{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementations":{"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"more":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"en":"From Z to A","ru":"от Я до А","_type":"localeString"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"_type":"localeString","en":"Rating descending","ru":"По убыванию рейтинга"},"sort-discount-asc":{"en":"Rebate ascending","ru":"По возрастанию скидки","_type":"localeString"},"sort-discount-desc":{"ru":"По убыванию скидки","_type":"localeString","en":"Rebate descending"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"product":{"_type":"localeString","en":"Product","ru":"Продукт"},"no-results":{"_type":"localeString","en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос."},"with-reference":{"_type":"localeString","en":"With reference","ru":"С референсом"},"items-found":{"_type":"localeString","en":"Deployments found","ru":"Внедрений найдено"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"_type":"localeString","en":"Deal in progress","ru":"Сделка в процессе"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"roi":{"en":"ROI","ru":"ROI","_type":"localeString"},"implementations-fetching-error":{"_type":"localeString","en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу."}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"_type":"localeString","en":"Sign out","ru":"Выйти"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"_type":"localeString","en":"from","ru":"от"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"_type":"localeString","en":"Filter by price","ru":"Фильтр по цене"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"category":{"_type":"localeString","en":"Category","ru":"Категория"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"en":"Add Product","ru":"Добавить продукт","_type":"localeString"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"en":"Filter","ru":"Фильтр","_type":"localeString"},"clear-button":{"_type":"localeString","en":"Сlear","ru":"Очистить"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"en":"Providers","ru":"Поставщик, производитель","_type":"localeString"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"en":"Suggest product","ru":"Предложить продукт","_type":"localeString"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"en":"Bonus 4 Reference","ru":"Бонус за референс","_type":"localeString"},"product-categories":{"en":"Product Categories","ru":"Категории продуктов","_type":"localeString"},"countries":{"en":"Countries","ru":"Страны","_type":"localeString"},"seller":{"ru":"Продавец","_type":"localeString","en":"Seller"},"vendors":{"_type":"localeString","en":"User products vendors","ru":"Производители продуктов пользователя"},"suppliers":{"_type":"localeString","en":"User suppliers","ru":"Поставщики пользователя"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"_type":"localeString","en":" Branch","ru":"Отрасль"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"en":"Info source","ru":"Информационный ресурс","_type":"localeString"},"with-reference-checkbox":{"ru":"С референсами","_type":"localeString","en":"With reference"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"en":"Find","ru":"Выполнить поиск","_type":"localeString"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"_type":"localeString","en":"Add company","ru":"Добавить компанию"},"add-implementation":{"en":"Add deployment","ru":"Добавить внедрение","_type":"localeString"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"en":"Supply type","ru":"Тип поставки","_type":"localeString"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"en":"Deal closed","ru":"Сделка закрыта","_type":"localeString"},"deal-in-progress":{"_type":"localeString","en":"Deal in progress","ru":"Сделка в процессе"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"en":"Finished","ru":"Завершено","_type":"localeString"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"_type":"localeString","en":"Proof of concept","ru":"Пилотный проект"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"_type":"localeString","en":"Competencies","ru":"Компетенции"}}},"translationsStatus":{"implementations":"success","filters":"success"},"sections":{"implementations-text-block":{"body":{"en":[{"markDefs":[],"children":[{"_key":"0e40f9075bd00","_type":"span","marks":[],"text":"The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference."}],"_type":"block","style":"normal","_key":"0e40f9075bd0"}],"ru":[{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Каталог внедрений ROI4CIO - это база данных о внедрениях программного обеспечения, оборудования и ИТ-услуг. Находите внедрения по вендору, поставщику, пользователю, бизнес-задачам, проблемам, статусу, фильтруйте по наличию ROI и референса.","_key":"1435aa0421110"}],"_type":"block","style":"normal","_key":"1435aa042111"}],"_type":"localeBlock"},"label":"catalog-implementations-text-block"}},"sectionsStatus":{"implementations-text-block":"success"},"pageMetaData":{"implementations":{"translatable_meta":[{"name":"og:title","translations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"}},{"name":"og:description","translations":{"en":"Implementations","ru":"Каталог внедрений различных видов программного обеспечения, ИТ проектов. Результаты внедрений ИТ, результаты, референсы, ROI","_type":"localeString"}},{"name":"title","translations":{"ru":"Внедрения","_type":"localeString","en":"Implementations"}},{"name":"description","translations":{"ru":"Описание внедрений","_type":"localeString","en":"Implementations description"}},{"translations":{"ru":"Внедрения ключевые слова","_type":"localeString","en":"Implementations keywords"},"name":"keywords"}],"title":{"_type":"localeString","en":"ROI4CIO: Implementations","ru":"ROI4CIO: Внедрения"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"implementations":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"cyberbit-scadashield-for-international-airport":{"id":859,"title":"Cyberbit SCADAShield for International Airport","description":"<span style=\"font-weight: bold;\">About company</span>\r\nThe customer is one of the 10 busiest airports in the world; an important regional transshipment center and passener hub. With over 50,000 employees and flights by hundreds of operators to destinations around the world. The airport has dozens of SCADA systems and OT networks in place that cover every aspect of airport operations - from check-in and baggage handling to electricity generation and A/C.<br /><span style=\"font-weight: bold;\"><br />The challenge</span>\r\nAs with many critical infrastructure organizations, the airport’s OT and IT networks were insecure by design as they were built primarily to ensure availability, rather than to be secure.<br />This means the architecture was flat, with minimal internal segregation, authentication controls were lacking, and patching was simply not a priority. Like all major airports, they have numerous OT assets and protocolsin place including:\r\n<ul><li>TIM luggage handling and security</li></ul>\r\n<ul><li>Siemens baggage handling</li></ul>\r\n<ul><li>TIBCO Fast Data technology stack</li></ul>\r\n<ul><li>TIBCO Enterprise Service Bus (ESB)</li></ul>\r\n<ul><li>StreamBase Complex Event Processing (CEP)</li></ul>\r\n<ul><li>Live Datamart business rules engines</li></ul>\r\n<ul><li>Inductive Automation’s Ignition SCADA</li></ul>\r\n<ul><li>SITA/ARINC (international protocol for information)</li></ul>\r\n<ul><li>Luggage carousels</li></ul>\r\n<ul><li>Electricity generation and control</li></ul>\r\n<ul><li>Climate control</li></ul>\r\n<ul><li>AirTrain (FMSS)</li></ul>\r\nAll major transportation hubs are high-value targets for cyber attackers motivated by financial gain or sponsored by nationstates. The most menacing threat is APT (advanced persistent threats) in which hackers gain network access and stay inside, undetected, for an extended period of time carrying out stealthy reconnaissance and data collection. In this case, the massively complex, highly-distributed and interconnected airport operational computing environment left numerous security blind spots open to potential attackers. These included switches and routers supplied by top-tier vendors frequently targeted by hackers, infrastructure running legacy operating systems, and OT systems left exposed to the Internet via VPN and other online maintenance channels.<br /><br /><span style=\"font-weight: bold;\">The solution</span>\r\nThe airport chose Cyberbit’s SCADAShield platform to map, monitor and continuously protect its OT networks against cyberthreats. The first step was to leverage SCADAShield’s network mapping capabilities to create an up-to-date map of all network assets. This visualization helped network managers understand all the IT/OT touch points and identify vulnerabilities such as unpatched devices, insecure protocols, unidentified hosts and other configuration issues.\r\nThe airport was able to quickly gain deeper visibility and granular insights into its OT assets – including vendors, models, software versions, OS, roles, and types. This mapping clearly demonstrated significant IT/OT touchpoints - meaning that any attack coming from an infected IT endpoint (like a workstation becoming infected via a phishing email sent to an employee) could immediately threaten mission-critical OT networks, too.\r\nThe airport then used SCADAShield to conduct an extensive vulnerability audit. This process included identifying suspicious traffic, unencrypted protocols, unpatched systems and old system versions – as well as risk assessment and remediation prioritization.\r\nCyberbit then remediated the issues discovered. Without interrupting operations, SCADAShield patched high-risk assets, strengthened vulnerable assets and protocols, upgraded outdated versions, and segregated the networks in accordance with the Purdue Model for Control Hierarchy. <br />Moreover, SCADAShield provides continuous scanning and automatically builds and enforces network and operation policies. It provide the airport with continuous security monitoring – detecting zero-day attacks, monitoring risk levels, and enabling ongoing OT network change management to maintain a high level of security<br /><br /><span style=\"font-weight: bold;\">The benefits</span>\r\nWith SCADAShield, the airport is protected against cyberthreats and the OT network is monitored; creating alerts about potential security threats and additional non-security related operational malfunctioning. By providing visibility over the entire airport network – including assets, communications and processes – SCADAShield measurably improved the airport’s mass transportation management from routing, baggage handling, check-in and beyond.","alias":"cyberbit-scadashield-for-international-airport","roi":0,"seo":{"title":"Cyberbit SCADAShield for International Airport","keywords":"","description":"<span style=\"font-weight: bold;\">About company</span>\r\nThe customer is one of the 10 busiest airports in the world; an important regional transshipment center and passener hub. With over 50,000 employees and flights by hundreds of operators to destinations aro","og:title":"Cyberbit SCADAShield for International Airport","og:description":"<span style=\"font-weight: bold;\">About company</span>\r\nThe customer is one of the 10 busiest airports in the world; an important regional transshipment center and passener hub. With over 50,000 employees and flights by hundreds of operators to destinations aro"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":5133,"title":"Cyberbit","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cyberbit_logo.jpg","alias":"cyberbit","address":"","roles":[],"description":" Cyberbit is the world-leading provider of cyber ranges for cybersecurity training and simulation. Cyberbit is also the first to provide consolidated threat detection and response platform that includes: security orchestration, automation, and response (SOAR), ICS security for OT networks, and endpoint detection and response (EDR) powered by behavioral analysis.\r\nThis unique platform provides unified detection and response protecting an organization’s entire attack surface across IT, OT and IoT networks.\r\nSince founded in mid-2015 Cyberbit’s products are rapidly adopted by enterprises, governments, higher education institutions, and MSSPs. Cyberbit’s investors include Elbit Systems (NASDAQ: ESLT) and Claridge Israel.\r\nCyberbit has offices in Israel, the US, Europe, and Asia.\r\nSource: https://www.linkedin.com/company/cyberbit/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.cyberbit.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cyberbit","keywords":"","description":" Cyberbit is the world-leading provider of cyber ranges for cybersecurity training and simulation. Cyberbit is also the first to provide consolidated threat detection and response platform that includes: security orchestration, automation, and response (SOAR),","og:title":"Cyberbit","og:description":" Cyberbit is the world-leading provider of cyber ranges for cybersecurity training and simulation. Cyberbit is also the first to provide consolidated threat detection and response platform that includes: security orchestration, automation, and response (SOAR),","og:image":"https://old.roi4cio.com/uploads/roi/company/Cyberbit_logo.jpg"},"eventUrl":""},"vendors":[],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":180,"title":"Inability to forecast execution timelines"},{"id":282,"title":"Unauthorized access to corporate IT systems and data"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":340,"title":"Low quality of customer service"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.cyberbit.com/wp-content/resources/uploads/2018/10/11094212/Airport-Cybersecurity-Cyberbit-SCADAShield-Case-Study.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"cyberbit-scadashield-cyberbit-edr-for-leading-european-energy-utility":{"id":861,"title":"Cyberbit SCADAShield, Cyberbit EDR for Leading European Energy Utility","description":"<span style=\"font-weight: bold;\">The Utility</span>\r\nA major energy utility of a European country, with dozens of geographically dispersed electrical substations. The utility holds two SCADA command and control centers for the transmission grid – a main site and a disaster recovery site, Using different SCADA protocols, standard and proprietary, and multiple vendors’ equipment.<br /><br />\r\n<span style=\"font-weight: bold;\">The challenge</span>\r\nThe utility operates, amongst new equipment, old and unsecured legacy equipment, which leaves it exposed to cyber security attacks, unknown malfunctions, human errors and tampering attempts with insufficient detection capabilities and network visibility. This combination of varied risks and deficient network visibility and detection directly influences system downtime, resulting in financial, reputational and even legal implications. Moreover, the utility worries about network policy violation performed by both employees and system technicians, that don’t fully obey regulation restrictions and thus impose yet additional threats on the OT network.\r\nUsing no inspection and monitoring solution, network visibility and security remain neglected and unnoticeable, leaving the network unreliable and unsafe. The utility had no capability of monitoring and tracking any action performed in the network, moreover its consequences. There was a crucial need to obtain visibility and see what actually occurred in the network in order to assure continuous network operability and full ongoing functionality. <br /><br />\r\n<span style=\"font-weight: bold;\">The Solution</span>\r\nThe utility understood it needed to combine a tool that will allow it to gain full OT network safety and reliability and add End Point security to it.\r\nCyberbit EDR is an end point detection and response solution.\r\nBy using SCADAShield, the utility’s network operators gained visibility of their network for the first time – which included seeing and investigating network transmissions, mapping both SCADA and non SCADA network assets, and obtaining a real, updated, network map.\r\nBy using automated whitelisting and blacklisting capabilities, EDR for SCADA detects anomalous network activity, generates alerts, and allows the SCADA operators to conduct forensic investigation by breaking down the protocol using deep packet inspection (DPI). All network transmissions can be then investigated in order to understand and analyze all the data.\r\nCyberbit EDR seamlessly integrated to the organization’s existing HP ArcSight SIEM, reporting its alerts directly to it.<br /><br />\r\n<span style=\"font-weight: bold;\">The Results</span>\r\nThe utility finally gained OT network visibility, reliability and security, and is now able to see, investigate and monitor all transmissions within the OT network.\r\nThe utility’s network operators can now assure operational continuity and ascertain minimum downtime, by identifying policy violations and unauthorized communications and tracking anomalous network activity caused by security threats, system malfunctions and operational.\r\n<span style=\"font-style: italic;\">“The ability to see what is going on in our network enables us to follow for the first time after problematic transmissions and understand their origins and their cause. Seeing a true network map of our network allows us to be more efficient and knowledgeable when analyzing operational and security risks, and to respond to them better and more adequately.”</span>","alias":"cyberbit-scadashield-cyberbit-edr-for-leading-european-energy-utility","roi":0,"seo":{"title":"Cyberbit SCADAShield, Cyberbit EDR for Leading European Energy Utility","keywords":"","description":"<span style=\"font-weight: bold;\">The Utility</span>\r\nA major energy utility of a European country, with dozens of geographically dispersed electrical substations. The utility holds two SCADA command and control centers for the transmission grid – a main site a","og:title":"Cyberbit SCADAShield, Cyberbit EDR for Leading European Energy Utility","og:description":"<span style=\"font-weight: bold;\">The Utility</span>\r\nA major energy utility of a European country, with dozens of geographically dispersed electrical substations. The utility holds two SCADA command and control centers for the transmission grid – a main site a"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":5133,"title":"Cyberbit","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cyberbit_logo.jpg","alias":"cyberbit","address":"","roles":[],"description":" Cyberbit is the world-leading provider of cyber ranges for cybersecurity training and simulation. Cyberbit is also the first to provide consolidated threat detection and response platform that includes: security orchestration, automation, and response (SOAR), ICS security for OT networks, and endpoint detection and response (EDR) powered by behavioral analysis.\r\nThis unique platform provides unified detection and response protecting an organization’s entire attack surface across IT, OT and IoT networks.\r\nSince founded in mid-2015 Cyberbit’s products are rapidly adopted by enterprises, governments, higher education institutions, and MSSPs. Cyberbit’s investors include Elbit Systems (NASDAQ: ESLT) and Claridge Israel.\r\nCyberbit has offices in Israel, the US, Europe, and Asia.\r\nSource: https://www.linkedin.com/company/cyberbit/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.cyberbit.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cyberbit","keywords":"","description":" Cyberbit is the world-leading provider of cyber ranges for cybersecurity training and simulation. Cyberbit is also the first to provide consolidated threat detection and response platform that includes: security orchestration, automation, and response (SOAR),","og:title":"Cyberbit","og:description":" Cyberbit is the world-leading provider of cyber ranges for cybersecurity training and simulation. Cyberbit is also the first to provide consolidated threat detection and response platform that includes: security orchestration, automation, and response (SOAR),","og:image":"https://old.roi4cio.com/uploads/roi/company/Cyberbit_logo.jpg"},"eventUrl":""},"vendors":[],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":180,"title":"Inability to forecast execution timelines"},{"id":282,"title":"Unauthorized access to corporate IT systems and data"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":340,"title":"Low quality of customer service"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.cyberbit.com/wp-content/resources/uploads/2017/07/12092130/SCADAShield-Power_Transmission_CaseStudy.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"cyberbit-soc-3d-for-bank-leumi":{"id":863,"title":"Cyberbit SOC 3D for Bank Leumi","description":"<span style=\"font-weight: bold; \">About Bank</span>\r\nBank Leumi is Israel’s largest bank with US$300 billion in assets, 2.5 million customers, 14,000 employees, more than 300 branches worldwide and tens of thousands of assets to protect.\r\nThe bank operates a 24/7 Cyber SOC, facing hundreds of security alerts per day.<br /><br />\r\n<span style=\"font-weight: bold; \">The challenge</span>\r\nBank Leumi understood that with the growing complexity, frequency, consistency, and variety of cyber threats imposed on financial institutions, the amount of information needed to be handled to mitigate these threats is ever growing.\r\nThe mitigation processes involve a myriad of people and teams, all need to be orchestrated and managed together to supply quick response and mitigation.\r\nUsing the existing technologies – SIEM, CRM, Ticketing, Email – did not provide the automation, situational awareness, knowledge and process management capabilities required to effectively mitigate the threats and shorten the timeframes required for response.\r\nThe bank also needed to integrate and collaborate its intelligence information with network- collected information, and provide reports and updates periodically to its management and internal audit teams.<br /><br />\r\n<span style=\"font-weight: bold; \">The Solution</span>\r\nAfter examining a few existing solutions, Bank Leumi chose to implement Cyberbit SOC 3D (SOC Management Platform).\r\nSOC 3D seamlessly integrated to the bank’s SIEM, automatically receiving alerts and relevant information.<br />Using Cyberbit SOC 3D, the SOC personnel can now focus on the core mission of protecting the bank’s assets and responding to cyber threats, using automated procedures, workflows, and reporting mechanisms that save time and allow the team to concentrate full attention on mitigating the threat.\r\nSOC 3D audit trail and documentation capabilities allow for post-incident investigation and drawing conclusions, leading to constant improvement of SOC procedures and incident management processes.\r\nUsing the system, the bank is now able to maintain situational awareness of its cyber domain and of the SOC operations, and easily send general and incident reports to the management and bank audit teams.\r\nThe system’s automatic capabilities link similar incidents automatically, allowing the bank to leverage the knowledge and experience gained in previous incidents easily.\r\nSOC 3D now serves as a single interface for all related cyber events and is the bank’s primary cyber management and control system.\r\nCyberbit SOC 3D solution was chosen due to its automation capabilities, intuitive and easy-to use UI, easy implementation, and its advanced and efficient retrieval capabilities, which exceeded the competition.\r\n<span style=\"font-style: italic;\">“Implementing SOC 3D allowed our team to be more effective decreasing response times by 30% - with out-of-the-box capabilities to interlink, document and follow up on any relevant data”</span><br /><br />\r\n<span style=\"font-weight: bold;\">The Results</span>\r\nBank Leumi identifies that the most notable result is the time saved while handling each incident - allowing the team to focus on the threat and response measures rather than be distracted by procedural tasks and documentation.\r\nUsing the reports and situational awareness modules, the SOC obtains an updated situational awareness picture, allowing its managers and decision makers to better manage their SOC resources, improve its operations and procedures to meet the ever changing needs and challenges in confronting cyber threats.\r\n<span style=\"font-style: italic;\">“For the first time since our SOC was established, we have a capability to overview, investigate and examine our procedures and processes thoroughly and without effort, and constantly improve our operations and methodologies to meet real-world challenges”</span>","alias":"cyberbit-soc-3d-for-bank-leumi","roi":0,"seo":{"title":"Cyberbit SOC 3D for Bank Leumi","keywords":"","description":"<span style=\"font-weight: bold; \">About Bank</span>\r\nBank Leumi is Israel’s largest bank with US$300 billion in assets, 2.5 million customers, 14,000 employees, more than 300 branches worldwide and tens of thousands of assets to protect.\r\nThe bank operates a 2","og:title":"Cyberbit SOC 3D for Bank Leumi","og:description":"<span style=\"font-weight: bold; \">About Bank</span>\r\nBank Leumi is Israel’s largest bank with US$300 billion in assets, 2.5 million customers, 14,000 employees, more than 300 branches worldwide and tens of thousands of assets to protect.\r\nThe bank operates a 2"},"deal_info":"","user":{"id":5888,"title":"Bank Leumi","logoURL":"https://old.roi4cio.com/uploads/roi/company/leumi.jpg","alias":"bank-leumi","address":"","roles":[],"description":" Leumi is Israel's oldest banking corporation and one of the leading and largest corporations in the Middle East. Leumi operates some 250 branches across Israel, along with branches and representatives in major financial hubs around the world. The Leumi Group provides banking services to all types of customers, from households, through small and medium enterprises, to giant corporations. Leumi currently leads the digital banking sector in Israel with a host of innovative digital products and services.\r\n\r\nSource: https://english.leumi.co.il/Articles/12910/","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.leumi.co.il/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Bank Leumi","keywords":"","description":" Leumi is Israel's oldest banking corporation and one of the leading and largest corporations in the Middle East. Leumi operates some 250 branches across Israel, along with branches and representatives in major financial hubs around the world. The Leumi Group ","og:title":"Bank Leumi","og:description":" Leumi is Israel's oldest banking corporation and one of the leading and largest corporations in the Middle East. Leumi operates some 250 branches across Israel, along with branches and representatives in major financial hubs around the world. The Leumi Group ","og:image":"https://old.roi4cio.com/uploads/roi/company/leumi.jpg"},"eventUrl":""},"supplier":{"id":5133,"title":"Cyberbit","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cyberbit_logo.jpg","alias":"cyberbit","address":"","roles":[],"description":" Cyberbit is the world-leading provider of cyber ranges for cybersecurity training and simulation. Cyberbit is also the first to provide consolidated threat detection and response platform that includes: security orchestration, automation, and response (SOAR), ICS security for OT networks, and endpoint detection and response (EDR) powered by behavioral analysis.\r\nThis unique platform provides unified detection and response protecting an organization’s entire attack surface across IT, OT and IoT networks.\r\nSince founded in mid-2015 Cyberbit’s products are rapidly adopted by enterprises, governments, higher education institutions, and MSSPs. Cyberbit’s investors include Elbit Systems (NASDAQ: ESLT) and Claridge Israel.\r\nCyberbit has offices in Israel, the US, Europe, and Asia.\r\nSource: https://www.linkedin.com/company/cyberbit/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.cyberbit.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cyberbit","keywords":"","description":" Cyberbit is the world-leading provider of cyber ranges for cybersecurity training and simulation. Cyberbit is also the first to provide consolidated threat detection and response platform that includes: security orchestration, automation, and response (SOAR),","og:title":"Cyberbit","og:description":" Cyberbit is the world-leading provider of cyber ranges for cybersecurity training and simulation. Cyberbit is also the first to provide consolidated threat detection and response platform that includes: security orchestration, automation, and response (SOAR),","og:image":"https://old.roi4cio.com/uploads/roi/company/Cyberbit_logo.jpg"},"eventUrl":""},"vendors":[],"products":[],"countries":[{"id":98,"title":"Israel","name":"ISR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":9,"title":"Support Decision Making"},{"id":254,"title":"Centralize management"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":336,"title":"Risk or Leaks of confidential information"},{"id":378,"title":"Low employee productivity"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":394,"title":"Shortage of information for decision making"},{"id":397,"title":"Insufficient risk management"},{"id":400,"title":"High costs"},{"id":177,"title":"Decentralized IT systems"}]}},"categories":[],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.cyberbit.com/wp-content/resources/uploads/2016/09/21134320/Leumi-Case-Study-Update-v1.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}},"aliases":{"1":["cyberbit-scadashield-for-international-airport","cyberbit-scadashield-cyberbit-edr-for-leading-european-energy-utility","cyberbit-soc-3d-for-bank-leumi"]},"links":{"first":"http://apis.roi4cio.com/api/implementations?page=1","last":"http://apis.roi4cio.com/api/implementations?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://apis.roi4cio.com/api/implementations","per_page":20,"to":3,"total":3},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}