View

Sorting

Products found: 158

logo
Offer a reference bonus
1.00

1С:Предприятие 8. Общепит КОРП

14 главных возможностей программы «1С:Общепит КОРП 3.0»:
  • Автоматизация рабочих мест: технолога, повара, заведующего производством, калькулятора, кладовщика, бухгалтера по различным участкам учета.
  • Выполнение всех требований законодательства по работе с ЕГАИС для предприятий общественного питания.
  • Налоговый учет обособленных подразделений с учетом особенностей, предусмотренных законодательством. Исчисление налога на прибыль осуществляется по юридическому лицу, при этом некоторые расходы включаются в уменьшение прибыли в объеме, рассчитанном в целом по юридическому лицу, исходя из суммы выручки, расходов по оплате труда, реализованных товаров.
  • Автоматические расчет долей и распределение налога на прибыль по инспекциям ФНС, где зарегистрированы обособленные подразделения. После проведения регламентных операций автоматически заполняется налоговая декларация по налогу на прибыль.
  • Специфический бухгалтерский документооборот между подразделениями, выделенными на отдельный баланс.
  • Для анализа информации по подразделениям, выделенным и не выделенным на отдельный баланс, используются любые стандартные отчеты.
  • Наличие отдельного блока работы с ЕГАИС для малых производителей пива и слабоалкогольных напитков (до 300 тыс. дал.), использующих упрощенную схему учета производства (по рецептурам, аналогично производству блюд) в части отражения в ЕГАИС операций по производству и реализации слабоалкогольной продукции.
  • Поддержка требований законодательства по работе с ЕГАИС для предприятий общественного питания — 54-ФЗ, необходимая отраслевая отчетность и печатные формы.
  • Обмен данными с кассовыми системами: «РестАрт» (двусторонний), «1С:Ресторан» (двусторонний), R_Keeper v.6 и v.7 (только загрузка продаж), iiko (только загрузка продаж), Frontol 5 (только загрузка продаж).
  • Ведение списка Рецептур и составление калькуляций с учетом предварительной проработки фирменных блюд, причем Рецептуры одного блюда могут различаться для различных подразделений.
  • Учет приготовления полуфабрикатов и блюд согласно заведенным ранее рецептурам. Оценка нехватки и требуемого количества ингредиентов, наличия необходимых полуфабрикатов.
  • Использование нескольких рецептур с возможностью выбора нужной в момент приготовления. Для сложных рецептур — механизм учета «блюдо в блюде».
  • Ведение списка взаимозаменяемых продуктов и его автоматическое использование при списании в производство и формировании калькуляционных карточек.
  • Учет сезонных коэффициентов перерасхода, специй, калорийности и пищевой ценности.
  • Варианты поставок решения «1С:Общепит КОРП 3.0»
Программа «1С:Общепит КОРП 3.0» разработана на базе 3-й редакции решения «1С:Бухгалтерия предприятия КОРП» системы программ «1С:Предприятие 8» с сохранением всех возможностей и механизмов типового решения. При обновлении решения до версии КОРП накопленные данные в информационной базе сохранятся.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
17
7
logo
Offer a reference bonus
0.00

Adlumin's Sentry

Adlumin's flagship product Sentry is a cloud delivered SaaS platform that detects identity based attacks in real time using user behavior analytics and active defense. We find attackers impersonating your legitimate employees. As a cloud delivered SaaS application Sentry deploy's in minutes and starts detecting threats immediately by building a pattern of life for every user. User & Entity Behavior Analytics (UEBA)
  • Artificial Intelligence-Based Decisions
  • No Rules to Write or Hardware to Manage
  • Artificial Intelligence Writes Your SIEM Rules
  • 24/7 Network Vulnerability Assessment
  • Analyzes Firewall, VPN Log Data, & Network
  • Automated Anomaly Interpretation
  • User and Device Context/Correlation
Log/Device Management
  • Automated log and Device Ingest
  • Critical Server Log Management
  • Real-time Intrusion Detection Alerts
  • Windows & Linux Server Management
  • Cloud and On-premise Ingest
  • Integrated Compliance Management (PCI, FFIEC, FINRA)
  • Secure & Encrypted Log Management
  • Log Data Normalization
Automated Compliance
  • Includes Reports Designed to Hand to Your Financial Auditor
  • Risk Management, Visualization, and Analysis
  • Automated Reporting for Auditors and Compliance
  • Make Decisions in Minutes, Not Days
  • Financial Compliance Audit Reports Included
  • Know Everything About an Account with 1 Click
  • 90-Days of Research Included with SIEM
  • 24/7 Anomaly Hunting w/o Hiring Anyone
  • Designed for Financial Institutions
  • Understand Risk with 1 Button Click
Adlumin collects and indexes data from just about any source imaginable – network traffic, web servers, VPNs, firewalls, custom applications, application servers, hypervisors, GPS systems, and preexisting structured databases. Not only does Adlumin ingest data from any source on your network, we also run sophisticated analytics and machine learning algorithms against all incoming events and use the results as metrics to determine what is anomalous and what is malicious.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
3
2
logo
Offer a reference bonus
2.00

Adobe Acrobat DC

Acrobat DC The world’s best PDF solution has everything you need to convert, edit, sign, and track documents on any device. Transform enrollment and onboarding. Combine dynamic forms with legal e-signatures to create fast, easy enrollment processes that can be completed on any device. Learn more about digital enrollment Create efficient, error-proof business workflows. Now you can meet the highest levels of compliance as specified in the new signature regulations of the European Union. Power global business with digital signatures. The redesigned, touch-friendly interface makes it easier than ever to give and get fast, clear feedback.
... Learn more
-
ROI-calculator
ROI-
-
19
8
logo
Offer a reference bonus
2.40

Adobe Creative Cloud for teams

Creative Cloud puts the latest versions of Adobe’s creative apps and services — including Photoshop, Illustrator, and InDesign — right at your fingertips. And you control how and when to deploy them. We’ve added hundreds of new features to boost productivity, support the latest standards and hardware, and make everyday tasks easier. If you’re still using Adobe Creative Suite, there’s never been a better time to step up to Creative Cloud. Easy collaboration Share assets and folders securely using custom-built Creative Cloud Libraries. Maintain version control, stay on top of changes, and collaborate better. With Libraries, you’ll save your team hours each week and work up to 10x faster. Adobe Stock built right in Work more efficiently with access to more than 55 million royalty-free Adobe Stock images, graphics, and videos right inside your Creative Cloud apps. Get the best value for your business with an Adobe Stock team plan, which allows each license to be shared among 10 team members. Company ownership and control Get a dashboard view of users and plans, and add or reassign licenses anytime. For security, licenses are controlled by your admins, not individual employees. Ongoing expert support Questions about deployment or license management? Creative Cloud for teams offers advanced 24/7 technical support. And count on 1:1 Expert Services sessions and thousands of product tutorials to help you master the latest software features. Creative Cloud for teams makes life better for IT with flexible deployment and simple license management.
... Learn more
ROI-calculator
Configurator
ROI-
-
17
7
logo
Offer a reference bonus
2.00

Adobe Experience Cloud

Massive amounts of data, the explosion of different devices and screens, and skyrocketing customer expectations are forcing businesses to completely rethink their approach. This next wave of transformation will be all about experience. To keep customers engaged, leading brands are now reimagining their experiences to drive brand loyalty and growth. Adobe Experience Cloud is your one-stop shop for everything your business needs to deliver these amazing experiences. Adobe Experience Cloud gives you access to an integrated set of solutions to build campaigns, manage your advertising, and gain deep intelligence about your business. And it’s all unified through powerful core services that give you access to your customer profiles, centralized assets, powerful tagging, and an ecosystem of partners and developers to extend the value of all the solutions. It’s everything you need to orchestrate a great customer experience. Tailored experiences for every industry:
  •  Financial Services
  •  Government
  •  High tech
  •  Manufacturing
  •  Media & Entertainment
  •  Retail
  •  Telecommunications
  •  Travel & hospitality
  •  Healthcare
... Learn more
ROI-calculator
Configurator
ROI-
-
20
4
logo
Offer a reference bonus
0.00

Agent Vi innoVi

Agent Vi innoVi — это аналитическая программная платформа для систем охранного видеонаблюдения. innoVi предоставляет широкий набор возможностей видеоаналитики на основе искусственного интеллекта для обнаружения в реальном времени различных инцидентов или подозрительных событий, отслеживания объектов и быстрого извлечения информации из видеоархива. Надежная платформа innoVi была создана с нуля для анализа и обработки огромных объемов видеоданных. Решение обладает высокой масштабируемостью, эффективно поддерживает развертывания любого размера, основано на открытой архитектуре и совместимо с широким перечнем продуктов сторонних производителей (камер видеонаблюдения, кодеров, систем управления видео и пр.). Доступные варианты как для локальной установки, так и в виде сервиса из облака по модели SaaS. Преимущества innoVi:
  • Перспективная программная платформа для видеоаналитики на базе искусственного интеллекта.
  • Современные инструменты анализа от лидера отрасли.
  • Масштабируемый сервис, поддерживающий неограниченное количество камер.
  • Доступно из любого места и в любое время с помощью стандартного веб-браузера.
  • Есть версия для локальной установки.
  • Доступно в виде SaaS-сервиса из облака.
  • Высокая доступность, автоматическое резервное данных и обновление.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
2.00

Amazon WorkMail

Amazon WorkMail is a secure, managed business email and calendar service with support for existing desktop and mobile email client applications. Amazon WorkMail gives users the ability to seamlessly access their email, contacts, and calendars using the client application of their choice, including Microsoft Outlook, native iOS and Android email applications, any client application supporting the IMAP protocol, or directly through a web browser. You can integrate Amazon WorkMail with your existing corporate directory, use email journaling to meet compliance requirements, and control both the keys that encrypt your data and the location in which your data is stored. You can also set up interoperability with Microsoft Exchange Server, and programmatically manage users, groups, and resources using the Amazon WorkMail SDK. Benefits Managed service
Amazon WorkMail makes it easy to manage your corporate email infrastructure and eliminates the need for up-front investments to license and provision on-premises email servers. There is no complex software to install or maintain and no hardware to manage. Amazon WorkMail automatically handles all of the patches, back-ups, and upgrades. Enterprise-grade security
Amazon WorkMail automatically encrypts all of your data at rest with encryption keys you control, using the AWS Key Management Service (KMS). Amazon WorkMail also allows you to retain full control over data locality by choosing the AWS region where all of your data is stored. Outlook compatible
Amazon WorkMail provides native support for Microsoft Outlook on both Windows and Mac OS X, so users can continue to use the email client they are already using without needing to install any additional software, such as plug-ins for Microsoft Outlook.
Anywhere access
Users can synchronize their mailboxes with iOS, Android, Amazon Fire, and Windows Phone devices. If you are migrating from an on-premises Microsoft Exchange server, your users’ mobile devices can automatically connect to Amazon WorkMail with no end-user reconfiguration required, and no change in user experience. A feature-rich web client is also available for users to access their email, calendar, and contacts.
Active directory integration
Amazon WorkMail securely integrates with your existing Microsoft Active Directory so that users can access their mailbox using their existing credentials. This also makes it easy to manage users and groups with familiar systems management tools, such as Active Directory Users and Computers.
Low cost
Amazon WorkMail features simple, low, monthly per-user pricing and costs $4 per user per month which includes 50GB of storage per user.
... Learn more
-
ROI-calculator
ROI-
-
18
20
logo
Offer a reference bonus
0.00

Auxilium Cyber Sec

Auxilium protects clients, partners and individuals as well as issues, which are most important for you (your freedom, your privacy, your protected workflows). Also we protect you from unauthorised access to your intern IT environment and to cyber attacks.

PENETRATION TESTING, SECURE DESIGN, IMPLEMENTATION

Infrastructure and cloud. Company provides visibility into the security state of your network from internal and external prospective and an extensive penetration test of your organization perimeter and identify weak links that can allow attacker to get access inside your network. Mobile and desktop software.Developing good software is not easy. But it is even harder to secure it properly. Team will test the security of your software, perform code reviews and ensure security of your customers. Web - your website represents your brand and can bare critical business functionality. At the same time it is one of the easiest attack surface to access. Therefore Auxilium wants to help you ensure that your web site is secure properly maintains its functionality by performing Penetration tests and analyzing the efficiency of existing security measures. Hardware (IoT devices, connected cars, robots, etc.).Auxilium performs an extensive penetration test, provides appropriate security measures for your specific scenario or help you to make your products secure by design.

RISK ASSESSMENT, THREAT MODELLING

Does your organization have a known problem in information security field or you simply want to increase the security level without knowing where to start? Auxilium can perform cost-effective and rapid analysis of your ICT environment pinpointing the most acute issues and assisting you with mitigating them.

SECURITY STRATEGY AND IMPLEMENTATION

Is your organization striving for comprehensive and efficient information security management with high long-term added value? Team will design Information Security Strategy following frameworks like ISO 27001 and PSI DSS, among others, and provide you with necessary assistance and experience to embed such Information Security Strategy seamlessly into your daily operations.

INCIDENT RESPONSE AND FORENSICS

Has information security inside your organization already been breached or are you suspicious that something is not right? Auxilium extensive expertise in intrusion detection and reverse engineering will help you uncover the high-profile security incidents including hacking intrusions or malware infections.

SOCIAL ENGINEERING PENETRATION TESTS

With the constant evolution of defensive technologies people remain the weakest link in the system. No matter how good your technologies are, attackers can exploit your employees to achieve their goals. Auxilium will simulate this threat for your organizations and help to educate your employees afterwards.

RED TEAMING

Are you ready to see what a real attacker what do to meet his objective? Are you ready to really test your defenses? Auxilium will identify weak links in your organization through pre agreed controlled attack scenarios (Digital, Physical and combined). It is a step beyond the traditional security testing and security reviews.

SECURITY TRAININGS

Auxilium really like to share our knowledge and experience. Team will teach your employees to detect social engineering attempts and improve their security awareness, and your developers to write secure code and your engineers to create solutions which are secure by design.

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
17
15
logo
Offer a reference bonus
0.00

Avanan

As hackers constantly update their attack methods, Avanan continues to test new algorithms and technologies from different vendors, and adds them to the platform to stay ahead, giving you a significant advantage, future-proofing your security. Avanan's unique position, inside the cloud allows it to catch attacks that have already bypassed Office 365 and Google's default security scans. No single vendor can offer the level of protection provided by Avanan's true defense-in-depth security Features: SECURES INBOUND, OUTBOUND, AND INTERNAL EMAIL While email gateways are blind to internal email,Avanan can see every message,- inbound, outbound, internal, and historical - to block attacks that they can't even see. Avanan deploys inside your Office 365 or Gmail, just like an app,. This gives us real-time and historical visibility into every user, file, event, and policy. BREACH DETECTION Perimeter email gateways can only see external attacks making them blind to insider threats. Not only can Avanan see every email, it monitors the entire suite--every user, every configuration, permissions change, file update and internal message--to identify malicious behavior and compromised accounts UNTESTABLE BY HACKERS Other mail gateways require you to change your DNS MX record,revealing your security to the attackers that can target their vulnerabilities. Because Avanan deploys from the inside, hackers will never know the type of technology nor the depth of your protection. PROTECTION BEYOND EMAIL Avanan secures more than just your email, extending its protection to messages and shared files in other Enterprise SaaS applications like Slack,Box, Dropbox, Google Drive, One Drive and more. DEPLOYS IN MINUTES Avanan is the only cloud-based email security solution that deploys from within Gmail, Microsoft, or whichever SaaS you want to secure. Approve our app from your admin account and in minutes,Avanan finds phishing attacks? completely out of band, with no need for a proxy, appliance, or endpoint agent. MULTI-LAYER DEFENSE When you deploy Avanan, you are really deploying an army of best-of-breed security tools to protect your organization from phishing attacks. We cloudified pre-configured, zero-management versions of the top security tools in the industry. Each security tool runs in parallel, acting as an additional layer of security with no additional latency. Benefits of Avanan:
  • Deploys Inside the Cloud. 100%visibility, with no need to put a gateway or agent between your users and their apps. No latency, no disruption, no change in user experience
  • Pre- configured. We take our partners' latest software and wrap the core technology in the Avanan API, standardizing all their user, file, event and policy information. We make cloud-native versions that are not available anywhere else.
  • Single License. You don't need to pay for each security tool individually. Avanan consolidates each vendor's individual licensing model into a single per-user per month subscription.
  • Standardized Universal Policies. Every SaaS has a completely different policy engine, each with its own rules and enforcement capabilities. With Avanan you can create one policy and apply it everywhere without having to do the translation.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
18
logo
Offer a reference bonus
0.00

Avast Smart Life Platform

INNOVATIVE SECURITY, NOW AT NETWORK LEVEL With Avast Smart Life in your network, you will provide your customers with the security, privacy, and insights vital in the IoT age. Device intelligence Smart Life knows which devices are connected to your customers’ networks and learns how they function, making it easier to recognize unusual behavior. Network safety Detects threats in real-time and shuts down malicious attacks before they can cause any harm to your customers or their families. Peace of mind Provides parents with insight and control over how their children use the Internet so they can help them develop healthy online habits. PROTECT YOUR CUSTOMERS, WHEREVER THEY GO Comprehensive security means protecting your customers at all times and in all places, whether they're connected to their home network over LAN, or your central gateway over your broadband cellular network. Smart Life on the router Password-protected routers aren’t enough to stop hackers from breaking into home networks. Smart Life is: it secures your customers’ home Wi-Fi and every device connected to it, keeping all smart devices secured against threats. Smart Life on the gateway Protection shouldn’t be limited by the borders of your home network. By implementing network security directly on the gateway, you can easily keep your customers and their devices safe, everywhere they go. HOW IT WORKS Whether Smart Life is deployed on the router or directly on the gateway, all data is processed and analyzed in real-time by our cloud intelligence platform. Both implementations are easily managed through our companion app. POWERFUL AND EASY TO USE Driven by AI Using artificial intelligence, Smart Life Platform learns how to detect unusual behavior in your customers’ home networks and immediately notifies them of any malicious activity. Always up-to-date By continuously learning the behavior of new devices and processing big data in real-time, Smart Life Platform provides world-class security, privacy, and insights. Cross-platform and cross-device Smart Life Platform acts as the central hub of your home’s comprehensive security solution. Our app makes it easy to manage. Doesn’t slow you down Smart Life Platform has been designed so that it will not affect your router performance or slow down your Internet connection. Fully customizable Smart Life Platform is available as white-labeled or branded to fit your brand identity — whatever works best for you.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
4
16
logo
Offer a reference bonus
0.00

Avira SafeThings for Partners

Avira SafeThings is the security solution of tomorrow, available today. Avira SafeThings transforms routers into home protectors, supporting user privacy and placing IoT devices beyond the reach of hackers. It secures your customers’ connected home at the best possible place — where it meets the Internet. It uses Artificial Intelligence to learn devices’ behavior, block vulnerabilities, guard against IoT attacks and protect privacy. Why choose Avira SafeThings? Protect your infrastructure Security for your clients means at the same time security for your service. By detecting and containing rogue edge devices in your infrastructure timely, you protect your SLAs, bandwidth and service quality. Extend your product portfolio Our solution is a marketplace with additional services: Private VPN, Parental Control, Safe Browsing, all of which that can be available to your clients through the router. Identify additional revenue streams Our solution can help you get precious intelligence to enhance your operations. By better understanding your clients’ needs, you can increase subscriber acquisition and reduce churn rate. Offer more than your competitors Avira SafeThings provides the unique opportunity to turn a simple router into the protector of the connected home. This transforms your routers into a compelling value proposition for the market. Tap into additional revenue streams Our solution is a marketplace with additional services: Private VPN, Parental Control, Safe Browsing, all of which that can be available to your clients through the router. Build fresh or retrofit Avira SafeThings can be deployed as a white-labeled or co-branded solution on new or existing router models. What Avira SafeThings means to your customers:
  • Reigning over IoT devices
  • Effortless protection for IoT devices
  • Complete risk assessment
  • Continuous Behavior Profiling
  • Real-time IoT security & privacy protection
  • Set and Forget
  • Shared swarm intelligence
  • All integrated into the router
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
18
13
logo
Offer a reference bonus
1.00

Bigleaf Cloud-first SD-WAN

Our Software Defined Wide Area Network (SD-WAN) technology ensures that your business-critical applications are prioritized across your Internet connections and that all traffic flows are routed over the best connection in real-time. Site-to-Cloud Architecture Unlike box-only solutions, Bigleaf leverages both an on-site router and a dedicated backbone network, controlling traffic both to and from the Cloud. Intelligent Software Experience a seamless connection with our Intelligent Load Balancing, Dynamic QoS, and Same IP Failover–with zero manual configurations or policies required. Firewall-friendly design Bigleaf installs outside your LAN, so you can leave your best-of-breed security solution in place, without disabling any of its features. Monitoring and alerts We monitor each ISP connection, end-to-end, 10 times per second for packet-loss, latency, jitter, and capacity. You'll have access to logs and graphs, plus configurable email alerts.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
18
0
logo
Offer a reference bonus
0.00

BitDam

Email, shared URL’s, file attachments, cloud drives and new digital communications are transforming the way we work. They are also the most accessible entry point for advanced content-borne cyber attacks. Deep Application Learning Continuous and aggregative CPU-level learning of application paths. BitDam live knowledge base of all legitimate executions for common business applications. Real-time analysis, code benchmarking and immediate alien code detection for advanced threats, regardless of the specific attack technique. Alien Code Detection Forever Protected Applications 100% attack code visibility for known and unknown threats, covering all attachments & links. Prevention of sophisticated exploits and evasion methods, pre-code execution. No need for security updates or patches. BitDam Email Security & Malware Protection Features
  • Close to zero latency – With minimal email latency of just a few seconds, end-users will not notice any change. With BitDam, they’re safe to click everything that lands in their inbox.
  • 2-click integration – Pre-built APIs enables a (literally) 2-click self-service deployment through the BitDam portal, which applies for all mailboxes in the organization.
  • Fast and easy deployment – No MX record change is needed, no hassle to your IT team.
  • Intuitive dashboard – Your SOC team can view email subject and recipients through the BitDam dashboard, making tracking and investigating attacks simple.
  • Email body and clean files are never saved – BitDam scans the entire email including links and attachments, but doesn’t save it unless malicious.
  • Quarantine malicious emails – Malicious emails are automatically quarantined, allowing the SOC team to investigate, delete or release them as needed.
  • Visibility to other security checks – As a SOC team user you can see what basic security checks each email went through. This includes anti-spam, spf, and dmarc checks.
Unmatched detection rates, immediate prevention of ALL advanced content-borne cyber threats. Any Exploit Logical Exploits and Hardware Vulnerabilities Any Payload Macro-Based Malware, Ransomware, Spear Phishing. Any Known Unknown Vulnerability One Day, Zero Day Attacks Make it safe to click across all channels
  • Email
  • Cloud Storage
  • Instant Messaging
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
9
16
logo
Offer a reference bonus
1.00

Bitglass CASB

A Cloud Access Security Broker (CASB) is a policy enforcement point that delivers data and threat protection in the cloud, on any device, anywhere. There are three requirements for a CASB vendor: Management: Visibility and clean-up after high-risk events Security:  Preventing high-risk events such as data leakages and threat intrusions Zero-Day protection: Protection from known and unknown data leakage risks and malware threats Correspondingly there are three types of CASB: API-only that deliver only management. Such CASB uses API access to SaaS apps to remediate after data-leakage events. Multi-mode First-Gen that delivers management and security, but not Zero-Day protection.  Such CASB offer signature-based protection for known data leakage paths and a fixed set of applications Multi-mode Next-Gen that deliver management, security and Zero-Day protection.  Such CASB dynamically adapt to deliver protection for known and unknown data leakage risks and malware threats, on any app. Bitglass is the CASB with a true hybrid architecture. We use a combination of proxies and API integrations with cloud apps, ensuring complete coverage against all risk of data leakage as sensitive information moves beyond the corporate firewall. While the industry is making the shift to a multimode approach, Bitglass designed its solution from the beginning to reduce complexity and headaches for IT. Bitglass addresses all components of a multimode approach, including: Forward proxy, which requires light-weight installations on endpoints and is perfect for securing managed devices. Reverse proxy, which doesn’t require agents and is ideal for BYOD environments. ActiveSync proxy, for agentlessly securing data accessed and stored by mobile devices. API integration, which provides visibility and control over data at rest within cloud-based tools. The largest differentiator for Bitglass is its reverse proxy, something competitors have yet to achieve at scale with the same reliability. This is because Bitglass has patented AJAX-VM, proprietary technology necessary to ensure robust reverse proxy functionality. Additionally, Bitglass differs from the competition through the below:
  • Patented, full-strength, searchable cloud encryption protects cloud data-at-rest while preserving user experience.
  • Agentless mobile data protection and selective wipe ensure that Bitglass customers enjoy all of the benefits of an MDM solution without violating employee privacy or requiring the headaches associated with deploying and maintaining agents on endpoints.
  • Its Zero-day Core, which includes advanced threat protection built for the cloud. While first-gen CASBs leverage signature-based engines for detecting known malware, Bitglass has partnered with Cylance to block both known and zero-day malware threats at upload, at download, and at rest within the cloud – for any app or device. Cylance’s solution is provided through Bitglass’ agentless, real-time protection platform – no endpoint installations are required.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
13
12
logo
Offer a reference bonus
0.00

BufferZone

Even the best detection technology cannot return the data, money or reputation that is lost in a breach. While a layered approach that addresses the entire attack cycle is a must, prevention still has the highest return on investment. BUFFERZONE provides a better way to reduce the attack surface and protect the most vulnerable part of the organization – employee endpoints. How it Works? The BUFFERZONE virtual container protects any application that you define as insecure including web browsers, email, Skype, FTP and even removable storage. BUFFERZONE is transparent to both the application and the end-user, yet completely seals off threats from the rest of the computer. Unlike conventional endpoint detection solutions that depend on signatures or behavioral profiles to detect malicious activity, BUFFERZONE simply isolates malware regardless of whether it is known or new, and prevents it from doing any harm. The BUFFERZONE Endpoint Security solution includes:
  • Virtual Container: A secure, virtual environment for accessing content from any potentially risky source including internet browsers, removable media and e-mail.
  • Secure Bridge: A configurable process for extracting data from the container to enable collaboration between people and systems while ensuring security and compliance.
  • Endpoint Intelligence: Detailed reporting and integration with SIEM and Big Data analytics to identify targeted attacks.
Features: Virtual Containment On endpoints running the BUFFERZONE agent, access to external, untrusted sources such as the internet and the effects of such access are completely isolated inside a virtualized container. Potential threats are thus isolated from the endpoint’s native resources from which trusted organizational resources are accessed, making it impossible for threats to in any way harm the endpoint or the rest of the organization. A configurable, centralized policy determines application containment. Network Separation Endpoint-based network segmentation. Define separate firewall-type rules for contained and uncontained applications, preventing uncontained, trusted applications from accessing risky destinations such as the internet and preventing contained, untrusted applications from accessing sensitive, internal organizational network destinations. Email Attachment Containment Contains attachments from external, untrusted sources, protecting the endpoint and trusted organizational resources from the attachments. Emails arriving from outside the organization are saved normally (uncontained) on endpoints but are subsequently opened on any protected endpoint in a BUFFERZONE container. DLP Features Several BUFFERZONE features can contribute to an organizational data-loss prevention (DLP) strategy by blocking information from exiting the organization by various paths:
  • Containment Features. Prevent uncontained applications, which can access organizational resources, from accessing the internet; and prevent contained applications, which can access the internet, from accessing organizational resources.
  • Hidden Files. Set file locations, that may contain sensitive data, to be hidden from contained applications.
  • Upload Blocker. When Upload Blocker is enabled, contained browsers can download to and upload from only a designated folder (by default: Downloads), which is isolated from uncontained programs. This prevents browsers from uploading any files to the internet other than contained files that were previously downloaded from the internet.
BUFFERZONE Management Server (BZMS) For centralized management, you can integrate BUFFERZONE with your existing endpoint management system; or, for fuller management capabilities, use the BUFFERZONE Management Server (BZMS) to manage organizational BUFFERZONE agents, gain visibility to relevant organizational endpoints, and serve and assign organizational policy by endpoint and/or user.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
10
6
logo
Offer a reference bonus
0.00

Carson & SAINT Corporation Security Suite

Offering fully integrated cybersecurity. SAINT Security Suite provides a fully-integrated set of capabilities to assess your network assets for the latest vulnerabilities across a wide variety of operating systems, software applications, databases, network devices and configurations. Attackers know where you are vulnerable, and they have the resources to challenge even the most robust security measures. You must go beyond typical vulnerability assessment measures and find risk exposures at all levels of the organization – including those exposed by human weaknesses. Whether your requirements are to enhance your existing security program or to meet stringent compliance standards and reporting mandates, SAINT Security Suite can help you meet your challenges. Learn more about the components of our solution below, or contact a representative today to get a FREE copy to test. Vulnerability Management Leverage our experience to find the vulnerabilities in your network and prioritize your plan to fix them. We provide a suite of tools that work together to deliver a full life cycle vulnerability management solution. Configuration Assessment Security configuration assessment is an integral component of the SAINT Security Suite that identifies and helps remediate security issues such as vulnerabilities, misconfigurations and malware exposure. Import benchmarks from industry-standard security configurations managed by the National Institute of Standards and Technologies (NIST) as well as from locally developed configurations. Social Engineering The human element is typically the weakest link. Use SAINT’s social engineering platform to test that your staff is following good security practices and developing defenses against social engineers. Penetration Testing Knowing a vulnerability exists is only part of understanding your risk. Extend your risk analysis by mapping known exploits to discovered vulnerabilities, using exploit data from Carson & SAINT or a third party. Asset Management Implement a risk-management program to effectively identify and track critical business assets based on key strategic metrics, and prioritize risk management and mitigation efforts as they impact these assets. Advanced Analytics Don’t get lost in your scan data. Use SAINT’s asset tagging and other prioritization features to identify the important issues putting your business at risk. Incident Response Use SAINT or other ticketing systems to ensure your team is organized and tracking mitigation steps from identification to remediation to confirmation and close. Reporting SAINT’s powerful and flexible reporting capabilities provide pre-defined reporting templates, pre-defined compliance report templates, and more than 150 options to create reports customized to fit your needs. Whether your needs are to generate executive-level summary reports, create detailed reports with the lowest level of scan results and remediation guidance, or create output for ingestion into a third-party solution – SAINT’s reporting can meet the demand. Third-Party Integration To ensure our security solutions are interoperable across the entire security landscape, we provide powerful APIs for custom integration development. Some of our integrations include ANITIAN Sherlock Compliance Automation, Continuum GRC, and Splunk. We are also an IBM PartnerWorld Partner and a Cisco Solution Partner.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

CipherCloud CASB+

CipherCloud, a leader in cloud security, provides powerful end-to-end protection for data resident in the cloud. Our award-winning cloud access security broker delivers comprehensive visibility, data security, threat protection, and compliance for cloud-based assets. Uniquely, CipherCloud provides the deepest levels of data protection and real-time data access control to provide an immediate solution for challenging cloud security and compliance problems. The world’s largest global enterprises and government institutions in over 25 countries protect and secure their cloud information with CipherCloud. Benefits Minimize Data Breach Risks with Powerful Data Protection End-to-end data protection and other key features ensure unprotected data is never stored in cloud applications or platforms, minimizing the risk of a data breach, financial loss, reputational and legal impact. Improve GDPR Readiness - One Solution to Meet Global Compliance Requirements The CipherCloud CASB+ architecture can address any mix of global compliance requirements and local privacy laws to simplify your cloud-based application adoption. Accelerate Cloud Adoption Move to cloud benefits faster by overcoming cloud security, data privacy and compliance obstacles. Increase Cloud Visibility Discover cloud usage and related data movement and user activity to minimize data lost and compliance risk. Prevent Forced 3rd Party Disclosures Unique key management capabilities give you more control and improve compliance. Enhance Collaborative Governance CASB+ provides a full solution for the collaborative sharing of data with 3rd parties, including full control over sensitive content and full monitoring and logging of activity. Reduce Cost of Ownership One centrally controlled, easy-to-deploy cloud or hybrid platform to address all enterprise cloud requirements, providing end-to-end data protection, and minimizing the scope of compliance audits. Capabilities Transparent Workflow Experience CipherCloud CASB+ extends data protection transparently and seamlessly to the user community, ensuring application experiences are not affected. Any App Connector Customers can integrate powerful application-level protection on sensitive data for their own custom applications. Application Specific Data Protection. CipherCloud CASB+ provides the deepest levels field level data protection for your major enterprise applications. Hybrid Architecture A single CipherCloud platform can support multiple application clouds and any mix of cloud and on-premise key management. Enterprise Integration Complete integrations with EDLP, EDRM, SIEM, IAM, SSO, EMM and NGFW are all in place today. Encryption - Full End-to-End and Searchable Encryption at rest, in-flight, and in-use can address the strongest security requirements while still providing user transparency for search, reporting, sorting, charts, and more. Zero Trust Key Management Full support for HMS and multiple on-premise keys enable you to address the most diverse compliance requirements. Native Device Management Limit authenticated users by device type so that access is done only from trusted designated platforms. Secure Offline Data Access Enable secure document access offline and automatically expire this access with a defined time period.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
20
3
logo
Offer a reference bonus
2.00

Cisco Cloudlock

Cisco Cloudlock is a cloud-native cloud access security broker (CASB) that helps you move to the cloud safely. It protects your cloud users, data, and apps. Cloudlock's simple, open, and automated approach uses APIs to manage the risks in your cloud app ecosystem. With Cloudlock you can more easily combat data breaches while meeting compliance regulations. Features User security Cloudlock uses advanced machine learning algorithms to detect anomalies based on multiple factors. It also identifies activities outside whitelisted countries and spots actions that seem to take place at impossible speeds across distances. Data security Cloudlock's data loss prevention (DLP) technology continuously monitors cloud environments to detect and secure sensitive information. It provides countless out-of-the-box policies as well as highly tunable custom policies. App security The Cloudlock Apps Firewall discovers and controls cloud apps connected to your corporate environment. You can see a crowd-sourced Community Trust Rating for individual apps, and you can ban or whitelist them based on risk. Featured technologies Automated shadow IT visibility Cloudlock technology is now built into Cisco Umbrella to deliver App Discovery and blocking. It provides cloud app usage and risk info to enable secure cloud adoption. Cloudlock's FedRAMP ATO The authority to operate helps you enable secure cloud adoption across multiple platforms. Cloud and application performance monitoring Get end-to-end cloud monitoring with AppDynamics to help manage and visualize your critical cloud-based app performance, in real time.
... Learn more
ROI-calculator
Configurator
ROI-
-
17
4
logo
Offer a reference bonus
2.00

Cisco Spark

Meet instantly or schedule ahead. Screen share, white board, and make decisions fast. Keep talking and sharing in your team’s Cisco Spark space.  Set your teams up for success. Create secure spaces for every team or conversation, and watch how efficiently you work together. Jump in any time to comment, share, or ask questions.    One tap makes the call. And connects you from any device. In the same space where your meetings, files, and conversations live. Add a new Cisco Spark cloud-based phone system to connect your work spaces and calling. Or connect your existing Cisco phone system to the rest of your Cisco Spark service. Everything you need, on the device in your hand. It all starts with the app. Your teams and tools and the things you make together, in one place. You’re part of the conversation across your devices, no matter where you are today.
... Learn more
ROI-calculator
Configurator
ROI-
-
19
12
logo
Offer a reference bonus
2.70

Citrix SD-WAN

Modern businesses need a network that can keep up with the pace of digital – one that delivers the best experience for the applications central to innovation and growth. Citrix' next-generation WAN Edge solution delivers flexible, automated, secure connectivity and performance that keeps the workspace always-on. Only Citrix SD-WAN delivers:

  • Unparalleled experience for SaaS, cloud, and virtual applications
  • Choice of deployment options with automated connectivity to the cloud
  • Integrated visibility and control over all aspects of the WAN
In connection with the increased use of business-critical web applications, modern global networks (WANs) operate under load that exceeds their capacity. Extending the network with Multiprotocol Label Switching (MPLS) solutions is a traditional approach, but can be expensive. On the other hand, alternatives like broadband and other types of Internet connections cost less, but they are not always acceptable for certain applications. Global network virtualization technologies can help optimize the bandwidth of such a network in an organization at a lower cost compared to traditional solutions.
... Learn more
ROI-calculator
Configurator
ROI-
-
19
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.