{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementations":{"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"more":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"_type":"localeString","en":"Rating descending","ru":"По убыванию рейтинга"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"ru":"По убыванию скидки","_type":"localeString","en":"Rebate descending"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"product":{"en":"Product","ru":"Продукт","_type":"localeString"},"no-results":{"_type":"localeString","en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос."},"with-reference":{"ru":"С референсом","_type":"localeString","en":"With reference"},"items-found":{"ru":"Внедрений найдено","_type":"localeString","en":"Deployments found"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"en":"Finished","ru":"Завершено","_type":"localeString"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"roi":{"ru":"ROI","_type":"localeString","en":"ROI"},"implementations-fetching-error":{"en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"_type":"localeString","en":"Company name","ru":"Компания"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"_type":"localeString","en":"Received ROI","ru":"Полученный ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"_type":"localeString","en":"View","ru":"Вид"},"sort-type-label":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"category":{"en":"Category","ru":"Категория","_type":"localeString"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"_type":"localeString","en":"Add Product","ru":"Добавить продукт"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"_type":"localeString","en":"Сlear","ru":"Очистить"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"en":"product categories","ru":"категориz продуктаhjle","_type":"localeString"},"providers-field":{"_type":"localeString","en":"Providers","ru":"Поставщик, производитель"},"business-tasks-field":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"problems-field":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"en":"Configurator","ru":"Конфигуратор","_type":"localeString"},"roi-calculator-checkbox":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"_type":"localeString","en":"Suggest product","ru":"Предложить продукт"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"_type":"localeString","en":"Countries","ru":"Страны"},"seller":{"ru":"Продавец","_type":"localeString","en":"Seller"},"vendors":{"_type":"localeString","en":"User products vendors","ru":"Производители продуктов пользователя"},"suppliers":{"_type":"localeString","en":"User suppliers","ru":"Поставщики пользователя"},"business-process":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"en":"With reference","ru":"С референсами","_type":"localeString"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"en":"Find","ru":"Выполнить поиск","_type":"localeString"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"_type":"localeString","en":"Try AI (Beta)","ru":"Попробовать AI (Beta)"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"company-size":{"en":"Company size","ru":"Размер компании","_type":"localeString"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"en":"Add deployment","ru":"Добавить внедрение","_type":"localeString"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"_type":"localeString","en":"Sellers","ru":"Поставщики, Производители"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"company-type":{"_type":"localeString","en":"Company type","ru":"Тип компании"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"en":"Product vendor","ru":"Производитель продукта","_type":"localeString"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"_type":"localeString","en":"Deal canceled","ru":"Сделка отменена"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"en":"In Process","ru":"Ведется","_type":"localeString"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"implementations":"success","filters":"success"},"sections":{"implementations-text-block":{"label":"catalog-implementations-text-block","body":{"en":[{"children":[{"text":"The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference.","_key":"0e40f9075bd00","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"0e40f9075bd0","markDefs":[]}],"ru":[{"markDefs":[],"children":[{"text":"Каталог внедрений ROI4CIO - это база данных о внедрениях программного обеспечения, оборудования и ИТ-услуг. Находите внедрения по вендору, поставщику, пользователю, бизнес-задачам, проблемам, статусу, фильтруйте по наличию ROI и референса.","_key":"1435aa0421110","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"1435aa042111"}],"_type":"localeBlock"}}},"sectionsStatus":{"implementations-text-block":"success"},"pageMetaData":{"implementations":{"title":{"en":"ROI4CIO: Implementations","ru":"ROI4CIO: Внедрения","_type":"localeString"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"og:title","translations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"}},{"translations":{"ru":"Каталог внедрений различных видов программного обеспечения, ИТ проектов. Результаты внедрений ИТ, результаты, референсы, ROI","_type":"localeString","en":"Implementations"},"name":"og:description"},{"translations":{"ru":"Внедрения","_type":"localeString","en":"Implementations"},"name":"title"},{"name":"description","translations":{"ru":"Описание внедрений","_type":"localeString","en":"Implementations description"}},{"translations":{"_type":"localeString","en":"Implementations keywords","ru":"Внедрения ключевые слова"},"name":"keywords"}]}},"pageMetaDataStatus":{"implementations":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"eset-endpoint-protection-for-airline":{"id":549,"title":"ESET Endpoint Protection for airline","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">ABOUT THE CUSTOMER</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The Budapest based Wizz Air operates in the region of the</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Central Europe. Originating in 2003, the company today offers</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">a choice of almost 200 fl ying routes, from a number of regional</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">airports: Katowice, Warsaw, Gdansk, Poznan and Wroclaw</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">in Poland; Budapest in Hungary; Sofi a in Bulgaria: Bucharest,</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Cluj Napoca and Timisoara in Romania;Prague in the Czech </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Republic; and Kiev in the Ukraine.</span>\r\n<span style=\"font-weight: bold;\"><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">PREVIOUS EXPERIENCE</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">WITH ANTIVIRUS</span></span>\r\n<span style=\"font-style: italic;\"><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">“Our previous antivirus system was often incompatible with the</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">various target applications used in our industry, and imposed</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">signifi cant restrictions on the performance of our servers and</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">workstations, which is simply inacceptable in the industry we’re</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">in. We were also dissatisfi ed with the level of technical support we</span></span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-style: italic;\">received,”</span> says Zsolt Csernák, CIO, Wizz Air Hungary.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Mr. Csernák’s team started looking for a different, more effective</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">antivirus system. After the fi rst screening, they asked for quotes </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">from three different AV vendors.<span style=\"font-style: italic;\"> “ESET NOD32 Antivirus matched </span></span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">our requirements, and it was also available at a very favorable price </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-style: italic;\">compared to the competition, so we began testing their solution,”</span> said </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">the IT Director.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">IMPLEMENTATION</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Wizz Air’s engineers built a Windows 2003-based test server and</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">configured three client PCs in order to test out the ESET Remote </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Administrator Server (ERAS). Once ERAS was successfully</span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">configured and all the necessary policies were created, it was </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">time to start testing the solution. <span style=\"font-style: italic;\">“Our positive experience soon </span></span><span style=\"font-style: italic;\"><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">led us to extend the test to live clients, and after that we adopted the </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">solution across the board,” said Zsolt Csernák.</span></span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The launch went smoothly, with no di\u0013 culties at all and ESET </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">NOD32 Antivirus currently protects 500 client PCs distributed </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">over 13 sites. Updates are load-balanced and distributed via </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">mirror servers, preserving the company’s bandwidth, leaving </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">more room for core business tasks.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">PROTECTED BY ESET</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Soon after installing ESET on endpoints, the protection was </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">extended to the company’s MS Exchange server that handles </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">tens of thousands of messages each day, as well to a network </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">of file- and print-servers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“We have have positive feedback from our employees – they appreciate </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">that ESET’s solution doesn’t slow down computer performance, while </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">our system administrators are pleased with easy monitoring and </span><span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">management of company security” – says Zsolt Csernák.</span>","alias":"eset-endpoint-protection-for-airline","roi":0,"seo":{"title":"ESET Endpoint Protection for airline","keywords":"","description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">ABOUT THE CUSTOMER</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The Budapest based Wizz Air operates in the region o","og:title":"ESET Endpoint Protection for airline","og:description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">ABOUT THE CUSTOMER</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The Budapest based Wizz Air operates in the region o"},"deal_info":"","user":{"id":4377,"title":"Wizz Air","logoURL":"https://old.roi4cio.com/uploads/roi/company/Wizz_Air.png","alias":"wizz-air","address":"","roles":[],"description":"Wizz Air, legally incorporated as Wizz Air Hungary Ltd. (Hungarian: Wizz Air Hungary Légiközlekedési Kft.) and stylised as Wizz Air, is a Hungarian low-cost airline with its head office in Budapest. The airline serves many cities across Europe, as well as some destinations in North Africa and the Middle East. It has the largest fleet of any Hungarian airline, although it is not a flag carrier, and currently serves 44 countries.\r\n\r\n","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://wizzair.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Wizz Air","keywords":"","description":"Wizz Air, legally incorporated as Wizz Air Hungary Ltd. (Hungarian: Wizz Air Hungary Légiközlekedési Kft.) and stylised as Wizz Air, is a Hungarian low-cost airline with its head office in Budapest. The airline serves many cities across Europe, as well as some","og:title":"Wizz Air","og:description":"Wizz Air, legally incorporated as Wizz Air Hungary Ltd. (Hungarian: Wizz Air Hungary Légiközlekedési Kft.) and stylised as Wizz Air, is a Hungarian low-cost airline with its head office in Budapest. The airline serves many cities across Europe, as well as some","og:image":"https://old.roi4cio.com/uploads/roi/company/Wizz_Air.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":315,"title":"ESET","logoURL":"https://old.roi4cio.com/uploads/roi/company/eset.jpeg","alias":"eset","address":"","roles":[],"description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET NOD32, hence competing in the antivirus industry market.","companyTypes":[],"products":{},"vendoredProductsCount":4,"suppliedProductsCount":4,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":4,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"www.eset.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ESET","keywords":"company, ESET, firewall, anti-virus, 2008, 2010, products, 2009","description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET","og:title":"ESET","og:description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET","og:image":"https://old.roi4cio.com/uploads/roi/company/eset.jpeg"},"eventUrl":""}],"products":[{"id":1730,"logo":false,"scheme":false,"title":"ESET Endpoint Protection advanced","vendorVerified":0,"rating":"1.80","implementationsCount":4,"suppliersCount":0,"alias":"eset-endpoint-protection-advanced","companyTypes":[],"description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection against ransomware</li> <li>Prevention of fileless attacks</li> <li>Remote management</li> </ul>\r\n<span style=\"font-weight: bold;\">Endpoint security</span> ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives. <span style=\"font-weight: bold;\">File server security</span> Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity. <span style=\"font-weight: bold;\">Manage products via on-premise console</span> ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.\r\n<ul> <li>Complete network visibility</li> <li>Full security management</li> <li>Flexible reporting</li> <li>Automated security management</li> </ul>\r\n<span style=\"font-style: italic;\">"ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally." - Richard Ford, Head of IT at SWFC</span>","shortDescription":"ESET ENDPOINT PROTECTION ADVANCED is a complete multilayered protection with remote security management: On-premise management, endpoint security, file server security\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET Endpoint Protection advanced","keywords":"","description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection aga","og:title":"ESET Endpoint Protection advanced","og:description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection aga"},"eventUrl":"","translationId":1731,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":400,"title":"High costs"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":385,"title":"Risk of data loss or damage"},{"id":384,"title":"Risk of attacks by hackers"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://cdn1.esetstatic.com/ESET/INT/Docs/Others/Customer-Stories/Wizz-Air_HU.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"eset-endpoint-protection-for-it-reseller":{"id":547,"title":"ESET Endpoint Protection for IT reseller","description":"<span style=\"font-weight: bold;\">KEY BENEFITS FOR CCS MEDIA</span>\r\n• Intuitive user interface making management straightforward and simple.\r\n• Issues are identified and dealt with quickly.\r\n• ESET’s UK based customer support is reliable and trust worthy.\r\n• ESET’s unobtrusive footprint allows CCS to run quickly and efficiently.\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE CUSTOMER</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">CCS Media are a privately owned IT reseller headquartered </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">on the outskirts of the historic market town of Chesterfield, </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Derbyshire. Winner of the ‘Cisco Rising Star’ award, ‘CRN </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Reseller of the Year’, and many more accolades over their </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">30 plus years of service. CCS have 16 offices around the UK </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">(including Wales and Scotland), over 250 employees and </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">around £120 million in annual turnover. Today, they work with </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">organisations all across the UK - delivering everyday IT, print </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">and office supplies - and large-scale IT projects. CCS Media’s </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">small IT department protects and maintains the company’s </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">IT infrastructure in offices around the UK - all from their data </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">centre in Chesterfield. Considering the nature of CCS Media’s </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">business, impeccable IT security is critical. The company needs </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">not only to protect its own information, but also sensitive </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">customer data and its reputation in the marketplace as a </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">trusted supplier of IT services.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">TIME TO CHANGE</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The geographic distribution of the organisation’s various </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">offices was causing problems for CCS. Onsite IT support was </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">proving to be both a very expensive and time-consuming </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">exercise. The company needed a solution that would allow </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">their small IT team to deploy, administer and maintain their </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">security software, without having to spend so much time </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">and money travelling. Additionally, they had found that </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">previous solutions were often slow to deploy, caused issues </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">with the end-user experience and did not provide effective </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">support when CCS needed it most.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE SOLUTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">CCS Media and ESET were introduced at a trade show through </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">a mutual connection. CCS’s IT Director, Tony Cooke, decided to </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">give ESET a try after recieving positive feedback from within </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">the industry. Migrating the infrastructure over to ESET was </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">seamless, happening over the course of a few days. ESET </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">supported CCS’s IT department throughout the process. The </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">install was silent and so flawless that most of the employees </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">were unaware of the changeover. ESET now provides CCS </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Media with endpoint security, as well as data encryption for all </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">of their client devices. Tony also commends the ESET interface </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">as he finds it, “easy to use, intuitive and modern, which is important </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">for today’s industry. “ This relationship has worked out to be </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">extremely cost effective for CCS Media. The firm’s two-person IT </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">team now manages what is essentially a network of hundreds </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">of end-users dispersed all over the country. And, with ESET’s </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">help, CCS’s team knows it can deal with any security threat the </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">organisation may face.</span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“Obviously, time is money. Using ESET makes my job much easier, </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">simply because of the tiny system footprint. Also, we don’t have any </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">downtime on the network, so I can access whatever information I </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">want at any time - and get on with selling and doing my job. I would </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">recommend ESET because of the speed, the simplicity and the very </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">helpful UK based tech support.” </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Chloe Butler, Business Development Manager, CCS Media</span></span>","alias":"eset-endpoint-protection-for-it-reseller","roi":0,"seo":{"title":"ESET Endpoint Protection for IT reseller","keywords":"","description":"<span style=\"font-weight: bold;\">KEY BENEFITS FOR CCS MEDIA</span>\r\n• Intuitive user interface making management straightforward and simple.\r\n• Issues are identified and dealt with quickly.\r\n• ESET’s UK based customer support is reliable and trust worthy.\r\n• E","og:title":"ESET Endpoint Protection for IT reseller","og:description":"<span style=\"font-weight: bold;\">KEY BENEFITS FOR CCS MEDIA</span>\r\n• Intuitive user interface making management straightforward and simple.\r\n• Issues are identified and dealt with quickly.\r\n• ESET’s UK based customer support is reliable and trust worthy.\r\n• E"},"deal_info":"","user":{"id":4378,"title":"CCS Media","logoURL":"https://old.roi4cio.com/uploads/roi/company/CCS_Media.gif","alias":"ccs-media","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our Company</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">CCS Media is a Technology and Supplies Reseller with over 30 years of experience delivering first-class IT solutions and services to organisations of every kind across the UK and beyond. Our network of 16 offices and 2 Advanced Technology Centres, secures unrivalled nationwide scale for supply and service, matched with the comfort of local presence. We work with more than 2,000 manufacturer partners and sell more than 1.3 million products as part of the solutions we deliver to our 14,000 customers. In 2017, we achieved revenues in excess of £180m and are recognised in the Sunday Times FastTrack 250 as one of the UK’s fastest growing companies.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our People</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our 350-strong team of experts are what makes our company a success. Encouraged to work in whatever way is most beneficial to our customers, our people are tasked with taking the raw materials at their disposal – our operational capability, finance, technology knowledge and customer context to shape the best possible outcome from every project.</span>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.ccsmedia.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CCS Media","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our Company</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span></div>\r\n<div><span style=\"color: rgb(","og:title":"CCS Media","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our Company</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span></div>\r\n<div><span style=\"color: rgb(","og:image":"https://old.roi4cio.com/uploads/roi/company/CCS_Media.gif"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":315,"title":"ESET","logoURL":"https://old.roi4cio.com/uploads/roi/company/eset.jpeg","alias":"eset","address":"","roles":[],"description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET NOD32, hence competing in the antivirus industry market.","companyTypes":[],"products":{},"vendoredProductsCount":4,"suppliedProductsCount":4,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":4,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"www.eset.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ESET","keywords":"company, ESET, firewall, anti-virus, 2008, 2010, products, 2009","description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET","og:title":"ESET","og:description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET","og:image":"https://old.roi4cio.com/uploads/roi/company/eset.jpeg"},"eventUrl":""}],"products":[{"id":1730,"logo":false,"scheme":false,"title":"ESET Endpoint Protection advanced","vendorVerified":0,"rating":"1.80","implementationsCount":4,"suppliersCount":0,"alias":"eset-endpoint-protection-advanced","companyTypes":[],"description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection against ransomware</li> <li>Prevention of fileless attacks</li> <li>Remote management</li> </ul>\r\n<span style=\"font-weight: bold;\">Endpoint security</span> ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives. <span style=\"font-weight: bold;\">File server security</span> Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity. <span style=\"font-weight: bold;\">Manage products via on-premise console</span> ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.\r\n<ul> <li>Complete network visibility</li> <li>Full security management</li> <li>Flexible reporting</li> <li>Automated security management</li> </ul>\r\n<span style=\"font-style: italic;\">"ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally." - Richard Ford, Head of IT at SWFC</span>","shortDescription":"ESET ENDPOINT PROTECTION ADVANCED is a complete multilayered protection with remote security management: On-premise management, endpoint security, file server security\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET Endpoint Protection advanced","keywords":"","description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection aga","og:title":"ESET Endpoint Protection advanced","og:description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection aga"},"eventUrl":"","translationId":1731,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":400,"title":"High costs"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":385,"title":"Risk of data loss or damage"},{"id":384,"title":"Risk of attacks by hackers"},{"id":387,"title":"Non-compliant with IT security requirements"},{"id":336,"title":"Risk or Leaks of confidential information"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://cdn1.esetstatic.com/ESET/INT/Docs/Others/Customer-Stories/CSS-Media_UK.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"eset-endpoint-protection-for-it-service-provider":{"id":550,"title":"ESET Endpoint Protection for IT service provider","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE PARTNER</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">GCS is a managed service provider located in El Paso, </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Texas. The company, which provides online cloud backup,</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">disaster recovery and managed IT services for home, office</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">& small business, became an ESET partner in early 2018.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Since joining the ESET Partner Program, company owner</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">John Gonzales says GCS has benefited from ESET’s trainings</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">and certifications, flexible Managed Service Provider</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">(MSP) program options and marketing resources.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">WHY THEY CHOSE ESET</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The company recommends ESET products to</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">their customers for the following reasons:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Efficient malware detection rate</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Low false positive rates</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Light system footprint</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Free U.S.-based customer support</span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“ESET is the most comprehensive security solution.</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">We recommend ESET security solutions to all our clients.”</span></span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">—John Gonzales – Owner – GCS</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Product:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">ESET Endpoint Security and ESET Endpoint Encryption</span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“I’ve tried and tested all the commercial security</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">solutions,” Gonzales said. “In my opinion, there’s</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">no comparison to the efficiency, effectiveness,</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">tools and support that ESET provides.”</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Gonzales added that the customizability and</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">functionality of the ESET Remote Administrator</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">gives GCS the tools to be more proactive for</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">their clients, thus providing better security.</span></span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“The ability to remotely install/update/manage ESET</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">endpoint products, and even operating system</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">updates, is essential and much more efficient</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">than other security endpoint solutions.”</span></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Partnering with ESET enabled GCS to extend its customer</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">base and offer more services by providing tailored solutions</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">based on the customers’ specific environments. “One of</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">the things to realize is that every business is different. ESET</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">empowers GCS, providing many integrated security products</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">for a wide range of solutions to fit a company’s needs.</span>","alias":"eset-endpoint-protection-for-it-service-provider","roi":0,"seo":{"title":"ESET Endpoint Protection for IT service provider","keywords":"","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE PARTNER</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">GCS is a managed service provider located in El ","og:title":"ESET Endpoint Protection for IT service provider","og:description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE PARTNER</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">GCS is a managed service provider located in El "},"deal_info":"","user":{"id":4379,"title":"GCS","logoURL":"https://old.roi4cio.com/uploads/roi/company/GCS_backup.png","alias":"gcs","address":"","roles":[],"description":"GCS is a locally owned business in El Paso, TX. We provide online cloud backup, disaster recovery and managed IT services for home, office & small business.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":4,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://gcsbackup.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"GCS","keywords":"","description":"GCS is a locally owned business in El Paso, TX. We provide online cloud backup, disaster recovery and managed IT services for home, office & small business.","og:title":"GCS","og:description":"GCS is a locally owned business in El Paso, TX. We provide online cloud backup, disaster recovery and managed IT services for home, office & small business.","og:image":"https://old.roi4cio.com/uploads/roi/company/GCS_backup.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":315,"title":"ESET","logoURL":"https://old.roi4cio.com/uploads/roi/company/eset.jpeg","alias":"eset","address":"","roles":[],"description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET NOD32, hence competing in the antivirus industry market.","companyTypes":[],"products":{},"vendoredProductsCount":4,"suppliedProductsCount":4,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":4,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"www.eset.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ESET","keywords":"company, ESET, firewall, anti-virus, 2008, 2010, products, 2009","description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET","og:title":"ESET","og:description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET","og:image":"https://old.roi4cio.com/uploads/roi/company/eset.jpeg"},"eventUrl":""}],"products":[{"id":1730,"logo":false,"scheme":false,"title":"ESET Endpoint Protection advanced","vendorVerified":0,"rating":"1.80","implementationsCount":4,"suppliersCount":0,"alias":"eset-endpoint-protection-advanced","companyTypes":[],"description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection against ransomware</li> <li>Prevention of fileless attacks</li> <li>Remote management</li> </ul>\r\n<span style=\"font-weight: bold;\">Endpoint security</span> ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives. <span style=\"font-weight: bold;\">File server security</span> Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity. <span style=\"font-weight: bold;\">Manage products via on-premise console</span> ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.\r\n<ul> <li>Complete network visibility</li> <li>Full security management</li> <li>Flexible reporting</li> <li>Automated security management</li> </ul>\r\n<span style=\"font-style: italic;\">"ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally." - Richard Ford, Head of IT at SWFC</span>","shortDescription":"ESET ENDPOINT PROTECTION ADVANCED is a complete multilayered protection with remote security management: On-premise management, endpoint security, file server security\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET Endpoint Protection advanced","keywords":"","description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection aga","og:title":"ESET Endpoint Protection advanced","og:description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection aga"},"eventUrl":"","translationId":1731,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":400,"title":"High costs"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":385,"title":"Risk of data loss or damage"},{"id":384,"title":"Risk of attacks by hackers"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://cdn1.esetstatic.com/ESET/US/resources/case-studies/ESET-Partner-Case-Study-GCS.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"eset-endpoint-protection-for-the-banking-industry":{"id":548,"title":"ESET Endpoint Protection for the banking industry","description":"<span style=\"font-weight: bold;\">KEY BENEFITS FOR ERSTE GROUP, AUSTRIA</span>\r\n• A single product for both servers and endpoints\r\n• Simple operation, high suitability for daily use\r\n• High quality of malware recognition\r\n• Complete compatibility with all versions of Windows\r\n• Central management and dashboard via the ESET Remote Administrator\r\n• Lean installation package\r\n• High-performance, interruption-free operation which continues entirely behind the scenes\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE CUSTOMER</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">S IT Solutions Austria provides “all in one” IT solutions for the </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">banking industry. As a result, it needs solutions that off er </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">a particularly high level of data security in order to effi ciently </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">protect the critical data of business partners and their </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">customers from access by third parties. For its client, ERSTE </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Group, a total of 3,000 servers and 3,500 workstations had to </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">be protected across an array of operating systems: Windows XP </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">32 Bit, Windows 7 – EE 64 Bit, Windows Server 2003 (R2) 32 & 64 </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Bit, Windows Server 2008 (R2), and Windows Server 2012.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">HIGH PERFORMANCE, HIGH SECURITY REQUIRED</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The initial recommendation to use ESET Endpoint Antivirus </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">came from colleagues in other companies of the Erste </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Group, and the choice was validated by means of an internal </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">evaluation. ESET Endpoint Antivirus Business Edition’s high </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">performance and sparing use of hardware resources were </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">the essential purchase criteria, along with its good ratio of </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">price to performance. Among the other advantages were its </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">high-quality malware recognition, its central management </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">system — via the Remote Administrator dashboard — and its </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">lean installation package. </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">In total, four months were allocated for the migration. After </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">a two-month test phase with pilot clients, the roll-out on all </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">systems was begun. It was “absolutely remarkable,” according to </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Michael Todorovitsch, Head of Infrastructure Basis Systems </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">at s IT Solutions. “The complete roll-out on over 6,500 computers </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">passed off without notable incidents.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">THE SOLUTION</span>\r\n<span style=\"font-style: italic;\"><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">In deploying the ESET solution, Todorovitsch commented that </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">“support and external help weren’t called on, and only a few directories</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">had to be exempted from scanning so that ESET Endpoint Antivirus </span></span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\"><span style=\"font-style: italic;\">could run without issues.” </span></span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">The implementation of ESET Endpoint Antivirus at Erste </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Group has so far met all expectations in full. The fi rm has </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">commended its high performance, and interruption-free </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">operation which happens entirely behind the scenes and </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">does not impact users’ work.</span>","alias":"eset-endpoint-protection-for-the-banking-industry","roi":0,"seo":{"title":"ESET Endpoint Protection for the banking industry","keywords":"","description":"<span style=\"font-weight: bold;\">KEY BENEFITS FOR ERSTE GROUP, AUSTRIA</span>\r\n• A single product for both servers and endpoints\r\n• Simple operation, high suitability for daily use\r\n• High quality of malware recognition\r\n• Complete compatibility with all versi","og:title":"ESET Endpoint Protection for the banking industry","og:description":"<span style=\"font-weight: bold;\">KEY BENEFITS FOR ERSTE GROUP, AUSTRIA</span>\r\n• A single product for both servers and endpoints\r\n• Simple operation, high suitability for daily use\r\n• High quality of malware recognition\r\n• Complete compatibility with all versi"},"deal_info":"","user":{"id":4376,"title":"Erste Group Bank AG","logoURL":"https://old.roi4cio.com/uploads/roi/company/Erste_Group_Bank_AG.png","alias":"erste-group-bank-ag","address":"","roles":[],"description":"Erste Group Bank AG was founded in 1819 as the first Austrian savings bank. Around 47,000 employees are serving 16.4 million clients in more than 2,500 branches in 7 countries. Erste Group is one of the largest financial services providers in Central and Eastern Europe.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.erstegroup.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Erste Group Bank AG","keywords":"","description":"Erste Group Bank AG was founded in 1819 as the first Austrian savings bank. Around 47,000 employees are serving 16.4 million clients in more than 2,500 branches in 7 countries. Erste Group is one of the largest financial services providers in Central and Easte","og:title":"Erste Group Bank AG","og:description":"Erste Group Bank AG was founded in 1819 as the first Austrian savings bank. Around 47,000 employees are serving 16.4 million clients in more than 2,500 branches in 7 countries. Erste Group is one of the largest financial services providers in Central and Easte","og:image":"https://old.roi4cio.com/uploads/roi/company/Erste_Group_Bank_AG.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":315,"title":"ESET","logoURL":"https://old.roi4cio.com/uploads/roi/company/eset.jpeg","alias":"eset","address":"","roles":[],"description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET NOD32, hence competing in the antivirus industry market.","companyTypes":[],"products":{},"vendoredProductsCount":4,"suppliedProductsCount":4,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":4,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"www.eset.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ESET","keywords":"company, ESET, firewall, anti-virus, 2008, 2010, products, 2009","description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET","og:title":"ESET","og:description":"ESET is an IT security company headquartered in Bratislava, Slovakia that was founded in 1992. The company was awarded the recognition of the most successful Slovak company in 2008, 2009 and in 2010.\r\n\r\nESET offers anti-virus and firewall products such as ESET","og:image":"https://old.roi4cio.com/uploads/roi/company/eset.jpeg"},"eventUrl":""}],"products":[{"id":1730,"logo":false,"scheme":false,"title":"ESET Endpoint Protection advanced","vendorVerified":0,"rating":"1.80","implementationsCount":4,"suppliersCount":0,"alias":"eset-endpoint-protection-advanced","companyTypes":[],"description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection against ransomware</li> <li>Prevention of fileless attacks</li> <li>Remote management</li> </ul>\r\n<span style=\"font-weight: bold;\">Endpoint security</span> ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives. <span style=\"font-weight: bold;\">File server security</span> Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity. <span style=\"font-weight: bold;\">Manage products via on-premise console</span> ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.\r\n<ul> <li>Complete network visibility</li> <li>Full security management</li> <li>Flexible reporting</li> <li>Automated security management</li> </ul>\r\n<span style=\"font-style: italic;\">"ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally." - Richard Ford, Head of IT at SWFC</span>","shortDescription":"ESET ENDPOINT PROTECTION ADVANCED is a complete multilayered protection with remote security management: On-premise management, endpoint security, file server security\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET Endpoint Protection advanced","keywords":"","description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection aga","og:title":"ESET Endpoint Protection advanced","og:description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection aga"},"eventUrl":"","translationId":1731,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":400,"title":"High costs"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://cdn1.esetstatic.com/ESET/INT/Docs/Others/Customer-Stories/Erste-Group_AT.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}},"aliases":{"1":["eset-endpoint-protection-for-airline","eset-endpoint-protection-for-it-reseller","eset-endpoint-protection-for-it-service-provider","eset-endpoint-protection-for-the-banking-industry"]},"links":{"first":"http://apis.roi4cio.com/api/implementations?page=1","last":"http://apis.roi4cio.com/api/implementations?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://apis.roi4cio.com/api/implementations","per_page":20,"to":4,"total":4},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}