Завершено"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"_type":"localeString","en":"Proof of concept","ru":"Пилотный проект"},"stopped":{"_type":"localeString","en":"Stopped","ru":"Остановлено"},"date":{"_type":"localeString","en":"Deployment date","ru":"Дата внедрения"},"roi":{"ru":"ROI","_type":"localeString","en":"ROI"},"implementations-fetching-error":{"en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"_type":"localeString","en":"Requests","de":"References","ru":"Мои запросы"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"en":"from","ru":"от","_type":"localeString"},"to":{"_type":"localeString","en":"to","ru":"до"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"_type":"localeString","en":"View","ru":"Вид"},"sort-type-label":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"category":{"_type":"localeString","en":"Category","ru":"Категория"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"_type":"localeString","en":"Add Product","ru":"Добавить продукт"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"_type":"localeString","en":"Сlear","ru":"Очистить"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"_type":"localeString","en":"Providers","ru":"Поставщик, производитель"},"business-tasks-field":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"_type":"localeString","en":"With discounts","ru":"Со скидками"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"show-all-button":{"en":"Show all","ru":"Показать все","_type":"localeString"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"_type":"localeString","en":"With deployments","ru":"С внедрениями"},"bonus-4-reference":{"en":"Bonus 4 Reference","ru":"Бонус за референс","_type":"localeString"},"product-categories":{"en":"Product Categories","ru":"Категории продуктов","_type":"localeString"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"_type":"localeString","en":"Seller","ru":"Продавец"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"business-objectives":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"ru":"С референсами","_type":"localeString","en":"With reference"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"_type":"localeString","en":"Date","ru":"Дата"},"try-button":{"_type":"localeString","en":"Try AI (Beta)","ru":"Попробовать AI (Beta)"},"hide":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"en":"Add deployment","ru":"Добавить внедрение","_type":"localeString"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"user":{"en":"User","ru":"Пользователь","_type":"localeString"},"company-type":{"en":"Company type","ru":"Тип компании","_type":"localeString"},"partners-field":{"_type":"localeString","en":"Partners","ru":" Партнеры"},"customers":{"en":"Customers","ru":"Покупатели","_type":"localeString"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"en":"Product vendor","ru":"Производитель продукта","_type":"localeString"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"en":"Canceled","ru":"Отменено","_type":"localeString"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"_type":"localeString","en":"Proof of concept","ru":"Пилотный проект"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"competencies":{"en":"Competencies","ru":"Компетенции","_type":"localeString"}}},"translationsStatus":{"implementations":"success","filters":"success"},"sections":{"implementations-text-block":{"body":{"_type":"localeBlock","en":[{"_key":"0e40f9075bd0","markDefs":[],"children":[{"text":"The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference.","_key":"0e40f9075bd00","_type":"span","marks":[]}],"_type":"block","style":"normal"}],"ru":[{"style":"normal","_key":"1435aa042111","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Каталог внедрений ROI4CIO - это база данных о внедрениях программного обеспечения, оборудования и ИТ-услуг. Находите внедрения по вендору, поставщику, пользователю, бизнес-задачам, проблемам, статусу, фильтруйте по наличию ROI и референса.","_key":"1435aa0421110"}],"_type":"block"}]},"label":"catalog-implementations-text-block"}},"sectionsStatus":{"implementations-text-block":"success"},"pageMetaData":{"implementations":{"title":{"en":"ROI4CIO: Implementations","ru":"ROI4CIO: Внедрения","_type":"localeString"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}],"translatable_meta":[{"translations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"name":"og:title"},{"translations":{"en":"Implementations","ru":"Каталог внедрений различных видов программного обеспечения, ИТ проектов. Результаты внедрений ИТ, результаты, референсы, ROI","_type":"localeString"},"name":"og:description"},{"name":"title","translations":{"_type":"localeString","en":"Implementations","ru":"Внедрения"}},{"name":"description","translations":{"en":"Implementations description","ru":"Описание внедрений","_type":"localeString"}},{"name":"keywords","translations":{"_type":"localeString","en":"Implementations keywords","ru":"Внедрения ключевые слова"}}]}},"pageMetaDataStatus":{"implementations":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"cisco-asa-ngfw-for-a-sporting-goods-chain-security-effectiveness-and-saving-costs":{"id":437,"title":"Cisco ASA NGFW for a sporting goods chain Security Effectiveness and Saving Costs","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Since it’s founding in 1902, Scheels has grown from three acres of potatoes to a sporting goods chain with 26 locations in 11 states, including the largest allsports store in the world. It’s an unlikely trajectory but one that was propelled by a commitment to customer service that began with the retailer’s founder, Frederick A. Scheel, and remains a cornerstone for success.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Just as SCHEELS sporting goods experts are dedicated to ensuring customers get the most from their shopping experience, SCHEELS IT experts Josh Diemert and Perry Stockwell are dedicated to helping the company get the most from its infrastructure and resources while protecting the company from cyber threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">For years, SCHEELS relied on a vendormanaged security solution that had become costly, difcult to manage, and used aging infrastructure. Set to open two more stores by 2020, the company realized that it needed to ensure that its infrastructure could scale and keep pace with both the dynamic threat landscape and its growing business.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic; \">“Our vendor-managed solution was difcult to work with and expensive,” explains Josh Diemert, Lead Systems Administrator, SCHEELS. “Every time we wanted to make a change to a policy it could take up to a day and it wasn’t always done correctly.” But the prospect of moving away from an outsourced model had to be carefully considered. “Our IT team runs lean – we needed a way to bring security in-house without adding a whole lot of work for our staf,” adds Diemert.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">At the same time, the company was considering a structural redesign that would eliminate the need to backhaul trafc to the corporate ofce, which would improve service quality to its stores and reduce bandwidth costs. Making this change would also require that the team have greater visibility and control over Internet access at each store to manage security in-house.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">SCHEELS has nearly 80 Cisco ASA with FirePOWER Services models deployed, the vast majority being the ASA 5506-X. In addition to the stateful frewall, the team uses FirePOWER Services including Advanced Malware Protection (AMP) for Networks, URL fltering, Application Visibility and Control (AVC), and NextGeneration IPS to deliver more integrated and efective security. The team centrally manages all the stores through the FireSIGHT® Management Center. Perry Stockwell, SCHEELS’ systems administrator, relies on the intelligence provided through this single pane of glass, including the events log, URL filtering, indicators of compromise (IoC), and prioritization fags, to strengthen the retailer’s security posture.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic; \">“The FireSIGHT® Management Center allows us to see what’s happening and make changes quickly. For example we can push out a policy change in under an hour, when previously it would have taken at least eight hours working through a third party,” Stockwell explains. “And the system will do a lot for us automatically – blocking malicious links without us having to do anything, preventing infected guest machines from connecting, and restricting user access according to policies.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Stockwell points out that one of the biggest security concerns for retailers right now is ransomware. In the battle against threats that use email as an attack vector, Stockwell believes that employee education on safe habits to ensure they know how to recognize and not click on potential malware is an important part of any security program. Still, mistakes will happen and threats are increasingly sophisticated so multilayered protection is also necessary to help defeat advanced malware. For example, Cisco AMP for Networks has allowed the team to catch malware that the anti-virus solution has missed.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Stockwell elaborates, “The extra layer of malware protection at the network with AMP for Networks has helped us detect malware that was attempting to call out to a command and control server, and block it before it was successful.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">As SCHEELS continues to expand with a new store in Colorado and another in Texas, the team is confdent in its ability to keep pace. “With our previous vendor, getting devices into a store was a very lengthy process and could take over a month,” notes Stockwell. “Given how quickly this initial rollout went, we feel we have the process down and a template we can use to get a store up and running in a matter of hours.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic; \">“We are always looking to improve security everywhere,” concludes Diemert.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic; \">“Moving to Cisco saved us money and is allowing us to apply resources to additional areas – increasing our endpoint protection with AMP for Endpoints is our next area of focus.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">Products and Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco ASA 5506-X with FirePOWER Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco ASA 5516-X with FirePOWER Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco ASA 5525-X with FirePOWER Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• FireSIGHT Management Center</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco FirePOWER Services in use:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">- Cisco Advanced Malware Protection (AMP) for Networks</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">- URL fltering</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">- Application Visibility and Control (AVC)</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">- Next-Generation IPS</span>\r\n\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); font-weight: bold;\">With Cisco ASA with FirePOWER Services, SCHEELS can:</span>\r\n<ul><li>Cut response time from hours to minutes.</li><li>Detect and stop threats that evade the anti-virus solution.</li><li>Deploy devices at new stores in couple of hours vs. more than a month.</li></ul>","alias":"cisco-asa-ngfw-for-a-sporting-goods-chain-security-effectiveness-and-saving-costs","roi":0,"seo":{"title":"Cisco ASA NGFW for a sporting goods chain Security Effectiveness and Saving Costs","keywords":"that, with, Cisco, security, Services, FirePOWER, from, SCHEELS","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Since it’s founding in 1902, Scheels has grown from three acres of potatoes to a sporting goods chain with 26 locations in 11 states, including the largest allsports store i","og:title":"Cisco ASA NGFW for a sporting goods chain Security Effectiveness and Saving Costs","og:description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Since it’s founding in 1902, Scheels has grown from three acres of potatoes to a sporting goods chain with 26 locations in 11 states, including the largest allsports store i"},"deal_info":"","user":{"id":4204,"title":"SCHEELS","logoURL":"https://old.roi4cio.com/uploads/roi/company/SCHEELS.png","alias":"scheels","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">SCHEELS' first All Sports Superstore opened in Grand Forks, ND in 1989. SCHEELS' Reno/Sparks, Nevada location opened in 2008 and is the World's Largest All Sports Store. Today, SCHEELS is a 27-store operation with stores in 12 states including North Dakota, Illinois, Iowa, Minnesota, South Dakota, Montana, Wisconsin, Nebraska, Nevada, Utah, Kansas, and Colorado. Providing SCHEELS' customers with first-class customer service and the world's largest selection of sports, sportswear and footwear are the priorities throughout the organization.</span>\r\n","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.scheels.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SCHEELS","keywords":"SCHEELS, Nevada, Dakota, with, Sports, opened, sportswear, customers","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">SCHEELS' first All Sports Superstore opened in Grand Forks, ND in 1989. SCHEELS' Reno/Sparks, Nevada location opened in 2008 and is the World's Largest All Sports Store","og:title":"SCHEELS","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">SCHEELS' first All Sports Superstore opened in Grand Forks, ND in 1989. SCHEELS' Reno/Sparks, Nevada location opened in 2008 and is the World's Largest All Sports Store","og:image":"https://old.roi4cio.com/uploads/roi/company/SCHEELS.png"},"eventUrl":""},"supplier":{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":1439,"logo":false,"scheme":false,"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","vendorVerified":0,"rating":"2.00","implementationsCount":5,"suppliersCount":0,"alias":"cisco-asa-ngfw-adaptive-security-appliance-software","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.\r\n<span style=\"font-weight: bold;\">Among its benefits, Cisco ASA Software:</span>\r\n<ul>\r\n<li>Offers integrated IPS, VPN, and Unified Communications capabilities</li>\r\n<li>Helps organizations increase capacity and improve performance through high-performance, multi-site, multi-node clustering</li>\r\n<li>Delivers high availability for high resiliency applications</li>\r\n<li>Provides collaboration between physical and virtual devices</li>\r\n<li>Meets the unique needs of both the network and the data center</li>\r\n<li>Provides context awareness with Cisco TrustSec security group tags and identity-based firewall technology</li>\r\n<li>Facilitates dynamic routing and site-to-site VPN on a per-context basis</li>\r\n</ul>\r\nCisco ASA software also supports next-generation encryption standards, including the Suite B set of cryptographic algorithms. It also integrates with the Cisco Cloud Web Security solution to provide world-class, web-based threat protection.","shortDescription":"The Cisco ASA Family of security devices protects corporate networks and data centers of all sizes. It provides users with highly secure access to data and network resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","keywords":"","description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form fa","og:title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","og:description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form fa"},"eventUrl":"","translationId":1440,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":4,"title":"Reduce Costs"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":385,"title":"Risk of data loss or damage"},{"id":384,"title":"Risk of attacks by hackers"},{"id":344,"title":"Malware infection via Internet, email, storage devices"}]}},"categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.cisco.com/c/dam/en/us/products/collateral/security/firewalls/scheels-case-study.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"cisco-asa-ngfw-for-insurance-company":{"id":1010,"title":"Cisco ASA NGFW for insurance company","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"cisco-asa-ngfw-for-insurance-company","roi":0,"seo":{"title":"Cisco ASA NGFW for insurance company","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Cisco ASA NGFW for insurance company","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":564,"title":"Insurance Company Universalna","logoURL":"https://old.roi4cio.com/uploads/roi/company/SK___Universalnaja__.png","alias":"sk-universalnaja","address":"","roles":[],"description":"PrJSC «IC «UNIVERSALNA» is one of TOP 3 leading Ukrainian Aviation Insurers<br />Between 2015-2018 «UNIVERSALNA» paid claims as aviation insurance indemnities in the amount of UAH 28.4 mln for various accidents with aircraft fleet insured.\r\nInsurance Company «UNIVERSALNA» is registered in the State Aviation Administration of Ukraine in the Register of Insurers engaged in compulsory aviation insurance. The company provides insurance coverage on the basis of valid licenses for compulsory and voluntary aviation insurance. Nowadays, Insurance Company "UNIVERSALNA" provides services for airlines registered in Ukraine, United Arab Emirates and other countries, Ukrainian International Airports and companies specialized on ground and air navigation services.\r\nThe aircraft fleet covered by Insurance Company «UNIVERSALNA» varies from such giants like AN-124-100 (Ruslan), Airbus 320/321 to medium size business jets like Hawker 800XP/850XP.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://universalna.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Insurance Company Universalna","keywords":"Универсальная, года, компании, страхования, предоставляет, компания, место, широкий","description":"PrJSC «IC «UNIVERSALNA» is one of TOP 3 leading Ukrainian Aviation Insurers<br />Between 2015-2018 «UNIVERSALNA» paid claims as aviation insurance indemnities in the amount of UAH 28.4 mln for various accidents with aircraft fleet insured.\r\nInsurance Company «","og:title":"Insurance Company Universalna","og:description":"PrJSC «IC «UNIVERSALNA» is one of TOP 3 leading Ukrainian Aviation Insurers<br />Between 2015-2018 «UNIVERSALNA» paid claims as aviation insurance indemnities in the amount of UAH 28.4 mln for various accidents with aircraft fleet insured.\r\nInsurance Company «","og:image":"https://old.roi4cio.com/uploads/roi/company/SK___Universalnaja__.png"},"eventUrl":""},"supplier":{"id":2701,"title":"VERNA","logoURL":"https://old.roi4cio.com/uploads/roi/company/VERNA.png","alias":"verna","address":"","roles":[],"description":"VERNA is one of the leading IT Integrators, specializing in design, implementation and support of technical solutions, aimed to improve the efficiency of corporate IT systems, - both on-site and on a remote basis. <br />VERNA has spent more than 15 successful years of dynamic development in the MSP area, having implemented 150 + projects for national-wide companies at Ukrainian market as well as outsourced projects for clients from USA and Western Europe.<br />The main customers are large geographically distributed enterprises: banks, retails, industrial enterprises (BNP Paribas Group, GlobalLogic, Volksbank, Kraft, ArcelorMittal, UniCredit Bank and others).<br />Technical expertise and skills of VERNA team are proven by certificates and partnership statuses with Cisco, Microsoft, HP, IBM, APC, Oracle, VMware, Citrix, Intel, Dell, Siemens, Systemax, etc.<br />VERNA specializes in planning, implementation and support of the following solutions:<br />- Virtualization (VMware,Hyper-V, Citrix, Dockers)<br />- Infrastructure (MS Active Directory, Office 365, Azure, AWS amazon)<br />- VoIP (Cisco, asterisk/FreePBX/Elastix)<br />- Unified Communications (Webex, Big Blue Button, Lync, Exchange, SharePoint)<br />- Networking (Cisco, FortiNet, OpenVPN, CheckPoint)<br />- Server & Storage (SAN, NAS, FAS)<br />- Business applications and databases (Microsoft, Oracle, IBM)<br />- VDI and terminal access solutions (Microsoft, VMware, Citrix)<br />- Storage virtualization (DataCore)<br />- DLP and Information Security (Antivirus systems, websence, Fortinet, DeviceLock e t.c.)<br />Source: https://www.linkedin.com/company/verna","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":205,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":41,"vendorImplementationsCount":0,"vendorPartnersCount":9,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.verna.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"VERNA","keywords":"solutions, infrastructure, providing, distributed, geographically, with, core, services","description":"VERNA is one of the leading IT Integrators, specializing in design, implementation and support of technical solutions, aimed to improve the efficiency of corporate IT systems, - both on-site and on a remote basis. <br />VERNA has spent more than 15 successful ","og:title":"VERNA","og:description":"VERNA is one of the leading IT Integrators, specializing in design, implementation and support of technical solutions, aimed to improve the efficiency of corporate IT systems, - both on-site and on a remote basis. <br />VERNA has spent more than 15 successful ","og:image":"https://old.roi4cio.com/uploads/roi/company/VERNA.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":1439,"logo":false,"scheme":false,"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","vendorVerified":0,"rating":"2.00","implementationsCount":5,"suppliersCount":0,"alias":"cisco-asa-ngfw-adaptive-security-appliance-software","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.\r\n<span style=\"font-weight: bold;\">Among its benefits, Cisco ASA Software:</span>\r\n<ul>\r\n<li>Offers integrated IPS, VPN, and Unified Communications capabilities</li>\r\n<li>Helps organizations increase capacity and improve performance through high-performance, multi-site, multi-node clustering</li>\r\n<li>Delivers high availability for high resiliency applications</li>\r\n<li>Provides collaboration between physical and virtual devices</li>\r\n<li>Meets the unique needs of both the network and the data center</li>\r\n<li>Provides context awareness with Cisco TrustSec security group tags and identity-based firewall technology</li>\r\n<li>Facilitates dynamic routing and site-to-site VPN on a per-context basis</li>\r\n</ul>\r\nCisco ASA software also supports next-generation encryption standards, including the Suite B set of cryptographic algorithms. It also integrates with the Cisco Cloud Web Security solution to provide world-class, web-based threat protection.","shortDescription":"The Cisco ASA Family of security devices protects corporate networks and data centers of all sizes. It provides users with highly secure access to data and network resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","keywords":"","description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form fa","og:title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","og:description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form fa"},"eventUrl":"","translationId":1440,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":397,"title":"Insufficient risk management"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":370,"title":"No automated business processes"}]}},"categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.verna.ua/projects/seti-i-telekommunikatsii/item/1160-povyshenie-bezopasnosti-i-nadezhnosti-korporativnoj-seti-za-schet-modernizatsii-yadra-setevoj-infrastruktury-kompanii","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"cisco-asa-ngfw-for-national-water-company":{"id":439,"title":"Cisco ASA NGFW for National Water Company","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Challenges</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Needed to protect nation’s critical infrastructure</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Lacked centralized visibility across its more than 100 locations</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Needed to deliver secure, reliable services to millions of customers </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Network Solution</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Next-generation firewall technology</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Advanced network visibility and security analytics</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Industry-leading email security with malware protection</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Results</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Dramatically reduced network blind spots</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Accelerated incident detection and response</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Enhanced IT and security team efficiency, saving time and costs </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Product List</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Security</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco ASA 5525-X and 5545-X with FirePOWER™ Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco Stealthwatch</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco Email Security Appliance C380 with AMP</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco Content Security Management Appliance M380</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco FireSIGHT® Management Center </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Challenges</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The National Water Company (NWC) of Saudi Arabia is a government-owned utility provider established to deliver exceptional water and wastewater treatment services in accordance with global best practices. NWC specializes in providing high-quality drinking water to the citizens of Saudi Arabia, as well as ensuring the presence of water and wastewater connections in all households, and preserving natural water resources and the environment. NWC prides itself on providing services that are innovative, efficient, reliable, and environmentally and financially sustainable. The water utility operates across four major cities in Saudi Arabia, and has between 7000 and 8000 employees, as well as an equal number of contractors. To be a world class water utility, NWC knew that a strong, secure network would be critical for its success. The company also plays an important role in ensuring that Saudi Arabia’s critical infrastructure is protected from every angle.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Network Solution</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">NWC’s first exposure to Cisco® Security was with the Cisco Adaptive Security Appliance (ASA), which NWC inherited at each of its 100-plus branch offices from the Saudi Arabian government when the company was formed in 2010. NWC also uses a full suite of Cisco routers and switches at both its branch offices and headquarters. </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Today, that infrastructure is being used to support and help enable a comprehensive security platform that protects more than 15,000 devices. It includes Cisco NextGeneration Firewalls, Advanced Malware Protection (AMP), the Cisco Email Security Appliance, and the Cisco Stealthwatch™ solution for network visibility and security analytics. NWC’s initial implementation of the Cisco ASA has evolved into NextGeneration Firewall protection complete with FirePOWER™ Services for multilayered threat defense across all of its branch networks.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Using the Cisco ASA 5525-X and 5545-X with FirePOWER Services, NWC is able to combine advanced, threat-focused firewall technology with value-added features, including malware protection, URL filtering, next-generation intrusion prevention, and application visibility and control, all from a single appliance. This eliminates the cost and complexity of buying and managing multiple solutions, and helps reduce blind spots caused by disjointed, piecemeal security solutions.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Extended Network Visibility</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">To build on the perimeter security provided by the Adaptive Security Appliance, NWC turned to Cisco Stealthwatch to obtain much-needed visibility across the extended network – including at the network core and edge, and in the data center, branch, and cloud. NWC selected Stealthwatch for its ability to collect flow data and provide insight into all network traffic across each of its locations.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">In addition to its ability to scale and collect massive volumes of data, NWC also embraced Stealthwatch for its quick analysis of network traffic, and because it can automatically prioritize potential issues for its IT staff.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“When we were evaluating NetFlow analysis solutions, there was no one competitor to Stealthwatch that was comprehensive, fast, and efficient,” says NWC’s Senior IT Manager Hakem S. Al Sagri. “We would have had to purchase three or four different solutions to get all of the features and performance of Stealthwatch. It gives us a very good indication of what’s going on in the network.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Some of the specific features that led NWC to select Stealthwatch include its indepth traffic monitoring and mapping, and the ability to detect both known and unknown threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Advanced Email Security</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">NWC rounds out its security platform with the Cisco Email Security Appliance for protection against email-based attacks, including spam, viruses, and phishing. NWC appreciates the Email Security Appliance, one of the top products in the industry, for its value-added Advanced Malware Protection solution. NWC also likes the ability to control all of its email appliances (including in the branches) through a single management console, instead of having to go to multiple boxes.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Results</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Cisco Stealthwatch</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">With Cisco Security, NWC operates a safer environment for supporting its thousands of employees and better serving its customers. In addition to providing early warnings for a wide range of attacks such as malware and DDoS attempts, Stealthwatch has also helped NWC with concerns over network and application slowdowns. </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">In the past, NWC would spend days investigating network and security issues, and it would be difficult to determine which team was responsible. Now, the IT teams can quickly determine the cause of the issue and remediate it within just minutes. “Without Stealthwatch, you’re blind,” says Al Sagri. “You don’t have a view of what’s going on in your network, and you don’t know what’s happening. Stealthwatch makes you see things better and makes you more proactive in isolating incidents.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">It gives the security operations center (SOC) team more insight so that, before anything even happens, they know what’s going on.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Next-Generation Firewalls</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“The beauty of the Cisco Next-Generation Firewall is the Layer 7 visibility,” says NWC Network and Security Manager Majed A. Alodaib. He explains that NWC’s IT team can easily see into the application layer and set and manage policies for various programs, saving the team both time and operational costs.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Al Sagri adds that the Next-Generation Firewall “simply makes life easier.” He says the Cisco FireSIGHT® Management Center makes the technology simple and easy to manage.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Email Security with AMP</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Regarding the Cisco Email Security Appliance, Alodaib says he appreciates the ability to create very specific, granular email policies with it, and pointed out that this is not possible with competitive products. NWC also finds that many malicious emails are blocked each month based on the AMP add-on feature, another valuable capability that was not available with NWC’s previous email security solution.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“The security stakes are high for National Water Company,” said Mohammad Alabsi, Cisco Enterprise Country Manager. “They cannot afford to suffer from major incidents. Cisco gives them a comprehensive, integrated solution for effectively detecting and stopping a wide range of attacks before they lead to large-scale issues.” </span>\r\n","alias":"cisco-asa-ngfw-for-national-water-company","roi":0,"seo":{"title":"Cisco ASA NGFW for National Water Company","keywords":"Cisco, with, Security, that, security, network, Stealthwatch, Appliance","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Challenges</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Needed to protect nation’s critical in","og:title":"Cisco ASA NGFW for National Water Company","og:description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Business Challenges</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Needed to protect nation’s critical in"},"deal_info":"","user":{"id":4203,"title":"National Water Company (NWC)","logoURL":"https://old.roi4cio.com/uploads/roi/company/National_Water_Company__NWC_.png","alias":"national-water-company-nwc","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The National Water Company (NWC), a Saudi joint stock company fully owned by the government (namely the Public Investment Fund), was established to provide water and wastewater treatment services in accordance with the latest international standards. This is achieved by the concerted efforts of national cadres in partnership with carefully selected international operators through foreign PPP.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">NWC specializes in providing the highest quality drinking water, ensuring the presence of water and wastewater connections in all households, preserving natural water resources and the environment, using the Treated Sewage Effluent (TSE) with maximum efficiency, and training qualified Saudi employees in accordance with the latest international standards.</span>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.nwc.com.sa/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"National Water Company (NWC)","keywords":"water, with, international, wastewater, accordance, latest, standards, National","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The National Water Company (NWC), a Saudi joint stock company fully owned by the government (namely the Public Investment Fund), was established to provide water and wa","og:title":"National Water Company (NWC)","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The National Water Company (NWC), a Saudi joint stock company fully owned by the government (namely the Public Investment Fund), was established to provide water and wa","og:image":"https://old.roi4cio.com/uploads/roi/company/National_Water_Company__NWC_.png"},"eventUrl":""},"supplier":{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":1439,"logo":false,"scheme":false,"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","vendorVerified":0,"rating":"2.00","implementationsCount":5,"suppliersCount":0,"alias":"cisco-asa-ngfw-adaptive-security-appliance-software","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.\r\n<span style=\"font-weight: bold;\">Among its benefits, Cisco ASA Software:</span>\r\n<ul>\r\n<li>Offers integrated IPS, VPN, and Unified Communications capabilities</li>\r\n<li>Helps organizations increase capacity and improve performance through high-performance, multi-site, multi-node clustering</li>\r\n<li>Delivers high availability for high resiliency applications</li>\r\n<li>Provides collaboration between physical and virtual devices</li>\r\n<li>Meets the unique needs of both the network and the data center</li>\r\n<li>Provides context awareness with Cisco TrustSec security group tags and identity-based firewall technology</li>\r\n<li>Facilitates dynamic routing and site-to-site VPN on a per-context basis</li>\r\n</ul>\r\nCisco ASA software also supports next-generation encryption standards, including the Suite B set of cryptographic algorithms. It also integrates with the Cisco Cloud Web Security solution to provide world-class, web-based threat protection.","shortDescription":"The Cisco ASA Family of security devices protects corporate networks and data centers of all sizes. It provides users with highly secure access to data and network resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","keywords":"","description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form fa","og:title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","og:description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form fa"},"eventUrl":"","translationId":1440,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":4,"title":"Reduce Costs"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":385,"title":"Risk of data loss or damage"},{"id":384,"title":"Risk of attacks by hackers"}]}},"categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.cisco.com/c/dam/en/us/products/collateral/security/stealthwatch/case-study-c36-738712.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"cisco-asa-ngfw-for-rio-summer-olympics-2016":{"id":438,"title":"Cisco ASA NGFW for Rio Summer Olympics 2016","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">All roads to the Olympics start with a dream. For the over 15,000 Olympic and Paralympic athletes from 205 countries who congregated in Rio de Janeiro in 2016, it’s the dream of competing at the highest level possible. It’s also about standing on the podium wearing a gold medal while their country’s flag rises and the national anthem plays. For Cisco, as a proud supporter of the 2016 Olympic and Paralympic Games in Rio, it also starts with a dream: that when we securely connect everything,</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">anything is possible.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Supporting a global event of this size is a monumental task that demands a network like no other. The Rio 2016 Games required connectivity, bandwidth, security, and support for:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 37 competition venues</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• More than 100 support venues</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 15,000 athletes</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 70,000 volunteers</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 9 million ticketholders</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 25,000 media personnel</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• 123 network broadcasters from around the world</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">All this while delivering 170,000 hours of video content and providing infrastructure for 5 billion TV viewers – up from 4 billion viewers for the London Olympics in 2012.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">In short, if this network were competing in the Olympics, it would break world records.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">However, simply providing the infrastructure wasn’t enough. Cisco also had to provide effective security.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“The challenge we faced at Rio 2016 was making memorable Games, and one crucial aspect was to provide uninterrupted connectivity to our athletes, guests, media, and critical systems, all while keeping everything secure,” said Marcelo</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">Souza, Technology Systems General Manager of the Rio 2016 Organizing Committee for the Olympic Games. “We needed a vendor that could handle the traffic demands in a complex environment and deliver the security needed for such a monumental event.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Comparisons don’t come easy when we talk about a world stage event such as the Olympic Games. Securely connecting the Games required 60 tons of equipment and more than 60,000 hours of work. As the official networking and enterprise server supporter and supplier, Cisco deployed over 5,000 access points (a 400 percent increase from the London 2012 Games) and over 113,000 local area network (LAN) ports. Cisco also supplied 440 Cisco Unified Computing System™ (Cisco UCS®) servers, 480 vehicle routers, and 177 security devices. IIn addition, the Cisco network protected core activities such as accreditation, volunteers, sports entries and qualifications, and workforce management.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The network connected 183,044 unique devices of which 168,158 were wireless (92 percent of all devices). Cisco Identity Services Engine (ISE) and Cisco TrustSec technology were used to identify devices and segment accordingly. Any unrecognized device would connect to the guest network. Network traffic was extremely heavy – 2.144 petabytes of traffic over the course of the Games. To put that into perspective, it’s equivalent to 950,000 hours of HD video, which would take more than 110 years of nonstop streaming to watch.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">As a highly visible target for sophisticated threats from around the world, the Rio 2016 Games demanded a security architecture that is fundamentally integrated into the network. Cisco Talos, an industry-leading threat intelligence organization, reviewed the sheer number of threats mitigated on the network. During the first two weeks of the Games, there were 674 times the number of Trojans detected on the network compared to a typical large retail corporate environment during the same time.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“The network had to handle a substantially larger number of BYOD (Bring Your Own Device) technology than you would commonly see in a corporate environment. A larger percentage of these devices were infected with Trojans and various other malware families. This goes to show how important it is to have proper checks in place for corporate devices from both an external and internal network perspective,” said JJ Cummings of Cisco Talos.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">As the first line of defense, Cisco Umbrella (formerly OpenDNS) was deployed to prevent access to malicious sites. Umbrella found and blocked hundreds of Olympic-related fake domains. Over the course of the Rio 2016 Games, it protected on average 22 million DNS requests and blocked 23,000 suspicious sites daily.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">At the network edge, Cisco Firepower Next- Generation Firewall and NextGeneration Intrusion Prevention System appliances prevented close to 7 million security events during the Games. On the network, millions of devices were monitored for anomalous activity through Cisco Stealthwatch, and potentially vulnerable endpoints were identified and automatically segmented away from the rest of the network using Cisco ISE and Cisco TrustSec technology.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“The result was an amazing experience for everyone in Rio. Cisco provided us with the connectivity and security that allowed Rio 2016 to connect with the world,” remarked Souza.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">In a span of just 40 days, Cisco successfully secured and connected key networks that made the Olympic and Paralympic Games a resounding success. From London to Rio, to Tokyo and beyond, there has never been a better time to build an Olympic legacy.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Products and Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco ASA 5500-X with FirePOWER Services</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco FirePOWER Services in use:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cisco Advanced Malware Protection (AMP) for Networks</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• URL filtering</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Application Visibility and Control (AVC)</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Next-Generation IPS</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco FirePOWER Next-Generation Intrusion Prevention System</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Security Manager</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Identity Services Engine</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco TrustSec Technology</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Secure Access Control System</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Stealthwatch</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Umbrella</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Cisco Prime Network Registrar</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">At the Rio 2016 Olympic Games, Cisco:</span>\r\n<ul><li>Blocked an average of 23,000 suspicious sites daily using Cisco Umbrella</li><li>Delivered a secure network that handled over 2.144 PB of traffic</li><li>Provided secure access for attendees, staff, media, and athletes across 37 competition venues</li></ul>\r\n","alias":"cisco-asa-ngfw-for-rio-summer-olympics-2016","roi":0,"seo":{"title":"Cisco ASA NGFW for Rio Summer Olympics 2016","keywords":"Cisco, network, Games, 2016, that, from, were, Olympic","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">All roads to the Olympics start with a dream. For the over 15,000 Olympic and Paralympic athletes from 205 countries who congregated in Rio de Janeiro in 2016, it’s the drea","og:title":"Cisco ASA NGFW for Rio Summer Olympics 2016","og:description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">All roads to the Olympics start with a dream. For the over 15,000 Olympic and Paralympic athletes from 205 countries who congregated in Rio de Janeiro in 2016, it’s the drea"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":1439,"logo":false,"scheme":false,"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","vendorVerified":0,"rating":"2.00","implementationsCount":5,"suppliersCount":0,"alias":"cisco-asa-ngfw-adaptive-security-appliance-software","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.\r\n<span style=\"font-weight: bold;\">Among its benefits, Cisco ASA Software:</span>\r\n<ul>\r\n<li>Offers integrated IPS, VPN, and Unified Communications capabilities</li>\r\n<li>Helps organizations increase capacity and improve performance through high-performance, multi-site, multi-node clustering</li>\r\n<li>Delivers high availability for high resiliency applications</li>\r\n<li>Provides collaboration between physical and virtual devices</li>\r\n<li>Meets the unique needs of both the network and the data center</li>\r\n<li>Provides context awareness with Cisco TrustSec security group tags and identity-based firewall technology</li>\r\n<li>Facilitates dynamic routing and site-to-site VPN on a per-context basis</li>\r\n</ul>\r\nCisco ASA software also supports next-generation encryption standards, including the Suite B set of cryptographic algorithms. It also integrates with the Cisco Cloud Web Security solution to provide world-class, web-based threat protection.","shortDescription":"The Cisco ASA Family of security devices protects corporate networks and data centers of all sizes. It provides users with highly secure access to data and network resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","keywords":"","description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form fa","og:title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","og:description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form fa"},"eventUrl":"","translationId":1440,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":4,"title":"Reduce Costs"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unauthorized access to corporate IT systems and data"},{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":384,"title":"Risk of attacks by hackers"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":384,"title":"Risk of attacks by hackers"}]}},"categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.cisco.com/c/dam/en/us/products/collateral/security/rio-case-study.pdf","title":"-"}},"comments":[],"referencesCount":0},"cisco-asa-ngfw-for-university-data-center-and-disaster-recovery-sites":{"id":436,"title":"Cisco ASA NGFW for University Data Center and Disaster Recovery Sites","description":"When Victoria University of Wellington experiences an earthquake, it needs consistent security policies and simplified operations to protect data and maintain uptime. The university’s Information Technology Services team used Cisco firewall geo-clustering technology to build safeguards and security into its network and technology environment.\r\n<span style=\"font-weight: bold; \">Challenges</span>\r\n\r\n<ul><li>Link campus data center with mirrored disaster recovery site</li><li>Help ensure high availability of data centers in earthquake-prone region</li><li>Streamline operations, security policies, reduce IT costs to support academic community</li><li>University campus lobby</li></ul>\r\n<span style=\"font-weight: bold; \">Solutions</span>\r\n<ul><li>Cisco next-generation firewalls with geo-clustering paired with refreshed Cisco data center</li><li>Two business professionals talk on a park bench</li></ul>\r\n<span style=\"font-weight: bold;\">Products and Services</span>\r\n<span style=\"text-decoration-line: underline;\">Security</span>\r\n• Cisco ASA 5585-S40 Next Generation Firewalls\r\n<span style=\"text-decoration-line: underline;\">Data Center</span>\r\n• Cisco Nexus® 7000 9-Slot Switch\r\n• Cisco Nexus 5510 Switch\r\n• Cisco Nexus 5548UP Switch\r\n• Cisco Catalyst® 3750 Switch\r\n• Cisco Catalyst 2960 Series Switches\r\n<span style=\"text-decoration-line: underline;\">Routers</span>\r\n• Cisco ASR 9010 Router\r\n• Cisco ASR 9006 Router\r\n• Cisco ASR 1002 Router\r\n<span style=\"text-decoration-line: underline;\">Network Management</span>\r\n• Cisco 5508 Wireless Controllers\r\n<span style=\"font-weight: bold; \">Results</span>\r\n\r\n<ul><li>Helped enable consolidation of multisite data center policies that are easy to set up and use</li><li>Facilitated data center redundancy to ensure high availability in earthquake-prone area</li><li>Lowered cost of ownership by 20%</li></ul>\r\n<span style=\"font-style: italic; \">"With the geo-clustered configuration, the team was able to manage hundreds of applications all in-house, and easily share security policies." - Simon Warren, Senior Networking Engineer, Victoria University of Wellington</span>\r\n\r\n","alias":"cisco-asa-ngfw-for-university-data-center-and-disaster-recovery-sites","roi":0,"seo":{"title":"Cisco ASA NGFW for University Data Center and Disaster Recovery Sites","keywords":"Cisco, data, Switch, policies, security, center, with, University","description":"When Victoria University of Wellington experiences an earthquake, it needs consistent security policies and simplified operations to protect data and maintain uptime. The university’s Information Technology Services team used Cisco firewall geo-clustering tech","og:title":"Cisco ASA NGFW for University Data Center and Disaster Recovery Sites","og:description":"When Victoria University of Wellington experiences an earthquake, it needs consistent security policies and simplified operations to protect data and maintain uptime. The university’s Information Technology Services team used Cisco firewall geo-clustering tech"},"deal_info":"","user":{"id":4202,"title":"Victoria University","logoURL":"https://old.roi4cio.com/uploads/roi/company/Victoria_University.png","alias":"victoria-university","address":"","roles":[],"description":"Victoria University is one of New Zealand’s oldest and most prestigious tertiary institutions with a proud tradition of academic excellence. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.victoria.ac.nz/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Victoria University","keywords":"Victoria, University, excellence, academic, tradition, proud, with, institutions","description":"Victoria University is one of New Zealand’s oldest and most prestigious tertiary institutions with a proud tradition of academic excellence. ","og:title":"Victoria University","og:description":"Victoria University is one of New Zealand’s oldest and most prestigious tertiary institutions with a proud tradition of academic excellence. ","og:image":"https://old.roi4cio.com/uploads/roi/company/Victoria_University.png"},"eventUrl":""},"supplier":{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":1439,"logo":false,"scheme":false,"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","vendorVerified":0,"rating":"2.00","implementationsCount":5,"suppliersCount":0,"alias":"cisco-asa-ngfw-adaptive-security-appliance-software","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.\r\n<span style=\"font-weight: bold;\">Among its benefits, Cisco ASA Software:</span>\r\n<ul>\r\n<li>Offers integrated IPS, VPN, and Unified Communications capabilities</li>\r\n<li>Helps organizations increase capacity and improve performance through high-performance, multi-site, multi-node clustering</li>\r\n<li>Delivers high availability for high resiliency applications</li>\r\n<li>Provides collaboration between physical and virtual devices</li>\r\n<li>Meets the unique needs of both the network and the data center</li>\r\n<li>Provides context awareness with Cisco TrustSec security group tags and identity-based firewall technology</li>\r\n<li>Facilitates dynamic routing and site-to-site VPN on a per-context basis</li>\r\n</ul>\r\nCisco ASA software also supports next-generation encryption standards, including the Suite B set of cryptographic algorithms. It also integrates with the Cisco Cloud Web Security solution to provide world-class, web-based threat protection.","shortDescription":"The Cisco ASA Family of security devices protects corporate networks and data centers of all sizes. It provides users with highly secure access to data and network resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","keywords":"","description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form fa","og:title":"Cisco ASA NGFW (Adaptive Security Appliance Software)","og:description":"<span style=\"font-weight: bold;\">Features and Capabilities</span>\r\nCisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form fa"},"eventUrl":"","translationId":1440,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.cisco.com/c/en/us/about/case-studies-customer-success-stories/victoria-university.html?dtid=osscdc000283","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}},"aliases":{"1":["cisco-asa-ngfw-for-a-sporting-goods-chain-security-effectiveness-and-saving-costs","cisco-asa-ngfw-for-insurance-company","cisco-asa-ngfw-for-national-water-company","cisco-asa-ngfw-for-rio-summer-olympics-2016","cisco-asa-ngfw-for-university-data-center-and-disaster-recovery-sites"]},"links":{"first":"http://apis.roi4cio.com/api/implementations?page=1","last":"http://apis.roi4cio.com/api/implementations?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://apis.roi4cio.com/api/implementations","per_page":20,"to":5,"total":5},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}