{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementations":{"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"more":{"_type":"localeString","en":"Learn more","ru":"Узнать больше"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"от Я до А"},"sort-rating-asc":{"_type":"localeString","en":"Rating ascending","ru":"По возрастанию рейтинга"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"_type":"localeString","en":"Rebate ascending","ru":"По возрастанию скидки"},"sort-discount-desc":{"en":"Rebate descending","ru":"По убыванию скидки","_type":"localeString"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"product":{"ru":"Продукт","_type":"localeString","en":"Product"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"with-reference":{"en":"With reference","ru":"С референсом","_type":"localeString"},"items-found":{"ru":"Внедрений найдено","_type":"localeString","en":"Deployments found"},"canceled":{"_type":"localeString","en":"Canceled","ru":"Отменено"},"deal-canceled":{"_type":"localeString","en":"Deal canceled","ru":"Сделка отменена"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"_type":"localeString","en":"Finished","ru":"Завершено"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"_type":"localeString","en":"Planned","ru":"Планируется"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"date":{"en":"Deployment date","ru":"Дата внедрения","_type":"localeString"},"roi":{"en":"ROI","ru":"ROI","_type":"localeString"},"implementations-fetching-error":{"en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}},"filters":{"from":{"en":"from","ru":"от","_type":"localeString"},"to":{"en":"to","ru":"до","_type":"localeString"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"category":{"en":"Category","ru":"Категория","_type":"localeString"},"follow":{"_type":"localeString","en":"Follow","ru":"Следить"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"_type":"localeString","en":"Delivery type","ru":"Тип поставки"},"product-categories-field":{"_type":"localeString","en":"product categories","ru":"категориz продуктаhjle"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"problems-field":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"with-discounts-checkbox":{"en":"With discounts","ru":"Со скидками","_type":"localeString"},"expert-price-checkbox":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"_type":"localeString","en":"Show all","ru":"Показать все"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"_type":"localeString","en":"With deployments","ru":"С внедрениями"},"bonus-4-reference":{"_type":"localeString","en":"Bonus 4 Reference","ru":"Бонус за референс"},"product-categories":{"_type":"localeString","en":"Product Categories","ru":"Категории продуктов"},"countries":{"_type":"localeString","en":"Countries","ru":"Страны"},"seller":{"ru":"Продавец","_type":"localeString","en":"Seller"},"vendors":{"_type":"localeString","en":"User products vendors","ru":"Производители продуктов пользователя"},"suppliers":{"en":"User suppliers","ru":"Поставщики пользователя","_type":"localeString"},"business-process":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"business-objectives":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"branch":{"_type":"localeString","en":" Branch","ru":"Отрасль"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"ru":"С референсами","_type":"localeString","en":"With reference"},"show-deal-checkbox":{"_type":"localeString","en":"Show deal with noname","ru":"Показывать сделки с noname"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"en":"Company size","ru":"Размер компании","_type":"localeString"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"en":"From A to Z","ru":"От А до Я","_type":"localeString"},"sort-title-desc":{"en":"From Z to A","ru":"От Я до А","_type":"localeString"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"_type":"localeString","en":"With comments","ru":"С комментариями"},"supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"user":{"en":"User","ru":"Пользователь","_type":"localeString"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"_type":"localeString","en":"Customers","ru":"Покупатели"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"en":"Canceled","ru":"Отменено","_type":"localeString"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"en":"Deal closed","ru":"Сделка закрыта","_type":"localeString"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"implementations":"success","filters":"success"},"sections":{"implementations-text-block":{"body":{"_type":"localeBlock","en":[{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference.","_key":"0e40f9075bd00"}],"_type":"block","style":"normal","_key":"0e40f9075bd0"}],"ru":[{"markDefs":[],"children":[{"marks":[],"text":"Каталог внедрений ROI4CIO - это база данных о внедрениях программного обеспечения, оборудования и ИТ-услуг. Находите внедрения по вендору, поставщику, пользователю, бизнес-задачам, проблемам, статусу, фильтруйте по наличию ROI и референса.","_key":"1435aa0421110","_type":"span"}],"_type":"block","style":"normal","_key":"1435aa042111"}]},"label":"catalog-implementations-text-block"}},"sectionsStatus":{"implementations-text-block":"success"},"pageMetaData":{"implementations":{"translatable_meta":[{"name":"og:title","translations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"}},{"name":"og:description","translations":{"ru":"Каталог внедрений различных видов программного обеспечения, ИТ проектов. Результаты внедрений ИТ, результаты, референсы, ROI","_type":"localeString","en":"Implementations"}},{"translations":{"ru":"Внедрения","_type":"localeString","en":"Implementations"},"name":"title"},{"name":"description","translations":{"en":"Implementations description","ru":"Описание внедрений","_type":"localeString"}},{"name":"keywords","translations":{"en":"Implementations keywords","ru":"Внедрения ключевые слова","_type":"localeString"}}],"title":{"en":"ROI4CIO: Implementations","ru":"ROI4CIO: Внедрения","_type":"localeString"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"implementations":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"citrix-adc-for-a-large-ukrainian-e-commerce-company":{"id":1091,"title":"Citrix ADC for a large Ukrainian e-commerce company","description":"<span style=\"font-style: italic;\">Description is not ready yet</span>","alias":"citrix-adc-for-a-large-ukrainian-e-commerce-company","roi":0,"seo":{"title":"Citrix ADC for a large Ukrainian e-commerce company","keywords":"","description":"<span style=\"font-style: italic;\">Description is not ready yet</span>","og:title":"Citrix ADC for a large Ukrainian e-commerce company","og:description":"<span style=\"font-style: italic;\">Description is not ready yet</span>"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":262,"title":"Softprom (supplier)","logoURL":"https://old.roi4cio.com/uploads/roi/company/SOFTPROM_blue_on_white_01.png","alias":"softprom-supplier","address":"","roles":[],"description":"<span style=\"font-weight: bold;\">Softprom</span> is a leading Value Added IT Distributor in the CIS and Eastern Europe markets which is trusted by more than 1200 partners. The company was founded in 1999 and today is represented in more than 30 countries.\r\n<span style=\"font-weight: bold;\">Softprom</span> provides professional services for testing, training, installation, implementation and technical support of IT solutions in IT Security, IT Infrastructure, Cloud Services, CAD and Graphic Design, Video Security.\r\nRead more: softprom.com","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":66,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":21,"vendorImplementationsCount":0,"vendorPartnersCount":13,"supplierPartnersCount":1,"b4r":1,"categories":{},"companyUrl":"https://softprom.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Softprom (supplier)","keywords":"Softprom, trust, company, services, customers, vendors, solutions, software","description":"<span style=\"font-weight: bold;\">Softprom</span> is a leading Value Added IT Distributor in the CIS and Eastern Europe markets which is trusted by more than 1200 partners. The company was founded in 1999 and today is represented in more than 30 countries.\r\n<sp","og:title":"Softprom (supplier)","og:description":"<span style=\"font-weight: bold;\">Softprom</span> is a leading Value Added IT Distributor in the CIS and Eastern Europe markets which is trusted by more than 1200 partners. The company was founded in 1999 and today is represented in more than 30 countries.\r\n<sp","og:image":"https://old.roi4cio.com/uploads/roi/company/SOFTPROM_blue_on_white_01.png"},"eventUrl":""},"vendors":[{"id":182,"title":"Citrix","logoURL":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png","alias":"citrix","address":"","roles":[],"description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that Citrix received from Microsoft. The use of its own optimized ICA data transfer protocol allowed Citrix to successfully compete in the market with other powerful players. The company's flagship product is Citrix Presentation Server (now XenApp).<br /><br />In addition, the company offers a range of solutions for working with clouds and deploying virtual desktop infrastructures (VDI):<br /><br />Citrix Endpoint Management is a single end-to-end solution for managing mobile devices and applications for consistent productivity.<br /><br />Citrix Workspace is a platform for bringing all applications and data together in a secure, unified and personalized workspace\r\n<br />Citrix Cloud is a suite of cloud services that simplifies deployment and management of Citrix technologies, allowing you to extend existing software landscapes.<br /><br />Citrix also offers software tools for working with hybrid and multicloud environments.<br /><br />In 2005, Citrix acquired NetScaler, a networking company and also a hardware vendor. In 2007, the company acquired XenSource, a virtualization developer based on Xen, an open source hypervisor. Hundreds of thousands of customers worldwide use Citrix solutions. The company currently employs about 8,500 employees. Citrix is headquartered in Fort Lauderdale, Florida, USA. ","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"https://www.citrix.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Citrix","keywords":"company, Citrix, with, Microsoft, remote, 1995, software, partnership","description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:title":"Citrix","og:description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:image":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png"},"eventUrl":""}],"products":[{"id":3132,"logo":false,"scheme":false,"title":"Citrix ADC (Application Delivery Controller)","vendorVerified":0,"rating":"2.80","implementationsCount":4,"suppliersCount":0,"alias":"citrix-adc-application-delivery-controller","companyTypes":[],"description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Application delivery controllers are purpose-built networking appliances whose function is to improve the performance, security and resiliency of applications delivered over the web.</span></p>\r\n<p>Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for your web, traditional, and cloud-native applications regardless of where they are hosted. It comes in a wide variety of form factors and deployment options without locking you into a single cloud. Pooled capacity licensing enables the movement of capacity among cloud deployments.</p>\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">The main features of Citrix ADC:</span></p>\r\n<ul>\r\n<li>Provides industry-leading app delivery and load balancing</li>\r\n</ul>\r\n<ul>\r\n<li>Fully integrates with Cisco ACI; endorsed as a Cisco ACE replacement</li>\r\n</ul>\r\n<ul>\r\n<li>Offers the most comprehensive set of ADC features in the ACI ecosystem</li>\r\n</ul>\r\n<ul>\r\n<li>Enables automation and orchestration of network-critical services to boost agility</li>\r\n</ul>","shortDescription":"Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for web, traditional, and cloud-native applications regardless of where they are hosted.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix ADC (Application Delivery Controller)","keywords":"","description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Applicat","og:title":"Citrix ADC (Application Delivery Controller)","og:description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Applicat"},"eventUrl":"","translationId":3135,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":7,"title":"Improve Customer Service"},{"id":252,"title":"Increase Customer Base"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":400,"title":"High costs"},{"id":373,"title":"IT infrastructure does not meet business tasks"},{"id":340,"title":"Low quality of customer service"}]}},"categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"citrix-adc-for-gas-and-electric-company":{"id":676,"title":"Citrix ADC for gas and electric company","description":"A paperless model won’t work if digital connections aren’t always available and secure. With its NetScaler solution, the LG&E and KU operations team can fully support the LG&E and KU corporate commitment to digital transformation. NetScaler appliances can also help the team drive even more paperless processes that help reduce errors, deliver greater time savings, and help maintain and improve compliance. Employees are empowered, and customers are more satisfied, by having consistent service and a faster return to service when outages occur. “We believe doing it electronically instead of on paper is better. And NetScaler helps us do it electronically,” says Bill Brumleve, System Administrator at LG&E and KU.\r\nCost savings and data-center consolidation\r\nWith the NetScaler SDX solution, cost savings come from more than just being paperless. Using the NetScaler SDX solution has allowed LG&E and KU to consolidate their data centers with fewer NetScaler appliances, which delivers significant cost savings. Consolidating to a single load-balancing vendor has also contributed to lower operational costs, as a result of decreased datacenter complexity and technical debt. The entire operation, with its 1.3 million customers, is now run using four NetScaler SDX 14030 appliances housed in two different data-center locations. And those NetScaler appliances are run on Intel Xeon processors, which contribute to outstanding performance in virtualized environments and high consolidation ratios.\r\nImproved user experience and IT productivity\r\nConsolidated load balancing with the NetScaler solution lets LG&E and KU deliver a better experience for field employees. It also has allowed LG&E and KU to improve field employee and IT productivity. Users can easily and reliably connect, and connections no longer fail as they occasionally had with the previous VPN solution. Users aren’t kept from getting their jobs done, and they don’t have to find time-consuming workarounds either. “Now, users get everything they need in a much easier way. The end user has a much smoother experience than before,” Brumleve says. With the NetScaler solution, the LG&E and KU IT team can focus on more strategic initiatives instead of managing application-access issues. “Better integration has helped make management of app delivery easier,” Brumleve says. \r\nWith the Intel Xeon processor E5 family powering its NetScaler solution, LG&E and KU optimizes performance based on workload demands at the server level. NetScaler appliances are optimized to squeeze the maximum capacity and support from Intel architecture and up to 55 MB of L3 cache on the Intel Xeon processor E5 v4 family. This lowers latency and accelerates performance, because it’s much faster for data to move through the L3 cache than through main system memory. By playing off of one another’s strengths, the Intel Xeon processor E5 v4 family and the NetScaler solution let Brumleve and his team move more data more quickly through the data center. ","alias":"citrix-adc-for-gas-and-electric-company","roi":0,"seo":{"title":"Citrix ADC for gas and electric company","keywords":"","description":"A paperless model won’t work if digital connections aren’t always available and secure. With its NetScaler solution, the LG&E and KU operations team can fully support the LG&E and KU corporate commitment to digital transformation. NetScaler appliances ","og:title":"Citrix ADC for gas and electric company","og:description":"A paperless model won’t work if digital connections aren’t always available and secure. With its NetScaler solution, the LG&E and KU operations team can fully support the LG&E and KU corporate commitment to digital transformation. NetScaler appliances "},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":182,"title":"Citrix","logoURL":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png","alias":"citrix","address":"","roles":[],"description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that Citrix received from Microsoft. The use of its own optimized ICA data transfer protocol allowed Citrix to successfully compete in the market with other powerful players. The company's flagship product is Citrix Presentation Server (now XenApp).<br /><br />In addition, the company offers a range of solutions for working with clouds and deploying virtual desktop infrastructures (VDI):<br /><br />Citrix Endpoint Management is a single end-to-end solution for managing mobile devices and applications for consistent productivity.<br /><br />Citrix Workspace is a platform for bringing all applications and data together in a secure, unified and personalized workspace\r\n<br />Citrix Cloud is a suite of cloud services that simplifies deployment and management of Citrix technologies, allowing you to extend existing software landscapes.<br /><br />Citrix also offers software tools for working with hybrid and multicloud environments.<br /><br />In 2005, Citrix acquired NetScaler, a networking company and also a hardware vendor. In 2007, the company acquired XenSource, a virtualization developer based on Xen, an open source hypervisor. Hundreds of thousands of customers worldwide use Citrix solutions. The company currently employs about 8,500 employees. Citrix is headquartered in Fort Lauderdale, Florida, USA. ","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"https://www.citrix.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Citrix","keywords":"company, Citrix, with, Microsoft, remote, 1995, software, partnership","description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:title":"Citrix","og:description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:image":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png"},"eventUrl":""},"vendors":[{"id":182,"title":"Citrix","logoURL":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png","alias":"citrix","address":"","roles":[],"description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that Citrix received from Microsoft. The use of its own optimized ICA data transfer protocol allowed Citrix to successfully compete in the market with other powerful players. The company's flagship product is Citrix Presentation Server (now XenApp).<br /><br />In addition, the company offers a range of solutions for working with clouds and deploying virtual desktop infrastructures (VDI):<br /><br />Citrix Endpoint Management is a single end-to-end solution for managing mobile devices and applications for consistent productivity.<br /><br />Citrix Workspace is a platform for bringing all applications and data together in a secure, unified and personalized workspace\r\n<br />Citrix Cloud is a suite of cloud services that simplifies deployment and management of Citrix technologies, allowing you to extend existing software landscapes.<br /><br />Citrix also offers software tools for working with hybrid and multicloud environments.<br /><br />In 2005, Citrix acquired NetScaler, a networking company and also a hardware vendor. In 2007, the company acquired XenSource, a virtualization developer based on Xen, an open source hypervisor. Hundreds of thousands of customers worldwide use Citrix solutions. The company currently employs about 8,500 employees. Citrix is headquartered in Fort Lauderdale, Florida, USA. ","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"https://www.citrix.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Citrix","keywords":"company, Citrix, with, Microsoft, remote, 1995, software, partnership","description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:title":"Citrix","og:description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:image":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png"},"eventUrl":""}],"products":[{"id":3132,"logo":false,"scheme":false,"title":"Citrix ADC (Application Delivery Controller)","vendorVerified":0,"rating":"2.80","implementationsCount":4,"suppliersCount":0,"alias":"citrix-adc-application-delivery-controller","companyTypes":[],"description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Application delivery controllers are purpose-built networking appliances whose function is to improve the performance, security and resiliency of applications delivered over the web.</span></p>\r\n<p>Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for your web, traditional, and cloud-native applications regardless of where they are hosted. It comes in a wide variety of form factors and deployment options without locking you into a single cloud. Pooled capacity licensing enables the movement of capacity among cloud deployments.</p>\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">The main features of Citrix ADC:</span></p>\r\n<ul>\r\n<li>Provides industry-leading app delivery and load balancing</li>\r\n</ul>\r\n<ul>\r\n<li>Fully integrates with Cisco ACI; endorsed as a Cisco ACE replacement</li>\r\n</ul>\r\n<ul>\r\n<li>Offers the most comprehensive set of ADC features in the ACI ecosystem</li>\r\n</ul>\r\n<ul>\r\n<li>Enables automation and orchestration of network-critical services to boost agility</li>\r\n</ul>","shortDescription":"Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for web, traditional, and cloud-native applications regardless of where they are hosted.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix ADC (Application Delivery Controller)","keywords":"","description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Applicat","og:title":"Citrix ADC (Application Delivery Controller)","og:description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Applicat"},"eventUrl":"","translationId":3135,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":348,"title":"No centralized control over IT systems"},{"id":375,"title":"No support for mobile and remote users"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.citrix.com/customers/louisville-gas-and-electric-company-and-kentucky-utilities-company.html","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"citrix-netscaler-mpx7500-enterprise-for-ukrainian-mobile-operator":{"id":976,"title":"Citrix NetScaler MPX7500 Enterprise for Ukrainian mobile operator","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"citrix-netscaler-mpx7500-enterprise-for-ukrainian-mobile-operator","roi":0,"seo":{"title":"Citrix NetScaler MPX7500 Enterprise for Ukrainian mobile operator","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Citrix NetScaler MPX7500 Enterprise for Ukrainian mobile operator","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":503,"title":"MTS Ukraine","logoURL":"https://old.roi4cio.com/uploads/roi/company/MTS_Ukraina.png","alias":"mts-ukraina","address":"","roles":[],"description":" The network of PrJSC MTS Ukraine covers more than 98% of the territory of Ukraine, where 99% of the population lives. The company serves more than 21.59 million subscribers. The company owns licenses for the provision of mobile (GSM-900/1800, CDMA-450 standard), fixed and international/long-distance communications, and also provides international roaming services on five continents. Revenues for 2013 amounted to 9.965 billion hryvnias.\r\nOJSC Mobile TeleSystems is the largest mobile operator in Eastern and Central Europe. The consolidated subscriber base of the company, excluding the MTS Belarus subscriber base, is more than 100 million subscribers. MTS and its subsidiaries provide GSM services in Armenia, Belarus, Russia, Ukraine and Turkmenistan; in the UMTS standard - in Russia, Armenia, Belarus; in CDMA-450 standard - in Ukraine, in LTE standard - in Russia and Armenia. The company also provides fixed-line and cable television services in Russia and Ukraine.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":5,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://company.mts.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"MTS Ukraine","keywords":"России, стандарте, услуги, Армении, связи, Украине, Компания, более","description":" The network of PrJSC MTS Ukraine covers more than 98% of the territory of Ukraine, where 99% of the population lives. The company serves more than 21.59 million subscribers. The company owns licenses for the provision of mobile (GSM-900/1800, CDMA-450 standar","og:title":"MTS Ukraine","og:description":" The network of PrJSC MTS Ukraine covers more than 98% of the territory of Ukraine, where 99% of the population lives. The company serves more than 21.59 million subscribers. The company owns licenses for the provision of mobile (GSM-900/1800, CDMA-450 standar","og:image":"https://old.roi4cio.com/uploads/roi/company/MTS_Ukraina.png"},"eventUrl":""},"supplier":{"id":6315,"title":"Sitronics Telecom Solutions Ukraine","logoURL":"https://old.roi4cio.com/uploads/roi/company/sitronics.png","alias":"sitronics","address":"Kyiv, Ukraine","roles":[],"description":"<span style=\"font-weight: bold;\">Sitronics Telecom Solutions Ukraine</span> is a national supplier of integrated technology solutions. For over 25 years it has been helping its corporate clients build IT environments and networks to improve business results, and optimize the cost and the speed of their implementation. Sitronics Telecom Solutions Ukraine is engaged in the search for advanced technologies, their in-depth study and provides Ukrainian companies with the most effective solutions based on the products of leading manufacturers. It has experience in consulting, integrating IT and network infrastructure, delivering software and hardware, project management, implementation services, integration, and technical support.\r\nSitronics Telecom Solutions Ukraine is a partner of numerous suppliers of software and hardware, has the highest partner status of all key vendors: Cisco Gold Certified Partner, Oracle Platinum Level, Microsoft Partner, HP Enterprise Gold Partner, Dell EMC Gold Solution Provider, Intel Gold Technology Provider, APC Elite Data Center Partner and many more.\r\nSitronics Telecom Solutions Ukraine offers specialized systems for designing, managing and controlling networks, databases and data warehouses, engineering solutions, as well as solutions for monitoring, analyzing and optimizing IT infrastructure for a large business with complex infrastructure. For small and medium enterprises, we supply turnkey solutions for building a basic IT infrastructure, including cloud and hybrid systems. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":133,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":11,"vendorImplementationsCount":0,"vendorPartnersCount":6,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.stsua.com/ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Sitronics Telecom Solutions Ukraine","keywords":"","description":"<span style=\"font-weight: bold;\">Sitronics Telecom Solutions Ukraine</span> is a national supplier of integrated technology solutions. For over 25 years it has been helping its corporate clients build IT environments and networks to improve business results, a","og:title":"Sitronics Telecom Solutions Ukraine","og:description":"<span style=\"font-weight: bold;\">Sitronics Telecom Solutions Ukraine</span> is a national supplier of integrated technology solutions. For over 25 years it has been helping its corporate clients build IT environments and networks to improve business results, a","og:image":"https://old.roi4cio.com/uploads/roi/company/sitronics.png"},"eventUrl":""},"vendors":[{"id":182,"title":"Citrix","logoURL":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png","alias":"citrix","address":"","roles":[],"description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that Citrix received from Microsoft. The use of its own optimized ICA data transfer protocol allowed Citrix to successfully compete in the market with other powerful players. The company's flagship product is Citrix Presentation Server (now XenApp).<br /><br />In addition, the company offers a range of solutions for working with clouds and deploying virtual desktop infrastructures (VDI):<br /><br />Citrix Endpoint Management is a single end-to-end solution for managing mobile devices and applications for consistent productivity.<br /><br />Citrix Workspace is a platform for bringing all applications and data together in a secure, unified and personalized workspace\r\n<br />Citrix Cloud is a suite of cloud services that simplifies deployment and management of Citrix technologies, allowing you to extend existing software landscapes.<br /><br />Citrix also offers software tools for working with hybrid and multicloud environments.<br /><br />In 2005, Citrix acquired NetScaler, a networking company and also a hardware vendor. In 2007, the company acquired XenSource, a virtualization developer based on Xen, an open source hypervisor. Hundreds of thousands of customers worldwide use Citrix solutions. The company currently employs about 8,500 employees. Citrix is headquartered in Fort Lauderdale, Florida, USA. ","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"https://www.citrix.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Citrix","keywords":"company, Citrix, with, Microsoft, remote, 1995, software, partnership","description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:title":"Citrix","og:description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:image":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png"},"eventUrl":""}],"products":[{"id":137,"logo":false,"scheme":false,"title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","vendorVerified":0,"rating":"2.40","implementationsCount":7,"suppliersCount":0,"alias":"citrix-virtual-apps-and-desktops-xenapp-and-xendesktop","companyTypes":[],"description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktops from any cloud—public, on-premises or hybrid—within a modern digital workspace.\r\n\r\n<span style=\"font-weight: bold; \">The main features of Citrix Virtual Apps and Desktops:</span>\r\n<ul><li>HDX technology for optimized user experience</li></ul>\r\n<ul><li>Virtual Windows, Linux and web applications</li></ul>\r\n<ul><li>Single management console for apps and desktops</li></ul>\r\n<ul><li>Centralized security in the data center</li></ul>\r\n<ul><li>FIPS and Common Criteria certified</li></ul>\r\n<ul><li>Single image provisioning technology </li></ul>\r\n<ul><li>VDI desktops</li></ul>\r\n<ul><li>Remote PC access</li></ul>\r\n\r\n<span style=\"font-weight: bold; \">Unifying editions across the Citrix product portfolio</span>\r\n<ul><li>Citrix is also unifying product editions across its portfolio – designating them Standard, Advanced, and Premium.</li></ul>\r\n<ul><li>XenApp Advanced edition now will map to Citrix Virtual Apps Standard edition</li></ul>\r\n<ul><li>XenApp Enterprise edition maps to Citrix Virtual Apps Advanced edition</li></ul>\r\n<ul><li>XenApp Platinum edition maps to Citrix Virtual Apps Premium edition</li></ul>\r\n<ul><li>XenDesktop VDI edition maps to Citrix Virtual Desktops Standard edition</li></ul>\r\n<ul><li>XenDesktop Enterprise edition maps to Citrix Virtual Apps and Desktops Advanced edition</li></ul>\r\n<ul><li>XenDesktop Platinum edition maps Citrix Virtual Apps and Desktops Premium edition</li></ul>\r\nView a detailed feature matrix","shortDescription":"Citrix Virtual Apps and Desktops are virtualization solutions that give IT control of virtual machines, applications, licensing, and security, while providing anywhere access for any device.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","keywords":"Single, desktops, data, technology, XenApp, apps, applications, Published","description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktop","og:title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","og:description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktop"},"eventUrl":"","translationId":138,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":299,"title":"Application and User Session Virtualization","alias":"application-and-user-session-virtualization","description":"Application virtualization is a technology that allows you to separate the software from the operating system on which it operates. Fully virtualized software is not installed in the traditional sense, although the end-user at first glance can not see it, because the virtualized software works just as normal. The software in the execution process works just as if it interacted with the operating system directly and with all its resources, but can be isolated or executed in a sandbox with different levels of restriction.\r\nModern operating systems, such as Microsoft Windows and Linux, can include limited software virtualization. For example, Windows 7 has Windows XP mode that allows you to run Windows XP software on Windows 7 without any changes.\r\nUser session virtualization is a newer version of desktop virtualization that works at the operating system level. While normal virtualization of the desktop allows an operating system to be run by virtualizing the hardware of the desktop, RDS and App-V allow for the virtualization of the applications. User session virtualization lies between the two.\r\nA desktop has an operating system loaded on the base hardware. This can be either physical or virtual. The user session virtualization keeps track of all changes to the operating system that a user might make by encapsulating the configuration changes and associating them to the user account. This allows the specific changes to be applied to the underlying operating system without actually changing it. This allows several users to have completely different operating system configurations applied to base operating system installation.\r\nIf you are in a distributed desktop environment and there are local file servers available at each location, you can deploy virtualized user sessions in the form of redirected folders and roaming profiles.","materialsDescription":" <span style=\"font-weight: bold;\">Understanding application virtualization</span>\r\nApplication virtualization technology isolates applications from the underlying operating system and from other applications to increase compatibility and manageability. This application virtualization technology enables applications to be streamed from a centralized location into an isolation environment on the target device where they will execute. The application files, configuration, and settings are copied to the target device and the application execution at run time is controlled by the application virtualization layer. When executed, the application run time believes that it is interfacing directly with the operating system when, in fact, it is interfacing with a virtualization environment that proxies all requests to the operating system.\r\n<span style=\"font-weight: bold;\">Understanding session virtualization</span>\r\nSession virtualization uses application streaming to deliver applications to hosting servers in the datacenter. The Application then connects the user to the server. The application then executes entirely on the server. The user interacts with the application remotely by sending mouse-clicks and keystrokes to the server. The server then responds by sending screen updates back to the user’s device. Whereas application virtualization is limited to Windows-based operating systems, session virtualization allows any user on any operating system to access any application delivered by IT. As a result, the application enables Windows, Mac, Linux, iOS and Android devices to run any applications using session virtualization. Furthermore, session virtualization leverages server-side processing power which liberates IT from the endless cycle of PC hardware refreshes which are typically needed to support application upgrades when using traditional application deployment methods.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Application_and_User_Session_Virtualization__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3132,"logo":false,"scheme":false,"title":"Citrix ADC (Application Delivery Controller)","vendorVerified":0,"rating":"2.80","implementationsCount":4,"suppliersCount":0,"alias":"citrix-adc-application-delivery-controller","companyTypes":[],"description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Application delivery controllers are purpose-built networking appliances whose function is to improve the performance, security and resiliency of applications delivered over the web.</span></p>\r\n<p>Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for your web, traditional, and cloud-native applications regardless of where they are hosted. It comes in a wide variety of form factors and deployment options without locking you into a single cloud. Pooled capacity licensing enables the movement of capacity among cloud deployments.</p>\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">The main features of Citrix ADC:</span></p>\r\n<ul>\r\n<li>Provides industry-leading app delivery and load balancing</li>\r\n</ul>\r\n<ul>\r\n<li>Fully integrates with Cisco ACI; endorsed as a Cisco ACE replacement</li>\r\n</ul>\r\n<ul>\r\n<li>Offers the most comprehensive set of ADC features in the ACI ecosystem</li>\r\n</ul>\r\n<ul>\r\n<li>Enables automation and orchestration of network-critical services to boost agility</li>\r\n</ul>","shortDescription":"Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for web, traditional, and cloud-native applications regardless of where they are hosted.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix ADC (Application Delivery Controller)","keywords":"","description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Applicat","og:title":"Citrix ADC (Application Delivery Controller)","og:description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Applicat"},"eventUrl":"","translationId":3135,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":397,"title":"Insufficient risk management"},{"id":393,"title":"Complex and non-transparent business processes"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":373,"title":"IT infrastructure does not meet business tasks"},{"id":400,"title":"High costs"},{"id":282,"title":"Unauthorized access to corporate IT systems and data"}]}},"categories":[{"id":299,"title":"Application and User Session Virtualization","alias":"application-and-user-session-virtualization","description":"Application virtualization is a technology that allows you to separate the software from the operating system on which it operates. Fully virtualized software is not installed in the traditional sense, although the end-user at first glance can not see it, because the virtualized software works just as normal. The software in the execution process works just as if it interacted with the operating system directly and with all its resources, but can be isolated or executed in a sandbox with different levels of restriction.\r\nModern operating systems, such as Microsoft Windows and Linux, can include limited software virtualization. For example, Windows 7 has Windows XP mode that allows you to run Windows XP software on Windows 7 without any changes.\r\nUser session virtualization is a newer version of desktop virtualization that works at the operating system level. While normal virtualization of the desktop allows an operating system to be run by virtualizing the hardware of the desktop, RDS and App-V allow for the virtualization of the applications. User session virtualization lies between the two.\r\nA desktop has an operating system loaded on the base hardware. This can be either physical or virtual. The user session virtualization keeps track of all changes to the operating system that a user might make by encapsulating the configuration changes and associating them to the user account. This allows the specific changes to be applied to the underlying operating system without actually changing it. This allows several users to have completely different operating system configurations applied to base operating system installation.\r\nIf you are in a distributed desktop environment and there are local file servers available at each location, you can deploy virtualized user sessions in the form of redirected folders and roaming profiles.","materialsDescription":" <span style=\"font-weight: bold;\">Understanding application virtualization</span>\r\nApplication virtualization technology isolates applications from the underlying operating system and from other applications to increase compatibility and manageability. This application virtualization technology enables applications to be streamed from a centralized location into an isolation environment on the target device where they will execute. The application files, configuration, and settings are copied to the target device and the application execution at run time is controlled by the application virtualization layer. When executed, the application run time believes that it is interfacing directly with the operating system when, in fact, it is interfacing with a virtualization environment that proxies all requests to the operating system.\r\n<span style=\"font-weight: bold;\">Understanding session virtualization</span>\r\nSession virtualization uses application streaming to deliver applications to hosting servers in the datacenter. The Application then connects the user to the server. The application then executes entirely on the server. The user interacts with the application remotely by sending mouse-clicks and keystrokes to the server. The server then responds by sending screen updates back to the user’s device. Whereas application virtualization is limited to Windows-based operating systems, session virtualization allows any user on any operating system to access any application delivered by IT. As a result, the application enables Windows, Mac, Linux, iOS and Android devices to run any applications using session virtualization. Furthermore, session virtualization leverages server-side processing power which liberates IT from the endless cycle of PC hardware refreshes which are typically needed to support application upgrades when using traditional application deployment methods.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Application_and_User_Session_Virtualization__1_.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://ko.com.ua/mts_ukraina_podklyuchaet_magaziny_k_oblakam_68410","title":"Media"}},"comments":[],"referencesCount":0},"citrix-workspace-for-manufacturer-of-wind-turbines":{"id":791,"title":"Citrix Workspace for manufacturer of wind turbines","description":" <span style=\"font-weight: bold;\">Лидер ветроэнергетики смотрит в будущее</span>\r\nОснованная в 1898 году как кузнечная мастерская в сельской Дании, Vestas многократно меняла свою деятельность - от производства кухонных приборов до изготовления гидравлических кранов и промежуточных охладителей для турбонагнетателей. Сегодня это ведущий мировой поставщик ветряных турбин.\r\nВ такой инновационной компании ИТ-организация должна быть ключевым игроком. «<span style=\"font-style: italic;\">Ответственность за новаторство в сфере ИТ лежит на нас»,</span> - говорит Кристоффер Николайсен, ИТ-архитектор Vestas. <span style=\"font-style: italic;\">«ИТ-специалисты не могут просто сидеть в подвале, присматривая за серверами и следя за тем, чтобы все работало нормально».</span>\r\nРынок устойчивой энергетики быстро развивается, и Николайсен и его коллеги по ИТ помогают держать Vestas в игре, постоянно укрепляя конкурентные позиции компании.\r\nДля этого они полагаются на Citrix. Решения Citrix помогают повысить производительность, улучшить работу на рабочем месте и обеспечить безопасность информации. Более того, они поддерживают традицию Vestas в области инноваций и совершенства.<br /><br /><span style=\"font-weight: bold;\">Гибкие решения повышают производительность для всех</span>\r\nУ Vestas есть разнообразная группа сотрудников: от рабочих, которые шлифуют лезвия на фабрике до инженеров, путешествующих по миру. Программное обеспечение для виртуализации Citrix XenApp и XenDesktop обеспечивает гибкость, необходимую Vestas для повышения производительности всех из них. Например, до недавнего времени работники огромных турбинных заводов компании ходили по длинным производственным линиям, проверяли тысячи точек качества и все еще использовали бумагу для заметок. Благодаря технологии Citrix Vestas автоматизирует этот процесс и повышает производительность.\r\nVestas теперь может принимать приложения, обычно доступные только в Windows, и представлять их на любом устройстве. А благодаря решению Citrix XenMobile Vestas может управлять устройствами, приложениями и контентом на собственных устройствах (BYO) и корпоративных устройствах по всему миру.\r\n<span style=\"font-style: italic;\">«Работа - это не место; это то, что вы делаете »,</span> - говорит Николайсен. <span style=\"font-style: italic;\">«XenDesktop и XenApp позволяют нашим пользователям работать так, как им удобно, так и наиболее продуктивно».</span> И успехи последовали. Теперь вместо того, чтобы потратить недели на адаптацию к новой системе и стилю работы, сотрудники продуктивно работают с первого дня.<br /><br /><span style=\"font-weight: bold;\">Безопасное сотрудничество защищает работу с третьими лицами</span>\r\nVestas поставляет автоматизированные проекты высокой четкости (CAD) консультантам в разных странах. <span style=\"font-style: italic;\">«У нас есть инженеры по всему миру, которые разрабатывают наши турбины», </span>- говорит Николайсен. <span style=\"font-style: italic;\">«Но мы не хотим, чтобы наша интеллектуальная собственность передавалась конкурентам, чтобы они могли вывести на рынок новую турбину».</span>\r\nРешения Citrix не только позволяют третьим сторонам получить доступ к проектам. HDX 3D Pro, набор технологий ускорения графики, оптимизирует виртуализацию богатых графических приложений и обеспечивает безопасное удаленное взаимодействие в режиме реального времени с проектными данными.\r\nРешения Citrix также позволяют Vestas быстрее и безопаснее подключать внешних консультантов, поскольку сотрудники могут создавать инфраструктуру виртуальных рабочих столов и предоставлять ее, как только они в ней нуждаются.<br /><br /><span style=\"font-weight: bold;\">100-процентное время безотказной работы обеспечивает исключительный пользовательский опыт</span>\r\nЧтобы оставаться конкурентоспособными, сегодня компании должны использовать преимущества облака. Но это преимущество испаряется, если доставка приложений ненадежна, а время безотказной работы не составляет 100 процентов. Vestas использует технологию Citrix NetScaler App Delivery Controller для обеспечения бесперебойной работы приложений и безупречной производительности.\r\nVestas может предоставлять приложения для гибридных и многокристальных архитектур с исключительным пользовательским интерфейсом. <span style=\"font-style: italic;\">«NetScaler ADC - это способ перенести различные решения в облако и связать их все вместе»</span>, - говорит Николайсен. <span style=\"font-style: italic;\">«Это очень важно, потому что наше ERP-решение и некоторые из наших приложений Microsoft находятся в облаке. Кроме того, мы хотим перенести XenMobile в облако. Нам нужен NetScaler, чтобы связать все эти части вместе ».</span><br /><span style=\"font-weight: bold;\"><br />Гибкие продукты делают будущую технологию реальностью уже сейчас</span>\r\nБудущее ИТ находится в конференц-зале, а не в серверной. Он поддерживает инновации и предоставляет сотрудникам новые способы лучше выполнять свою работу. Он доставляет прямые и релевантные приложения и данные быстро. Это дает людям возможность сосредоточиться на своих задачах, а не заниматься сложным пользовательским интерфейсом.\r\nVestas использует решения Citrix, чтобы сделать это будущее реальностью. ИТ-отдел может предоставить работникам единообразный опыт, помогая им сосредоточиться на своей работе. Например, пользователи могут использовать систему планирования ресурсов предприятия (ERP) на виртуальном рабочем столе или мобильном устройстве, и оно выглядит как собственное приложение, даже если оно размещено в центре обработки данных Vestas.\r\n<span style=\"font-style: italic;\">«Мы многому учимся, просто слушая наших пользователей, а не рассказывая им, что делать», </span>- говорит Томас Даугор, ИТ-архитектор Vestas. <span style=\"font-style: italic;\">«Это легче сказать, чем сделать. Часто ИТ-команда настолько занята обслуживанием систем, что у них нет времени слушать, учиться и внедрять инновации. Технология Citrix делает это возможным.</span>\r\n<span style=\"font-style: italic;\">«Citrix избавила нас от некоторых операционных проблем, с которыми мы столкнулись, и высвободила время для наших ИТ-специалистов для работы с бизнесом и выяснения того, как создавать решения для поддержки бизнеса»,</span> - говорит Даугор. <span style=\"font-style: italic;\">«И когда ИТ могут помочь бизнесу, это здорово. Я бы предпочел сделать это, чем работать с серверами и исправлять программное обеспечение в течение всего дня ».</span><br /><br /><br />","alias":"citrix-workspace-for-manufacturer-of-wind-turbines","roi":0,"seo":{"title":"Citrix Workspace for manufacturer of wind turbines","keywords":"","description":" <span style=\"font-weight: bold;\">Лидер ветроэнергетики смотрит в будущее</span>\r\nОснованная в 1898 году как кузнечная мастерская в сельской Дании, Vestas многократно меняла свою деятельность - от производства кухонных приборов до изготовления гидравлических к","og:title":"Citrix Workspace for manufacturer of wind turbines","og:description":" <span style=\"font-weight: bold;\">Лидер ветроэнергетики смотрит в будущее</span>\r\nОснованная в 1898 году как кузнечная мастерская в сельской Дании, Vestas многократно меняла свою деятельность - от производства кухонных приборов до изготовления гидравлических к"},"deal_info":"","user":{"id":5420,"title":"Vestas","logoURL":"https://old.roi4cio.com/uploads/roi/company/Vestas.jpeg","alias":"vestas","address":"","roles":[],"description":" Vestas Wind Systems A/S is a Danish manufacturer, seller, installer, and servicer of wind turbines founded in 1945. The company operates manufacturing plants in Denmark, Germany, India, Italy, Romania, the United Kingdom, Spain, Sweden, Norway, Australia, China, and the United States.\r\nVestas lives on the cutting edge. Founded in 1898 as a blacksmith shop in rural Denmark, it has reinvented itself many times—from manufacturing kitchen appliances to making hydraulic cranes and intercoolers for turbochargers. Today it is the world’s leading wind turbine supplier.\r\nVestas designs, manufactures, installs, and services wind turbines across the globe, and with 101 GW of wind turbines in 80 countries, it has installed more wind power than anyone else.\r\nThrough its industry-leading smart data capabilities and unparalleled 86 GW of wind turbines under service, Vestas uses data to interpret, forecast, and exploit wind resources and deliver best-in-class wind power solutions. Together with its customers, Vestas’ more than 24,600 employees are bringing the world sustainable energy solutions to power a bright future.<br /><br />","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.vestas.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Vestas","keywords":"","description":" Vestas Wind Systems A/S is a Danish manufacturer, seller, installer, and servicer of wind turbines founded in 1945. The company operates manufacturing plants in Denmark, Germany, India, Italy, Romania, the United Kingdom, Spain, Sweden, Norway, Australia","og:title":"Vestas","og:description":" Vestas Wind Systems A/S is a Danish manufacturer, seller, installer, and servicer of wind turbines founded in 1945. The company operates manufacturing plants in Denmark, Germany, India, Italy, Romania, the United Kingdom, Spain, Sweden, Norway, Australia","og:image":"https://old.roi4cio.com/uploads/roi/company/Vestas.jpeg"},"eventUrl":""},"supplier":{"id":182,"title":"Citrix","logoURL":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png","alias":"citrix","address":"","roles":[],"description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that Citrix received from Microsoft. The use of its own optimized ICA data transfer protocol allowed Citrix to successfully compete in the market with other powerful players. The company's flagship product is Citrix Presentation Server (now XenApp).<br /><br />In addition, the company offers a range of solutions for working with clouds and deploying virtual desktop infrastructures (VDI):<br /><br />Citrix Endpoint Management is a single end-to-end solution for managing mobile devices and applications for consistent productivity.<br /><br />Citrix Workspace is a platform for bringing all applications and data together in a secure, unified and personalized workspace\r\n<br />Citrix Cloud is a suite of cloud services that simplifies deployment and management of Citrix technologies, allowing you to extend existing software landscapes.<br /><br />Citrix also offers software tools for working with hybrid and multicloud environments.<br /><br />In 2005, Citrix acquired NetScaler, a networking company and also a hardware vendor. In 2007, the company acquired XenSource, a virtualization developer based on Xen, an open source hypervisor. Hundreds of thousands of customers worldwide use Citrix solutions. The company currently employs about 8,500 employees. Citrix is headquartered in Fort Lauderdale, Florida, USA. ","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"https://www.citrix.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Citrix","keywords":"company, Citrix, with, Microsoft, remote, 1995, software, partnership","description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:title":"Citrix","og:description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:image":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png"},"eventUrl":""},"vendors":[{"id":182,"title":"Citrix","logoURL":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png","alias":"citrix","address":"","roles":[],"description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that Citrix received from Microsoft. The use of its own optimized ICA data transfer protocol allowed Citrix to successfully compete in the market with other powerful players. The company's flagship product is Citrix Presentation Server (now XenApp).<br /><br />In addition, the company offers a range of solutions for working with clouds and deploying virtual desktop infrastructures (VDI):<br /><br />Citrix Endpoint Management is a single end-to-end solution for managing mobile devices and applications for consistent productivity.<br /><br />Citrix Workspace is a platform for bringing all applications and data together in a secure, unified and personalized workspace\r\n<br />Citrix Cloud is a suite of cloud services that simplifies deployment and management of Citrix technologies, allowing you to extend existing software landscapes.<br /><br />Citrix also offers software tools for working with hybrid and multicloud environments.<br /><br />In 2005, Citrix acquired NetScaler, a networking company and also a hardware vendor. In 2007, the company acquired XenSource, a virtualization developer based on Xen, an open source hypervisor. Hundreds of thousands of customers worldwide use Citrix solutions. The company currently employs about 8,500 employees. Citrix is headquartered in Fort Lauderdale, Florida, USA. ","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"https://www.citrix.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Citrix","keywords":"company, Citrix, with, Microsoft, remote, 1995, software, partnership","description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:title":"Citrix","og:description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:image":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png"},"eventUrl":""}],"products":[{"id":137,"logo":false,"scheme":false,"title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","vendorVerified":0,"rating":"2.40","implementationsCount":7,"suppliersCount":0,"alias":"citrix-virtual-apps-and-desktops-xenapp-and-xendesktop","companyTypes":[],"description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktops from any cloud—public, on-premises or hybrid—within a modern digital workspace.\r\n\r\n<span style=\"font-weight: bold; \">The main features of Citrix Virtual Apps and Desktops:</span>\r\n<ul><li>HDX technology for optimized user experience</li></ul>\r\n<ul><li>Virtual Windows, Linux and web applications</li></ul>\r\n<ul><li>Single management console for apps and desktops</li></ul>\r\n<ul><li>Centralized security in the data center</li></ul>\r\n<ul><li>FIPS and Common Criteria certified</li></ul>\r\n<ul><li>Single image provisioning technology </li></ul>\r\n<ul><li>VDI desktops</li></ul>\r\n<ul><li>Remote PC access</li></ul>\r\n\r\n<span style=\"font-weight: bold; \">Unifying editions across the Citrix product portfolio</span>\r\n<ul><li>Citrix is also unifying product editions across its portfolio – designating them Standard, Advanced, and Premium.</li></ul>\r\n<ul><li>XenApp Advanced edition now will map to Citrix Virtual Apps Standard edition</li></ul>\r\n<ul><li>XenApp Enterprise edition maps to Citrix Virtual Apps Advanced edition</li></ul>\r\n<ul><li>XenApp Platinum edition maps to Citrix Virtual Apps Premium edition</li></ul>\r\n<ul><li>XenDesktop VDI edition maps to Citrix Virtual Desktops Standard edition</li></ul>\r\n<ul><li>XenDesktop Enterprise edition maps to Citrix Virtual Apps and Desktops Advanced edition</li></ul>\r\n<ul><li>XenDesktop Platinum edition maps Citrix Virtual Apps and Desktops Premium edition</li></ul>\r\nView a detailed feature matrix","shortDescription":"Citrix Virtual Apps and Desktops are virtualization solutions that give IT control of virtual machines, applications, licensing, and security, while providing anywhere access for any device.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","keywords":"Single, desktops, data, technology, XenApp, apps, applications, Published","description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktop","og:title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","og:description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktop"},"eventUrl":"","translationId":138,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":299,"title":"Application and User Session Virtualization","alias":"application-and-user-session-virtualization","description":"Application virtualization is a technology that allows you to separate the software from the operating system on which it operates. Fully virtualized software is not installed in the traditional sense, although the end-user at first glance can not see it, because the virtualized software works just as normal. The software in the execution process works just as if it interacted with the operating system directly and with all its resources, but can be isolated or executed in a sandbox with different levels of restriction.\r\nModern operating systems, such as Microsoft Windows and Linux, can include limited software virtualization. For example, Windows 7 has Windows XP mode that allows you to run Windows XP software on Windows 7 without any changes.\r\nUser session virtualization is a newer version of desktop virtualization that works at the operating system level. While normal virtualization of the desktop allows an operating system to be run by virtualizing the hardware of the desktop, RDS and App-V allow for the virtualization of the applications. User session virtualization lies between the two.\r\nA desktop has an operating system loaded on the base hardware. This can be either physical or virtual. The user session virtualization keeps track of all changes to the operating system that a user might make by encapsulating the configuration changes and associating them to the user account. This allows the specific changes to be applied to the underlying operating system without actually changing it. This allows several users to have completely different operating system configurations applied to base operating system installation.\r\nIf you are in a distributed desktop environment and there are local file servers available at each location, you can deploy virtualized user sessions in the form of redirected folders and roaming profiles.","materialsDescription":" <span style=\"font-weight: bold;\">Understanding application virtualization</span>\r\nApplication virtualization technology isolates applications from the underlying operating system and from other applications to increase compatibility and manageability. This application virtualization technology enables applications to be streamed from a centralized location into an isolation environment on the target device where they will execute. The application files, configuration, and settings are copied to the target device and the application execution at run time is controlled by the application virtualization layer. When executed, the application run time believes that it is interfacing directly with the operating system when, in fact, it is interfacing with a virtualization environment that proxies all requests to the operating system.\r\n<span style=\"font-weight: bold;\">Understanding session virtualization</span>\r\nSession virtualization uses application streaming to deliver applications to hosting servers in the datacenter. The Application then connects the user to the server. The application then executes entirely on the server. The user interacts with the application remotely by sending mouse-clicks and keystrokes to the server. The server then responds by sending screen updates back to the user’s device. Whereas application virtualization is limited to Windows-based operating systems, session virtualization allows any user on any operating system to access any application delivered by IT. As a result, the application enables Windows, Mac, Linux, iOS and Android devices to run any applications using session virtualization. Furthermore, session virtualization leverages server-side processing power which liberates IT from the endless cycle of PC hardware refreshes which are typically needed to support application upgrades when using traditional application deployment methods.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Application_and_User_Session_Virtualization__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":449,"logo":false,"scheme":false,"title":"Citrix Endpoint Management (XenMobile)","vendorVerified":0,"rating":"2.80","implementationsCount":7,"suppliersCount":0,"alias":"citrixendpointmanagementxenmobile","companyTypes":[],"description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retrieve asset inventories.</li> </ul>\r\n<ul> <li>Carry out actions on devices, such as a device wipe.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">MAM features of Endpoint Management let you:</span>\r\n<ul> <li>Secure apps and data on BYO mobile devices.</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps.</li> </ul>\r\n<ul> <li>Lock apps and wipe their data.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">Withi a combination of MDM and MAM features, you can:</span>\r\n<ul> <li>Manage a corporate-issued device by using MDM</li> </ul>\r\n<ul> <li>Deploy device policies and apps</li> </ul>\r\n<ul> <li>Retrieve an asset inventory</li> </ul>\r\n<ul> <li>Wipe devices</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps</li> </ul>\r\n<ul> <li>Lock apps and wipe the data on devices</li> </ul>","shortDescription":"Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities. \r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Endpoint Management (XenMobile)","keywords":"management, devices, with, endpoint, unified, workspace, device, Simplify","description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev","og:title":"Citrix Endpoint Management (XenMobile)","og:description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev"},"eventUrl":"","translationId":1062,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":449,"logo":false,"scheme":false,"title":"Citrix Endpoint Management (XenMobile)","vendorVerified":0,"rating":"2.80","implementationsCount":7,"suppliersCount":0,"alias":"citrixendpointmanagementxenmobile","companyTypes":[],"description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retrieve asset inventories.</li> </ul>\r\n<ul> <li>Carry out actions on devices, such as a device wipe.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">MAM features of Endpoint Management let you:</span>\r\n<ul> <li>Secure apps and data on BYO mobile devices.</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps.</li> </ul>\r\n<ul> <li>Lock apps and wipe their data.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">Withi a combination of MDM and MAM features, you can:</span>\r\n<ul> <li>Manage a corporate-issued device by using MDM</li> </ul>\r\n<ul> <li>Deploy device policies and apps</li> </ul>\r\n<ul> <li>Retrieve an asset inventory</li> </ul>\r\n<ul> <li>Wipe devices</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps</li> </ul>\r\n<ul> <li>Lock apps and wipe the data on devices</li> </ul>","shortDescription":"Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities. \r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Endpoint Management (XenMobile)","keywords":"management, devices, with, endpoint, unified, workspace, device, Simplify","description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev","og:title":"Citrix Endpoint Management (XenMobile)","og:description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev"},"eventUrl":"","translationId":1062,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3132,"logo":false,"scheme":false,"title":"Citrix ADC (Application Delivery Controller)","vendorVerified":0,"rating":"2.80","implementationsCount":4,"suppliersCount":0,"alias":"citrix-adc-application-delivery-controller","companyTypes":[],"description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Application delivery controllers are purpose-built networking appliances whose function is to improve the performance, security and resiliency of applications delivered over the web.</span></p>\r\n<p>Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for your web, traditional, and cloud-native applications regardless of where they are hosted. It comes in a wide variety of form factors and deployment options without locking you into a single cloud. Pooled capacity licensing enables the movement of capacity among cloud deployments.</p>\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">The main features of Citrix ADC:</span></p>\r\n<ul>\r\n<li>Provides industry-leading app delivery and load balancing</li>\r\n</ul>\r\n<ul>\r\n<li>Fully integrates with Cisco ACI; endorsed as a Cisco ACE replacement</li>\r\n</ul>\r\n<ul>\r\n<li>Offers the most comprehensive set of ADC features in the ACI ecosystem</li>\r\n</ul>\r\n<ul>\r\n<li>Enables automation and orchestration of network-critical services to boost agility</li>\r\n</ul>","shortDescription":"Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for web, traditional, and cloud-native applications regardless of where they are hosted.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix ADC (Application Delivery Controller)","keywords":"","description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Applicat","og:title":"Citrix ADC (Application Delivery Controller)","og:description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Applicat"},"eventUrl":"","translationId":3135,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3406,"logo":false,"scheme":false,"title":"Citrix Workspace","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"citrix-workspace","companyTypes":[],"description":"<p>With new workstyles and complex IT environments, it’s increasingly frustrating for people to get work done in a productive way. Employees are forced to remember numerous logins as they switch between applications—not to mention the time they can waste searching across locations for information. This is all while dealing with performance and security issues that can further hinder the employee experience. Citrix Workspace is the only solution that delivers a unified, secure and intelligent workspace that lets people do their best work while maintaining a high-quality user experience.</p>\r\n<p>With Citrix Workspace users get a seamless work experience regardless of the type of app, device, network, or location, without a lot of extra steps. IT maintains control and visibility of SaaS, mobile, virtual, and web apps with a simple and integrated solution that enhances user experience, giving them the best tool to work efficiently. <a class=\"external-link-new-window\" title=\"Opens internal link in current window\" href=\"https://www.citrix.com/products/citrix-workspace/\" target=\"_blank\" rel=\"noopener\">Compare </a>below to see which product best suits your business needs.</p>\r\n<p><span style=\"font-weight: bold;\">Citrix Workspace</span></p>\r\n<ul>\r\n<li>Provides employees a single, actionable view into all of their systems.</li>\r\n</ul>\r\n<ul>\r\n<li>Breaks down complex SaaS applications into single-purpose streamlined workflows.</li>\r\n</ul>\r\n<ul>\r\n<li>Automates work by pushing important information and tasks to any device, intranet or messenger.</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Services included</span></p>\r\n<ul>\r\n<li>Citrix Virtual Apps and Desktops (formerly XenApp and XenDesktop Service)</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Endpoint Management (formerly XenMobile Service)</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Content Collaboration (ShareFile integration)</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Access Control</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Analytics</li>\r\n</ul>","shortDescription":"Combine the benefits of app and desktop virtualization, endpoint management, content collaboration and web/SaaS access control to deliver the secure digital workspace your business needs.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Workspace","keywords":"","description":"<p>With new workstyles and complex IT environments, it’s increasingly frustrating for people to get work done in a productive way. Employees are forced to remember numerous logins as they switch between applications—not to mention the time they can","og:title":"Citrix Workspace","og:description":"<p>With new workstyles and complex IT environments, it’s increasingly frustrating for people to get work done in a productive way. Employees are forced to remember numerous logins as they switch between applications—not to mention the time they can"},"eventUrl":"","translationId":3407,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":3,"title":"MDM - Mobile Device Management","alias":"mdm-mobile-device-management","description":" <span style=\"font-weight: bold; \">Mobile device management (MDM)</span> is an industry term for the administration of mobile devices, such as smartphones, tablet computers and laptops. Device management system is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.\r\nMDM is typically a deployment of a combination of on-device applications and configurations, corporate policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT management of end user devices. In modern corporate IT environments, the sheer number and diversity of managed devices (and user behavior) has motivated device management tools that allow the management of devices and users in a consistent and scalable way. The overall role of MDM is to increase device supportability, security, and corporate functionality while maintaining some user flexibility.\r\nMany organizations administer devices and applications using MDM products/services. Mobile device management software primarily deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.\r\nMDM functionality can include over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. Most recently laptops and desktops have been added to the list of systems supported as Mobile Device Management becomes more about basic device management and less about the mobile platform itself. \r\nSome of the <span style=\"font-weight: bold; \">core functions</span> of mobile management software include:\r\n<ul><li>Ensuring that diverse user equipment is configured to a consistent standard/supported set of applications, functions, or corporate policies</li><li>Updating equipment, applications, functions, or policies in a scalable manner</li><li>Ensuring that users use applications in a consistent and supportable manner</li><li>Ensuring that equipment performs consistently</li><li>Monitoring and tracking equipment (e.g. location, status, ownership, activity)</li><li>Being able to efficiently diagnose and troubleshoot equipment remotely</li></ul>\r\nDevice management solutions are leveraged for both company-owned and employee-owned (Bring Your Own Device) devices across the enterprise or mobile devices owned by consumers. Consumer demand for BYOD is now requiring a greater effort for MDM and increased security for both the devices and the enterprise they connect to, especially since employers and employees have different expectations concerning the types of restrictions that should be applied to mobile devices.\r\nBy controlling and protecting the data and configuration settings of all mobile devices in a network, enterprise device management software can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.\r\nWith mobile devices becoming ubiquitous and applications flooding the market, mobile monitoring is growing in importance. The use of mobile device management across continues to grow at a steady pace, and is likely to register a compound annual growth rate (CAGR) of nearly 23% through 2028. The US will continue to be the largest market for mobile device management globally. ","materialsDescription":"<h1 class=\"align-center\">How Mobile Device Management works?</h1>\r\nMobile device management relies on endpoint software called an MDM agent and an MDM server that lives in a data center. IT administrators configure policies through the MDM server's management console, and the server then pushes those policies over the air to the MDM agent on the device. The agent applies the policies to the device by communicating with application programming interfaces (APIs) built directly into the device operating system.\r\nSimilarly, IT administrators can deploy applications to managed devices through the MDM server. Mobile software management emerged in the early 2000s as a way to control and secure the personal digital assistants and smartphones that business workers began to use. The consumer smartphone boom that started with the launch of the Apple iPhone in 2007 led to the bring your own device trend, which fueled further interest in MDM.\r\nModern MDM management software supports not only smartphones but also tablets, Windows 10 and macOS computers and even some internet of things devices. The practice of using MDM to control PCs is known as unified endpoint management.\r\n<h1 class=\"align-center\">Key Benefits of Mobile Device Management Software</h1>\r\n<span style=\"font-weight: bold;\">Reduce IT Administration.</span> Instead of manually configuring and testing each new mobile device, mobile device software takes care of the repetitive tasks for you. That gives IT staff more time to work on challenging projects that improve productivity.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Improve End-user Productivity. </span>Mobile device management helps end users become more productive because the process of requesting new mobile devices can be cut down from days to hours. Once end users have the device in their hands, mobile device management program helps them get set up on their corporate network much faster. That means less time waiting to get access to email, internal websites, and calendars.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Reduce IT Risk.</span> Mobile devices, especially if your organization allows “Bring Your Own Device” (BYOD), create increased risk exposures. Typically, IT managers respond to these risks in one of two ways, neither of which help. First, you may say “no” to mobile device requests. That’s a fast way to become unpopular. Second, you may take a manual approach to review and oversee each device.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Enable Enterprise Growth. </span>If your enterprise added a thousand employees this quarter through hiring, acquisition, or other changes, could IT handle the challenge? If you’re honest, you can probably imagine going through plenty of struggles and missing SLAs. That kind of disappointment and missed service expectations make end users respect IT less. \r\nBy using enterprise device management thoroughly, you'll enable enterprise growth. You'll have the systems and processes to manage 100 users or 10,000 users. That means IT will be perceived as enabling growth not standing in the way.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MDM_Mobile_Device_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":7,"title":"Improve Customer Service"},{"id":254,"title":"Centralize management"},{"id":307,"title":"Enhance Competitive Ability"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":5,"title":"Enhance Staff Productivity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":177,"title":"Decentralized IT systems"},{"id":178,"title":"No control over data access"},{"id":340,"title":"Low quality of customer service"},{"id":370,"title":"No automated business processes"},{"id":375,"title":"No support for mobile and remote users"},{"id":378,"title":"Low employee productivity"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":299,"title":"Application and User Session Virtualization","alias":"application-and-user-session-virtualization","description":"Application virtualization is a technology that allows you to separate the software from the operating system on which it operates. Fully virtualized software is not installed in the traditional sense, although the end-user at first glance can not see it, because the virtualized software works just as normal. The software in the execution process works just as if it interacted with the operating system directly and with all its resources, but can be isolated or executed in a sandbox with different levels of restriction.\r\nModern operating systems, such as Microsoft Windows and Linux, can include limited software virtualization. For example, Windows 7 has Windows XP mode that allows you to run Windows XP software on Windows 7 without any changes.\r\nUser session virtualization is a newer version of desktop virtualization that works at the operating system level. While normal virtualization of the desktop allows an operating system to be run by virtualizing the hardware of the desktop, RDS and App-V allow for the virtualization of the applications. User session virtualization lies between the two.\r\nA desktop has an operating system loaded on the base hardware. This can be either physical or virtual. The user session virtualization keeps track of all changes to the operating system that a user might make by encapsulating the configuration changes and associating them to the user account. This allows the specific changes to be applied to the underlying operating system without actually changing it. This allows several users to have completely different operating system configurations applied to base operating system installation.\r\nIf you are in a distributed desktop environment and there are local file servers available at each location, you can deploy virtualized user sessions in the form of redirected folders and roaming profiles.","materialsDescription":" <span style=\"font-weight: bold;\">Understanding application virtualization</span>\r\nApplication virtualization technology isolates applications from the underlying operating system and from other applications to increase compatibility and manageability. This application virtualization technology enables applications to be streamed from a centralized location into an isolation environment on the target device where they will execute. The application files, configuration, and settings are copied to the target device and the application execution at run time is controlled by the application virtualization layer. When executed, the application run time believes that it is interfacing directly with the operating system when, in fact, it is interfacing with a virtualization environment that proxies all requests to the operating system.\r\n<span style=\"font-weight: bold;\">Understanding session virtualization</span>\r\nSession virtualization uses application streaming to deliver applications to hosting servers in the datacenter. The Application then connects the user to the server. The application then executes entirely on the server. The user interacts with the application remotely by sending mouse-clicks and keystrokes to the server. The server then responds by sending screen updates back to the user’s device. Whereas application virtualization is limited to Windows-based operating systems, session virtualization allows any user on any operating system to access any application delivered by IT. As a result, the application enables Windows, Mac, Linux, iOS and Android devices to run any applications using session virtualization. Furthermore, session virtualization leverages server-side processing power which liberates IT from the endless cycle of PC hardware refreshes which are typically needed to support application upgrades when using traditional application deployment methods.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Application_and_User_Session_Virtualization__1_.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"},{"id":3,"title":"MDM - Mobile Device Management","alias":"mdm-mobile-device-management","description":" <span style=\"font-weight: bold; \">Mobile device management (MDM)</span> is an industry term for the administration of mobile devices, such as smartphones, tablet computers and laptops. Device management system is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.\r\nMDM is typically a deployment of a combination of on-device applications and configurations, corporate policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT management of end user devices. In modern corporate IT environments, the sheer number and diversity of managed devices (and user behavior) has motivated device management tools that allow the management of devices and users in a consistent and scalable way. The overall role of MDM is to increase device supportability, security, and corporate functionality while maintaining some user flexibility.\r\nMany organizations administer devices and applications using MDM products/services. Mobile device management software primarily deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.\r\nMDM functionality can include over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. Most recently laptops and desktops have been added to the list of systems supported as Mobile Device Management becomes more about basic device management and less about the mobile platform itself. \r\nSome of the <span style=\"font-weight: bold; \">core functions</span> of mobile management software include:\r\n<ul><li>Ensuring that diverse user equipment is configured to a consistent standard/supported set of applications, functions, or corporate policies</li><li>Updating equipment, applications, functions, or policies in a scalable manner</li><li>Ensuring that users use applications in a consistent and supportable manner</li><li>Ensuring that equipment performs consistently</li><li>Monitoring and tracking equipment (e.g. location, status, ownership, activity)</li><li>Being able to efficiently diagnose and troubleshoot equipment remotely</li></ul>\r\nDevice management solutions are leveraged for both company-owned and employee-owned (Bring Your Own Device) devices across the enterprise or mobile devices owned by consumers. Consumer demand for BYOD is now requiring a greater effort for MDM and increased security for both the devices and the enterprise they connect to, especially since employers and employees have different expectations concerning the types of restrictions that should be applied to mobile devices.\r\nBy controlling and protecting the data and configuration settings of all mobile devices in a network, enterprise device management software can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.\r\nWith mobile devices becoming ubiquitous and applications flooding the market, mobile monitoring is growing in importance. The use of mobile device management across continues to grow at a steady pace, and is likely to register a compound annual growth rate (CAGR) of nearly 23% through 2028. The US will continue to be the largest market for mobile device management globally. ","materialsDescription":"<h1 class=\"align-center\">How Mobile Device Management works?</h1>\r\nMobile device management relies on endpoint software called an MDM agent and an MDM server that lives in a data center. IT administrators configure policies through the MDM server's management console, and the server then pushes those policies over the air to the MDM agent on the device. The agent applies the policies to the device by communicating with application programming interfaces (APIs) built directly into the device operating system.\r\nSimilarly, IT administrators can deploy applications to managed devices through the MDM server. Mobile software management emerged in the early 2000s as a way to control and secure the personal digital assistants and smartphones that business workers began to use. The consumer smartphone boom that started with the launch of the Apple iPhone in 2007 led to the bring your own device trend, which fueled further interest in MDM.\r\nModern MDM management software supports not only smartphones but also tablets, Windows 10 and macOS computers and even some internet of things devices. The practice of using MDM to control PCs is known as unified endpoint management.\r\n<h1 class=\"align-center\">Key Benefits of Mobile Device Management Software</h1>\r\n<span style=\"font-weight: bold;\">Reduce IT Administration.</span> Instead of manually configuring and testing each new mobile device, mobile device software takes care of the repetitive tasks for you. That gives IT staff more time to work on challenging projects that improve productivity.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Improve End-user Productivity. </span>Mobile device management helps end users become more productive because the process of requesting new mobile devices can be cut down from days to hours. Once end users have the device in their hands, mobile device management program helps them get set up on their corporate network much faster. That means less time waiting to get access to email, internal websites, and calendars.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Reduce IT Risk.</span> Mobile devices, especially if your organization allows “Bring Your Own Device” (BYOD), create increased risk exposures. Typically, IT managers respond to these risks in one of two ways, neither of which help. First, you may say “no” to mobile device requests. That’s a fast way to become unpopular. Second, you may take a manual approach to review and oversee each device.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Enable Enterprise Growth. </span>If your enterprise added a thousand employees this quarter through hiring, acquisition, or other changes, could IT handle the challenge? If you’re honest, you can probably imagine going through plenty of struggles and missing SLAs. That kind of disappointment and missed service expectations make end users respect IT less. \r\nBy using enterprise device management thoroughly, you'll enable enterprise growth. You'll have the systems and processes to manage 100 users or 10,000 users. That means IT will be perceived as enabling growth not standing in the way.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MDM_Mobile_Device_Management.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.citrix.ru/customers/vestas-en.html","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}},"aliases":{"1":["citrix-adc-for-a-large-ukrainian-e-commerce-company","citrix-adc-for-gas-and-electric-company","citrix-netscaler-mpx7500-enterprise-for-ukrainian-mobile-operator","citrix-workspace-for-manufacturer-of-wind-turbines"]},"links":{"first":"http://b4r_be/api/implementations?page=1","last":"http://b4r_be/api/implementations?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://b4r_be/api/implementations","per_page":20,"to":4,"total":4},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}