{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Сonfigurator"},"i-sell-it":{"_type":"localeString","en":"I sell it","ru":"I sell it"},"i-use-it":{"_type":"localeString","en":"I use it","ru":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"show-more-button":{"en":"Show more","ru":"Показать еще","_type":"localeString"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"supplier-popover":{"en":"supplier","ru":"поставщик","_type":"localeString"},"implementation-popover":{"en":"deployment","ru":"внедрение","_type":"localeString"},"manufacturer-popover":{"en":"manufacturer","ru":"производитель","_type":"localeString"},"short-description":{"en":"Pitch","ru":"Краткое описание","_type":"localeString"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"product-features":{"ru":"Особенности продукта","_type":"localeString","en":"Product features"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"solutions":{"ru":"Проблемы которые решает","_type":"localeString","en":" Problems that solves"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"_type":"localeString","en":"Comparison matrix","ru":"Матрица сравнения"},"testing":{"_type":"localeString","en":"Testing","ru":"Тестирование"},"compare":{"_type":"localeString","en":"Compare with competitors","ru":"Сравнить с конкурентами"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":" Characteristics"},"transaction-features":{"ru":"Особенности сделки","_type":"localeString","en":"Transaction Features"},"average-discount":{"_type":"localeString","en":"Partner average discount","ru":"Средняя скидка партнера"},"deal-protection":{"en":"Deal protection","ru":"Защита сделки","_type":"localeString"},"average-deal":{"en":"Average deal size","ru":"Средний размер сделки","_type":"localeString"},"average-time":{"en":"Average deal closing time","ru":"Средний срок закрытия сделки","_type":"localeString"},"login":{"ru":"Войти","_type":"localeString","en":"Login"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"to-know-more":{"en":"To know more","ru":"Чтобы узнать больше","_type":"localeString"},"scheme":{"ru":"Схема работы","_type":"localeString","en":" Scheme of work"},"competitive-products":{"ru":"Конкурентные продукты","_type":"localeString","en":" Competitive products"},"implementations-with-product":{"_type":"localeString","en":"Deployments with this product","ru":"Внедрения с этим продуктом"},"user-features":{"_type":"localeString","en":"User features","ru":"Особенности пользователей"},"job-roles":{"en":" Roles of Interested Employees","ru":"Роли заинтересованных сотрудников","_type":"localeString"},"organizational-features":{"ru":"Организационные особенности","_type":"localeString","en":"Organizational Features"},"calculate-price":{"_type":"localeString","en":" Calculate product price","ru":"Рассчитать цену продукта"},"selling-stories":{"ru":"Продающие истории","_type":"localeString","en":" Selling stories"},"materials":{"_type":"localeString","en":"Materials","ru":"Материалы"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"en":"or","ru":"или","_type":"localeString"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"ru":"Рассчитать ROI продукта","_type":"localeString","en":"Calculate Product ROI"},"complementary-categories":{"en":"Complementary Categories","ru":"Схожие категории","_type":"localeString"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"rebate-for-poc":{"ru":"Бонус 4 POC","_type":"localeString","en":"Bonus 4 POC"},"configurator-content":{"ru":"Рассчитайте стоимость продукта","_type":"localeString","en":"Calculate price for this product here"},"configurator-link":{"ru":"тут","_type":"localeString","en":"here"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"user-popover":{"en":"user","ru":"пользователь","_type":"localeString"},"select-for-presentation":{"_type":"localeString","en":"select product for presentation","ru":"выбрать продукт для презентации"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You have to register or login."},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"en":"Added to comparison","ru":"Добавлено в сравнения","_type":"localeString"},"roi-calculator-content":{"_type":"localeString","en":"Calculate ROI for this product here","ru":"Рассчитайте ROI для данного продукта"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."},"videos":{"en":"Videos","ru":"Видео","_type":"localeString"},"vendor-verified":{"ru":"Подтверждено производителем","_type":"localeString","en":"Vendor verified"},"event-schedule":{"_type":"localeString","en":"Events schedule","ru":"Расписание событий"},"scheduling-tip":{"ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event."},"register-to-schedule":{"ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To register for the event please log in or register on the site."},"comparison-matrix":{"ru":"Матрица сравнений","_type":"localeString","en":"Comparison matrix"},"compare-with-competitive":{"ru":"Сравнить с конкурентными","_type":"localeString","en":" Compare with competitive"},"avg-deal-closing-unit":{"ru":"месяцев","_type":"localeString","en":"months"},"under-construction":{"_type":"localeString","en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке."},"product-presentation":{"_type":"localeString","en":"Product presentation","ru":"Презентация продукта"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"_type":"localeString","en":"Company name","ru":"Компания"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"translatable_meta":[{"name":"og:title","translations":{"en":"Example product","ru":"Конкретный продукт","_type":"localeString"}},{"name":"og:description","translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"}},{"name":"title","translations":{"_type":"localeString","en":"Product","ru":"Продукт"}},{"name":"description","translations":{"_type":"localeString","en":"Product description","ru":"Описание продукта"}},{"name":"keywords","translations":{"en":"Product keywords","ru":"Ключевые слова продукта","_type":"localeString"}}],"title":{"en":"ROI4CIO: Product","ru":"ROI4CIO: Продукт","_type":"localeString"},"meta":[{"content":"website","name":"og:type"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"id-experts-myidcare-protection-platform":{"id":5451,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ID_Experts.png","logo":true,"scheme":false,"title":"ID Experts MyIDCare Protection Platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"id-experts-myidcare-protection-platform","companyTitle":"ID Experts","companyTypes":["vendor"],"companyId":8458,"companyAlias":"id-experts","description":"<p class=\"align-center\"><b>Identity & Privacy Protection Services </b></p>\r\n<p class=\"align-center\"><i>Threats to your identity and privacy are everywhere. MyIDCare’s alert-based identity & privacy protection platform scans billions of data points, notifying you of risks to your privacy and identity so you can take action! </i></p>\r\n<b>Advanced Identity Monitoring </b>\r\nID Experts’ MyIDCare includes comprehensive identity monitoring including credit monitoring, deep and dark web monitoring, credit lock, instant inquiry, social security number scanning, and much much more. More than 14 billion data points are scanned for your protection. You will receive alerts if there are changes to monitored information. \r\n<b>Privacy Protection </b>\r\nProtect your privacy with our SocialSentry social media protection. SocialSentry actively scans social networks to detect fraudulent and takeover activity, identifies inappropriate content and reduces personal information exposure. Coupled with our Password Detective, you will be empowered to protect your privacy. \r\n<b>Health Claims Monitoring (MIDAS) </b>\r\nOur MIDAS technology is the first and only consumer-focused healthcare fraud solution. MIDAS alerts members every time a medical claim is made against their identity. This powerful tool enables individuals to review health transactions for potential identity fraud the same way they do for credit transactions. \r\n<p class=\"align-center\"><b>Financial Protection </b></p>\r\n<p class=\"align-center\"><i>$1 million of insurance and stolen funds protection provide a solid backstop for serious cases of identity theft. </i></p>\r\n<b>Putting money back in your hands </b>\r\nMyIDCare members who fall victim to identity crime can rest easy. Our $1 million reimbursement insurance replaces stolen funds—including losses due to medical, financial, and other types of identity crimes. It also covers legal and other professional service expenses related to identity theft. \r\n<p class=\"align-center\"><b>Concierge-Style Identity Recovery </b></p>\r\n<p class=\"align-center\"><i>No other identity protection company provides their members with this level of customer experience. </i></p>\r\n<b>We delight victims with friendly, expert service </b>\r\nFor MyIDCare members whose identity is stolen, our ID Care Team of identity specialists is standing by. Using limited power of attorney (LPOA), we’ll act on a victim’s behalf to restore their identity to pre-theft status, which we’ve done with a 100% success rate. \r\n<p class=\"align-center\"><b>Easy Implementation </b></p>\r\n<p class=\"align-center\"><i>Whether a data breach, an employee benefit, or something valued to offer your members, we can get you up and running quickly and easily. </i></p>\r\n<b>Hassle-free and quick time to value </b>\r\nMyIDCare is simple to offer your customers, members, or employees. We provide the implementation and rollout plan, along with all the tools you need to communicate with your people. The average availability is fast—90 days from signing—so you can provide valuable identity protection right away. ","shortDescription":"Combining innovative monitoring and scanning technologies with concierge-style services in order to protect people from the consequences of data breaches","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ID Experts MyIDCare Protection Platform","keywords":"","description":"<p class=\"align-center\"><b>Identity & Privacy Protection Services </b></p>\r\n<p class=\"align-center\"><i>Threats to your identity and privacy are everywhere. MyIDCare’s alert-based identity & privacy protection platform scans billions of data points, not","og:title":"ID Experts MyIDCare Protection Platform","og:description":"<p class=\"align-center\"><b>Identity & Privacy Protection Services </b></p>\r\n<p class=\"align-center\"><i>Threats to your identity and privacy are everywhere. MyIDCare’s alert-based identity & privacy protection platform scans billions of data points, not","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ID_Experts.png"},"eventUrl":"","translationId":5450,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[{"id":5410,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/AccessData.png","logo":true,"scheme":false,"title":"AccessData AD EDISCOVERY","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"accessdata-ad-ediscovery","companyTitle":"AccessData","companyTypes":["vendor"],"companyId":6017,"companyAlias":"accessdata","description":"Efficiently and seamlessly conduct enterprisewide search, targeted forensically sound collection, systemized preservation, litigation hold, processing, data assessment and complete legal review—all while keeping costs in line and reducing risk.\r\n<ul> <li>Mitigate Risk. Limit handoffs between vendors and technologies with a single, secure, end-to-end solution and protect against spoliation, data loss and theft. </li> <li>Lower Cost. Process all potentially relevant information, structured and unstructured, inside and outside the enterprise, with a single integrated solution, meaning less cost and wasted resources for your organization. </li> <li>Improve Efficiency. Now you can collect data faster from even more data sources, including Office 365®, with the latest release of AD eDiscovery. We’ve also automated more tasks, speeding up the time between collection and analysis. </li> </ul>\r\n<b>Capabilities</b>\r\n<ul> <li>End-to-end e-discovery platform supporting preservation through production </li> <li>Transform your unstructured data into new discoveries. Brainspace customers can push data from and pull data to AD eDiscovery and back again for deeper insights without using load files. </li> <li>Advanced interactive data visualizations to quickly identify relationships and custodian communication patterns </li> <li>Collect emails—even upgraded/migrated Exchange/O365 emails that contain “illegal” data—directly into your AccessData environment as distinct files, ready for MD5 hashing. </li> <li>Collect data seamlessly with support for the latest Enterprise Vault® and OneDrive® environments. </li> <li>Create/export searchable PDFs from native files. </li> <li>Intuitive litigation hold wizard featuring real-time hold status updates, pre-loaded notification templates and out-of-the-box litigation hold integrations with the leading HR database solutions </li> <li>Ability to assign secure web and role-based access </li> <li>Process over 700 data types (including PSTs/NSFs) with full forensic logging </li> <li>Integrated document review with predictive coding </li> <li>Direct web API export feature enables the seamless transfer of data from AD eDiscovery to Relativity® without the use of load files. </li> </ul>","shortDescription":"End-to-End eDiscovery\r\n\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AccessData AD EDISCOVERY","keywords":"","description":"Efficiently and seamlessly conduct enterprisewide search, targeted forensically sound collection, systemized preservation, litigation hold, processing, data assessment and complete legal review—all while keeping costs in line and reducing risk.\r\n<ul> <li>Mitig","og:title":"AccessData AD EDISCOVERY","og:description":"Efficiently and seamlessly conduct enterprisewide search, targeted forensically sound collection, systemized preservation, litigation hold, processing, data assessment and complete legal review—all while keeping costs in line and reducing risk.\r\n<ul> <li>Mitig","og:image":"https://old.roi4cio.com/fileadmin/user_upload/AccessData.png"},"eventUrl":"","translationId":5410,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5412,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/AimBrain.png","logo":true,"scheme":false,"title":"AimBrain AimFace","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"alias":"aimbrain-aimface","companyTypes":[],"description":"<b>Features:</b>\r\n<ul> <li>Greater user identification accuracy. Our patented technology clusters facial data to identify your users in virtually unlimited contexts, for greater accuracy and a smoother user experience. </li> <li>AI-based image processing. Intuitive quality feedback for the user, including suggestions to improve lighting or positioning, to simplify and support the customer through the step. </li> <li>Deep learning for faster onboarding. Using algorithms enhanced by millions of requests, our technology de-noises and enhances document images in real-time, for faster onboarding. </li> <li>Protects against video and photo fraud. Inbuilt liveliness detection plus checks for signals of video such as Moiré flares and chromatic anomalies, to protect against synthetic fraud. </li> <li>Integrate your apps today. Simple-to-deploy SDKs to connect your web or mobile app and benefit from stronger user identification straightaway; use it for free with AimBrain On Demand. </li> <li>Standalone or add-on authentication. Use AimFace facial authentication on its own, or integrate it with other authentication tools as part of a step-up process for additional security. </li> </ul>\r\n<b>Benefits:</b>\r\n<b>CAST IRON SECURITY </b>\r\nInbuilt liveliness detection and anti-spoof technology lets users in quickly and easily, and our server-side authentication model stops the risk of access through breached devices. \r\n<b>SUPPORTS OMNI-DIGITAL CUSTOMERS </b>\r\nOur Biometric Identity as-a-Service (BIDaaS) model means users enrol just once, for a consistent facial authentication experience use across any device and channel with a camera. \r\n<b>AUTHENTICATION FOR TODAY’S CONSUMERS</b>\r\nDitch the passwords and push notifications for technology more fit for purpose, try it for free with our developer tools. \r\n<b>INSTANT DEPLOYMENT </b>\r\nIntegrate open source SDKs into your web or mobile app and roll out stronger user authentication today. Integrate AimFace today with our free-for-life developer dashboard and tools. \r\n<b>HELLO, REGULATORS </b>\r\nAimFace supports KYC-compliant onboarding, 5AMLD customer verification and PSD2's ‘inherence’ factor for stronger user authentication, whatever your business. \r\n<b>CUT ONBOARDING TIME </b>\r\nOnboard customers quickly by combining AimFace technology with document scanning and image matching, for happier regulators and a higher customer conversion rate. ","shortDescription":"Let your customers unlock the benefits of your business with facial authentication","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AimBrain AimFace","keywords":"","description":"<b>Features:</b>\r\n<ul> <li>Greater user identification accuracy. Our patented technology clusters facial data to identify your users in virtually unlimited contexts, for greater accuracy and a smoother user experience. </li> <li>AI-based image processing. Intu","og:title":"AimBrain AimFace","og:description":"<b>Features:</b>\r\n<ul> <li>Greater user identification accuracy. Our patented technology clusters facial data to identify your users in virtually unlimited contexts, for greater accuracy and a smoother user experience. </li> <li>AI-based image processing. Intu","og:image":"https://old.roi4cio.com/fileadmin/user_upload/AimBrain.png"},"eventUrl":"","translationId":5412,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5418,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Armji.png","logo":true,"scheme":false,"title":"Armjisoft PDF DRM Security OwnerGuard","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"armjisoft-pdf-drm-security-ownerguard","companyTitle":"Armjisoft Digital Rights Management Systems","companyTypes":["vendor"],"companyId":8447,"companyAlias":"armjisoft-digital-rights-management-systems","description":"<p class=\"align-center\"><b>DRM FOR PDF Security and Rights Management Systems </b></p>\r\nPDF DRM, Security, Protection and Distribution Management technologies are used as a copyright enforcement mechanism and sometimes as an alternative mechanism to copyright law. Granting exclusive ownership rights to authors and creators through Copyrights, Security and DRM, allows for a better chance of enrichment of more and more creative and cultural products, and they can nominally compensate their efforts and costs. Intellectual efforts for producing a product or artifact must be appropriately prizes, and we must prevent people to benefit from such products free of charge. PDF Security and DRM provide a better base for protecting contents against illegal distributions, usages and sells. PDF Security and Digital Rights Management (DRM) systems are provided to ease distribution of PDF documents for end users by enforcing some usage and distribution limitations like printing, copying, save and transfer.\r\n<b>With PDF Security OwnerGuard you can: </b>\r\n<ul> <li>Protect and Lock your PDF documents to specific User, Computer or USB Drive. </li> <li>Define High Security Expiration Date or Working Duration for your drm protected pdf documents.</li> <li> Stop your valuable PDF documents from being shared and distributed across the Internet.</li> <li> Allow users to use full features of Adobe Reader to access your drm protected pdf documents.</li> <li> Define Print and/or View watermarks for your protected pdf document users.</li> <li> Minimize your users DRM hassles by letting them access your secure pdf documents offline.</li> <li> Distribute and Sell your secure PDF documents easily. </li> <li>Gain full control over your sensitive documents usage rights.</li> <li>Feel free to Store, transfer and share your protected contents using your desired method and media just like before.</li> </ul>\r\n<b>Features:</b>\r\n<ul> <li> Advanced 512 bit unique encryption system for DRM protected PDF Documents. </li> <li> Support a wide range of limitations including Machine-Dependency, Working Duration, Expiration Date, Print Watermarking, Printing, Clipboard, Modification and Screen-Capture. </li> <li> Extremely easy to implement and use licensing system for DRM protected PDF Documents distribution over local networks or internet. </li> <li> Fully automated serial based licensing system for protected pdf documents. </li> <li> Protection and Licensing Application Programming Interface (API) for customization and full integration. </li> <li> Support Machine Dependent/Independent licenses to Lock your DRM Protected PDF documents to specific computers. </li> <li> Multiple projects creation and management to make groups for your protected PDF documents. </li> <li> Hierarchical reseller licensing system to ease license distribution. </li> <li> Built in support for integration with windows Active Directory and Group Policy. </li> </ul>","shortDescription":"PDF Security OwnerGuard is the ultimate Security, DRM, Copy Protection, Licensing, Watermarking and Distribution Management solution for Adobe PDF Documents\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Armjisoft PDF DRM Security OwnerGuard","keywords":"","description":"<p class=\"align-center\"><b>DRM FOR PDF Security and Rights Management Systems </b></p>\r\nPDF DRM, Security, Protection and Distribution Management technologies are used as a copyright enforcement mechanism and sometimes as an alternative mechanism to copyright ","og:title":"Armjisoft PDF DRM Security OwnerGuard","og:description":"<p class=\"align-center\"><b>DRM FOR PDF Security and Rights Management Systems </b></p>\r\nPDF DRM, Security, Protection and Distribution Management technologies are used as a copyright enforcement mechanism and sometimes as an alternative mechanism to copyright ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Armji.png"},"eventUrl":"","translationId":5418,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5421,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/BehavioSec.png","logo":true,"scheme":false,"title":"BehavioSec Platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"behaviosec-platform","companyTitle":"BehavioSec","companyTypes":["supplier","vendor"],"companyId":5623,"companyAlias":"behaviosec","description":"<p class=\"align-center\"><b>BEHAVIOSEC’S CONTINUOUS AND TRANSPARENT AUTHENTICATION SOLUTION </b></p>\r\nBehavioSec is the first vendor to pioneer Behavioral Biometrics for the enterprise at scale that can support billions of transactions and millions of users. BehavioSec’s Behavioral Biometrics software is a new method that transparently and continuously verifies human digital identity across mobile and web apps. \r\nWhile traditional authentication technologies offer one-time verification, typically during the sign in phase and introduce friction to the digital experience, they typically validate things that infer the user’s identity. In contrast, BehavioSec’s software platform, as part of a multi-layered authentication approach, verifies people in real-time and continuously as the user engages with the app. \r\n<p class=\"align-center\"><b>BEHAVIOSEC’S UNIQUE BENEFITS TO COMBAT FRAUD AND DIGITAL RISK </b></p>\r\nBehavioSec’s platform delivers precise information on users engaging with mobile and web apps to help detect and stop digital fraud, lower outbound customer calls required to verify identity, reduce uncertainty generated by traditional, one-time authentications tools, and orchestrate appropriate course of actions to combat fraud attacks from malware and criminals. BehavioSec provides unique capabilities to help fraud and security teams effectively combat against the rise of cybercrime. \r\n<b>Features:</b>\r\n<ul> <li>Security. Continuous authentication that complements one-time verification. </li> <li>Frictionless. Transparent authentication that improves digital experience. </li> <li>Integration. Easily connect with existing web and mobile apps.</li> <li>Scalability. Authenticate billions of transactions across millions of users.</li> <li>Orchestrate. Connect to existing anti-fraud and security systems.</li> <li>Savings. Mitigate on-line fraud risk. Automate your response to attacks. </li></ul>\r\n<b>Benefits:</b>\r\n<ul> <li>Ensuring Uptime. Protect the transaction integrity across your digital transformation efforts</li> <li>Less Manual Intervention. Automate your real-time detection and response to online fraud.</li> <li>Lowering False Positives. Identify individual identities based on their unique behavioral traits.</li> <li>Lowering Fraud Risks. Detect real-time and continuously online account attacks.</li> </ul>","shortDescription":"Better Authentication. Better Experience","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BehavioSec Platform","keywords":"","description":"<p class=\"align-center\"><b>BEHAVIOSEC’S CONTINUOUS AND TRANSPARENT AUTHENTICATION SOLUTION </b></p>\r\nBehavioSec is the first vendor to pioneer Behavioral Biometrics for the enterprise at scale that can support billions of transactions and millions of users. Be","og:title":"BehavioSec Platform","og:description":"<p class=\"align-center\"><b>BEHAVIOSEC’S CONTINUOUS AND TRANSPARENT AUTHENTICATION SOLUTION </b></p>\r\nBehavioSec is the first vendor to pioneer Behavioral Biometrics for the enterprise at scale that can support billions of transactions and millions of users. Be","og:image":"https://old.roi4cio.com/fileadmin/user_upload/BehavioSec.png"},"eventUrl":"","translationId":5420,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5429,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Cloudentity.png","logo":true,"scheme":false,"title":"Cloudentity CIAM.next","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cloudentity-ciamnext","companyTitle":"Cloudentity","companyTypes":["supplier","vendor"],"companyId":6570,"companyAlias":"cloudentity","description":"<b>Integration</b>\r\nUsing Cloudentity’s Identity Management with MicroPerimeter™ Security extends the information available for fine-grained policy enforcement and recovery such as triggering MFA at the policy level or evaluating extended attributes or entitlements that might not be available with other IDP integrations. \r\n<b>Flexibility</b>\r\nYour Identity Management needs to reflect your business requirements. Cloudentity’s unique architecture provides your company with the ability to use your existing IDP, scale SAML, OAuth and OIDC integrations, and choose from a range of deployment options with on-prem, in-cloud, managed services or our IDaaS solution. \r\n<b>Features</b>\r\nCloudentity’s Identity Management is a fully robust IAM solution built on a flexible stack of microservices. These services allow for “mix-and-match” to increase performance and lower overhead and risk, all while providing the right services to solve your business requirements. \r\n<b>Basic features include:</b>\r\n<ul> <li>Upstream Federation: Use your existing IDP (or multiple IDPs) as the source of truth for your users </li> <li>SAML Federation: Standard support for SAML Service Providers (SPs) </li> <li>OAuth and OIDC: Integrate applications with 3-Legged OAuth using OIDC JWT tokens with an optional developer portal </li> <li>MFA: Out of the box support for a range of MFA solutions </li> <li>Multi-Organization Support: Our Organization support provides centralized administration if you have different divisions, departments, or groups that require segmentation </li> <li>User Self-Service: Allow users to sign up, verify their accounts using their choice of second factor OTP, and manage their accounts in the future </li> </ul>\r\n<b>More options</b>\r\n<b><i>IDaaS </i></b>\r\nIdentity as a Service gives you the easiest path to setting up and getting going. With support for SAML, OAuth, and OIDC for your service providers, and support for using upstream IDPs like Google auth, Azure AD, Facebook and even Salesforce, Cloudentity’s IDaaS is an easy, economical way to implement a Single Sign On solution. \r\n<b><i>Managed Services </i></b>\r\nIf you have complex business workflows or proprietary systems you need to integrate with your identity solution, but don’t want the hassle of managing your infrastructure, our managed services solution provides single tenancy and the ability to customize the tools as your business needs require. \r\n<b><i>On Prem </i></b>\r\nFor companies that require complete control, Cloudentity offers an on-premises option. With full access to the backend environment, and the ability to customize for legacy systems or workflows, this solution is particularly useful for companies in flux between maintaining existing system while moving to cloud native tools. ","shortDescription":"Our zero-trust authorization delivers full lifecycle management, risk-based authentication and session mobility","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cloudentity CIAM.next","keywords":"","description":"<b>Integration</b>\r\nUsing Cloudentity’s Identity Management with MicroPerimeter™ Security extends the information available for fine-grained policy enforcement and recovery such as triggering MFA at the policy level or evaluating extended attributes or entitle","og:title":"Cloudentity CIAM.next","og:description":"<b>Integration</b>\r\nUsing Cloudentity’s Identity Management with MicroPerimeter™ Security extends the information available for fine-grained policy enforcement and recovery such as triggering MFA at the policy level or evaluating extended attributes or entitle","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Cloudentity.png"},"eventUrl":"","translationId":5428,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5439,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Digital_Resolve.png","logo":true,"scheme":false,"title":"Digital Resolve Platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"digital-resolve-platform","companyTitle":"Digital Resolve","companyTypes":["supplier","vendor"],"companyId":5917,"companyAlias":"digital-resolve","description":"The platform was designed by a team of seasoned experts to provide a comprehensive view of all transactions and interactions, unlike other solutions that merely detect events in isolation. Furthermore, real-time intervention options and a frictionless user experience mean that you can maintain confidence and trust among your user base- all while providing real-time protection against potential risks.\r\n<p class=\"align-center\"><b>Single Sign-On</b></p>\r\nDigital Resolve’s cloud-based security solution eliminates time-intensive integrations by providing easy configurations so SSO can quickly be deployed across your entire enterprise’s technology and business system framework. Digital Resolve’s SSO is the only marketplace solution that automatically incorporates proprietary and proven multi-factor authentication (MFA) to provide another level of security to ensure only authorized users are logging in. \r\n<ul> <li>Replaces integration with easy configuration </li> <li>Strengthens security with safer, stronger credentials </li> <li>Reduces IT administration overhead costs </li> <li>Supports compliance and governance protocols </li> <li>Improves employee productivity </li> </ul>\r\n<p class=\"align-center\"><b>Multifactor Authentication</b></p>\r\nThe Digital Resolve platform combines the power of behavioral profiling, device identification and calculated risk factors to automate the authentication process in a transparent yet powerful manner. Should a login attempt be deemed suspect, adaptive authentication options spring into play to provide robust protection that’s hard to bypass—no matter how seasoned the criminal. \r\n<ul> <li>Challenge/ Response Questions </li> <li>One-Time Passwords </li> <li>Out-of-Band Authentication </li> <li>Real-time robust risk response options </li> </ul>\r\n<p class=\"align-center\"><b>Behavioral Monitoring & Analytics</b></p>\r\nTo address the full fraud lifecycle, the Digital Resolve platform monitors every user interaction and transaction to uncover any suspect behaviors while engaged with your site. All activity is traced at the user, account and site levels to provide a comprehensive view across your entire channel. By determining regular user patterns at multiple levels, suspect activity can be flagged and handled accordingly. \r\n<ul> <li>Application Navigation Analysis </li> <li>Online Session & Transaction Profiling </li> <li>Account/ Personal Information Monitoring </li> <li>Click Analysis </li> <li>Payment Profiling </li> <li>Device Fingerprint Analysis </li> </ul>","shortDescription":"The Digital Resolve platform is a cost-effective and easy-to-deploy solution that effectively mitigates risk on day one of deployment","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Digital Resolve Platform","keywords":"","description":"The platform was designed by a team of seasoned experts to provide a comprehensive view of all transactions and interactions, unlike other solutions that merely detect events in isolation. Furthermore, real-time intervention options and a frictionless user exp","og:title":"Digital Resolve Platform","og:description":"The platform was designed by a team of seasoned experts to provide a comprehensive view of all transactions and interactions, unlike other solutions that merely detect events in isolation. Furthermore, real-time intervention options and a frictionless user exp","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Digital_Resolve.png"},"eventUrl":"","translationId":5438,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5441,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/forter.jpg","logo":true,"scheme":false,"title":"Forter Payment Protection","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"forter-payment-protection","companyTitle":"Forter","companyTypes":["vendor"],"companyId":8330,"companyAlias":"forter","description":"<p class=\"align-center\"><b>Payment Protection </b></p>\r\n<b>Payment Fraud Protection </b>\r\nForter protects all of your online transactions from fraud – regardless of payment type – by accurately determining the trustworthiness of every transaction and the user behind it. \r\n<b>Phone Fraud Protection </b>\r\nForter’s adaptive authentication capabilities protect your call centers from fraud in real-time. \r\n<b>PSD2 Solution for Merchants </b>\r\nForter automatically evaluates the risk of each transaction affected by the directive and routes it through the path of least possible friction. \r\n<b>Omnichannel Fraud Protection </b>\r\nForter protects your various customer channels from fraud so you can provide omnichannel offerings like BOPIS (Buy Online, Pickup Instore) and more without risk. \r\n<b>Chargeback Guarantee </b>\r\nForter protects you from chargebacks by assuming full chargeback liability, improving your bottom-line. \r\n<b>Chargeback & Claims Resolution </b>\r\nForter enables merchants to streamline claims management and identify dispute opportunities in real-time. ","shortDescription":"Eliminate chargebacks and fraud to protect your bottom-line\r\n\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forter Payment Protection","keywords":"","description":"<p class=\"align-center\"><b>Payment Protection </b></p>\r\n<b>Payment Fraud Protection </b>\r\nForter protects all of your online transactions from fraud – regardless of payment type – by accurately determining the trustworthiness of every transaction and the user ","og:title":"Forter Payment Protection","og:description":"<p class=\"align-center\"><b>Payment Protection </b></p>\r\n<b>Payment Fraud Protection </b>\r\nForter protects all of your online transactions from fraud – regardless of payment type – by accurately determining the trustworthiness of every transaction and the user ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/forter.jpg"},"eventUrl":"","translationId":5440,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5443,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Fraudlogix.png","logo":true,"scheme":false,"title":"Fraudlogix Live IP Blocklist","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"fraudlogix-live-ip-blocklist","companyTitle":"Fraudlogix","companyTypes":["vendor"],"companyId":8457,"companyAlias":"fraudlogix","description":"<p class=\"align-center\"><b>Live IP Blocklist </b></p>\r\nComprehensive IP intelligence for use in multiple environments to identify and block malicious Internet traffic generated from bots, compromised devices, data centers, and more. \r\n<ul> <li>Fraudlogix javascript code is embedded on 300+ million URLs and apps, monitoring 640 million unique users monthly. </li> <li>IPs that generate high volumes of fake ad traffic and installs are identified and added to a list, which updates hourly. </li> <li>The list is integrated directly into your environment for preventative blocking. </li></ul>","shortDescription":"Block bots via live intelligence derived from the global programmatic and affiliate communities","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fraudlogix Live IP Blocklist","keywords":"","description":"<p class=\"align-center\"><b>Live IP Blocklist </b></p>\r\nComprehensive IP intelligence for use in multiple environments to identify and block malicious Internet traffic generated from bots, compromised devices, data centers, and more. \r\n<ul> <li>Fraudlogix javas","og:title":"Fraudlogix Live IP Blocklist","og:description":"<p class=\"align-center\"><b>Live IP Blocklist </b></p>\r\nComprehensive IP intelligence for use in multiple environments to identify and block malicious Internet traffic generated from bots, compromised devices, data centers, and more. \r\n<ul> <li>Fraudlogix javas","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Fraudlogix.png"},"eventUrl":"","translationId":5442,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5445,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Hoxhunt.png","logo":true,"scheme":false,"title":"Hoxhunt Gamified phishing training platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"hoxhunt-gamified-phishing-training-platform","companyTitle":"Hoxhunt","companyTypes":["supplier","vendor"],"companyId":8273,"companyAlias":"hoxhunt","description":"<b>Automation</b>\r\nHoxhunt’s automated phishing simulator sends attacks that resemble real-life threats. Our content is continuously updated by our threat intelligence team. \r\n<b>Personalization </b>\r\nHoxhunt gathers information automatically about your company and your employees. This way the content of the attack is always relevant for the employees. \r\n<b>Gamified user experience </b>\r\nHoxhunt makes cybersecurity training fun and engaging. The employees are rewarded by points when they report threats. They can also compare their progress to other employees on the leaderboard. \r\n<b>Micro training moments </b>\r\nWhen a user reports or fails simulated attacks, we deliver small pieces of education about how they can detect threats. This way their security knowledge is always kept up to date. \r\n<b>Individual learning paths </b>\r\nThe Hoxhunt algorithm automatically recognizes and adapts to user behavior to deliver the right level of difficulty and depth in the attacks. \r\n<b>Localization </b>\r\nThe attacks are personalized based on the users’ language and location. We currently support more than 20 languages. \r\n<b><i>Real, measurable results </i></b>\r\nThe Hoxhunt training platform delivers real measurable results across your organization. Your employees’ behavior towards email threat changes and we have the reporting to prove it. \r\n<ul> <li>Failure rates on simulated attacks drop to less than 2% even with the most sophisticated attacks </li> <li>Reporting rates of real attacks increase to over 60% </li> </ul>\r\n<b><i>Your employees will love us </i></b>\r\nWe make cybersecurity awareness training engaging and fun. Our gamified experience rewards employees for reporting both simulated and real attacks. But don’t just take our word for it. \r\n<ul> <li>Loved by security teams and employees alike </li> </ul>","shortDescription":"Our platform automatically sends individual phishing simulations to your employees and rewards them for reporting threats\r\n\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Hoxhunt Gamified phishing training platform","keywords":"","description":"<b>Automation</b>\r\nHoxhunt’s automated phishing simulator sends attacks that resemble real-life threats. Our content is continuously updated by our threat intelligence team. \r\n<b>Personalization </b>\r\nHoxhunt gathers information automatically about your compan","og:title":"Hoxhunt Gamified phishing training platform","og:description":"<b>Automation</b>\r\nHoxhunt’s automated phishing simulator sends attacks that resemble real-life threats. Our content is continuously updated by our threat intelligence team. \r\n<b>Personalization </b>\r\nHoxhunt gathers information automatically about your compan","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Hoxhunt.png"},"eventUrl":"","translationId":5444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5447,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ID_Analytics.png","logo":true,"scheme":false,"title":"ID Analytics First-Party Fraud","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"id-analytics-first-party-fraud","companyTitle":"ID Analytics","companyTypes":["supplier","vendor"],"companyId":6615,"companyAlias":"id-analytics","description":"<p class=\"align-center\"><b>Identifying “Mules” Before They Come Back to Bite You </b></p>\r\nOften referred to as “credit muling” or “equipment gaming,” first-party fraud occurs when consumers use their true identities and personal information to apply for multiple, high-value products with no intention of honoring their contractual agreements.2 \r\nWhen consumers set out to steal from a business using their real identities, running a standard credit check – or even a third-party fraud screen – won’t necessarily protect the credit issuer. These “mules” have different profiles from identity fraudsters, so they require a specialized approach using fraud assessment tools and predictive solutions. \r\nConsumer behavioral data from the ID Network incorporates insights from wireless, retail lending, banking, peer-to-peer lending, and checking and savings accounts. By using these insights to form a historical picture of how a consumer typically behaves, ID Analytics can quickly identify when an individual begins to seek credit and services in an unusual and high risk fashion. \r\n<p class=\"align-center\"><b>An In-Depth Analysis of First-Party Fraud </b></p>\r\nBy rank-ordering the risk associated with consumer identity elements being asserted on an application, ID Analytics provides a first-party fraud risk assessment across all channels. Higher risk applications are flagged for remediation while lower-scoring applications may move on to the next step of the purchase process. Organizations choose the score threshold that best balances fraud prevention with fast, convenient adjudication processes. \r\nBusinesses need first-party fraud solutions that can: \r\n<ul> <li>Identify and analyze the special attributes of “mules” across industries </li> <li>Minimize the manual review of legitimate, well-intentioned customers </li> <li>Help reduce first-party fraud losses with a near real-time fraud assessment purpose-built for this unique challenge </li> </ul>","shortDescription":"The True Identities Behind First-Party Fraud\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ID Analytics First-Party Fraud","keywords":"","description":"<p class=\"align-center\"><b>Identifying “Mules” Before They Come Back to Bite You </b></p>\r\nOften referred to as “credit muling” or “equipment gaming,” first-party fraud occurs when consumers use their true identities and personal information to apply for multi","og:title":"ID Analytics First-Party Fraud","og:description":"<p class=\"align-center\"><b>Identifying “Mules” Before They Come Back to Bite You </b></p>\r\nOften referred to as “credit muling” or “equipment gaming,” first-party fraud occurs when consumers use their true identities and personal information to apply for multi","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ID_Analytics.png"},"eventUrl":"","translationId":5446,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5449,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IdentityMind.png","logo":true,"scheme":false,"title":"IdentityMind IdentityLink API","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"identitymind-identitylink-api","companyTitle":"IdentityMind","companyTypes":["vendor"],"companyId":8274,"companyAlias":"identitymind","description":"The IdentityLink API is built on IdentityMind’s patented eDNA™ engine. It leverages trusted digital identities to provide real-time access to: \r\n<ul> <li><b>Fraud prevention:</b> account origination, account takeover, payment fraud prevention</li> <li><b>Identity reputation:</b> leverage IdentityMind’s digital identity reputation network</li> <li><b>Risk score:</b> machine learning score based off complexity of the entity graph </li> </ul>\r\n<b>Features:</b>\r\n<ul> <li>FRAUD PREVENTION. Account origination, account takeover, payment fraud prevention </li> <li>IDENTITY REPUTATION. Leverage IDM digital identity reputation network </li> <li>RISK SCORE. Machine learning score based off complexity of the entity graph </li> <li>API. Real time based to retrieve risk score, graph stats, reputation, and actual graph </li> </ul>\r\n<b>Benefits:</b>\r\n<ul> <li>REDUCE FRAUD. IdentityMind’s 50+ attribute identity building capabilities enable you to make higher confidence risk assessments. </li> <li>MACHINE LEARNING. Continual improvements and more targeted risk assessment as system learns from your data </li> <li>QUICK DEPLOYMENT. Save time and money through plug and play entity link analysis and machine learning solution </li> </ul>\r\n<p class=\"align-center\"><b>Fraud Prevention</b></p>\r\nLeverage IdentityMind’s Trusted Digital Identities reputation values to expedite trusted users and detect suspicious users before they transact. Detect when users may be related to terrorism, human trafficking, drug cartels, through their network of affiliations. \r\n<p class=\"align-center\"><b>Transaction Monitoring</b></p>\r\nDetect hidden connections in groups of customers and aggregate individual’s activities even when using multiple accounts.","shortDescription":"Enhance Fraud Prevention Through Better KYC Compliance for Your Business","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IdentityMind IdentityLink API","keywords":"","description":"The IdentityLink API is built on IdentityMind’s patented eDNA™ engine. It leverages trusted digital identities to provide real-time access to: \r\n<ul> <li><b>Fraud prevention:</b> account origination, account takeover, payment fraud prevention</li> <li><b>Ident","og:title":"IdentityMind IdentityLink API","og:description":"The IdentityLink API is built on IdentityMind’s patented eDNA™ engine. It leverages trusted digital identities to provide real-time access to: \r\n<ul> <li><b>Fraud prevention:</b> account origination, account takeover, payment fraud prevention</li> <li><b>Ident","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IdentityMind.png"},"eventUrl":"","translationId":5448,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5710,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Nitrokey.png","logo":true,"scheme":false,"title":"Nitrokey","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nitrokey","companyTitle":"Nitrokey","companyTypes":["vendor"],"companyId":8610,"companyAlias":"nitrokey","description":"<p class=\"align-center\"><b>How Nitrokey works </b></p>\r\n<p class=\"align-center\">Protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware and can't be stolen. The device is PIN-protected and is secured against brute force and hardware attacks. Backups protect against loss. </p>\r\n<b>Nitrokey enables </b>\r\n<ul> <li>Secure Login. Login to websites (e.g. Google, Facebook) using secure One Time Passwords (OTP), U2F or ordinary static passwords. Login to computers and network services (e.g. SSH) using certificates. </li> <li>Email Encryption. Encrypt your emails with GnuPG, OpenPGP, S/MIME or your favourite email client. Keep your secret keys secure on your Nitrokey. </li> <li>Encrypted Mobile Storage. Carry important data with you, hardware-encrypted on your Nitrokey Storage device (16-64 GB). Compatible with Windows, Linux and Mac OS. </li> <li>Hard Disk & File Encryption. Encrypt your hard disks and files using TrueCrypt/VeraCrypt, GnuPG Tools and more. Keep your secret keys secure on your Nitrokey. </li> <li>Key and Certificate Management. Protect your server certificates by using up to 300 cryptographic keys with the Nitrokey HSM. Ideal for security servers, Public Key Infrastructures (PKI) and Certificate Authorities (CA). </li> <li>Server Administration with SSH. Manage your servers, critical infrastructure, and Internet of Things (IoT) not just securely but also more easily. Administrators no longer require to synchronize key files between their desktops or remember complex passwords. Nitrokey acts as a mobile latch key to your servers by using Secure Shell (SSH), providing 2FA always at hand. </li> </ul>\r\n<b>Nitrokey is better </b>\r\n<ul> <li>High Security. Your secret keys are stored in the tamper-resistant and PIN-protected device and are secured against computer viruses, other malware, phishing, loss, theft and brute-force attacks. </li> <li>Made in Germany. Nitrokey is developed and produced in Germany, primarily in Berlin. For the sake of higher quality and security, we do not use cheap overseas manufacturing. </li> <li>Independent Security Assessment. The auditing company Cure53 performed an intensive security review of the Nitrokey Storage. The security experts summarize their results with \"Nitrokey is capable of functioning properly and securely\" (see final report available here Firmware, Hardware). </li> <li>Open Source. Both hardware and software are open-source, free software and allow independent security reviews. Customisable, no vendor lock-in, no security via obfuscation, no hidden security issues! </li> <li>Complete USB plug. Unlike some competitors, Nitrokey contains a complete and standard compliant USB plug. This ensures thousands of insertions without connectivity issues. </li> <li>No Backdoors - No NSA. Installed firmware can be exported and verified, preventing attackers from inserting backdoors into products during shipping. Nitrokey is open-source and free of backdoors. Secret keys are generated only by you and we have no access to your private information. </li> <li>Plausible Deniability. The only hardware solution with hidden encrypted storage. This allows you to plausibly deny the existence of encrypted data, for example during border controls. </li> <li>Easy Integration. Nitrokey uses open interfaces and open drivers to enable its easy integration with your personal requirements. Custom solution can be provided on request. </li> <li>Better Than Software. The Nitrokey hardware functions independently of any operating systems and protects your secret keys against theft, loss, user mistakes, phishing, brute-force attacks, computer viruses and other malware. </li> <li>Sustainability. The sustainable development and production of Nitrokeys contributes to a sustainable environment and society. </li> </ul>","shortDescription":"Protects emails, files, hard drives, server certificates and online accounts","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Nitrokey","keywords":"","description":"<p class=\"align-center\"><b>How Nitrokey works </b></p>\r\n<p class=\"align-center\">Protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware and can't be s","og:title":"Nitrokey","og:description":"<p class=\"align-center\"><b>How Nitrokey works </b></p>\r\n<p class=\"align-center\">Protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware and can't be s","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Nitrokey.png"},"eventUrl":"","translationId":5709,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"},{"id":5,"title":"Security Software","alias":"security-software","description":" Computer security software or cybersecurity software is any computer program designed to enhance information security. Security software is a broad term that encompasses a suite of different types of software that deliver data and computer and network security in various forms. \r\nSecurity software can protect a computer from viruses, malware, unauthorized users and other security exploits originating from the Internet. Different types of security software include anti-virus software, firewall software, network security software, Internet security software, malware/spamware removal and protection software, cryptographic software, and more.\r\nIn end-user computing environments, anti-spam and anti-virus security software is the most common type of software used, whereas enterprise users add a firewall and intrusion detection system on top of it. \r\nSecurity soft may be focused on preventing attacks from reaching their target, on limiting the damage attacks can cause if they reach their target and on tracking the damage that has been caused so that it can be repaired. As the nature of malicious code evolves, security software also evolves.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Firewall. </span>Firewall security software prevents unauthorized users from accessing a computer or network without restricting those who are authorized. Firewalls can be implemented with hardware or software. Some computer operating systems include software firewalls in the operating system itself. For example, Microsoft Windows has a built-in firewall. Routers and servers can include firewalls. There are also dedicated hardware firewalls that have no other function other than protecting a network from unauthorized access.\r\n<span style=\"font-weight: bold; \">Antivirus.</span> Antivirus solutions work to prevent malicious code from attacking a computer by recognizing the attack before it begins. But it is also designed to stop an attack in progress that could not be prevented, and to repair damage done by the attack once the attack abates. Antivirus software is useful because it addresses security issues in cases where attacks have made it past a firewall. New computer viruses appear daily, so antivirus and security software must be continuously updated to remain effective.\r\n<span style=\"font-weight: bold; \">Antispyware.</span> While antivirus software is designed to prevent malicious software from attacking, the goal of antispyware software is to prevent unauthorized software from stealing information that is on a computer or being processed through the computer. Since spyware does not need to attempt to damage data files or the operating system, it does not trigger antivirus software into action. However, antispyware software can recognize the particular actions spyware is taking by monitoring the communications between a computer and external message recipients. When communications occur that the user has not authorized, antispyware can notify the user and block further communications.\r\n<span style=\"font-weight: bold; \">Home Computers.</span> Home computers and some small businesses usually implement security software at the desktop level - meaning on the PC itself. This category of computer security and protection, sometimes referred to as end-point security, remains resident, or continuously operating, on the desktop. Because the software is running, it uses system resources, and can slow the computer's performance. However, because it operates in real time, it can react rapidly to attacks and seek to shut them down when they occur.\r\n<span style=\"font-weight: bold; \">Network Security.</span> When several computers are all on the same network, it's more cost-effective to implement security at the network level. Antivirus software can be installed on a server and then loaded automatically to each desktop. However firewalls are usually installed on a server or purchased as an independent device that is inserted into the network where the Internet connection comes in. All of the computers inside the network communicate unimpeded, but any data going in or out of the network over the Internet is filtered trough the firewall.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is IT security software?</span></h1>\r\nIT security software provides protection to businesses’ computer or network. It serves as a defense against unauthorized access and intrusion in such a system. It comes in various types, with many businesses and individuals already using some of them in one form or another.\r\nWith the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations. Since more and more businesses are now relying their crucial operations on software products, the importance of security system software assurance must be taken seriously – now more than ever. Having reliable protection such as a security software programs is crucial to safeguard your computing environments and data. \r\n<p class=\"align-left\">It is not just the government or big corporations that become victims of cyber threats. In fact, small and medium-sized businesses have increasingly become targets of cybercrime over the past years. </p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">What are the features of IT security software?</span></h1>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Automatic updates. </span>This ensures you don’t miss any update and your system is the most up-to-date version to respond to the constantly emerging new cyber threats.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Real-time scanning.</span> Dynamic scanning features make it easier to detect and infiltrate malicious entities promptly. Without this feature, you’ll risk not being able to prevent damage to your system before it happens.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Auto-clean.</span> A feature that rids itself of viruses even without the user manually removing it from its quarantine zone upon detection. Unless you want the option to review the malware, there is no reason to keep the malicious software on your computer which makes this feature essential.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Multiple app protection.</span> This feature ensures all your apps and services are protected, whether they’re in email, instant messenger, and internet browsers, among others.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application level security.</span> This enables you to control access to the application on a per-user role or per-user basis to guarantee only the right individuals can enter the appropriate applications.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Role-based menu.</span> This displays menu options showing different users according to their roles for easier assigning of access and control.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Row-level (multi-tenant) security.</span> This gives you control over data access at a row-level for a single application. This means you can allow multiple users to access the same application but you can control the data they are authorized to view.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Single sign-on.</span> A session or user authentication process that allows users to access multiple related applications as long as they are authorized in a single session by only logging in their name and password in a single place.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">User privilege parameters.</span> These are customizable features and security as per individual user or role that can be accessed in their profile throughout every application.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application activity auditing.</span> Vital for IT departments to quickly view when a user logged in and off and which application they accessed. Developers can log end-user activity using their sign-on/signoff activities.</li></ul>\r\n<p class=\"align-left\"><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Security_Software.png"},{"id":834,"title":"IoT - Internet of Things Security","alias":"iot-internet-of-things-security","description":" IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).\r\nIoT involves adding internet connectivity to a system of interrelated computing devices, mechanical and digital machines, objects, animals and/or people. Each "thing" is provided a unique identifier and the ability to automatically transfer data over a network. Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.\r\nIoT security has become the subject of scrutiny after a number of high-profile incidents where a common IoT device was used to infiltrate and attack the larger network. Implementing security measures is critical to ensuring the safety of networks with IoT devices connected to them.\r\nIoT security hacks can happen in any industry, from smart home to a manufacturing plant to a connected car. The severity of impact depends greatly on the individual system, the data collected and/or the information it contains.\r\nAn attack disabling the brakes of a connected car, for example, or on a connected health device, such as an insulin pump hacked to administer too much medication to a patient, can be life-threatening. Likewise, an attack on a refrigeration system housing medicine that is monitored by an IoT system can ruin the viability of a medicine if temperatures fluctuate. Similarly, an attack on critical infrastructure -- an oil well, energy grid or water supply -- can be disastrous.\r\nSo, a robust IoT security portfolio must allow protecting devices from all types of vulnerabilities while deploying the security level that best matches application needs. Cryptography technologies are used to combat communication attacks. Security services are offered for protecting against lifecycle attacks. Isolation measures can be implemented to fend off software attacks. And, finally, IoT security should include tamper mitigation and side-channel attack mitigation technologies for fighting physical attacks of the chip.","materialsDescription":" <span style=\"font-weight: bold;\">What are the key requirements of IoT Security?</span>\r\nThe key requirements for any IoT security solution are:\r\n<ul><li>Device and data security, including authentication of devices and confidentiality and integrity of data</li><li>Implementing and running security operations at IoT scale</li><li>Meeting compliance requirements and requests</li><li>Meeting performance requirements as per the use case</li></ul>\r\n<span style=\"font-weight: bold;\">What do connected devices require to participate in the IoT Securely?</span>\r\nTo securely participate in the IoT, each connected device needs a unique identification – even before it has an IP address. This digital credential establishes the root of trust for the device’s entire lifecycle, from initial design to deployment to retirement.\r\n<span style=\"font-weight: bold;\">Why is device authentication necessary for the IoT?</span>\r\nStrong IoT device authentication is required to ensure connected devices on the IoT can be trusted to be what they purport to be. Consequently, each IoT device needs a unique identity that can be authenticated when the device attempts to connect to a gateway or central server. With this unique ID in place, IT system administrators can track each device throughout its lifecycle, communicate securely with it, and prevent it from executing harmful processes. If a device exhibits unexpected behavior, administrators can simply revoke its privileges.\r\n<span style=\"font-weight: bold;\">Why is secure manufacturing necessary for IoT devices?</span>\r\nIoT devices produced through unsecured manufacturing processes provide criminals opportunities to change production runs to introduce unauthorized code or produce additional units that are subsequently sold on the black market.\r\nOne way to secure manufacturing processes is to use hardware security modules (HSMs) and supporting security software to inject cryptographic keys and digital certificates and to control the number of units built and the code incorporated into each.\r\n<span style=\"font-weight: bold;\">Why is code signing necessary for IoT devices?</span>\r\nTo protect businesses, brands, partners, and users from software that has been infected by malware, software developers have adopted code signing. In the IoT, code signing in the software release process ensures the integrity of IoT device software and firmware updates and defends against the risks associated with code tampering or code that deviates from organizational policies.\r\nIn public key cryptography, code signing is a specific use of certificate-based digital signatures that enables an organization to verify the identity of the software publisher and certify the software has not been changed since it was published.\r\n<span style=\"font-weight: bold;\">What is IoT PKI?</span>\r\nToday there are more things (devices) online than there are people on the planet! Devices are the number one users of the Internet and need digital identities for secure operation. As enterprises seek to transform their business models to stay competitive, rapid adoption of IoT technologies is creating increasing demand for Public Key Infrastructures (PKIs) to provide digital certificates for the growing number of devices and the software and firmware they run.\r\nSafe IoT deployments require not only trusting the devices to be authentic and to be who they say they are, but also trusting that the data they collect is real and not altered. If one cannot trust the IoT devices and the data, there is no point in collecting, running analytics, and executing decisions based on the information collected.\r\nSecure adoption of IoT requires:\r\n<ul><li>Enabling mutual authentication between connected devices and applications</li><li>Maintaining the integrity and confidentiality of the data collected by devices</li><li>Ensuring the legitimacy and integrity of the software downloaded to devices</li><li>Preserving the privacy of sensitive data in light of stricter security regulations</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/iot.png"},{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"<span style=\"font-weight: bold; \">Messaging security</span> is a subcategory of <span style=\"font-style: italic; \">unified threat management (UTM) </span>focused on securing and protecting an organization’s communication infrastructure. Communication channels can include email software, messaging apps, and social network IM platforms. This extra layer of security can help secure devices and block a wider range of viruses or malware attacks.\r\nMessaging security helps to ensure the confidentiality and authenticity of an organization’s communication methods. Confidentiality refers to making sure only the intended recipients are able to read the messages and authenticity refers to making sure the identity of each sender or recipient is verified.\r\nOftentimes, attackers aim to gain access to an entire network or system by infiltrating the messaging infrastructure. Implementing proper data and message security can minimize the chance of data leaks and identity theft.\r\n<span style=\"color: rgb(97, 97, 97); \">Encrypted messaging (also known as secure messaging) provides end-to-end encryption for user-to-user text messaging. Encrypted messaging prevents anyone from monitoring text conversations. Many encrypted messenger apps also offer end-to-end encryption for phone calls made using the apps, as well as for files that are sent using the apps.</span>\r\nTwo modern methods of encryption are the <span style=\"font-style: italic; \">Public Key (Asymmetric)</span> and the <span style=\"font-style: italic; \">Private Key (Symmetric</span>) methods. While these two methods of encryption are similar in that they both allow users to encrypt data to hide it from the prying eyes of outsiders and then decrypt it for viewing by an authorized party, they differ in how they perform the steps involved in the process.\r\n<span style=\"font-weight: bold; \">Email</span> security message can rely on public-key cryptography, in which users can each publish a public key that others can use to encrypt messages to them, while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send. \r\n<span style=\"font-weight: bold;\">Encrypted messaging systems </span>must be encrypted end-to-end, so that even the service provider and its staff are unable to decipher what’s in your communications. Ideal solutions is “server-less” encrypted chat where companies won’t store user information anywhere.\r\nIn a more general sense, users of unsecured public Wi-Fi should also consider using a <span style=\"font-weight: bold;\">Virtual Private Network </span>(VPN) application, to conceal their identity and location from Internet Service Providers (ISPs), higher level surveillance, and the attentions of hackers.","materialsDescription":"<h1 class=\"align-center\"> What is messaging security?</h1>\r\nMessaging Security is a program that provides protection for companies' messaging infrastructure. The programs include IP reputation-based anti-spam, pattern-based anti-spam, administrator-defined block/allow lists, mail antivirus, zero-hour malware detection, and email intrusion prevention.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Six Dimensions of Comprehensive Messaging Security</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">IP-Reputation Anti-spam.</span> It checks each email connection request with a database of IP addresses to establish whether a sender is a legitimate or known spam sender and malware. If a sender is recognized it undesirable the messaging Security program drops the connection before the message is accepted.</li><li><span style=\"font-weight: bold; \">Pattern-based anti-spam</span> utilizes a proprietary algorithm to establish a fingerprint-like signature of email messages. When a message comes in, its pattern is calculated and checked against a database to determine if the message matches a known email pattern. </li><li><span style=\"font-weight: bold; \">Block/Allow List Anti-spam.</span> Administrators can create a list of IP addresses or domains that they would like to either block or allow. This method ensures that trusted sources are explicitly allowed and unwanted sources are explicitly denied access.</li><li><span style=\"font-weight: bold; \">Mail Antivirus.</span> This layer of protection blocks a wide range of known viruses and malware attacks.</li><li><span style=\"font-weight: bold; \">Zero-Hour Malware Protection.</span> By analyzing large numbers of messages, outbreaks are detected along with their corresponding messages. These message patterns are then flagged as malicious, giving information about a given attack.</li><li><span style=\"font-weight: bold; \">SmartDefense Email IPS.</span> The messaging security program utilizes SmartDefense Email IPS to stop attacks targeting the messaging infrastructure. </li></ul>\r\n<h1 class=\"align-center\">What are Signal, Wire and LINE messenger security apps like ?</h1>\r\n<p class=\"align-left\">Secure private messenger is a messaging application that emphasizes the privacy and of users using encryption and service transparency. While every modern messenger system is using different security practices (most prominently SSL/HTTPS) - the difference between secure and classic messengers is what we don’t know in the scope of implementation and approach to user data. </p>\r\n<p class=\"align-left\">Message access control and secure messengers evolved into a distinct category due to the growing awareness that communication over the internet is accessible by third parties, and reasonable concerns that the messages can be used against the users.</p>\r\n<h1 class=\"align-center\">Why secure communication is essential for business?</h1>\r\n<p class=\"align-left\">In the context of business operation, communication is a vital element of maintaining an efficient and dynamic working process. It lets you keep everything up to date and on the same page. And since many things are going on at the same time - tools like messengers are one of the many helpers that make the working day a little more manageable.</p>\r\n<p class=\"align-left\">Some of the information, like employee and customer data, proprietary information, data directly linked to business performance or future projections, may be strictly under a non-disclosure agreement. Without proper text message authentication in information security or encryption, it remains vulnerable to exposure. The chances are slim, but the possibility remains. </p>\r\n<p class=\"align-left\">And there are people interested in acquiring that sensitive information, people who like to play dirty because getting a competitive advantage is a decent motivation to go beyond the law. And when private conversations leak, especially the business-related ones - the impact is comparable with the Titanic hitting an iceberg. </p>\r\n<p class=\"align-left\">Encrypted massages in messenger prevents this from happening.</p>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Messaging_Security.png"},{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Data leak prevention (DLP) is a suite of technologies aimed at stemming the loss of sensitive information that occurs in enterprises across the globe. By focusing on the location, classification and monitoring of information at rest, in use and in motion, this solution can go far in helping an enterprise get a handle on what information it has, and in stopping the numerous leaks of information that occur each day. DLP is not a plug-and-play solution. The successful implementation of this technology requires significant preparation and diligent ongoing maintenance. Enterprises seeking to integrate and implement DLP should be prepared for a significant effort that, if done correctly, can greatly reduce risk to the organization. Those implementing the solution must take a strategic approach that addresses risks, impacts and mitigation steps, along with appropriate governance and assurance measures.","materialsDescription":" <span style=\"font-weight: bold;\">How to protect the company from internal threats associated with leakage of confidential information?</span>\r\nIn order to protect against any threat, you must first realize its presence. Unfortunately, not always the management of companies is able to do this if it comes to information security threats. The key to successfully protecting against information leaks and other threats lies in the skillful use of both organizational and technical means of monitoring personnel actions.\r\n<span style=\"font-weight: bold;\">How should the personnel management system in the company be organized to minimize the risks of leakage of confidential information?</span>\r\nA company must have a special employee responsible for information security, and a large department must have a department directly reporting to the head of the company.\r\n<span style=\"font-weight: bold;\">Which industry representatives are most likely to encounter confidential information leaks?</span>\r\nMore than others, representatives of such industries as industry, energy, and retail trade suffer from leaks. Other industries traditionally exposed to leakage risks — banking, insurance, IT — are usually better at protecting themselves from information risks, and for this reason they are less likely to fall into similar situations.\r\n<span style=\"font-weight: bold;\">What should be adequate measures to protect against leakage of information for an average company?</span>\r\nFor each organization, the question of protection measures should be worked out depending on the specifics of its work, but developing information security policies, instructing employees, delineating access to confidential data and implementing a DLP system are necessary conditions for successful leak protection for any organization. Among all the technical means to prevent information leaks, the DLP system is the most effective today, although its choice must be taken very carefully to get the desired result. So, it should control all possible channels of data leakage, support automatic detection of confidential information in outgoing traffic, maintain control of work laptops that temporarily find themselves outside the corporate network...\r\n<span style=\"font-weight: bold;\">Is it possible to give protection against information leaks to outsourcing?</span>\r\nFor a small company, this may make sense because it reduces costs. However, it is necessary to carefully select the service provider, preferably before receiving recommendations from its current customers.\r\n<span style=\"font-weight: bold;\">What data channels need to be monitored to prevent leakage of confidential information?</span>\r\nAll channels used by employees of the organization - e-mail, Skype, HTTP World Wide Web protocol ... It is also necessary to monitor the information recorded on external storage media and sent to print, plus periodically check the workstation or laptop of the user for files that are there saying should not.\r\n<span style=\"font-weight: bold;\">What to do when the leak has already happened?</span>\r\nFirst of all, you need to notify those who might suffer - silence will cost your reputation much more. Secondly, you need to find the source and prevent further leakage. Next, you need to assess where the information could go, and try to somehow agree that it does not spread further. In general, of course, it is easier to prevent the leakage of confidential information than to disentangle its consequences.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Data_Leak_Prevention.png"},{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"<span style=\"font-weight: bold; \">Identity management</span> (IdM), also known as <span style=\"font-weight: bold; \">identity and access management</span> (IAM or IdAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and Data Management.\r\nWith an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Identity and access management software offers role-based access control, which lets system administrators regulate access to systems or networks based on the roles of individual users within the enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create or modify a file. Roles are defined according to job competency, authority and responsibility within the enterprise.\r\nSystems used for identity and access management include single sign-on systems, multi-factor authentication and privileged access management (PAM). These technologies also provide the ability to securely store identity and profile data as well as data governance functions to ensure that only data that is necessary and relevant is shared. IAM systems can be deployed on premises, provided by a third-party vendor through a cloud-based subscription model or deployed in a hybrid cloud.\r\n<span style=\"font-weight: bold; \">Basic components of IAM.</span> On a fundamental level, IAM encompasses the following components:\r\n<ul><li>How individuals are identified in a system.</li><li>How roles are identified in a system and how they are assigned to individuals.</li><li>Adding, removing and updating individuals and their roles in a system.</li><li>Assigning levels of access to individuals or groups of individuals.</li><li>Protecting the sensitive data within the system and securing the system itself.</li></ul>\r\nAccess identity management system should consist of all the necessary controls and tools to capture and record user login information, manage the enterprise database of user identities and orchestrate the assignment and removal of access privileges. That means that systems used for IAM should provide a centralized directory service with oversight as well as visibility into all aspects of the company user base.\r\nTechnologies for identity access and management should simplify the user provisioning and account setup process. User access management software should reduce the time it takes to complete these processes with a controlled workflow that decreases errors as well as the potential for abuse while allowing automated account fulfillment. An identity and access management system should also allow administrators to instantly view and change access rights.\r\nIAM systems should be used to provide flexibility to establish groups with specific privileges for specific roles so that access rights based on employee job functions can be uniformly assigned. Identity access management software should also provide request and approval processes for modifying privileges because employees with the same title and job location may need customized, or slightly different, access.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between identity and access management?</span></h1>\r\nAfter authentication, there needs to be an access control decision. The decision is based on the information available about the user. The difference between identity management and access management is thus:\r\n<ul><li>Identity Management is about managing the attributes related to the user.</li><li>Access Management is about evaluating the attributes based on policies and making Yes/No decisions.</li></ul>\r\nThere are three types of Access Control Systems: \r\n<ul><li>Discretionary Access Control (DAC)</li><li>Mandatory Access Control (MAC)</li><li>Role-Based Access Control (RBAC)</li></ul>\r\n<h1 class=\"align-center\">What are the main benefits of identity management?</h1>\r\nIdentity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. These are the main benefits of having an IAM solution:\r\n<ul><li><span style=\"font-weight: bold; \">Easily accessible anywhere</span></li></ul>\r\nNowadays, people need their identities all the time to use services and resources. In that sense, they require access to any platform without limits using their IDs, thus eliminating barriers for customers to enter the platform anytime, anywhere.\r\n<ul><li><span style=\"font-weight: bold; \">It encourages the connection between the different parts</span></li></ul>\r\nThe digital transformation that is taking place among more and more organizations forces the need for people, applications and devices to stay connected to each other. And, as expected, all of these processes bring with them some security threats.\r\nHowever, IAM software is a solution that guarantees correct administration with the best identity providers, such as Salesforce, Twitter and Google. Authentication and security are two of the strengths of Identity and Access Management, as well as being extendable and ready for future advances. \r\n<ul><li><span style=\"font-weight: bold; \">It improves productivity</span></li></ul>\r\nIdentity software automates the entry of new personnel and facilitates access to all components of the system with which the company operates. This allows reducing times in the delivery of access so that they begin to produce immediately. For this reason, business agility is also increased by using the advantages that technology makes available to meet the demands of today’s world. \r\n<ul><li><span style=\"font-weight: bold; \">It optimizes user experience</span></li></ul>\r\nRemembering so many usernames and passwords to access social networks, banks and other services on the Internet becomes a challenge for people. Thanks to user identity management system, people can get an identity that provides access to different systems. Single sign-on (SSO) allows customers and partners to access different internal and external applications with the same access method. That way the user experience will not be affected.\r\n<ul><li><span style=\"font-weight: bold; \">Secure your brand at all levels</span></li></ul>\r\nThere will be no risk of security breach, regardless of whether a connection is made from multiple identity providers. Identity management software and access management software enables strong authentication to keep your business and brand secure. Detailed verification of all identities entering the system is performed, in addition to allowing various licenses to limit access levels. At the same time, it monitors through analysis, fraud detection and alert functions that indicate a possible real risk. In short, enterprise identity management system is a reliable tool that employs technology to support digital transformation. A software that provides agility, security and satisfaction to the company’s customers. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5455,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/InfoArmor.png","logo":true,"scheme":false,"title":"InfoArmor PrivacyArmor","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"infoarmor-privacyarmor","companyTitle":"InfoArmor","companyTypes":["supplier","vendor"],"companyId":6790,"companyAlias":"infoarmor","description":"<p class=\"align-center\"><b>Peace of mind delivered </b></p>\r\n<b>Dark web monitoring </b>\r\nWe use bots and embedded human intelligence operatives to search the dark web for compromised credentials. We then alert members who have been compromised. \r\n<b>Stolen fund reimbursement </b>\r\nFunds stolen from a bank account, 401(k), or HSA? We’ll reimburse it. We even advance tax refunds that were fraudulently issued. \r\n<b>Pre-existing conditions </b>\r\nIf your employees are victims of identity theft or fraud before joining PrivacyArmor, we’ll fully remediate past and present incidents with no extra fees. \r\n<b>Deceased family member coverage </b>\r\nFamily members who pass away are still targets for identity theft. We’ll fully remediate cases for loved ones who have passed on. \r\n<b>PrivacyArmor also offers: </b>\r\n<ul> <li>Service and benefits that fit all industries and company sizes </li> <li>Accounts secured with two-factor authentication </li> <li>Generous family coverage that includes kids, parents, in-laws, and other dependents living at home </li> <li>No age cap on minors or “aging out” of coverage </li> <li>Full-service fraud remediation with a dedicated Privacy Advocate® </li> <li>Pre-existing identity theft coverage at no extra cost </li> <li>In-house Privacy Advocates available 24/7 </li> <li>$1 million identity theft insurance policy† </li> </ul>\r\n<b>Benefits:</b>\r\n<ul> <li>Financial protection far beyon a credit score</li> <li>Keep control of social media accounts</li> <li>Combat advanced fraud</li> </ul>","shortDescription":"The industry leader in employee identity protection","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"InfoArmor PrivacyArmor","keywords":"","description":"<p class=\"align-center\"><b>Peace of mind delivered </b></p>\r\n<b>Dark web monitoring </b>\r\nWe use bots and embedded human intelligence operatives to search the dark web for compromised credentials. We then alert members who have been compromised. \r\n<b>Stolen fu","og:title":"InfoArmor PrivacyArmor","og:description":"<p class=\"align-center\"><b>Peace of mind delivered </b></p>\r\n<b>Dark web monitoring </b>\r\nWe use bots and embedded human intelligence operatives to search the dark web for compromised credentials. We then alert members who have been compromised. \r\n<b>Stolen fu","og:image":"https://old.roi4cio.com/fileadmin/user_upload/InfoArmor.png"},"eventUrl":"","translationId":5454,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5457,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Verimatrix.png","logo":true,"scheme":false,"title":"Verimatrix Multi-DRM","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"verimatrix-multi-drm","companyTitle":"Inside Secure (Verimatrix)","companyTypes":["supplier","vendor"],"companyId":6938,"companyAlias":"inside-secure","description":"A cloud-based SaaS model, Verimatrix Multi-DRM not only reduces NOC-related expenditures, but also addresses issues of fragmentation, business analytics and security, while allowing operators to retain full control of their service offer and subscriber relationships. Building upon the Verimatrix Video Content Authority System (VCAS) and Analytics products and services, Verimatrix offers a comprehensive, multi-screen and multi-DRM solution for premium content security and monetization. The SaaS solution is based in the Verimatrix Secure Cloud (AWS) and features several value-add options:\r\n<ul> <li>Multi-Rights OTT security solution offers unified rights management for common DRMs and client device categories</li> <li>Analytics enables secure collection of device and usage data for access, presentation and export, with the goal of optimizing and monetizing the video services platform </li> <li>The Multi-DRM Client SDK with pre-integrated player enables live and on-demand video services with all common Pay TV models</li> <li>Watermarking delivers server-side video marking for OTT mobile devices, with a client-side option for set-top boxes, including UHD.</li> </ul>\r\n<b>Features:</b>\r\n<ul> <li>Unified management for common DRMs and client device categories</li> <li>Simple and scalable SaaS subscription pricing model</li> <li>Secure AWS virtual cloud environment, with worldwide footprint options</li> <li>Rapid deployment, reduced TCO and increased agility</li> <li>Analytics tools for video services optimization and monetization</li> <li>Multi-DRM Client with pre-integrated player for live and on-demand video services</li> <li>Server-side and client-side video watermarking for OTT mobile and STBs</li> <li>Open APIs integrate into existing deployments and business systems</li> </ul>","shortDescription":"Verimatrix is the leading provider of software security solutions. Its Multi-DRM, player and client solutions are a compelling choice in the busy OTT market\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Verimatrix Multi-DRM","keywords":"","description":"A cloud-based SaaS model, Verimatrix Multi-DRM not only reduces NOC-related expenditures, but also addresses issues of fragmentation, business analytics and security, while allowing operators to retain full control of their service offer and subscriber relatio","og:title":"Verimatrix Multi-DRM","og:description":"A cloud-based SaaS model, Verimatrix Multi-DRM not only reduces NOC-related expenditures, but also addresses issues of fragmentation, business analytics and security, while allowing operators to retain full control of their service offer and subscriber relatio","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Verimatrix.png"},"eventUrl":"","translationId":5456,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5459,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Intelligent_Wave.png","logo":true,"scheme":false,"title":"Intelligent Wave ACEPlus ","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"intelligent-wave-aceplus","companyTitle":"Intelligent Wave, Inc. (IWI)","companyTypes":["supplier","vendor"],"companyId":6642,"companyAlias":"intelligent-wave-inc-iwi","description":"As credit card use expands, criminal use of forged or stolen cards is also increasing. In order to further assure the credibility of the credit card business, we developed the ACEPlus fraudulent use detection system based on a score / rule system for such crime patterns, and further expanded its functions.\r\n<b>Major Functions </b>\r\n<ul> <li>Flexibility to build a system environment in accordance with handling volume (from tens of thousands to tens of millions of card members)</li> <li>Extensive installations in Japanese credit card industries</li> <li>Functions to detect and monitor fraudulent card use in real time, online</li> <li>Automatic suspension function</li> <li>Function to manage information on customer card use</li> <li>Scoring function based on customer behavior model</li> <li>Function to support data analysis effectively utilizing a database</li> <li>Function to search critical alert data</li> <li>Flexible changes in screen display</li> <li>Work efficiency improvements by obtaining statistical information</li> <li>Data mining utilizing accumulated data</li> </ul>\r\n<b>Scoring system </b>\r\nACEPlus achieves highly accurate results that surpass those of conventional scoring systems. This scoring system has achieved high cost performance and highly precise results, as well as minimizing damage, monitoring online credit authorizations from all over the world in real time, and sending warnings.","shortDescription":"ACE Plus achieves high precision and strategically detects fraudulent card use","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Intelligent Wave ACEPlus ","keywords":"","description":"As credit card use expands, criminal use of forged or stolen cards is also increasing. In order to further assure the credibility of the credit card business, we developed the ACEPlus fraudulent use detection system based on a score / rule system for such crim","og:title":"Intelligent Wave ACEPlus ","og:description":"As credit card use expands, criminal use of forged or stolen cards is also increasing. In order to further assure the credibility of the credit card business, we developed the ACEPlus fraudulent use detection system based on a score / rule system for such crim","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Intelligent_Wave.png"},"eventUrl":"","translationId":5458,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5461,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Ipsidy.png","logo":true,"scheme":false,"title":"Ipsidy Verified","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"ipsidy-verified","companyTitle":"Ipsidy, Inc.","companyTypes":["supplier","vendor"],"companyId":6646,"companyAlias":"ipsidy-inc","description":"<p class=\"align-center\"><b>Verify Identity of Employees and Customers, Anywhere </b></p>\r\nSecurely manage identity both inside and outside your enterprise with Verified by Ipsidy. Reduce fraud and gain identity certainty of a mobile app logon, online chat, or any digital transaction. \r\n<ul> <li>Trigger an identity authentication from your platform or our Identity Portal to the Ipsidy app on a user’s mobile phone. A user swipes right to confirm the request and details specific to the event. </li> <li>The phone’s camera with liveness detection auto-prompts a user to capture their face with just a blink and a smile. </li> <li>Ipsidy converts the selfie into a biometric facial template and matches against the user’s reference photo. The transaction is confirmed, and the user’s identity is Verified. </li> </ul>\r\n<p class=\"align-center\"><b>Frictionless Biometric Multi-Factor Authentication </b></p>\r\n<b>Key Features </b>\r\n<ul> <li>A full-service web-portal, where you can view and manage data, export reports, and send all authentication requests. </li> <li>Reverse-Verify feature allows customers to request your service providers (whether on the phone or in-person) to verify their identities. </li> <li>Multi-factor authentication technology allows for multiple levels of security: PIN, password, biometrics, dynamic digital signature, etc. </li> </ul>\r\n<b>How will this identity verification solution benefit my business? </b>\r\n<ul> <li>With no integration required, reduce the time it takes to verify customers, whether on the phone, chatting online, or even in-person. </li> <li>Provide customers and employees with a trusted, seamless and secure biometric identification experience, secure corporate transactions, and reduce fraud. </li> <li>Out-of-the-box solution offers flexibility and allows you to get started immediately. However, Ipsidy's APIs and SDKs allow for optional easy integration to enterprise databases. </li> </ul>\r\n<b>Securely Manage Identity Through the Customer Lifecycle </b>\r\nSecure identity beyond the initial KYC customer onboarding experience. Verified offers multi-factor authentication for any follow-on transactions, including seamless logon with face to any website or mobile app. Call center or online chat support can verify customers with a seamless selfie. Account changes, password resets, even wire transfers and stock trades can all be confirmed with Verified. Verified allows you to seamlessly present transaction details, allowing you to receive transaction confirmation and identity certainty. ","shortDescription":"Reduce Identity Fraud with Mobile, Biometric Multi-Factor Authentication","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Ipsidy Verified","keywords":"","description":"<p class=\"align-center\"><b>Verify Identity of Employees and Customers, Anywhere </b></p>\r\nSecurely manage identity both inside and outside your enterprise with Verified by Ipsidy. Reduce fraud and gain identity certainty of a mobile app logon, online chat, or ","og:title":"Ipsidy Verified","og:description":"<p class=\"align-center\"><b>Verify Identity of Employees and Customers, Anywhere </b></p>\r\nSecurely manage identity both inside and outside your enterprise with Verified by Ipsidy. Reduce fraud and gain identity certainty of a mobile app logon, online chat, or ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Ipsidy.png"},"eventUrl":"","translationId":5460,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5463,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Iraje_Software.jpg","logo":true,"scheme":false,"title":"Iraje Software ActiveChange Manager","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"iraje-software-activechange-manager","companyTitle":"Iraje Software","companyTypes":["vendor"],"companyId":6647,"companyAlias":"iraje-software","description":"<b>Product Focus:</b> Control security access to changes in Schema (DDL), Work area hierarchy, and Data (DML), thus providing the mechanisms for real time Computer Audits. \r\n<b>Product Description:</b> ActiveChangeManager allows the user to define the security access for any specific schema, how multiple database users can access and work in a cooperative environment, with restricted privileges with respect to database schema design, data and audit information. \r\n<b>Benefits: </b>\r\n<ul> <li>All users have a consistent real-time secured vision of multiple instances of all corporate database applications. </li> <li>ActiveChangeManager provides an encrypted password algorithm whereby the user is prevented from knowing the direct SQL database passwords for sensitive production databases. </li> <li>All database changes are recorded, along with the exact SQL that has been executed as well as the specific database user who executed the SQL. </li> <li>Ability to freeze the database schema at any time from a single controlling point. </li> <li>Ability to allow the users SQL access to databases with restricted SQL privileges. E.g. DROP table and DELETE CUSTOMER operations may be restricted by the ActiveChangeManager for a particular production database. </li> <li>Ability to restrict specific data access provides the database application owner the means to prevent a developer from querying sensitive production database information, while allowing this developer to modify and work with the schema design if necessary. </li> <li>ActiveChangeManager also allows the changes to work its way around a change management and approval process, thus providing a controlled environment for database design changes. This is an option that can be turned ON when the system enters implementation/production stage. </li> </ul>\r\n<b>Application Area: </b>\r\n<ul> <li>To restrict users from uncontrolled SQL access on production databases. </li> <li>To allow full access to developers on development databases, at the same time controlling the changes via the recording feature whereby all changes and changed by information is being recorded. </li> <li>Changes on one database schema instance can be propagated effortlessly to another database instance, e.g. Changes in the DEVL environment can be propagated to the PROD database. </li> <li>Where it is required to provide access to the audit control information, but not allow direct access to database changes or schema changes. </li> </ul>","shortDescription":"The solution architecture is highly scalable. It can support hundreds of users and thousands of devices. It has multiple options to support active-active or active-passive architectures","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Iraje Software ActiveChange Manager","keywords":"","description":"<b>Product Focus:</b> Control security access to changes in Schema (DDL), Work area hierarchy, and Data (DML), thus providing the mechanisms for real time Computer Audits. \r\n<b>Product Description:</b> ActiveChangeManager allows the user to define the security","og:title":"Iraje Software ActiveChange Manager","og:description":"<b>Product Focus:</b> Control security access to changes in Schema (DDL), Work area hierarchy, and Data (DML), thus providing the mechanisms for real time Computer Audits. \r\n<b>Product Description:</b> ActiveChangeManager allows the user to define the security","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Iraje_Software.jpg"},"eventUrl":"","translationId":5462,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5465,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Jumio_Corporation.png","logo":true,"scheme":false,"title":"Jumio Corporation Identity Verification","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"jumio-corporation-identity-verification","companyTitle":"Jumio Corporation","companyTypes":["vendor"],"companyId":5705,"companyAlias":"jumio-corporation","description":"<p class=\"align-center\"><b>Know the True Identity of Your Customers </b></p>\r\nThe Jumio Identity Verification process uses machine learning, face-based biometrics and verification experts to ensure the person behind a transaction is present and who they say are. Identity verification goes well beyond traditional authentication methods to deliver a significantly higher level of assurance and establish a trusted digital identity. \r\n<ul> <li>ID Proofing Check. Is the ID document authentic and valid? </li> <li>Similarity Check. Is the person holding the ID the same person shown in the ID photo? </li> <li>Liveness Check. Is the person holding the ID physically present during the transaction? </li> <li>Definitive Answer. Jumio Identity Verification delivers a definitive yes or no answer in seconds. </li> </ul>\r\n<b>Benefits:</b>\r\n<ul> <li>Verify IDs. Ensure the ID document is authentic and valid. </li> <li>Similarity Check. Make sure the person holding the ID is the same person shown in the ID photo. </li> <li>Compliance. Comply with growing regulations & directives including GDPR, PSD2, KYC and AML. </li> <li>Certified Liveness Check. Perform liveness detection using FaceTec’s certified 3D selfie technology. </li> <li>User Experience. Dramatically reduce user friction and verification time while increasing conversion rates. </li> <li>Security. All data is transmitted and stored with strong AES 256 bit encryption. Jumio is PCI Level 1 compliant. </li> </ul>\r\n<b>Use Cases </b>\r\n<ul> <li>Cardholder not present </li> <li>User authentication </li> <li>Fraud detection </li> <li>High risk transactions </li> <li>KBA replacement </li> <li>KYC/AML compliance </li> </ul>","shortDescription":"Jumio provides real-time identity verification, helping you prevent identity fraud while achieving KYC/AML compliance and providing a seamless customer experience\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Jumio Corporation Identity Verification","keywords":"","description":"<p class=\"align-center\"><b>Know the True Identity of Your Customers </b></p>\r\nThe Jumio Identity Verification process uses machine learning, face-based biometrics and verification experts to ensure the person behind a transaction is present and who they say ar","og:title":"Jumio Corporation Identity Verification","og:description":"<p class=\"align-center\"><b>Know the True Identity of Your Customers </b></p>\r\nThe Jumio Identity Verification process uses machine learning, face-based biometrics and verification experts to ensure the person behind a transaction is present and who they say ar","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Jumio_Corporation.png"},"eventUrl":"","translationId":5464,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5467,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/MarkMonitor.jpg","logo":true,"scheme":false,"title":"MarkMonitor Domain Security","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"markmonitor-domain-security","companyTitle":"MarkMonitor","companyTypes":["supplier","vendor"],"companyId":5739,"companyAlias":"markmonitor","description":"With more than half of the world’s population online, registered domain names totaling 330+ million and 23+ million new gTLDs registered, security threats against domain name assets can have more ramifications on your business than ever. The destruction caused by attacks against domain names and domain registration accounts goes beyond brand reputation, bleeding into customer trust and your organization’s bottom line. A valuable corporate asset, your portfolio merits round-the-clock protection. Fortunately, our best-in-class innovations have made better solutions possible.\r\n<b>Exceptional security for your valuable domain assets </b>\r\nReduce your company’s security vulnerabilities and minimize the likelihood of successful attacks with a suite of security capabilities, featuring: \r\n<ul> <p><b>A simplified experience </b></p><ul> <li>API and single sign-on (SSO) create a streamlined and user-friendly interface </li> <li>Granular permissions and full transaction logging for accountability and control </li> <li>Customizable security levels for each of your domains </li> <li>Count on the MarkMonitor team, trusted by 10 out of 10 most highly trafficked websites worldwide </li> </ul> <p><b>Highly-secured access </b></p><ul> <li>Two-Factor Authentication fortifies account access against account hijacking </li> <li>Portal Access Control to prevent tampering with off-premises registration </li> <li>Secure Account Management automatically notifies a secure email address when changes are made </li> </ul> <p><b>Full-scale protection </b></p><ul> <li>DNS Monitoring identifies unauthorized DNS updates by scanning each domain name under management </li> <li>Domain Masking keeps your ownership confidential until you’re ready to introduce your product or service to the market </li> <li>Mission-Critical Domain Security combines maximum domain renewal periods with domain locking </li> </ul>","shortDescription":"Trusted by the world's most recognized brands\r\n\r\n\r\n\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"MarkMonitor Domain Security","keywords":"","description":"With more than half of the world’s population online, registered domain names totaling 330+ million and 23+ million new gTLDs registered, security threats against domain name assets can have more ramifications on your business than ever. The destruction caused","og:title":"MarkMonitor Domain Security","og:description":"With more than half of the world’s population online, registered domain names totaling 330+ million and 23+ million new gTLDs registered, security threats against domain name assets can have more ramifications on your business than ever. The destruction caused","og:image":"https://old.roi4cio.com/fileadmin/user_upload/MarkMonitor.jpg"},"eventUrl":"","translationId":5466,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":["Shortage of inhouse software developers","Shortage of inhouse IT resources","High costs of IT personnel","Shortage of inhouse IT engineers"],"materials":[],"useCases":[],"best_practices":[],"values":["Reduce Costs","Enhance Staff Productivity"],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}