{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementations":{"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"more":{"en":"Learn more","ru":"Узнать больше","_type":"localeString"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"en":"Rating ascending","ru":"По возрастанию рейтинга","_type":"localeString"},"sort-rating-desc":{"en":"Rating descending","ru":"По убыванию рейтинга","_type":"localeString"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"_type":"localeString","en":"Rebate descending","ru":"По убыванию скидки"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"product":{"_type":"localeString","en":"Product","ru":"Продукт"},"no-results":{"en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString"},"with-reference":{"en":"With reference","ru":"С референсом","_type":"localeString"},"items-found":{"_type":"localeString","en":"Deployments found","ru":"Внедрений найдено"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"_type":"localeString","en":"Stopped","ru":"Остановлено"},"date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"roi":{"ru":"ROI","_type":"localeString","en":"ROI"},"implementations-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"_type":"localeString","en":"4 vendors","ru":"поставщикам"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"_type":"localeString","en":"to","ru":"до"},"filter-price-title":{"en":"Filter by price","ru":"Фильтр по цене","_type":"localeString"},"view-type-label":{"_type":"localeString","en":"View","ru":"Вид"},"sort-type-label":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"category":{"en":"Category","ru":"Категория","_type":"localeString"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"en":"Add Product","ru":"Добавить продукт","_type":"localeString"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"filter-toggle":{"_type":"localeString","en":"Filter","ru":"Фильтр"},"clear-button":{"_type":"localeString","en":"Сlear","ru":"Очистить"},"delivery-type-field":{"en":"Delivery type","ru":"Тип поставки","_type":"localeString"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"en":"Providers","ru":"Поставщик, производитель","_type":"localeString"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"_type":"localeString","en":"With discounts","ru":"Со скидками"},"expert-price-checkbox":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"en":"Bonus 4 Reference","ru":"Бонус за референс","_type":"localeString"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"en":"Countries","ru":"Страны","_type":"localeString"},"seller":{"ru":"Продавец","_type":"localeString","en":"Seller"},"vendors":{"_type":"localeString","en":"User products vendors","ru":"Производители продуктов пользователя"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"en":"Info source","ru":"Информационный ресурс","_type":"localeString"},"with-reference-checkbox":{"_type":"localeString","en":"With reference","ru":"С референсами"},"show-deal-checkbox":{"_type":"localeString","en":"Show deal with noname","ru":"Показывать сделки с noname"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"_type":"localeString","en":"Date","ru":"Дата"},"try-button":{"en":"Try AI (Beta)","ru":"Попробовать AI (Beta)","_type":"localeString"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"От Я до А"},"sellers-field":{"en":"Sellers","ru":"Поставщики, Производители","_type":"localeString"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"en":"With comments","ru":"С комментариями","_type":"localeString"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"_type":"localeString","en":"Partners","ru":" Партнеры"},"customers":{"en":"Customers","ru":"Покупатели","_type":"localeString"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"_type":"localeString","en":"Deal canceled","ru":"Сделка отменена"},"deal-closed":{"en":"Deal closed","ru":"Сделка закрыта","_type":"localeString"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"en":"Finished","ru":"Завершено","_type":"localeString"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"_type":"localeString","en":"Proof of concept","ru":"Пилотный проект"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"competencies":{"en":"Competencies","ru":"Компетенции","_type":"localeString"}}},"translationsStatus":{"implementations":"success","filters":"success"},"sections":{"implementations-text-block":{"body":{"ru":[{"style":"normal","_key":"1435aa042111","markDefs":[],"children":[{"_key":"1435aa0421110","_type":"span","marks":[],"text":"Каталог внедрений ROI4CIO - это база данных о внедрениях программного обеспечения, оборудования и ИТ-услуг. Находите внедрения по вендору, поставщику, пользователю, бизнес-задачам, проблемам, статусу, фильтруйте по наличию ROI и референса."}],"_type":"block"}],"_type":"localeBlock","en":[{"_key":"0e40f9075bd0","markDefs":[],"children":[{"_key":"0e40f9075bd00","_type":"span","marks":[],"text":"The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference."}],"_type":"block","style":"normal"}]},"label":"catalog-implementations-text-block"}},"sectionsStatus":{"implementations-text-block":"success"},"pageMetaData":{"implementations":{"title":{"_type":"localeString","en":"ROI4CIO: Implementations","ru":"ROI4CIO: Внедрения"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"}},{"name":"og:description","translations":{"_type":"localeString","en":"Implementations","ru":"Каталог внедрений различных видов программного обеспечения, ИТ проектов. Результаты внедрений ИТ, результаты, референсы, ROI"}},{"name":"title","translations":{"ru":"Внедрения","_type":"localeString","en":"Implementations"}},{"name":"description","translations":{"en":"Implementations description","ru":"Описание внедрений","_type":"localeString"}},{"name":"keywords","translations":{"_type":"localeString","en":"Implementations keywords","ru":"Внедрения ключевые слова"}}]}},"pageMetaDataStatus":{"implementations":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"forcepoint-ngfw-for-a-cloud-company":{"id":277,"title":"Forcepoint NGFW for a cloud company","description":"<span style=\"font-weight: bold;\">OVERVIEW</span>\r\nFounded in 1996, Cobweb Solutions offers a range of Cloud solutions including: Hosted Microsoft Exchange, Office 365, Enterprise Mobility Suite, Azure, Power BI, Dynamics CRM, Hosted Desktop, Email Archiving, Email Encryption and Cloud Backup.\r\nBased in Fareham, Hampshire and Canary Wharf, London Cobweb provides Cloud solutions to over 6,000 SMBs and over 320 partners through Vuzion the new cloud aggregator business for resellers. An early adopter of Microsoft Exchange, Cobweb is a long-established provider of cloud communications and a gold-status member of the Microsoft Partner Network.\r\n<span style=\"font-weight: bold;\">CHALLENGE</span>\r\nCobweb provides hosted services for over 150,000 mailboxes, managing firewalls for hundreds of locations with complex, overlapping IP schemas. The impact of overlapping schemas to Cobweb and its customers created an inability to deliver the service to customers.\r\n<span style=\"font-style: italic;\">“It’s a monumental task. Having easy-to-access insight into the whole system is a necessity. The company’s reputation hinges on its services being secure and constantly up and running.” — Julian Dyer, Chief Technical Officer, Cobweb</span>\r\nFurthermore, Cobweb has to ensure that the environment is up-todate in order to manage a continually evolving threat landscape. Visits to perform data center upgrades in Segensworth, Fareham, and one in Telehouse, London were proving to be time intensive, and the company needed a system it could rely on to upgrade automatically.\r\n<span style=\"font-weight: bold;\">SOLUTION</span>\r\nAccording to Dyer, the decision to migrate to Forcepoint Stonesoft Next Generation Firewall (NGFW)—part of the Forcepoint Security product offering—was not taken lightly. Cobweb wanted to move away from the expensive licensing model it had previously, and pay only for the features it needed. The deployment option of Stonesoft Softwareas-a-Service (SaaS) for virtual versions of Stonesoft NGFW is the affordable licensing model Cobweb was looking for.\r\nIn addition, centralized security management, combined with the flexibility to add security features such as a delegated local administrator and capacity, helped drive the decision to implement Stonesoft NGFW.\r\n<span style=\"font-style: italic;\">“We were able to replace overlapping encryption domains with site-to-site VPNs that take minutes to configure. We simply use the domain feature to logically separate the organization, delegating local administrative control if we choose.” — Dyer</span>\r\n<span style=\"font-weight: bold;\">RESULTS</span>\r\nImplementing Stonesoft NGFW has enabled Cobweb to increase bandwidth, add connections, and aggregate across network links safely and securely, giving multiple seamless failover options. The single management platform provides admins with quicker response times to all change requests and any incidents that may occur on the network.\r\nUltimately, with Stonesoft NGFW and centralized firewall management, Cobweb is now equipped with the tools to manage network security holistically in real-time mode, utilize shared network connections, and benefit from shared logging, reporting, auditing, and other tools. Ease-of-use makes Stonesoft NGFW an effective and efficient security solution, saving valuable time and resources for Cobweb.\r\n<span style=\"font-style: italic;\">“No more standing in cold data centers for hours configuring a firewall or performing upgrades. Forcepoint Stonesoft Next Generation Firewall does 99% of our network configuration, reducing what used to take hours to minutes. Everything is done through the management platform. I am one happy customer.” — Dyer</span>\r\nCobweb has relied on Forcepoint solutions since 2012.","alias":"forcepoint-ngfw-for-a-cloud-company","roi":0,"seo":{"title":"Forcepoint NGFW for a cloud company","keywords":"Cobweb, Stonesoft, NGFW, with, Forcepoint, network, Dyer, management","description":"<span style=\"font-weight: bold;\">OVERVIEW</span>\r\nFounded in 1996, Cobweb Solutions offers a range of Cloud solutions including: Hosted Microsoft Exchange, Office 365, Enterprise Mobility Suite, Azure, Power BI, Dynamics CRM, Hosted Desktop, Email Archiving, E","og:title":"Forcepoint NGFW for a cloud company","og:description":"<span style=\"font-weight: bold;\">OVERVIEW</span>\r\nFounded in 1996, Cobweb Solutions offers a range of Cloud solutions including: Hosted Microsoft Exchange, Office 365, Enterprise Mobility Suite, Azure, Power BI, Dynamics CRM, Hosted Desktop, Email Archiving, E"},"deal_info":"","user":{"id":3868,"title":"Cobweb","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cobweb.jpg","alias":"cobweb","address":"","roles":[],"description":"We’ve been a cloud company since ‘the cloud’ began.\r\nOur cloud services and solutions have liberated businesses of all kinds; removing the restrictions of on-premise IT, so we can provide the best communication tools and services; \r\naffordably and maintenance-free.\r\nOur expertise\r\nWe go back a long way. Since 1996, our experience has grown and we’ve innovated new solutions to help our customers realise their ambitions. While the power of cloud continues to evolve, so do we. But the touchstones of our service remain:\r\nDiscovery\r\nDuring discovery we learn about your organisation and identify what the best solutions are to suit your needs.\r\nScalability\r\nWe help businesses of all sizes. As you grow, we can make sure your IT grows with you.\r\nWorld-Class Infrastructure\r\nPlatforms are hosted in Tier 3+ UK data centres; they’re ISO 27001 certified and have 24/7 physical security.\r\nSelf Care\r\nWe empower you with easy-to-use tools for straight forward user administration and configuration.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.cobweb.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cobweb","keywords":"Cobweb","description":"We’ve been a cloud company since ‘the cloud’ began.\r\nOur cloud services and solutions have liberated businesses of all kinds; removing the restrictions of on-premise IT, so we can provide the best communication tools and services; \r\naffordably and maintenance-","og:title":"Cobweb","og:description":"We’ve been a cloud company since ‘the cloud’ began.\r\nOur cloud services and solutions have liberated businesses of all kinds; removing the restrictions of on-premise IT, so we can provide the best communication tools and services; \r\naffordably and maintenance-","og:image":"https://old.roi4cio.com/uploads/roi/company/Cobweb.jpg"},"eventUrl":""},"supplier":{"id":178,"title":"Forcepoint","logoURL":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-domain solutions, the company is also known as Websense, Raytheon | Websense. </span>\r\n<span lang=\"en\"> Forcepoint solutions protect users, data and computing networks from attacks, as well as accidental and deliberate information leaks throughout the entire life cycle. Forcepoint protects data everywhere - in the office, on the road, in the cloud. This simplifies regulatory compliance and optimizes the cost of security solutions. Forcepoint allows you to focus on prioritization by automating day-to-day operations. </span>\r\n<span lang=\"en\">Forcepoint's clients include Fortune 500 and FTSE 100 leaders: AT&T, Deutsche Telecom, Canon, McDonanld's, UPS, Sheraton, Merill Lynch, Bank of America, PepsiCo Inc. and many others.</span> ","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":15,"vendorImplementationsCount":16,"vendorPartnersCount":0,"supplierPartnersCount":8,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:title":"Forcepoint","og:description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:image":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""},"vendors":[{"id":178,"title":"Forcepoint","logoURL":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-domain solutions, the company is also known as Websense, Raytheon | Websense. </span>\r\n<span lang=\"en\"> Forcepoint solutions protect users, data and computing networks from attacks, as well as accidental and deliberate information leaks throughout the entire life cycle. Forcepoint protects data everywhere - in the office, on the road, in the cloud. This simplifies regulatory compliance and optimizes the cost of security solutions. Forcepoint allows you to focus on prioritization by automating day-to-day operations. </span>\r\n<span lang=\"en\">Forcepoint's clients include Fortune 500 and FTSE 100 leaders: AT&T, Deutsche Telecom, Canon, McDonanld's, UPS, Sheraton, Merill Lynch, Bank of America, PepsiCo Inc. and many others.</span> ","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":15,"vendorImplementationsCount":16,"vendorPartnersCount":0,"supplierPartnersCount":8,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:title":"Forcepoint","og:description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:image":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""},{"id":5795,"title":"ReversingLabs","logoURL":"https://old.roi4cio.com/uploads/roi/company/ReversingLabs.png","alias":"reversinglabs","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">ReversingLabs</span> develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.hese threats routinely defeat current anti-virus scanner, white list, behavioral and sandbox technology thus requiring tedious, manual analysis by highly skilled experts. <br /><span style=\"font-weight: bold; \">ReversingLabs'</span> industry leading technology automates this manual process to provide hyper-fast processing of files to expose all internal objects and metadata to determine capabilities and intent. Their approach enables new protection paradigms that screen high volumes of files of any type, including Windows, Linux, mobile apps, documents, and firmware.<br />Source: https://www.linkedin.com/company/reversinglabs/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.reversinglabs.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ReversingLabs","keywords":"","description":" <span style=\"font-weight: bold; \">ReversingLabs</span> develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.hese threats routinely defeat current anti-virus scan","og:title":"ReversingLabs","og:description":" <span style=\"font-weight: bold; \">ReversingLabs</span> develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.hese threats routinely defeat current anti-virus scan","og:image":"https://old.roi4cio.com/uploads/roi/company/ReversingLabs.png"},"eventUrl":""}],"products":[{"id":952,"logo":false,"scheme":false,"title":"Forcepoint NGFW","vendorVerified":1,"rating":"3.70","implementationsCount":3,"suppliersCount":0,"alias":"forcepoint-ngfw","companyTypes":[],"description":"<span style=\"color: #616161;\">Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers around the world, Forcepoint network security solutions enable businesses, government agencies and other organizations to address critical issues efficiently and economically.<br /></span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Decrypt traffic while safeguarding privacy</span><br />Inspect attacks and stolen data hidden inside encrypted SSL/TLS traffic while still protecting users' privacy.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Extend your network into the cloud</span><br />Deploy applications safely in Amazon Web Services, Azure, and VMware. Segment different service layers and manage virtual NGFWs and IPSs the same way as physical appliances.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Control access to web content</span><br />Limit users' access to entire categories of websites containing inappropriate or unsafe content with URL intelligence that’s depended upon around the globe.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Protect high-assurance systems</span><br />Safeguard your most sensitive, mission-critical networks and applications with Forcepoint’s renowned Sidewinder proxy technology.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Regain control of shadow IT</span><br />Understand the risk associated with unsanctioned cloud apps so you can redirect users to more appropriate apps or block them altogether.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Offer SD-WAN and NGFW security as an MSSP</span><br />Manage enterprise-grade connectivity and protection from your own multi-tenant systems, with a business model tailored to the needs of MSSPs.<br /></span>\r\n\r\n<span style=\"text-decoration: underline;\"><span style=\"font-weight: bold;\"><span style=\"color: #616161;\">Key features:</span></span></span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Modular appliances for every environment</span><br />Our broad range of appliances provide the right price-performance and form factor for each location; pluggable interface cards let you change networks with ease.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">High availability, mixed clustering</span><br />Active-active clustering lets you mix up to 16 different models of appliances for unrivaled scalability, longer lifecycles, and seamless updates without dropping packets.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Multi-link connectivity for SD-WAN</span><br />Broadband, wireless, and dedicated lines at each location can be centrally deployed and managed, providing full control over what traffic goes over each link with automated failover.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Automated, zero-downtime updates</span><br />Policy changes and software updates can be deployed to hundreds of firewalls and IPS devices around the world in minutes, not hours, without the need for service windows.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Policy-driven centralized management</span><br />Smart Policies describe your business processes in familiar terms and are automatically implemented throughout the network, managed in-house or via MSSP.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Actionable, interactive 360° visibility</span><br />Graphical dashboards and visualizations of network activity go beyond simple reporting, enabling admins to drill into events and respond to incidents faster.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Built-in NGFW, VPN, proxies, and more</span><br />Unparalleled security comes standard, from top-ranked Next Generation Firewall and IPS to rapid-setup VPNs and granular decryption, as well as our unique Sidewinder proxy technology.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Top-ranked anti-evasion defense</span><br />Multi-layer stream inspection defeats advanced attacks that traditional packet inspection can't detect—see for yourself in our Evader video series.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Human-centric endpoint context</span><br />Access policies can whitelist or blacklist specific endpoint apps, patch levels or AV status. Users' behaviors are consolidated into actionable dashboards.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Unified virtual and physical security</span><br />Native support for AWS, Azure, and VMware has the same capabilities, management, and high performance of our physical appliances.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">CASB and web security</span><br />Our reknowned URL filtering and industry-leading cloud services work together to protect your data and people as they use apps and web content.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Anti-malware sandboxing</span><br />Forcepoint Advanced Malware Detection blocks previously undetected ransomware, zero-days, and other attacks before they steal sensitive data or damage your systems.</span>","shortDescription":"With Forcepoint NGFW, you can deploy and manage thousands of firewalls, IPSs, VPNs and SD-WANs – in minutes, all from a single console.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint NGFW","keywords":"Forcepoint, NGFW, your, network, security, that, data, with","description":"<span style=\"color: #616161;\">Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers aroun","og:title":"Forcepoint NGFW","og:description":"<span style=\"color: #616161;\">Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers aroun"},"eventUrl":"","translationId":953,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3870,"logo":false,"scheme":false,"title":"ReversingLabs TitaniumScale","vendorVerified":0,"rating":"0.00","implementationsCount":3,"suppliersCount":0,"alias":"reversinglabs-titaniumscale","companyTypes":[],"description":"TitaniumScale enables an organization to profile and classify large volumes of files in real-time to create relevant data for advanced analytics platforms to support threat correlation, hunting and response. Conventional malware products focus on detecting malware while treating undetected files as good, essentially overlooking them. As the amount of malware that evades detection grows, the need to profile, track and correlate “undetected” files becomes imperative to limit the impact and accelerate resolution of incidents and breaches. This intelligence data helps close the visibility gap between malware detection and tedious and expensive post-breach reconstruction.\r\n<b>Key Features</b>\r\n<ul> <li> Real-time, deep inspection of files scalable to millions of files per day without execution.</li><p> </p> <li> Broad coverage identifying 3600+ file formats and unpacking of 360+ file formats.</li><p> </p> <li> Files sourced from a variety of inputs via automated submission from ReversingLabs and third-party products.</li><p> </p> <li> Customer supplied YARA rule matching.</li><p> </p> <li> Extracted file profiles are searchable by content or context of the file.</li><p> </p> <li> Infrastructure scales incrementally to meet customer volume and/or capacity requirements.</li><p> </p> <li> Programmable infrastructure supports threat identification, analytics, hunting, and software verification.</li><p> </p> <li>Seamless integration for automated operations with SIEM, analytics, and file collection. </li><p> </p> </ul>\r\n<b>Scalable Architecture</b>\r\nTitaniumScale uses a flexible cluster architecture that scales incrementally to support distributed or centralized file processing across physical and cloud environments. The cluster scales file processing capacity from 100K up to 100M files per day by adding worker nodes. TitaniumScale consists of:\r\n<b><i>Worker Nodes: </i></b>\r\nA cluster of physical or virtual servers that perform the actual file assessment and support N+1 redundancy. \r\n<b><i> Load Balancer Hubs: </i></b>\r\nA server (and optional redundant server) that directs files to Worker Nodes for processing. \r\n<b><i>Control Manager: </i></b>\r\nA server that manages configuration (i.e. YARA rules, whitelists) and monitors status across the TitaniumScale cluster.\r\n<b><i>TitaniumCloud File Reputation: </i></b>\r\nA service available as a cloud-based resource or on-site appliance that identifies and provides information on known goodware and malware.","shortDescription":"High Volume Processing & Integration","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ReversingLabs TitaniumScale","keywords":"","description":"TitaniumScale enables an organization to profile and classify large volumes of files in real-time to create relevant data for advanced analytics platforms to support threat correlation, hunting and response. Conventional malware products focus on detecting mal","og:title":"ReversingLabs TitaniumScale","og:description":"TitaniumScale enables an organization to profile and classify large volumes of files in real-time to create relevant data for advanced analytics platforms to support threat correlation, hunting and response. Conventional malware products focus on detecting mal"},"eventUrl":"","translationId":3869,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":824,"title":"ATP - Advanced Threat Protection","alias":"atp-advanced-threat-protection","description":" Advanced threat protection (ATP) refers to a category of security solutions that defend against sophisticated malware or hacking-based attacks targeting sensitive data. Advanced threat protection solutions can be available as software or as managed services. ATP solutions can differ in approaches and components, but most include some combination of endpoint agents, network devices, email gateways, malware protection systems, and a centralized management console to correlate alerts and manage defenses.\r\nThe primary benefit offered by advanced threat protection software is the ability to prevent, detect, and respond to new and sophisticated attacks that are designed to circumvent traditional security solutions such as antivirus, firewalls, and IPS/IDS. Attacks continue to become increasingly targeted, stealthy, and persistent, and ATP solutions take a proactive approach to security by identifying and eliminating advanced threats before data is compromised.\r\nAdvanced threat protection services build on this benefit by providing access to a global community of security professionals dedicated to monitoring, tracking, and sharing information about emerging and identified threats. ATP service providers typically have access to global threat information sharing networks, augmenting their own threat intelligence and analysis with information from third parties. When a new, advanced threat is detected, ATP service providers can update their defenses to ensure protection keeps up. This global community effort plays a substantial role in maintaining the security of enterprises around the world.\r\nEnterprises that implement advanced threat protection are better able to detect threats early and more quickly formulate a response to minimize damage and recover should an attack occur. A good security provider will focus on the lifecycle of an attack and manage threats in real-time. ATP providers notify the enterprise of attacks that have occurred, the severity of the attack, and the response that was initiated to stop the threat in its tracks or minimize data loss. Whether managed in-house or provided as a service, advanced threat protection solutions secure critical data and systems, no matter where the attack originates or how major the attack or potential attack is perceived.","materialsDescription":" <span style=\"font-weight: bold;\">How Advanced Threat Protection Works?</span>\r\nThere are three primary goals of advanced threat protection: early detection (detecting potential threats before they have the opportunity to access critical data or breach systems), adequate protection (the ability to defend against detected threats swiftly), and response (the ability to mitigate threats and respond to security incidents). To achieve these goals, advanced threat protection services and solutions must offer several components and functions for comprehensive ATP:\r\n<ul><li><span style=\"font-weight: bold;\">Real-time visibility</span> – Without continuous monitoring and real-time visibility, threats are often detected too late. When damage is already done, response can be tremendously costly in terms of both resource utilization and reputation damage.</li><li><span style=\"font-weight: bold;\">Context</span> – For true security effectiveness, threat alerts must contain context to allow security teams to effectively prioritize threats and organize response.</li><li><span style=\"font-weight: bold;\">Data awareness</span> – It’s impossible to determine threats truly capable of causing harm without first having a deep understanding of enterprise data, its sensitivity, value, and other factors that contribute to the formulation of an appropriate response.</li></ul>\r\nWhen a threat is detected, further analysis may be required. Security services offering ATP typically handle threat analysis, enabling enterprises to conduct business as usual while continuous monitoring, threat analysis, and response occurs behind the scenes. Threats are typically prioritized by potential damage and the classification or sensitivity of the data at risk. Advanced threat protection should address three key areas:\r\n<ul><li>Halting attacks in progress or mitigating threats before they breach systems</li><li>Disrupting activity in progress or countering actions that have already occurred as a result of a breach</li><li>Interrupting the lifecycle of the attack to ensure that the threat is unable to progress or proceed</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon-ATP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unauthorized access to corporate IT systems and data"},{"id":336,"title":"Risk or Leaks of confidential information"}]}},"categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":824,"title":"ATP - Advanced Threat Protection","alias":"atp-advanced-threat-protection","description":" Advanced threat protection (ATP) refers to a category of security solutions that defend against sophisticated malware or hacking-based attacks targeting sensitive data. Advanced threat protection solutions can be available as software or as managed services. ATP solutions can differ in approaches and components, but most include some combination of endpoint agents, network devices, email gateways, malware protection systems, and a centralized management console to correlate alerts and manage defenses.\r\nThe primary benefit offered by advanced threat protection software is the ability to prevent, detect, and respond to new and sophisticated attacks that are designed to circumvent traditional security solutions such as antivirus, firewalls, and IPS/IDS. Attacks continue to become increasingly targeted, stealthy, and persistent, and ATP solutions take a proactive approach to security by identifying and eliminating advanced threats before data is compromised.\r\nAdvanced threat protection services build on this benefit by providing access to a global community of security professionals dedicated to monitoring, tracking, and sharing information about emerging and identified threats. ATP service providers typically have access to global threat information sharing networks, augmenting their own threat intelligence and analysis with information from third parties. When a new, advanced threat is detected, ATP service providers can update their defenses to ensure protection keeps up. This global community effort plays a substantial role in maintaining the security of enterprises around the world.\r\nEnterprises that implement advanced threat protection are better able to detect threats early and more quickly formulate a response to minimize damage and recover should an attack occur. A good security provider will focus on the lifecycle of an attack and manage threats in real-time. ATP providers notify the enterprise of attacks that have occurred, the severity of the attack, and the response that was initiated to stop the threat in its tracks or minimize data loss. Whether managed in-house or provided as a service, advanced threat protection solutions secure critical data and systems, no matter where the attack originates or how major the attack or potential attack is perceived.","materialsDescription":" <span style=\"font-weight: bold;\">How Advanced Threat Protection Works?</span>\r\nThere are three primary goals of advanced threat protection: early detection (detecting potential threats before they have the opportunity to access critical data or breach systems), adequate protection (the ability to defend against detected threats swiftly), and response (the ability to mitigate threats and respond to security incidents). To achieve these goals, advanced threat protection services and solutions must offer several components and functions for comprehensive ATP:\r\n<ul><li><span style=\"font-weight: bold;\">Real-time visibility</span> – Without continuous monitoring and real-time visibility, threats are often detected too late. When damage is already done, response can be tremendously costly in terms of both resource utilization and reputation damage.</li><li><span style=\"font-weight: bold;\">Context</span> – For true security effectiveness, threat alerts must contain context to allow security teams to effectively prioritize threats and organize response.</li><li><span style=\"font-weight: bold;\">Data awareness</span> – It’s impossible to determine threats truly capable of causing harm without first having a deep understanding of enterprise data, its sensitivity, value, and other factors that contribute to the formulation of an appropriate response.</li></ul>\r\nWhen a threat is detected, further analysis may be required. Security services offering ATP typically handle threat analysis, enabling enterprises to conduct business as usual while continuous monitoring, threat analysis, and response occurs behind the scenes. Threats are typically prioritized by potential damage and the classification or sensitivity of the data at risk. Advanced threat protection should address three key areas:\r\n<ul><li>Halting attacks in progress or mitigating threats before they breach systems</li><li>Disrupting activity in progress or countering actions that have already occurred as a result of a breach</li><li>Interrupting the lifecycle of the attack to ensure that the threat is unable to progress or proceed</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon-ATP.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/cobweb","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"forcepoint-ngfw-for-fusion-media-networks":{"id":829,"title":"Forcepoint NGFW for Fusion Media Networks","description":"<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\">Challenge</span><br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \">Designed and developed by in-house software engineers, Fusion’s VDC is a suite of service solutions that delivers infrastructure for data centers and IT operations as cloud-based services. VDC enables “cloud to desktop” solutions for new and existing customers, and brings the cloud and network closer together, helping Fusion provide improved service level agreements (SLAs).</span>\r\n<span style=\"color: rgb(97, 97, 97); \">By moving to the cloud, Fusion would be able to move from a CAPEX to OPEX model, resulting in reduced and better managed costs. Developing on the cloud meant that the company could grow rapidly without investing in physical hardware.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Security is a critical part of the VDC solution. Fusion needed to choose a security vendor who would be able to protect customer data onpremises, on mobile devices, and in the cloud while working within an affordable budget.</span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-style: italic;\">“There is no doubt that hackers are getting more sophisticated in their attack methods. Education is one of our biggest issues — remote office computers don’t always have the latest security updates, leaving them vulnerable to attack, and potentially posing a threat to our services.”</span> — Lee Norvall, CTO, Fusion Media Networks<br /><br /><span style=\"font-weight: bold;\">Solution</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">Initially, Fusion became a Forcepoint reseller after one of its partners recommended the company as a well-established player in the security market.</span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-style: italic;\">“Having sold the Forcepoint Next Generation Firewall for some time, we were confident in its ability to protect against Advanced Evasion Techniques (AETs). Additionally, after using the solution, we believed that the firewall would provide us with exactly the right level of security protection that both we and our customers were looking for.”</span> - Norvall</span>\r\n<span style=\"color: rgb(97, 97, 97); \">After a series of environment-wide product tests, Fusion decided to incorporate the Forcepoint NGFW into its VDC solution. Forcepoint NGFW provides centralized management, application awareness and user identification, intrusion prevention, Anti-Spam, Anti-Virus, web filtering and protection of remote offices from advanced evasion techniques.<br /><br /><span style=\"font-weight: bold;\">Results</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">The VDC solution, combined with Forcepoint’s robust security solution, enables Fusion’s customers to benefit from reliable data security and guaranteed network continuity as well as secure information flow between business units. Fusion hosts the NGFW off premises within the core network and enables one virtual instance of the firewall per customer.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Forcepoint NGFW provides network segmentation, server load balancing, and the possibility of utilizing reserve carrier capacity when Internet connections are overloaded. The solution provides Fusion with a clear view of its client’s data, enabling the company to offer full protection against threats, regardless of location. This means customers can benefit from zero disruption to services and concentrate on their core business activities.</span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-style: italic;\">“Our experience with Forcepoint NGFW has exceeded our expectations. To date, they have provided us with both reliable support and short response times to queries. Additionally, by making use of the security management center (SMC) to manage all queries from one centralized system, we have been able to cut costs by 30 percent.”</span>- Norvall<br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \">Fusion Media Networks has relied on Forcepoint security solutions since 2012.</span>","alias":"forcepoint-ngfw-for-fusion-media-networks","roi":0,"seo":{"title":"Forcepoint NGFW for Fusion Media Networks","keywords":"","description":"<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\">Challenge</span><br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \">Designed and developed by in-house software engineers, Fusion’s VDC is a suite of service solutions that delivers infr","og:title":"Forcepoint NGFW for Fusion Media Networks","og:description":"<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\">Challenge</span><br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \">Designed and developed by in-house software engineers, Fusion’s VDC is a suite of service solutions that delivers infr"},"deal_info":"","user":{"id":5736,"title":"Fusion Media Networks (Fusion)","logoURL":"https://old.roi4cio.com/uploads/roi/company/Fusion.png","alias":"fusion-media-networks-fusion","address":"","roles":[],"description":" Fusion Media Networks (Fusion) is a provider of network services, security, and Wide Area Network (WAN) connectivity for businesses in the United Kingdom and Europe. Based in Essex, England and launched in early 2004, the company has one of the largest and most sophisticated core network infrastructures in the UK. Fusion offers its customers a single point of contact for network, security, and end-toend business communication solutions.\r\nThe company manages multiple complex network solutions for clients delivered through both direct and partner channels, using skilled staff drawn from the IT and telecommunications sectors. Fusion is one of the UK’s top five network service providers.<br />\r\nFusion offers its solutions as managed services, fully monitored and controlled from its Network Operations Centre (NOC) comprising a team of experience and accredited technicians based in Southend, UK that deliver services with industry-leading SLAs.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.fmn.uk.net/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Fusion Media Networks (Fusion)","keywords":"","description":" Fusion Media Networks (Fusion) is a provider of network services, security, and Wide Area Network (WAN) connectivity for businesses in the United Kingdom and Europe. Based in Essex, England and launched in early 2004, the company has one of the largest and mo","og:title":"Fusion Media Networks (Fusion)","og:description":" Fusion Media Networks (Fusion) is a provider of network services, security, and Wide Area Network (WAN) connectivity for businesses in the United Kingdom and Europe. Based in Essex, England and launched in early 2004, the company has one of the largest and mo","og:image":"https://old.roi4cio.com/uploads/roi/company/Fusion.png"},"eventUrl":""},"supplier":{"id":178,"title":"Forcepoint","logoURL":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-domain solutions, the company is also known as Websense, Raytheon | Websense. </span>\r\n<span lang=\"en\"> Forcepoint solutions protect users, data and computing networks from attacks, as well as accidental and deliberate information leaks throughout the entire life cycle. Forcepoint protects data everywhere - in the office, on the road, in the cloud. This simplifies regulatory compliance and optimizes the cost of security solutions. Forcepoint allows you to focus on prioritization by automating day-to-day operations. </span>\r\n<span lang=\"en\">Forcepoint's clients include Fortune 500 and FTSE 100 leaders: AT&T, Deutsche Telecom, Canon, McDonanld's, UPS, Sheraton, Merill Lynch, Bank of America, PepsiCo Inc. and many others.</span> ","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":15,"vendorImplementationsCount":16,"vendorPartnersCount":0,"supplierPartnersCount":8,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:title":"Forcepoint","og:description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:image":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""},"vendors":[{"id":178,"title":"Forcepoint","logoURL":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-domain solutions, the company is also known as Websense, Raytheon | Websense. </span>\r\n<span lang=\"en\"> Forcepoint solutions protect users, data and computing networks from attacks, as well as accidental and deliberate information leaks throughout the entire life cycle. Forcepoint protects data everywhere - in the office, on the road, in the cloud. This simplifies regulatory compliance and optimizes the cost of security solutions. Forcepoint allows you to focus on prioritization by automating day-to-day operations. </span>\r\n<span lang=\"en\">Forcepoint's clients include Fortune 500 and FTSE 100 leaders: AT&T, Deutsche Telecom, Canon, McDonanld's, UPS, Sheraton, Merill Lynch, Bank of America, PepsiCo Inc. and many others.</span> ","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":15,"vendorImplementationsCount":16,"vendorPartnersCount":0,"supplierPartnersCount":8,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:title":"Forcepoint","og:description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:image":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":952,"logo":false,"scheme":false,"title":"Forcepoint NGFW","vendorVerified":1,"rating":"3.70","implementationsCount":3,"suppliersCount":0,"alias":"forcepoint-ngfw","companyTypes":[],"description":"<span style=\"color: #616161;\">Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers around the world, Forcepoint network security solutions enable businesses, government agencies and other organizations to address critical issues efficiently and economically.<br /></span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Decrypt traffic while safeguarding privacy</span><br />Inspect attacks and stolen data hidden inside encrypted SSL/TLS traffic while still protecting users' privacy.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Extend your network into the cloud</span><br />Deploy applications safely in Amazon Web Services, Azure, and VMware. Segment different service layers and manage virtual NGFWs and IPSs the same way as physical appliances.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Control access to web content</span><br />Limit users' access to entire categories of websites containing inappropriate or unsafe content with URL intelligence that’s depended upon around the globe.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Protect high-assurance systems</span><br />Safeguard your most sensitive, mission-critical networks and applications with Forcepoint’s renowned Sidewinder proxy technology.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Regain control of shadow IT</span><br />Understand the risk associated with unsanctioned cloud apps so you can redirect users to more appropriate apps or block them altogether.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Offer SD-WAN and NGFW security as an MSSP</span><br />Manage enterprise-grade connectivity and protection from your own multi-tenant systems, with a business model tailored to the needs of MSSPs.<br /></span>\r\n\r\n<span style=\"text-decoration: underline;\"><span style=\"font-weight: bold;\"><span style=\"color: #616161;\">Key features:</span></span></span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Modular appliances for every environment</span><br />Our broad range of appliances provide the right price-performance and form factor for each location; pluggable interface cards let you change networks with ease.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">High availability, mixed clustering</span><br />Active-active clustering lets you mix up to 16 different models of appliances for unrivaled scalability, longer lifecycles, and seamless updates without dropping packets.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Multi-link connectivity for SD-WAN</span><br />Broadband, wireless, and dedicated lines at each location can be centrally deployed and managed, providing full control over what traffic goes over each link with automated failover.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Automated, zero-downtime updates</span><br />Policy changes and software updates can be deployed to hundreds of firewalls and IPS devices around the world in minutes, not hours, without the need for service windows.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Policy-driven centralized management</span><br />Smart Policies describe your business processes in familiar terms and are automatically implemented throughout the network, managed in-house or via MSSP.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Actionable, interactive 360° visibility</span><br />Graphical dashboards and visualizations of network activity go beyond simple reporting, enabling admins to drill into events and respond to incidents faster.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Built-in NGFW, VPN, proxies, and more</span><br />Unparalleled security comes standard, from top-ranked Next Generation Firewall and IPS to rapid-setup VPNs and granular decryption, as well as our unique Sidewinder proxy technology.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Top-ranked anti-evasion defense</span><br />Multi-layer stream inspection defeats advanced attacks that traditional packet inspection can't detect—see for yourself in our Evader video series.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Human-centric endpoint context</span><br />Access policies can whitelist or blacklist specific endpoint apps, patch levels or AV status. Users' behaviors are consolidated into actionable dashboards.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Unified virtual and physical security</span><br />Native support for AWS, Azure, and VMware has the same capabilities, management, and high performance of our physical appliances.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">CASB and web security</span><br />Our reknowned URL filtering and industry-leading cloud services work together to protect your data and people as they use apps and web content.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Anti-malware sandboxing</span><br />Forcepoint Advanced Malware Detection blocks previously undetected ransomware, zero-days, and other attacks before they steal sensitive data or damage your systems.</span>","shortDescription":"With Forcepoint NGFW, you can deploy and manage thousands of firewalls, IPSs, VPNs and SD-WANs – in minutes, all from a single console.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint NGFW","keywords":"Forcepoint, NGFW, your, network, security, that, data, with","description":"<span style=\"color: #616161;\">Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers aroun","og:title":"Forcepoint NGFW","og:description":"<span style=\"color: #616161;\">Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers aroun"},"eventUrl":"","translationId":953,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":74,"title":"United Kingdom","name":"GBR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":400,"title":"High costs"},{"id":385,"title":"Risk of data loss or damage"},{"id":384,"title":"Risk of attacks by hackers"},{"id":382,"title":"High costs of IT personnel"},{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":282,"title":"Unauthorized access to corporate IT systems and data"}]}},"categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.forcepoint.com/resources/case-study/fusion-media-networks","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"forcepoint-ngfw-for-it-company":{"id":613,"title":"Forcepoint NGFW for IT company","description":"The results with Forcepoint NGFW have been extraordinary – outstanding performance, lower costs, and, most important, considerably fewer invasions.\r\nHendrik Walter\r\nIT Director Avency\r\n\r\nOVERVIEW\r\nAvency is a B2B digital services provider based in Telgte, Germany. The company is an independent ISP with more than 20 years of experience in providing online and various datacenter services. Avency provides domain, mail, hosted security and cloud services and builds and designs online applications.\r\nAvency currently hosts more than 1,200 websites/applications and 7,000 domains for a wide range of businesses including retail, social media, manufacturing, and nance. Avency’s focus on data center security is a key differentiator from other hosting companies.\r\nCHALLENGE\r\nAs IT director for Avency, Hendrik Walter is also Forcepoint’s first Accredited Channel Engineer (ACE) for NGFW in Germany. Walter and his team made a large investment in a proprietary ISP system that makes it completely independent and autonomous. Naturally, high availability and security were large concerns, particularly with regard to intrusion prevention and data loss prevention.\r\nTo meet its ongoing security requirements, the company decided to migrate its data center from Check Point to a more suitable solution.\r\nSOLUTION\r\nAvency ultimately chose to implement Forcepoint Next Generation Firewall (NGFW) with the Forcepoint Security Management Center (SMC).\r\n“After an extensive market evaluation, we realized that Forcepoint NGFW would offer superior performance, evasion protection, and cost benefits. Forcepoint is the only solution that offers mature multitenant capabilities. Plus, it offers a lower total cost of ownership since the SMC license includes built-in features that competitors lack.”\r\n— Hendrik Walter, IT Director, Avency\r\nProtected by Forcepoint NGFW, Avency offers several levels of security-based services to its clients. The most comprehensive is Managed Firewall Services, in which customers rent their firewalls from Avency and have full access to the SMC. Through Forcepoint NGFW’s multitenancy capabilities, Avency is able to provide each client with its own secure, separate domain that is inaccessible to other clients. Customers can access the SMC to manage their own firewalls, or they can contract with Avency to provide firewall management as needed.\r\n“With the domain management features of Forcepoint NGFW and the well-engineered role systems in SMC, the solution is multitenant in every way. With the reporting tool, clients can automatically receive weekly or monthly reports about attacks, traf c, and all other events.”\r\n— Walter\r\nThrough Avency’s Datacenter Firewall Services, customers outsource their IT infrastructures to Avency but maintain access to their rules, policies, and logs. These capabilities are powered by the SMC’s subrule feature and Web Portal Server.\r\nAlso through the SMC’s Web Portal Server, Avency offers a Web Hosting service that enables customers to view live log data. Armed with this data, clients can troubleshoot connection/speed issues and stay informed of attacks targeting their Web applications.\r\nRESULTS\r\nWith the built-in exibility of Forcepoint NGFW, Avency is able to write its own signatures and correlations in order to provide a perfect t with customer use cases.\r\n“The solution’s extremely robust log and reporting functionality, coupled with best-in-class alert and escalation management, means we can react three times faster to incidents than we could before. Also, the centralized management, API functionality, and intelligent domain/user model mean that admins and customer can work simultaneously on their own rules and elements.”\r\n— Walter\r\nAs Avency built momentum for its in-house use of Forcepoint NGFW, customers began to take notice.\r\n“Our clients were curious as to how we could offer these efficient and flexible security services at such a competitive price point. This prompted us to use our experience and confidence in the products to become a Forcepoint NGFW reseller.”\r\n— Walter\r\nThrough its Forcepoint NGFW reseller services, Avency actively monitors the customer rewalls around the clock and contacts the clients when critical events occur.\r\n“Clients pay only a fixed monthly fee. Even with only a small budget, they’re able to get best-in-class firewall protection with expert management, and without having to make a high upfront investment. Our results with Forcepoint NGFW have been extraordinary – outstanding performance, lower costs, and, most important, considerably fewer invasions. Forcepoint is the right partner with which to grow our firewall security business.”\r\n— Walter\r\nAvency has relied on Forcepoint solutions since 2012. ","alias":"forcepoint-ngfw-for-it-company","roi":0,"seo":{"title":"Forcepoint NGFW for IT company","keywords":"Avency, Forcepoint, with, NGFW, Walter, that, clients, security","description":"The results with Forcepoint NGFW have been extraordinary – outstanding performance, lower costs, and, most important, considerably fewer invasions.\r\nHendrik Walter\r\nIT Director Avency\r\n\r\nOVERVIEW\r\nAvency is a B2B digital services provider based in Telgte, Ger","og:title":"Forcepoint NGFW for IT company","og:description":"The results with Forcepoint NGFW have been extraordinary – outstanding performance, lower costs, and, most important, considerably fewer invasions.\r\nHendrik Walter\r\nIT Director Avency\r\n\r\nOVERVIEW\r\nAvency is a B2B digital services provider based in Telgte, Ger"},"deal_info":"","user":{"id":5040,"title":"Cegedim","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cegedim.jpg","alias":"cegedim","address":"","roles":[],"description":"Founded in 1969, Cegedim is a global provider of technology and data services to healthcare organizations, life sciences companies, healthcare professionals, and insurance companies. The world leader in customer relationship management (CRM) for the life sciences industry, Cegedim supplies services, technological tools, specialized software, data flow management services, and databases. The company is also one of the leading providers of strategic healthcare industry data. Cegedim has 8,000 employees in more than 80 countries.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cegedim","keywords":"","description":"Founded in 1969, Cegedim is a global provider of technology and data services to healthcare organizations, life sciences companies, healthcare professionals, and insurance companies. The world leader in customer relationship management (CRM) for the life scien","og:title":"Cegedim","og:description":"Founded in 1969, Cegedim is a global provider of technology and data services to healthcare organizations, life sciences companies, healthcare professionals, and insurance companies. The world leader in customer relationship management (CRM) for the life scien","og:image":"https://old.roi4cio.com/uploads/roi/company/Cegedim.jpg"},"eventUrl":""},"supplier":{"id":178,"title":"Forcepoint","logoURL":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-domain solutions, the company is also known as Websense, Raytheon | Websense. </span>\r\n<span lang=\"en\"> Forcepoint solutions protect users, data and computing networks from attacks, as well as accidental and deliberate information leaks throughout the entire life cycle. Forcepoint protects data everywhere - in the office, on the road, in the cloud. This simplifies regulatory compliance and optimizes the cost of security solutions. Forcepoint allows you to focus on prioritization by automating day-to-day operations. </span>\r\n<span lang=\"en\">Forcepoint's clients include Fortune 500 and FTSE 100 leaders: AT&T, Deutsche Telecom, Canon, McDonanld's, UPS, Sheraton, Merill Lynch, Bank of America, PepsiCo Inc. and many others.</span> ","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":15,"vendorImplementationsCount":16,"vendorPartnersCount":0,"supplierPartnersCount":8,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:title":"Forcepoint","og:description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:image":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""},"vendors":[{"id":178,"title":"Forcepoint","logoURL":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png","alias":"forcepoint","address":"Forcepoint Title","roles":[],"description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-domain solutions, the company is also known as Websense, Raytheon | Websense. </span>\r\n<span lang=\"en\"> Forcepoint solutions protect users, data and computing networks from attacks, as well as accidental and deliberate information leaks throughout the entire life cycle. Forcepoint protects data everywhere - in the office, on the road, in the cloud. This simplifies regulatory compliance and optimizes the cost of security solutions. Forcepoint allows you to focus on prioritization by automating day-to-day operations. </span>\r\n<span lang=\"en\">Forcepoint's clients include Fortune 500 and FTSE 100 leaders: AT&T, Deutsche Telecom, Canon, McDonanld's, UPS, Sheraton, Merill Lynch, Bank of America, PepsiCo Inc. and many others.</span> ","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":15,"vendorImplementationsCount":16,"vendorPartnersCount":0,"supplierPartnersCount":8,"b4r":0,"categories":{},"companyUrl":"www.forcepoint.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Forcepoint","keywords":"Forcepoint, from, Websense, Raytheon, security, data, employees, browsing","description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:title":"Forcepoint","og:description":"<span lang=\"en\">Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-do","og:image":"https://old.roi4cio.com/uploads/roi/company/forcepoint_logo.png"},"eventUrl":""}],"products":[{"id":952,"logo":false,"scheme":false,"title":"Forcepoint NGFW","vendorVerified":1,"rating":"3.70","implementationsCount":3,"suppliersCount":0,"alias":"forcepoint-ngfw","companyTypes":[],"description":"<span style=\"color: #616161;\">Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers around the world, Forcepoint network security solutions enable businesses, government agencies and other organizations to address critical issues efficiently and economically.<br /></span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Decrypt traffic while safeguarding privacy</span><br />Inspect attacks and stolen data hidden inside encrypted SSL/TLS traffic while still protecting users' privacy.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Extend your network into the cloud</span><br />Deploy applications safely in Amazon Web Services, Azure, and VMware. Segment different service layers and manage virtual NGFWs and IPSs the same way as physical appliances.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Control access to web content</span><br />Limit users' access to entire categories of websites containing inappropriate or unsafe content with URL intelligence that’s depended upon around the globe.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Protect high-assurance systems</span><br />Safeguard your most sensitive, mission-critical networks and applications with Forcepoint’s renowned Sidewinder proxy technology.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Regain control of shadow IT</span><br />Understand the risk associated with unsanctioned cloud apps so you can redirect users to more appropriate apps or block them altogether.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-weight: bold;\">Offer SD-WAN and NGFW security as an MSSP</span><br />Manage enterprise-grade connectivity and protection from your own multi-tenant systems, with a business model tailored to the needs of MSSPs.<br /></span>\r\n\r\n<span style=\"text-decoration: underline;\"><span style=\"font-weight: bold;\"><span style=\"color: #616161;\">Key features:</span></span></span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Modular appliances for every environment</span><br />Our broad range of appliances provide the right price-performance and form factor for each location; pluggable interface cards let you change networks with ease.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">High availability, mixed clustering</span><br />Active-active clustering lets you mix up to 16 different models of appliances for unrivaled scalability, longer lifecycles, and seamless updates without dropping packets.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Multi-link connectivity for SD-WAN</span><br />Broadband, wireless, and dedicated lines at each location can be centrally deployed and managed, providing full control over what traffic goes over each link with automated failover.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Automated, zero-downtime updates</span><br />Policy changes and software updates can be deployed to hundreds of firewalls and IPS devices around the world in minutes, not hours, without the need for service windows.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Policy-driven centralized management</span><br />Smart Policies describe your business processes in familiar terms and are automatically implemented throughout the network, managed in-house or via MSSP.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Actionable, interactive 360° visibility</span><br />Graphical dashboards and visualizations of network activity go beyond simple reporting, enabling admins to drill into events and respond to incidents faster.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Built-in NGFW, VPN, proxies, and more</span><br />Unparalleled security comes standard, from top-ranked Next Generation Firewall and IPS to rapid-setup VPNs and granular decryption, as well as our unique Sidewinder proxy technology.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Top-ranked anti-evasion defense</span><br />Multi-layer stream inspection defeats advanced attacks that traditional packet inspection can't detect—see for yourself in our Evader video series.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Human-centric endpoint context</span><br />Access policies can whitelist or blacklist specific endpoint apps, patch levels or AV status. Users' behaviors are consolidated into actionable dashboards.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Unified virtual and physical security</span><br />Native support for AWS, Azure, and VMware has the same capabilities, management, and high performance of our physical appliances.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">CASB and web security</span><br />Our reknowned URL filtering and industry-leading cloud services work together to protect your data and people as they use apps and web content.</span>\r\n<span style=\"color: #616161;\"><span style=\"font-style: italic;\">Anti-malware sandboxing</span><br />Forcepoint Advanced Malware Detection blocks previously undetected ransomware, zero-days, and other attacks before they steal sensitive data or damage your systems.</span>","shortDescription":"With Forcepoint NGFW, you can deploy and manage thousands of firewalls, IPSs, VPNs and SD-WANs – in minutes, all from a single console.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forcepoint NGFW","keywords":"Forcepoint, NGFW, your, network, security, that, data, with","description":"<span style=\"color: #616161;\">Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers aroun","og:title":"Forcepoint NGFW","og:description":"<span style=\"color: #616161;\">Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers aroun"},"eventUrl":"","translationId":953,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unauthorized access to corporate IT systems and data"},{"id":384,"title":"Risk of attacks by hackers"},{"id":336,"title":"Risk or Leaks of confidential information"}]}},"categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.forcepoint.com/sites/default/files/case_study_downloads/casestudy_cegedim_en.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}},"aliases":{"1":["forcepoint-ngfw-for-a-cloud-company","forcepoint-ngfw-for-fusion-media-networks","forcepoint-ngfw-for-it-company"]},"links":{"first":"http://apis.roi4cio.com/api/implementations?page=1","last":"http://apis.roi4cio.com/api/implementations?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://apis.roi4cio.com/api/implementations","per_page":20,"to":3,"total":3},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}