{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"en":"Offer a reference bonus","ru":"Предложить бонус за референс","_type":"localeString"},"configurator":{"en":"Configurator","ru":"Конфигуратор","_type":"localeString"},"i-sell-it":{"en":"I sell it","ru":"I sell it","_type":"localeString"},"i-use-it":{"en":"I use it","ru":"I use it","_type":"localeString"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"vendor-popover":{"en":"vendor","ru":"производитель","_type":"localeString"},"sort-title-desc":{"en":"From Z to A","ru":"от Я до А","_type":"localeString"},"sort-rating-asc":{"en":"Rating ascending","ru":"По возрастанию рейтинга","_type":"localeString"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"_type":"localeString","en":"Rebate descending","ru":"По убыванию скидки"},"i-use-it-popover":{"ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"vendor-verified":{"_type":"localeString","en":"Vendor verified","ru":"Поставщик потверждён"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"categories-popover":{"_type":"localeString","en":"categories","ru":"категории"},"sort-popular-asc":{"ru":"По возростанию популярности","_type":"localeString","en":"Popular ascending"},"sort-popular-desc":{"_type":"localeString","en":"Popular descending","ru":"По убыванию популярности"},"no-results":{"_type":"localeString","en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос."},"login":{"de":"Einloggen","ru":"Войти","_type":"localeString","en":"Login"},"register":{"de":"Registrieren","ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"auth-message":{"de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You need to register or login."},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"en":"Added to comparison","ru":"Добавлено в сравнения","_type":"localeString"},"items-found":{"ru":"Продуктов найдено","_type":"localeString","en":"Products found"},"sort-sales-desc":{"ru":"По продаже","_type":"localeString","en":"By sale"},"sort-purchases-desc":{"_type":"localeString","en":"By purchase","ru":"По покупке"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product producer"},"products-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"en":"from","ru":"от","_type":"localeString"},"to":{"_type":"localeString","en":"to","ru":"до"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"_type":"localeString","en":"View","ru":"Вид"},"sort-type-label":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"en":"Follow","ru":"Следить","_type":"localeString"},"add-product":{"en":"Add Product","ru":"Добавить продукт","_type":"localeString"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"en":"Filter","ru":"Фильтр","_type":"localeString"},"clear-button":{"en":"Сlear","ru":"Очистить","_type":"localeString"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"en":"Configurator","ru":"Конфигуратор","_type":"localeString"},"roi-calculator-checkbox":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"apply-filter-button":{"_type":"localeString","en":"Apply filter","ru":"Применить фильтр"},"sorting-toggle":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"_type":"localeString","en":"Suggest product","ru":"Предложить продукт"},"with-projects-label":{"_type":"localeString","en":"With deployments","ru":"С внедрениями"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"_type":"localeString","en":"Product Categories","ru":"Категории продуктов"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"_type":"localeString","en":"Seller","ru":"Продавец"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"en":"User suppliers","ru":"Поставщики пользователя","_type":"localeString"},"business-process":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"_type":"localeString","en":"With reference","ru":"С референсами"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"_type":"localeString","en":"Date","ru":"Дата"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"en":"Company size","ru":"Размер компании","_type":"localeString"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"sort-title-desc":{"en":"From Z to A","ru":"От Я до А","_type":"localeString"},"sellers-field":{"_type":"localeString","en":"Sellers","ru":"Поставщики, Производители"},"supply-types":{"_type":"localeString","en":"Supply type","ru":"Тип поставки"},"with-comments-checkbox":{"_type":"localeString","en":"With comments","ru":"С комментариями"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"user":{"en":"User","ru":"Пользователь","_type":"localeString"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"en":"Product vendor","ru":"Производитель продукта","_type":"localeString"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"en":"Deal closed","ru":"Сделка закрыта","_type":"localeString"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"_type":"localeString","en":"Stopped","ru":"Остановлено"},"competencies":{"_type":"localeString","en":"Competencies","ru":"Компетенции"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"body":{"ru":[{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0"}],"_type":"block","style":"normal","_key":"28241882db7a"}],"_type":"localeBlock","en":[{"children":[{"marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550","_type":"span"}],"_type":"block","style":"normal","_key":"8bebcfb34955","markDefs":[]}]},"label":"catalog-products-text-block"}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"translatable_meta":[{"name":"og:title","translations":{"ru":"Продукты","_type":"localeString","en":"Products"}},{"name":"description","translations":{"en":"Description","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString"}},{"name":"og:description","translations":{"_type":"localeString","en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI"}},{"name":"keywords","translations":{"ru":"каталог, программное обеспечение, софт, ит услуги","_type":"localeString","en":"keyword"}},{"translations":{"ru":"Продукты","_type":"localeString","en":"Products"},"name":"title"}],"title":{"ru":"ROI4CIO: Продукты","_type":"localeString","en":"ROI4CIO: Products"},"meta":[{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"24-translate-translation-memory-systems":{"id":5650,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/24translate_logo.png","logo":true,"scheme":false,"title":"24translate Translation memory systems","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"24-translate-translation-memory-systems","companyTitle":"24translate","companyTypes":["vendor"],"companyId":8558,"companyAlias":"24translate","description":"<span style=\"font-weight: bold;\">What is a translation memory system?</span>\r\nThe use of translation memory systems (or TMS) is an essential guarantor of quality in modern translation. In 'translation memories', a customer's existing translations are stored in the form of text segments that can be automatically retrieved by a translator working on a new translation. As such, there is no need to re-translate previously translated text segments, phrases and terms, an advantage that improves both the consistency of the translations and the translator's efficiency, while also reducing translation costs. In order to make the best possible use of these capabilities 24translate, working alongside 24technology, developed a TMS with a unique range of functions: 24|tcm.\r\n<span style=\"font-weight: bold;\">How do translation memory systems support our translators with their work?</span>\r\nLike glossaries, translation memory systems are effective aides in the translation process. The decision as to how to translate a given sentence fragment, however, is still up to the translator. Our software does not replace the translator but rather supports them by providing access to intelligent memory and search functions. As such, our system continues to rely on quality work by specialist translators: Only when it is 'fed' with intelligent translations can it provide intelligent suggestions for translation.\r\nIn practice, the individual translation segments are stored as a language pair consisting of source and target text, which is then automatically suggested in future translation projects bearing identical or similar text passages. All translators working for a specific company rely on the same translation memory (database). On the one hand, this significantly lowers translators' manual research efforts, while on the other it prevents deviation from specific terminology or phrases in subsequent translations and/or the work of additional translators.\r\n<span style=\"font-weight: bold;\">24|tcm in use</span>\r\n24translate maintains a company-specific translation memory (abbreviated TM) for each of its clients. In order to provide customers with the full benefit of already existing translations, we will gladly maintain and store these at the beginning of our collaboration. Each new translation provided by us is then automatically stored in your translation memory. Clients may also access their translation memories and view existing translations at any time via various interfaces and tools (e.g. our customer portal).\r\n<span style=\"font-weight: bold;\">The advantages of a translation memory system</span>\r\n<ul><li>Eliminates double translations, leading to greater efficiency: Translators focus on 'new', previously untranslated text segments.</li><li>Saves the customer time and money: Translations can be delivered more quickly and at significantly lower rates.</li><li>Quality assurance: Consistency with regard to content and terminology is maintained at all times.</li></ul>","shortDescription":"24translate maintains a company-specific translation memory for each of its clients.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"24translate Translation memory systems","keywords":"","description":"<span style=\"font-weight: bold;\">What is a translation memory system?</span>\r\nThe use of translation memory systems (or TMS) is an essential guarantor of quality in modern translation. In 'translation memories', a customer's existing translations are stored in","og:title":"24translate Translation memory systems","og:description":"<span style=\"font-weight: bold;\">What is a translation memory system?</span>\r\nThe use of translation memory systems (or TMS) is an essential guarantor of quality in modern translation. In 'translation memories', a customer's existing translations are stored in","og:image":"https://old.roi4cio.com/fileadmin/user_upload/24translate_logo.png"},"eventUrl":"","translationId":5650,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":425,"title":"Linguistics Software","alias":"linguistics-software","description":" <span style=\"font-weight: bold; \">Linguistic software</span> - computer programs and data that provide analysis, processing, storage and retrieval of audio data, pictures (OCR) and texts in natural language.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Linguistic analysis software</span> is a tool that enhances the comprehension of information present in documents, or across a set of documents. Some linguistic analysis software tools use an automatic mathematical or statistical approach to analyze and extract relations that occur in a set of documents and the words they contain. The idea is that the distribution and frequency of relevant terms in documents that cover a specific topic is similar and that the meaning of a specific word can be inferred by the above assumption. \r\nThe term CAT stands for <span style=\"font-weight: bold;\">Computer-Assisted Translation Tool</span>. CAT tools have significantly changed the way how translators work and manage translation projects today. CAT tools split large multilingual documents into segments (phrases & paragraphs) which are stored in a database. This is called translation memory which means that previously translated material can be reused at any time. Nowadays, it is more common for enterprises and translators to use CAT tools to speed up their work and increase their productivity globally.A number of computer-assisted translation software and websites exists for various platforms and access types.\r\nAccording to a 2006 survey undertaken by Imperial College of 874 translation professionals from 54 countries, primary tool usage was reported as follows: Trados (35%), Wordfast (17%), Déjà Vu (16%), SDL Trados 2006 (15%), SDLX (4%), STAR Transit (3%), OmegaT (3%), others (7%).\r\n\r\n<br /><br />","materialsDescription":"<h1 class=\"align-center\">CAT Tool Functionality</h1>\r\n<ul><li>Spell checkers, autocorrect—automatically highlight and fix spelling and grammar mistakes.</li><li>In-context review—display multimedia documents with images, text box sizes and layout in real time in both source and target language.</li><li>Integrated machine translation—suggest translations for segments from a connected MT engine.</li><li>Adaptive machine translation—offer translations for segments from a connected MT engine as autosuggest pop-ups, learn from user input.</li><li>Concordance—retrieve instances of a word or an expression and their respective context in a text corpus, such as a translation memory database, to check their usage.</li><li>Electronic dictionaries—allow term search inside the tool, track usage statistics.</li><li>Text search tools—find phrases or terms in the text for reference.</li><li>Alignment—build translation memories texts from source text and its translation. When a translation company adopts a CAT-tool, they often use alignment to create their first TM databases.</li></ul>\r\nThere are online and offline CAT tools available for purchase. Web-based CAT tools work in the web browser; desktop CAT tools require installation and do not depend on internet connection stability.\r\nBasic CAT tools support MS Office formats, such as .docx, .odt, .csv, .xlsx, plus .html files and .xml. The primary translation industry formats are XLIFF, and tmx. Advanced tools also support various software formats, such as .json, .properties, Visual Studio, as well layout building software such as InDesign, Corel Draw and sometimes AutoCAD.\r\nCAT tools are useful when translating multimedia formats. They extract text for editing and rebuild files in the target language after the translation is finished. This ability reduces the time needed to create multilingual artwork. Instead of fishing for each individual bit of text on the page, the translator simply goes segment by segment in plain text.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Automated Quality Assurance (AutoQA)</span></p>\r\nAutoQA tools scan bilingual texts and detect errors in translation, such as wrong numbers and number format, incorrect terminology, missing tags, missing segments, erroneous formatting and many others. Complementary to spellcheckers, AutoQA helps editing.\r\nWhile popular translation memory tools feature built-in QA components, standalone software offers extended functionality and support for morphology of selected languages. Advanced functionality leads to better error detection and fewer false positives. Standalone tools may require import/export of translation files from the TMS, unless there is an integration in place.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Terminology Management</span></p>\r\nTerminology Management or glossary management, refers to technologies that centrally maintain lists of subject matter-specific, company, or other technical terms to improve consistency and speed of translation. Such systems usually include guidance on terms that should not be translated to target languages or additional reference material and images to assist translators in understanding the translation material.\r\nAdvanced terminology systems include integrations with authoring tools, workflows for terminology creation and validation processes, and automated term mining functions.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Linguistics_Software.png"},{"id":427,"title":"Translation Memory","alias":"translation-memory","description":" A translation memory (TM) is a database that stores "segments", which can be sentences, paragraphs or sentence-like units (headings, titles or elements in a list) that have previously been translated, in order to aid human translators. The translation memory stores the source text and its corresponding translation in language pairs called “translation units”. Individual words are handled by terminology bases and are not within the domain of TM.\r\nSoftware programs that use translation memories are sometimes known as translation memory managers (TMM) or translation memory systems (TM systems, not to be confused with a Translation management system (TMS), which is another type of software focused on managing process of translation).\r\nTranslation memories are typically used in conjunction with a dedicated computer assisted translation (CAT) tool, word processing program, terminology management systems, multilingual dictionary, or even raw machine translation output.\r\nResearch indicates that many companies producing multilingual documentation are using translation memory software. In a survey of language professionals in 2006, 82.5% out of 874 replies confirmed the use of a TM. Usage of TM correlated with text type characterised by technical terms and simple sentence structure (technical, to a lesser degree marketing and financial), computing skills, and repetitiveness of content.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Types of translation-memory systems</span></p>\r\n<span style=\"font-weight: bold;\">Desktop:</span> Desktop translation memory tools are typically what individual translators use to complete translations. They are machine translation software that a freelance translator downloads and installs on his/her desktop computer.<br /><span style=\"font-weight: bold;\">Server-based or Centralised:</span> Centralized translation memory systems store TM on a central server. They work together with desktop TM and can increase TM match rates by 30–60% more than the TM leverage attained by desktop TM alone.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">How does translation memory works?</span></h1>\r\nTranslation memory works in the background of your translation software programsl, offering sentence suggestions as you translate. Its memory consists of your previous translations and only identical or similar sentences are suggested.\r\nThe similarity between the source and target segments is indicated with percentages (100% is the perfect match) while differences are highlighted with colors. This means that somebody in the past had already translated that exact segment. There are also 101% and 102% matches, which means that not only the current segment, but also one or both of those before and/or after it are the same as stored in this TM entry.\r\nMatches below 100% are called fuzzy matches. These are ranked from 0% to 99%. A 99% match means that the segments differ by at least one character. Matches below 70% are often considered useless and might not show up, depending on the settings.\r\n“Repetitions” are identical segments within one document that have no translation in the translation memory yet. Most automated translation software scan for repetitions before the translator starts working. After the translator is done with the first occurrence of these, all others will get filled in automatically. \r\nBesides matches as such, you can use your existing translation memories for concordance searches — where you investigate if the translation memory has a certain term was translated before, if the segment as a whole wasn’t.<br />\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the benefits of translation memory?</span><br /></h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Speeds up Translation: </span>A TM offers previously translated sentences that are identical to the current translation, with differences only in numbers, tags, formatting, punctuation or spacing.<br /><span style=\"font-weight: bold;\">Reduces Translation Costs:</span> Translation memory is usually the most effective with texts that include many repetitions, such as website content, games, contracts and product manuals.<br /><span style=\"font-weight: bold;\">Increases Translation Quality: </span>Proactively prevent inconsistencies by storing correct phrases and sentences. It can be extremely useful when several people are working on the same text.<br /><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Translation_Memory.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"2event":{"id":6428,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/2event_Logo.png","logo":true,"scheme":false,"title":"2Event","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"2event","companyTitle":"2Event","companyTypes":["supplier"],"companyId":8972,"companyAlias":"2event","description":"The main advantage of 2Event over hundreds of regular ticket sites is its all-in-one service, where you get 100+ useful features from one source. The platform contains the main functions for organizing events: registration of visitors, tickets, schedule, speaker schedule, networking (list of visitors, appointment of meetings), search for fellow travelers (people who go to the event and are coordinated with each other), polls and voting, Twitter Wall , badges with QR, push-mailing.<br /><br /><span style=\"font-weight: bold;\">Basic functionality</span><br />\r\n<ul><li>Landing Page for your event: get a ready-made "landing page"</li></ul>\r\n<ul><li>Simple registration of visitors via mail or social networks</li></ul>\r\n<ul><li>Purchase tickets directly from your smartphone, with a minimum commission of 2.5%</li></ul>\r\n<ul><li>Ticket and face scanners in smartphone: put an unlimited number of volunteers at the entrance with regular smartphones for control</li></ul>\r\n<ul><li>Schedule and questions to speakers on the user's phone. In addition to interactivity, this is also saving on printing</li></ul>\r\n<ul><li>Push notifications: send instant messages to your guests' smartphones with information about schedule changes, promotions or announcements of your next events</li></ul>\r\n<ul><li>Polls, polls and contests, QR quests: get feedback, hold contests and sweepstakes from partners, engage your audience</li></ul>\r\n<ul><li>Badges with QR: create your own ticket / badge design and use at your events</li></ul>\r\n<ul><li>Analytics: get access to full event statistics 24/7, connect Google Ads and track conversions</li></ul>\r\n<br /><span style=\"font-weight: bold;\">Networking</span><br />\r\n<ul><li>List of visitors in the application and on the website. It can be seen who else will go to the event</li></ul>\r\n<ul><li>Meetings: scheduling and scheduling meetings between event attendees</li></ul>\r\n<ul><li>Correspondence between event participants: private and general chats, the ability to ask questions to speakers</li></ul>\r\n<ul><li>Chat for the projector (Twitter Wall): a large screen on the wall, where posts of event visitors and all posts from social networks with the # hashtag of your event are broadcast in real time. Twitter Wall is one of the visitor attention centers and additional advertising space for sponsors</li></ul>\r\n<br /><span style=\"font-weight: bold;\">Advanced networking</span><br />\r\n<ul><li>Fellow travelers by car / taxi: visitors create groups by car / taxi or join existing ones to save money and get more time for communication</li></ul>\r\n<ul><li>Travel Companions Between Cities: Scan your transport ticket and find out who else is someone from your city traveling to the same event in your carriage. This way you will find fellow travelers and meet like-minded people on the road.</li></ul>\r\n<ul><li>Search for roommates among event participants: reduce living expenses, meet visitors from other cities and spend the night with them</li></ul>\r\n<ul><li>Geolocation: look at the location of the event participants on the map. An indispensable feature if you are in an unfamiliar city</li></ul>","shortDescription":"2Event is a website and free mobile application for visitors and event organizers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"2Event","keywords":"","description":"The main advantage of 2Event over hundreds of regular ticket sites is its all-in-one service, where you get 100+ useful features from one source. The platform contains the main functions for organizing events: registration of visitors, tickets, schedule, speak","og:title":"2Event","og:description":"The main advantage of 2Event over hundreds of regular ticket sites is its all-in-one service, where you get 100+ useful features from one source. The platform contains the main functions for organizing events: registration of visitors, tickets, schedule, speak","og:image":"https://old.roi4cio.com/fileadmin/user_upload/2event_Logo.png"},"eventUrl":"","translationId":6428,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":113,"title":"Virtual Event Platforms"}],"testingArea":"","categories":[{"id":864,"title":"Virtual Event Platforms","alias":"virtual-event-platforms","description":" Virtual events are on the rise. As technology progresses, it has made it possible for companies to host amazing online events - ones that even rival in-person versions. This has led to many benefits for both event planners and attendees alike.\r\nA virtual event, also known as an online event, is an interactive gathering that happens on the internet. Unlike in-person events, virtual ones aren't restricted to a single location. A remote attendee can join and participate from anywhere in the world, given he or she has access to the web.\r\nSome events are completely virtual and every guest attends sessions from the comfort of their own home, favorite coffee shop, or wherever they might be. Others have both in-person and virtual components. Some attendees visit the actual event location and others stream the festivities from their computer.\r\nThere are many reasons why virtual events are valuable. First off, virtual events allow the individuals or companies hosting them to reach a wider audience. Were you to host your event in New York City, for example, not every person in your audience would be able to attend due to the cost of travel. With a virtual event, travel isn't an issue.\r\nIn general, virtual events are also much cheaper to put on. Event planners don't have to book a giant venue or hire a bunch of temporary staff. These cost savings can then be passed on to each virtual attendee in the form of lower ticket prices.\r\nLastly, virtual events are extremely measurable. Companies can easily learn which sessions were the most popular, how many people attended, where those attendees live, how they paid for their tickets, and much more. Just about every attendee action can be easily tracked and analyzed. This information can then be used to improve event strategy.","materialsDescription":" <span style=\"font-weight: bold; \">What is a virtual event?</span>\r\nIn an industry with lots of jargon and acronyms flying about, it’s easy to become bamboozled by terminology. However, in the case of virtual events, there’s little room for ambiguity – they are as they sound – events that take place completely online. Supported by specialist AV technology, virtual events negate the need for a physical location and work to bring people together virtually from across the world. Whilst a virtual event can’t replace the power and value of in-person interactions, they’re an effective tool that can be an engaging and immersive alternative to delivering business content and information.\r\n<span style=\"font-weight: bold; \">How many people can attend a virtual event?</span>\r\nVirtual events have the capacity to facilitate large audience numbers: from hundreds of thousands to thousands, hundreds or smaller groups. Understanding, from the outset, what you want to achieve from your event and the complexity of the program, will provide a good guide to how many attendees should be invited.\r\n<span style=\"font-weight: bold; \">How do attendees gain access to a virtual event?</span>\r\nIn theory, this is an easy one to answer: attendees will receive an invite with access details, which will allow them to enter the virtual event on the date and time outlined. However, before this happens, there are some important things for you to consider first, including:\r\n<ul><li>Are you charging an entry fee for the event?</li><li>Will the event be live, on-demand or a combination of the two?</li><li>How will you market your event, so your audience knows it’s taking place and want to be part of it?</li><li>Is your audience tech-savvy? Might they need a pre-event virtual guide/tour, so they are familiar with how to join and the features of a virtual event set up?</li></ul>\r\nHaving questions like these answered will define the platform required, help maximize attendance and optimize your delegates overall experience of the virtual event offering.\r\n<span style=\"font-weight: bold; \">What are the main benefits of a virtual event?</span>\r\n<ul><li><span style=\"font-weight: bold; \">Scope:</span> Whilst not all events will suit a virtual treatment, many programs can be adapted into a digital format. It really comes down to your objectives and whether or not these can be achieved through holding an online event.</li><li><span style=\"font-weight: bold; \">Accessibility:</span> Expand the reach of your brand without the need for travel. Not only can virtual events connect you with a global audience in real-time, but with event recording, event content can be made available on-demand; providing more opportunities for people to consume your content at a time that suits their schedule best. What’s more, all that attendees and speakers need to attend/talk is a computer, laptop, or mobile device and a good, reliable internet connection.</li><li><span style=\"font-weight: bold; \">Engagement:</span> In-person events are unrivaled in their ability to engage and facilitate real human-to-human connections through creative interactions. For this reason, you might be concerned that virtual events can’t engage audiences. Whilst there’s no escaping the fact that there are limitations vs face-to-face meetings, there are lots of potentials to mix rich content with live polling, Q&As and whiteboards to keep engagement levels high throughout sessions. Social media can also be employed as a great engagement tool – use event hashtags, encourage attendees to post images of their highlights from the event, and get imaginative with other ways a sense of community can be created via social channels.</li><li><span style=\"font-weight: bold; \">Multiple or Single Content Experiences:</span> As with physical events, virtual events offer the opportunity to run multiple content streams concurrently; allowing different speakers to host sessions simultaneously and giving attendees the option to select sessions most relevant to them. If this isn’t required for your event, then a multiple single content experience may be a better fit.</li><li><span style=\"font-weight: bold; \">Networking:</span> While there’s no escaping the fact that in-person events are the most conducive way to network and make meaningful business connections, networking can still be factored into a virtual event program. Give attendees the chance to schedule one-on-one time or assemble into group breakouts, where they can speak to each other, your team, sponsors or speakers over the internet. A range of tools can be used to ensure attendees can leverage the best from their interactions.</li><li><span style=\"font-weight: bold; \">Insight:</span> The metrics and data insights that can be captured from virtual event platforms can help measure ROI and success against pre-defined KPIs. Information derived can be used to articulate if your event was successful and to influence future event decision making.</li></ul>\r\n<span style=\"font-weight: bold; \">Is there a potential to incorporate sponsorship?</span>\r\nYes. Virtual event spaces, presentations and other assets can be customised to reflect your branding and the branding of any sponsors you may partner with. This maximises brand exposure and maintains a sponsor revenue stream coming into your event.\r\n<span style=\"font-weight: bold;\">Can virtual events be used as part of a hybrid event strayegy?</span>\r\nAbsolutely. Incorporating virtual events with a holistic approach can be a good way to enhance your existing event strategy. Integrating virtual events into your wider events and meetings program will give you an additional tool to utilize alongside your live events; extending reach and engagement with your audience further.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/1999104__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"360learning":{"id":6694,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/360_learning_logo.jpg","logo":true,"scheme":false,"title":"360Learning","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"360learning","companyTitle":"360Learning","companyTypes":["vendor"],"companyId":9257,"companyAlias":"360learning","description":"<h3>This Collaborative Learning platform relies on peer learning where anyone can elevate and respond to requests for knowledge, closing skills gaps faster. With it’s iterative training framework, minimum viable courses are shipped quickly and improved constantly by peers who identify out-of-date content or suggest additions.</h3>\r\n<p>Feedback & data from interactions within the course are also pushed to coaches on the platform, who facilitate peer learning by ensuring that courses are easily accessible, actionable & impactful. From onboarding new employees to training sales reps on a new product pitch, 360Learning aligns employee aspirations with organization expectations.</p>\r\n<h3 class=\"align-center\">Overview of 360Learning benefits</h3>\r\n<p><span style=\"font-weight: bold;\">360Learning Collaborative Learning platform reduces the feedback loop </span>between expert & employee with lightweight reactions and qualitative forums for asking experts questions while allowing L&D to identify where courses are working and where they need work.</p>\r\n<p>L&D leaders spend less time monitoring course completion (360Learning courses have a 90%+ completion rate) and more time demonstrating business impact.</p>\r\n<p><span style=\"font-weight: bold;\">With build-in Salesforce integration, L&D teams connect the dots between training & time-to-first deal,</span> while our analytics dashboard tracks employee progress - giving them a nudge when they’re falling behind!</p>\r\n<p><span style=\"font-weight: bold;\">With HCM & TMS integrations,</span> 360Learning enables you to evolve on top of our robust platform as an orchestrator of continuous learning throughout the organization. <br /><span style=\"font-weight: bold;\">Thanks to the dedicated sales enablement features, sales trainers using 360Learning to train their new reps also see great results:</span></p>\r\n<ul>\r\n<li>15% increase in quota attainment</li>\r\n<li>30% decrease in ramp up time</li>\r\n<li>From $500k to $3m in yearly onboarding savings</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Level up your sales team with 360Learning's Collaborative Learning Platform.</span> Fast track new hires. Reps hone their script 10x faster with our digital role-play tool. Leverage your team's best examples. Continuously upskill your reps. Co-create impactful courses in just a few hours. Make them available at the point of need through our Salesforce connector and mobile app. Skyrocket sales performance: Demonstrate the impact of training on quota attainment through CRM integration.</p>\r\n<p><span style=\"font-weight: bold;\">360Learning is a learning engagement and training platform that provides learners and trainers with a commonplace to create a learning culture. </span>It allows users to setup digital learning culture in less time and enables them to create online courses in just a few clicks. The platform uses social interaction, gamification and mobile friendly features to get learners engaged and involved in online courses. For trainers, it works more like a marketing and management platform and offers course optimizations, A/B testing and real-time tracking. The platform is being used by some key industry players that all aim to create a global digital learning culture within the organization. It allows trainers and experts to achieve more in less time and helps them become digital experts without having to go through lengthy technology lessons.</p>\r\n<ul>\r\n<li><span style=\"font-weight: bold;\">For Trainers and Experts</span></li>\r\n</ul>\r\n<p>The platform is compatible with all web and media formats and allows organizations to reuse their existing resources. This allows businesses to leverage their existing best online content and helps them discover innovative formats that make it easier to produce new interactive content. The platform allows creating different kinds of evaluations, including open-ended and closed-ended questions. Trainers can also develop brainstorming sessions, business goals, collaborative activities, exams and more. Trainers and experts can be reviewed by the community, while the platform highlights such reviews to encourage participation. The platform uses a gamified ranking system, which makes it easier to identify top performers for each skill. Advanced tools promote continuous improvement by generating actionable suggestions for course improvement.</p>\r\n<ul>\r\n<li><span style=\"font-weight: bold;\">For Learners</span></li>\r\n</ul>\r\n<p>360Learning involves learners in online courses on a day-to-day basis and helps increase engagement rates using gamification methods, which are inspired by popular web practices. Groups can be created based on different variables such as by class, by arrival date or by theme, while detailed analysis on these groups or communities can also be performed. The platform puts human interaction at the center of the training strategy by allowing effectively collaborating and innovating during the courses. All the features the platform has to offer are mobile friendly, which allows learners to access important stuff right from their mobile devices, and from anywhere.<br /><br /></p>","shortDescription":"360Learning is the easiest way to create, deliver & optimize online courses. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"360Learning","keywords":"","description":"<h3>This Collaborative Learning platform relies on peer learning where anyone can elevate and respond to requests for knowledge, closing skills gaps faster. With it’s iterative training framework, minimum viable courses are shipped quickly and improved c","og:title":"360Learning","og:description":"<h3>This Collaborative Learning platform relies on peer learning where anyone can elevate and respond to requests for knowledge, closing skills gaps faster. With it’s iterative training framework, minimum viable courses are shipped quickly and improved c","og:image":"https://old.roi4cio.com/fileadmin/user_upload/360_learning_logo.jpg"},"eventUrl":"","translationId":6694,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":155,"title":"LMS"}],"testingArea":"","categories":[{"id":72,"title":"LMS - Learning Management System","alias":"lms-learning-management-system","description":"A<span style=\"font-weight: bold; \"> learning management system (LMS</span>) is a software application for the administration, documentation, tracking, reporting, and delivery of educational courses, training programs, or learning and development programs. \r\n<ul><li><span style=\"font-weight: bold; \">L — Learning. </span>With an LMS, you can create a single source of online courses and training materials. This will become a unique source of knowledge in your area so that you can keep and increase the in-house expertise of your company.</li><li><span style=\"font-weight: bold; \">M — Management.</span> You can manage courses and learners, and even improve your own efficiency. Unlike file-sharing services, an LMS is not just a heap of files; it’s a well-organized system where you manage the training process. To start training, simply add employees and assign courses.</li><li><span style=\"font-weight: bold; \">S — System.</span> A computer system, to be exact. An LMS automates the most boring and tedious work such as grading, processing statistics, and preparing reports. Plus, you can train your employees without leaving the office, managing all the processes right from your work computer.</li></ul>\r\nThe learning management system concept emerged directly from e-Learning. Although the first LMS appeared in the higher education sector, the majority of the LMSs today focus on the corporate market. Learning Management Systems make up the largest segment of the learning system market. \r\nLearning management systems were designed to identify training and learning gaps, utilizing analytical data and reporting. LMSs are focused on online learning delivery but support a range of uses, acting as a platform for online content, including courses, both asynchronous based and synchronous based. Learning management solutions may offer classroom management for instructor-led training or a flipped classroom, used in higher education, but not in the corporate space. \r\nMost modern learning management systems are web-based. There are a variety of integration strategies for embedding content into LMSs, including AICC, xAPI (also called 'Tin Can'), SCORM (Sharable Content Object Reference Model) and LTI (Learning Tools Interoperability). LMSs were originally designed to be locally hosted on-premises, where the organization purchases a license to a version of the software, and installs it on their own servers and network. Many LMSs are now offered as SaaS (software as a service), with hosting provided by the vendors.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Features Of An LMS</span></p>\r\nAll modern LMSs are loaded with many features. Some of the common features are:\r\n<ul><li><span style=\"font-weight: bold;\">Course content authoring and upload.</span> An LMS lets you author course content and upload course content in a wide variety of formats including audio, video, multimedia, documents, etc.</li><li><span style=\"font-weight: bold;\">User and course management.</span> An LMS offers user management and course management. User enrollment, tagging, course administration, order management, pre-registration and assigning courses can be done semi-automatically.</li><li><span style=\"font-weight: bold;\">Communication management.</span> An LMS can handle all course communications and notifications to concerned users. For example, an LMS can automatically send a notification to all enrolled users when a new assignment is uploaded by the teacher. There is no need to copy and paste contact data or switch between two digital services.<span style=\"font-weight: bold;\"></span></li><li><span style=\"font-weight: bold;\">Report management. </span>An LMS can generate a wide variety of reports, including student progress, score, student engagement, etc. The data can be utilized to gain valuable insight into the effectiveness of the course content.<span style=\"font-weight: bold;\"></span></li><li><span style=\"font-weight: bold;\">Assessment creation and management.</span> Assessments are a key part of any course. An LMS makes it easy to create and manage these assessments, both system evaluated and tutor evaluated. You can get a result in a single click for all students.</li></ul>\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Types of Learning Management Systems</span></h1>\r\n<span style=\"font-weight: bold; \">Free vs. Commercial.</span> This is typically one of the first dilemmas organizations face when choosing an LMS.\r\n<span style=\"font-style: italic; \">Free, open-source software</span> has a pretty clear upside: It’s free. Also, because the source code is open, it can be modified to be highly customizable for each organization. However, most free LMS products tend to be more complicated than commercial products — typically they are utilized by more sophisticated users. \r\n<span style=\"font-style: italic; \">Commercial software</span>, on the other hand, offers users a support staff, and tends to be much easier to deploy, and use. But of course it costs money. Among commercial LMS products, there are typically two main forms: Installed, or the service-based cloud option.\r\n<span style=\"font-weight: bold; \">Installed vs. SaaS.</span> One of the most important elements of an LMS is the ability to scale up or down quickly and easily. Commercial LMS software solutions are typically sold as either a locally hosted enterprise product, which is hosted on an organization’s own servers, or as a Software-as-a-Service (SaaS) offering, which is hosted on the vendor’s servers and is accessible from anywhere (the data is stored in “the cloud”).\r\nGenerally,<span style=\"font-style: italic; \"> cloud-based</span> LMS products offer trainers more flexibility when it comes to scaling up or down. Because the product is sold as a “service” (usually monthly), the burden of making systems upgrades, freeing up bandwidth, and providing IT support falls on the vendor. Because data does not have to be stored on local servers, scalability isn’t a concern; most SaaS LMSs can ramp up or down by thousands of users with ease.\r\nA <span style=\"font-style: italic; \">locally installed LMS</span> offers users the ability to individualize and customize their LMS. So if an organization already has an IT staff in place that can administer the system, handle support and customization and scalability concerns, a locally hosted LMS can be powerful.\r\n<span style=\"font-weight: bold; \">Course-creating or not. </span>Another thing to look for in an LMS is whether it comes with the ability to create training content. In some cases, an LMS is simply a tool to distribute course content, which must be created in a Learning Content Management System elsewhere.\r\nSome LMS systems, however, do come with some authoring tools that allow trainers and designers to develop their own unique content. Other LMS vendors offer separate course-creation tools for purchase, while some offer no authoring tools whatsoever, and instead rely on third-party course materials.\r\n<span style=\"font-weight: bold; \">Integrated. </span>As LMS systems become more sophisticated, one of the most exciting developments is the ability for the system to integrate with other applications your organization already uses — whether that’s internal calendars, email, or social networks. \r\nOther LMS products may also integrate closely with <span style=\"font-style: italic;\">talent management systems</span>, which tend to focus on providing support to Human Resource staff functions like recruiting, performance management, and payroll. Depending on your organization’s needs, you may keep an eye out for an LMS that features this sort of app integration.<span style=\"font-weight: bold; \"></span>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Choosing a Learning Management System</span></h1>\r\n<p class=\"align-left\">Choosing the right LMS is crucial to the success of your eLearning strategy. The selection process may seem overly complicated and stressful, but it doesn’t have to be! With these steps to choosing an LMS, you’ll discover a simple and straightforward technique to help you choose perfect LMS for your business needs. </p>\r\n<span style=\"font-weight: bold; \">Identify your audience.</span> Identify exactly what you need from your LMS and who your learning content is aimed towards. This will vary depending on your learner audience and the type of training you wish to deliver.\r\nIf you’re<span style=\"font-weight: bold; \"> </span><span style=\"font-style: italic; \">training your employees,</span> you’ll need an LMS tools to formalize learning processes, like employee onboarding, and improve employee retention.\r\nIf <span style=\"font-style: italic; \">compliance training </span>is your focus, you’ll need an LMS that makes it easy to achieve, maintain, and track compliance.\r\n<span style=\"font-style: italic; \">Customer training</span> delivered through an LMS optimizes onboarding, increases retention and presents opportunities for upselling thanks to customers who complete training having a more thorough understanding of your product or service.\r\nIf you need an LMS for <span style=\"font-style: italic; \">partner training,</span> your priorities will be scaling your partner business while building and protecting your brand. \r\n<span style=\"font-weight: bold; \">Focus on important features. </span>There are many basic LMS’s out there, but your LMS has to support your “need to have” features to ensure it’s fit for purpose. Some examples of invaluable LMS features include:\r\n<ul><li><span style=\"font-weight: bold; \">Ease of use</span> - A platform that’s easy to use ensures your learners and admins can use the LMS without needing training on how to do so. This makes the process of using the LMS a positive experience, increasing engagement.</li><li><span style=\"font-weight: bold; \">Reporting</span> - LMS reporting makes it easy to accurately track learner progression, course status and completion rate, exam results, etc.</li><li><span style=\"font-weight: bold; \">Integrations</span> - By integrating applications you already use in your organization, you’ll get the most efficiency out of your LMS. LMS integration can help increase learner and admin engagement, and delivers a better user experience.</li><li><span style=\"font-weight: bold; \">SCORM and xAPI compliant </span>- Ensuring your LMS is SCORM and xAPI compliant is a pretty essential feature. If the LMS you’re considering isn’t compliant, it’s likely it’s a very basic system.</li><li><span style=\"font-weight: bold; \">Portals</span> - Learning portals offer your learners a great user experience, but also make it possible to manage multiple training audiences in one system.</li></ul>\r\n<span style=\"font-weight: bold; \"><span style=\"color: rgb(97, 97, 97); \">Evaluate each LMS. </span></span><span style=\"color: rgb(97, 97, 97); \">Start evaluating potential contenders by doing an initial round of high-level research to identify systems that appear to meet both your training audience and features list needs. This will become your LMS longlist. Once compiled you can then evaluate each one individually to rule it in or out of the next stage of selection.</span>\r\n<span style=\"font-weight: bold; \">Look beyond the LMS.</span> Go online and research LMS vendors on your shortlist. Find out as much as you can about each company. Once you’re satisfied with the company’s reputation, peer reviews, and support services, sign yourself up for a free trial and demo so that you can see the LMS in action and understand how the system will meet your audience and feature requirements. You could also submit support tickets to each vendor during your free trial to compare the responsiveness and attentiveness of each support team. \r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What are the advantages and disadvantages?</span><span style=\"font-style: italic; \"></span></h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\"><span style=\"font-style: italic; \">Advantages:</span></span> </p>\r\nThere are six major advantages of LMS: interoperability, accessibility, reusability, durability, maintenance ability and adaptability, which in themselves constitute the concept of LMS.\r\nOther advantages include:\r\n<ul><li>An LMS supports content in various formats: text, video, audio, etc.</li><li>One can access materials anytime, from everywhere, teachers can modify the content, and students can see the updated material.</li><li>The evaluation of students is easier and fair, based on student attendance and online quizzes.</li><li>Students and teachers can re-use the material every time they need.</li><li>Students can learn collaboratively by setting up a School website with the LMS software and helps "Keeps organizations up-to-date with compliance regulations. If your organization must stay up-to-date with current compliance regulations, then a Learning Management System can be an invaluable tool. Compliance laws change on a regular basis, and updating a traditional course to reflect these changes can be a time-consuming chore.</li></ul>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\"><span style=\"font-style: italic; \">Disadvantages:</span></span></p>\r\nAlthough there are many advantages of LMSs, authors have identified some disadvantages of using these systems.\r\n<ul><li>Implementing an LMS requires a well-built technology infrastructure. Teachers have to be willing to adapt their curricula from face to face lectures to online lectures.</li><li>Expense.</li><li>Difficulty of learning to use authoring software.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/LMS_-_Learning_Management_System1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"3ants":{"id":5352,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/3ants.png","logo":true,"scheme":false,"title":"3Ants","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"3ants","companyTitle":"3ants","companyTypes":["vendor"],"companyId":8415,"companyAlias":"3ants","description":"<b>Our technology and our team work hard to protect your intellectual property. </b>\r\n<i>We have profound knowledge of how piracy is distributed and we have developed advanced technological tools especially design for content protection. </i>\r\n<ul> <li>DETECTION. 3Ants has advanced and innovative software and processes specifically designed to protect your property and content from piracy. </li> <li>ANALYSIS. 3Ants' software and team of experts studies the gathered data and offers specialziaed feedback to the processes so you have more sophisticated content protection methods. </li> <li>DELETION. The tools 3Ants uses and its team is fully capable of deleting the links and the pirate content that put your intellectual property at risk. </li> </ul>\r\n<b>We protect your brand on the Internet </b>\r\n<i>We offer a custom-made solution and top quality content protection. </i>\r\n<ul> <li>Brands and companies. We prevent the dishonest use of your brand by watching over your online reputation. With innovative methods, we protect your brand's image and the use of your identity to improve your consumers' opinion of you. </li> <li>Digital contents. We offer content protection of the best quality by removing the illegal copies and unauthorized sharing. We also redirect the user to legal pages where they can purchase your product or find information on it. </li> <li>Physical Products. We work to increase and protect your legal sales, as well as to eliminate forgeries in online sales. </li> </ul>","shortDescription":"We locate and delete Internet piracy to ensure content protection","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"3Ants","keywords":"","description":"<b>Our technology and our team work hard to protect your intellectual property. </b>\r\n<i>We have profound knowledge of how piracy is distributed and we have developed advanced technological tools especially design for content protection. </i>\r\n<ul> <li>DETECTI","og:title":"3Ants","og:description":"<b>Our technology and our team work hard to protect your intellectual property. </b>\r\n<i>We have profound knowledge of how piracy is distributed and we have developed advanced technological tools especially design for content protection. </i>\r\n<ul> <li>DETECTI","og:image":"https://old.roi4cio.com/fileadmin/user_upload/3ants.png"},"eventUrl":"","translationId":5352,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":" Computer security software or cybersecurity software is any computer program designed to enhance information security. Security software is a broad term that encompasses a suite of different types of software that deliver data and computer and network security in various forms. \r\nSecurity software can protect a computer from viruses, malware, unauthorized users and other security exploits originating from the Internet. Different types of security software include anti-virus software, firewall software, network security software, Internet security software, malware/spamware removal and protection software, cryptographic software, and more.\r\nIn end-user computing environments, anti-spam and anti-virus security software is the most common type of software used, whereas enterprise users add a firewall and intrusion detection system on top of it. \r\nSecurity soft may be focused on preventing attacks from reaching their target, on limiting the damage attacks can cause if they reach their target and on tracking the damage that has been caused so that it can be repaired. As the nature of malicious code evolves, security software also evolves.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Firewall. </span>Firewall security software prevents unauthorized users from accessing a computer or network without restricting those who are authorized. Firewalls can be implemented with hardware or software. Some computer operating systems include software firewalls in the operating system itself. For example, Microsoft Windows has a built-in firewall. Routers and servers can include firewalls. There are also dedicated hardware firewalls that have no other function other than protecting a network from unauthorized access.\r\n<span style=\"font-weight: bold; \">Antivirus.</span> Antivirus solutions work to prevent malicious code from attacking a computer by recognizing the attack before it begins. But it is also designed to stop an attack in progress that could not be prevented, and to repair damage done by the attack once the attack abates. Antivirus software is useful because it addresses security issues in cases where attacks have made it past a firewall. New computer viruses appear daily, so antivirus and security software must be continuously updated to remain effective.\r\n<span style=\"font-weight: bold; \">Antispyware.</span> While antivirus software is designed to prevent malicious software from attacking, the goal of antispyware software is to prevent unauthorized software from stealing information that is on a computer or being processed through the computer. Since spyware does not need to attempt to damage data files or the operating system, it does not trigger antivirus software into action. However, antispyware software can recognize the particular actions spyware is taking by monitoring the communications between a computer and external message recipients. When communications occur that the user has not authorized, antispyware can notify the user and block further communications.\r\n<span style=\"font-weight: bold; \">Home Computers.</span> Home computers and some small businesses usually implement security software at the desktop level - meaning on the PC itself. This category of computer security and protection, sometimes referred to as end-point security, remains resident, or continuously operating, on the desktop. Because the software is running, it uses system resources, and can slow the computer's performance. However, because it operates in real time, it can react rapidly to attacks and seek to shut them down when they occur.\r\n<span style=\"font-weight: bold; \">Network Security.</span> When several computers are all on the same network, it's more cost-effective to implement security at the network level. Antivirus software can be installed on a server and then loaded automatically to each desktop. However firewalls are usually installed on a server or purchased as an independent device that is inserted into the network where the Internet connection comes in. All of the computers inside the network communicate unimpeded, but any data going in or out of the network over the Internet is filtered trough the firewall.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is IT security software?</span></h1>\r\nIT security software provides protection to businesses’ computer or network. It serves as a defense against unauthorized access and intrusion in such a system. It comes in various types, with many businesses and individuals already using some of them in one form or another.\r\nWith the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations. Since more and more businesses are now relying their crucial operations on software products, the importance of security system software assurance must be taken seriously – now more than ever. Having reliable protection such as a security software programs is crucial to safeguard your computing environments and data. \r\n<p class=\"align-left\">It is not just the government or big corporations that become victims of cyber threats. In fact, small and medium-sized businesses have increasingly become targets of cybercrime over the past years. </p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">What are the features of IT security software?</span></h1>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Automatic updates. </span>This ensures you don’t miss any update and your system is the most up-to-date version to respond to the constantly emerging new cyber threats.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Real-time scanning.</span> Dynamic scanning features make it easier to detect and infiltrate malicious entities promptly. Without this feature, you’ll risk not being able to prevent damage to your system before it happens.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Auto-clean.</span> A feature that rids itself of viruses even without the user manually removing it from its quarantine zone upon detection. Unless you want the option to review the malware, there is no reason to keep the malicious software on your computer which makes this feature essential.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Multiple app protection.</span> This feature ensures all your apps and services are protected, whether they’re in email, instant messenger, and internet browsers, among others.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application level security.</span> This enables you to control access to the application on a per-user role or per-user basis to guarantee only the right individuals can enter the appropriate applications.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Role-based menu.</span> This displays menu options showing different users according to their roles for easier assigning of access and control.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Row-level (multi-tenant) security.</span> This gives you control over data access at a row-level for a single application. This means you can allow multiple users to access the same application but you can control the data they are authorized to view.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Single sign-on.</span> A session or user authentication process that allows users to access multiple related applications as long as they are authorized in a single session by only logging in their name and password in a single place.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">User privilege parameters.</span> These are customizable features and security as per individual user or role that can be accessed in their profile throughout every application.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application activity auditing.</span> Vital for IT departments to quickly view when a user logged in and off and which application they accessed. Developers can log end-user activity using their sign-on/signoff activities.</li></ul>\r\n<p class=\"align-left\"><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Security_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"3d-warehouse":{"id":6306,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/3d-warehouse.png","logo":true,"scheme":false,"title":"3D Warehouse","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"3d-warehouse","companyTitle":"Trimble","companyTypes":["vendor"],"companyId":8924,"companyAlias":"trimble","description":"With over 4 million models and 23 million users every year, 3D Warehouse is the world’s largest and most popular repository of free 3D models. It is an open library where anyone using SketchUp Pro can download and share. <br /><span style=\"font-weight: bold;\"><br />A community for all</span>\r\nAnyone can search, download models from, and contribute content to 3D Warehouse, for free. The world’s largest 3D content platform features direct integration with SketchUp Pro and compatibility with CAD apps.<br /><span style=\"font-weight: bold;\"></span>\r\n<span style=\"font-weight: bold;\">Sharing is caring</span>\r\nNot every model in 3D Warehouse has to be shared; private items are accessible only to you. Public models can be searched and downloaded. Models can be organised into collections and shared to social media.<br /><span style=\"font-weight: bold;\"></span>\r\n<span style=\"font-weight: bold;\">Content marketing platform</span>\r\n3D Warehouse offers product manufacturers a unique way to showcase catalogs, allowing prospects to specify product into their own designs. The 3D model is a native channel to reach and engage new customers.<br /><span style=\"font-weight: bold;\"></span>\r\n<span style=\"font-weight: bold;\">Certified content development</span>\r\nSketchUp has built a strong network of Certified Content Developers; together they are equipped to build professional models for those organisations seeking to get their content noticed on 3D Warehouse.","shortDescription":"3D Warehouse is an online community and pre-made 3D model website for those who create or use SketchUp models.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"3D Warehouse","keywords":"","description":"With over 4 million models and 23 million users every year, 3D Warehouse is the world’s largest and most popular repository of free 3D models. It is an open library where anyone using SketchUp Pro can download and share. <br /><span style=\"font-weight: bold;\">","og:title":"3D Warehouse","og:description":"With over 4 million models and 23 million users every year, 3D Warehouse is the world’s largest and most popular repository of free 3D models. It is an open library where anyone using SketchUp Pro can download and share. <br /><span style=\"font-weight: bold;\">","og:image":"https://old.roi4cio.com/fileadmin/user_upload/3d-warehouse.png"},"eventUrl":"","translationId":6306,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"Computer-aided design (CAD) is the use of computers (or workstations) to aid in the creation, modification, analysis or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation and to create a database for manufacturing. CAD output is often in the form of electronic files for print, machining or other manufacturing operations. The term CADD (for Computer Aided Design and Drafting) is also used.\r\nCAD may be used to design curves and figures in two-dimensional (2D) space or curves, surfaces and solids in three-dimensional (3D) space.\r\nCAD is an important industrial art extensively used in many applications, including architectural design, prosthetics and many more.\r\nSoftware for architecture - systems designed specifically for architects, whose tools allow you to build drawings and models from familiar objects (walls, columns, floors, etc.), to design buildings and facilities for industrial and civil construction. These programs have the tools to build three-dimensional models and obtain all the necessary working documentation and support modern technology of information modeling of buildings.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What is a CAD drafter or CAD Designer?</span></h1>\r\nEverything around us that is manufactured begins with an idea in a written plan. When these plans require illustrations or drawings to convey meaning, a CAD drafter is needed to prepare these ideas in graphic forms of communication. Drafters translate ideas and rough sketches of other professionals, such as architects and engineers, into scaled detail (or working) drawings. A CAD designer often prepares the plans and rough sketches for an architect or engineer. The designer has more education and thus more responsibility than the drafter but less than an architect or engineer.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What software do architects use?</span></h1>\r\n<p class=\"align-left\">Before computer-aided design software, architects relied solely on hand drawings and handmade architecture models to communicate their designs. With the evolution of technology and the architecture industry, architectural drafting software has changed the way architects plan and design buildings. Implementing 2D and 3D architecture software allows designers to draft at greater speed, test ideas and determine consistent project workflows. Advancements in rendering software provide architects and their clients with the ability to visually experience designs before a project is realized.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Is CAD 2D or 3D?</span></h1>\r\n<p class=\"align-left\">A common misconception surrounding CAD is that it is a 3D architecture software modeling tool only. However, CAD can be used as a 2D drawing tool as well. Construction designers might use a CAD tool that only works in 2D while architects might work in a 3D software architecture tools that has a 2D converter. It is highly dependent upon the actual platform used. This can be convenient because a company might only use a 2D tool and can pay for that tool alone. However, as construction centers around 3D modeling software for architecture and informational models, it will be harder for companies who only to use a 2D tool.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is CAD used for in construction?</span></h1>\r\n<p class=\"align-left\">There are a lot of uses for CAD in construction. Subcontractor’s designers can take the drawings made by the architect and add in additional necessary details to ensure constructability. From there they have a plan that they can work off of and check their work against. Companies have already done this to a degree of success. Some companies were able to use a combination of drones and 3D models to notice issues with the construction. Specifically, a company can overlay their live drone footage with the model. They could note that the foundation would be off and make corrections.</p>\r\n<p class=\"align-left\">Architecture planning software benefits contractors because the drawings and plans can be easily stored in the cloud. This allows for contractors to use their plans at any location. Also, if they are included in a shared file for the project, they can easily see changes to the plans. So, a subcontractor could quickly determine which changes were made, by who, and how it will impact construction.</p>\r\n<p class=\"align-left\">Another benefit of professional architecture software is it is more accurate than manual drawings. It’s easier for construction design software than it is when it’s manual. And it’s easier for subcontractors to add details than it is in manual drawings.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What architects’ tools have been transformed by technology?</span></h1>\r\nWorking methods that previously resulted in only the documentation of an idea are now moving toward the realization of a full virtual copy of a building and all its complex components before a single nail is hammered. As such, architects’ tools that used to be physical, like pens and pencils, are now mere basics in a virtual toolbox with capabilities an analog architect couldn’t even fathom. The breakneck pace of this change is good reason to reflect on the history of these architect software virtual tools by comparing them to their physical forebears.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Arm vs. Dynamic Input. </span>Appearing like an alien appendage affixed to a drawing board, a drafting arm originally consolidated a variety of tasks completed with separate rulers, straightedges and protractors into a single versatile tool. AutoCAD’s crosshair reticle, for example, once relied on manual input with compass-style designations before it featured point-and-click functionality with real-time metrics following it around the screen.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Tape Measure vs. Surveying App.</span> Documenting an existing building in order to plan its transformation is likely one of the most frequent tasks architects complete. Until recently, the only way to correctly do this was by hand, with a tape measure, pen and paper. Since the advent of infrared scanners, depth-sensing cameras and software that can communicate with them, the time-intensive process of surveying an existing space has been cut to a fraction of what it once was.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Template vs. Premade 3-D Models.</span> In the days of hand-drafting, adding furniture to a drawing meant choosing an appropriately scaled object from a stencil and tracing it. Today’s sophisticated equivalent that architecture software programs offer allows an infinite number of premade models to be brought into a wide range of design software with a single click. Despite technological advances in this practice, the old method may actually be advantageous due to its reliance on abstraction because choosing realistically detailed furnishings for an early design scheme often prompts cosmetic decisions long before they need to be made.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Electric Eraser vs. Undo.</span> The most simple, and, for this reason, the most underappreciated, transformation an architect’s tools have undergone between physical and virtual methods is the ease with which one can now reverse the work they’ve done. Allowing what essentially amounts to time travel, the Undo function is universal to almost all software programs and as such is often taken for granted. Prior to this wonderful invention, the savviest architects wielded handheld electric erasers allowing them to salvage large drawing sets in the event of a drafting mistake or last-minute design change.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Blueprint Machine vs. Inkjet Plotter. </span>If you hang around an architecture firm long enough, you might hear older designers talk about using a blueprint machine. Originally the premier method for producing copies of drawings, blueprint machines involved rolling an original drawing through a chemical mixture that reproduced the image on a special type of paper. For some time now, digital plotters have removed manual labor from the equation, being fed information directly from a virtual drawing file.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Digitizer Tablet vs. Touchscreen Workstation.</span> Early iterations of digital drafting were often paired with a digitizer: a special keyboard that could choose commands or be directly drawn on. Software used in architecture eventually got better at incorporating a keyboard and mouse, but nowadays the tide might be turning back to a hands-on approach as devices like Microsoft’s Surface Studio are pushing an interface with touch-heavy tools just for architects. Though currently limited to apps for sketching and drawing review, the way architects work could be changed forever if a large influential company like Autodesk or Graphisoft were to fully embrace touchscreen capabilities.</li></ul>\r\n\r\n<p class=\"align-left\"><br /><br /> <br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CAD.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"3dexperience-platform":{"id":713,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Platforma_3DEXPERIENCE.jpg","logo":true,"scheme":false,"title":"3DEXPERIENCE platform","vendorVerified":0,"rating":"1.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":0,"alias":"3dexperience-platform","companyTitle":"Dassault Systèmes","companyTypes":["supplier","vendor"],"companyId":2774,"companyAlias":"dassault-systemes","description":"With a single, easy-to-use interface, it powers Industry Solution Experiences – based on 3D design, analysis, simulation, and intelligence software in a collaborative, interactive environment. It is available on premise and on cloud.\r\nDassault Systèmes offers industry-leading applications delivered on the 3DEXPERIENCE platform: Design & Engineering, Manufacturing & Production, Simulation, Governance & Lifecycle, 3D Design Experience for Professionals, as well as a broad catalog of services.","shortDescription":"The 3DEXPERIENCE® platform is a business experience platform.\r\n\r\nIt provides software solutions for every organization in your company – from marketing to sales to engineering – that help you, in your value creation process, to create differentiating consumer experiences. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"3DEXPERIENCE platform","keywords":"Design, 3DEXPERIENCE, platform, delivered, applications, Engineering, industry-leading, Dassault","description":"With a single, easy-to-use interface, it powers Industry Solution Experiences – based on 3D design, analysis, simulation, and intelligence software in a collaborative, interactive environment. It is available on premise and on cloud.\r\nDassault Systèmes offers ","og:title":"3DEXPERIENCE platform","og:description":"With a single, easy-to-use interface, it powers Industry Solution Experiences – based on 3D design, analysis, simulation, and intelligence software in a collaborative, interactive environment. It is available on premise and on cloud.\r\nDassault Systèmes offers ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Platforma_3DEXPERIENCE.jpg"},"eventUrl":"","translationId":713,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":64,"title":"PLM - Product Lifecycle Management","alias":"plm-product-lifecycle-management","description":"<span style=\"font-weight: bold; \">Product lifecycle management,</span> sometimes "product life cycle management", PLM, represents an all-encompassing vision for managing all data relating to the design, production, support and ultimate disposal of manufactured goods. Product life management concepts were first introduced where safety and control have been extremely important, notably the aerospace, medical device, military and nuclear industries. These industries originated the discipline of configuration management (CM), which evolved into electronic data management systems (EDMS), which then further evolved to product data management (PDM).\r\nOver the last ten years, manufacturers of instrumentation, industrial machinery, consumer electronics, packaged goods and other complex engineered products have discovered the benefits of PLM management and are adopting efficient PLM software in increasing numbers.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">The PLM Stages</span></p>\r\n<span style=\"font-weight: bold; \">Beginning of Life (BOL):</span> The beginning of life phase includes all of the design and manufacturing, which consists of the initial conceptualization and development, and any prototypes built. Initial development has multiple sub-actions that identify all the requirements, concepts, and necessary testing. \r\n<span style=\"font-weight: bold; \">Middle of Life (MOL):</span> The middle of life phase is post-manufacturing, when your product is distributed, used, and serviced. At this point, your product is in the hands of the end user. You can collect data on any failures, maintenance rates, and user experience to get information for immediate fixes and future development.\r\n<span style=\"font-weight: bold; \">End of Life (EOL):</span> The end of life phase is the retiring, recycling, or disposing of your product. At this point, the reverse logistics happen for the company. EOL starts when users no longer have a need for the product. At this stage, companies collect information about what parts and materials are still valuable.\r\n<span style=\"font-weight: bold;\">Product lifecycle management software</span> is used to deliver all kinds of products to market, which means there are a lot of different providers out there. Its purpose today is to help organizations: \r\n<ol><li>Develop new products using CAD software</li><li>Produce and manufacture new products</li><li>Bring those products to market</li></ol>\r\nAnd increasingly, product life management software has to process the feedback from the market back to the design and production processes. To achieve these goals, product lifecycle management solutions have to do four things:\r\n<ul><li>Link together CAD metadata with a bill of materials</li><li>Manage workflows for organizations needed to bring products to market</li><li>Manage product data as they move through the product development lifecycle stages</li><li> Hook in auxiliary suppliers and business stakeholders to a shared version of truth or single source of truth.</li></ul>\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Top PLM System Software Requirements</h1>\r\n<span style=\"font-weight: bold; \">Bill of Materials.</span> Having a common source of information across your company is incredibly important during product development. That’s why a bill of materials (BOM) is key to include in your list of product lifecycle management requirements. At the very least, your system should provide a single definition of a particular product and its components. More advanced options include features specifically designed for different team members such as designers, engineers and other professionals who frequently collaborate.\r\n<span style=\"font-weight: bold; \">Computer-Aided Design Management.</span> Managing your CAD activities and documents is more than useful when it comes to PLM. Your solution should be able to manage changes to product configurations while maintaining the functional and physical attributes of a product throughout its lifecycle. Production engineering changes should proliferate throughout your processes, with the changes evident in the subsequent BOMs and plans.\r\n<span style=\"font-weight: bold; \">Manufacturing Product Management.</span> During a product’s lifecycle, you want to keep an eye on your portfolio. With portfolio management, users can determine the proper investment balance to maximize their research and development investment returns. Some systems provide strategy tools to spotlight priorities and support planning. Top PLM software can even determine the best possible investment scenario. Users can also track project progress to completion, which is automatically documented in the product record. This allows greater insight into your processes, facilitating better resource management and allocation.\r\n<span style=\"font-weight: bold; \">Product Regulation and Governance.</span> Failing to follow regulation and compliance standards is one of the quickest ways to earn your business a bad reputation. But having the right tools built into your product life management system can make staying compliant much easier than it would be otherwise. Your solution should be able to centralize relevant information and documentation, making it easier for enterprise organizations to achieve and maintain compliance. You also may choose a system that can comply with medical, environmental, safety, FSA and ISO standards depending on your industry.\r\n<span style=\"font-weight: bold; \">Project and Component Maintenance.</span> Project management tools are vital for providing users visibility into daily processes and progress. These features include tracking and scheduling capabilities, which enable you to manage product development along with resource allocation in real time. Users can also see upcoming milestones and constraints for further planning.\r\n<span style=\"font-weight: bold; \">Quote Process Management.</span> Data from many different sources is often needed during the quote process. PLM’s inherent coordination capabilities gather and organize data pertaining to product design to support your engineering teams. This includes teams developing engineer-to-order and configure-to-order products. The system only shares the necessary data, meaning your team members can spend more time focusing on their work and less on hunting down information. \r\n<span style=\"font-weight: bold; \">Risk Management. </span>This feature brings risks to users’ attention, allowing them to manage, report and mitigate those instabilities. Reducing risks early on prevents issues from growing as they move through product development unseen, reducing the overall cost of development. Some systems do this by “detecting” or “highlighting” risks, whereas some systems simply offer full visibility through PM tools.\r\n<span style=\"font-weight: bold;\">Workflow and Change Management.</span> Plainly said, this suite of PLM software tools gives users insight into product activities. Users can determine phases for a project, as well as assign milestones to keep projects on track. Some systems allow users to see all pending and implemented changes, as well as all items that endure the subsequent effects. This visibility extends to portfolio and resource management, also.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/PLM_-_Product_Lifecycle_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"6connex-platform":{"id":5799,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/6Connex_Logo.png","logo":true,"scheme":false,"title":"6Connex Platform","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"6connex-platform","companyTitle":"6Connex","companyTypes":["supplier","vendor"],"companyId":8656,"companyAlias":"6connex","description":"<span style=\"font-weight: bold;\">Unlimited possibilities</span><br />\r\n6Connex is a virtual platform like no other — with the robust flexibility needed to create any interactive environment in the cloud. You have the ability to power fully-remote and hybrid events for Marketing, Sales, HR, Business Development, and more.<br /><br /><span style=\"font-weight: bold;\">Attendee-centric experiences</span><br />\r\nAttendees can easily interact with advanced engagement tools, such as 1:1 chat, video chat, gamification, social sharing, and webcasting, while leveraging our sophisticated A.I. technology that allows for a unique, personalized event experience with content-matching and networking opportunities.<br /><br /><span style=\"font-weight: bold;\">Enterprise-level security</span><br />\r\nAs the virtual event industry’s leader in security and privacy, many of the world’s most admired companies have put their trust in our security and privacy protocols. We comply with the most stringent enterprise security requirements with features including whitelisting, blacklisting, and secure cookie handling.<br /><span style=\"font-weight: bold;\"><br />Actionable insights</span><br />\r\nTrack activity and ROI with 24/7 access to 35+ real-time reports. Understand the Who, What, Where, and When for every activity in your virtual environment. Provide your sponsors with actionable data that allows them to target campaigns accurately.\r\n\r\nKey features of 6Connex:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold; \">Unmatched Scalability with Enterprise Level Security</span></span>\r\nThe 6Connex platform is ISO 27001 certified, offering a secure virtual environment with unlimited capacity and flexibility to host any hybrid or virtual use case.<br /><span style=\"font-style: italic;\"><br /><span style=\"font-weight: bold; \">The Perpetual VE Concept</span></span><br />\r\nThe 6Connex platform handles multiple use cases, allowing customers to repurpose the Environment and leverage their long-term license to support multiple engagements in a single location.<br /><br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold; \">Immersive Experience</span></span><br />\r\nOur environment templates and navigation design drive attendees through a unique immersive experience, delivering a new level of engagement and virtual experience.<br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold; \"><br />Open VE Universe</span></span><br />\r\n6Connex’s platform is technology agnostic allowing clients to bring the tools they use day-to-day and are approved by their IT protocols to integrate with our platform and drive engagement.","shortDescription":"6Connex is a virtual Platform to create attendee-centric experiences for virtual and hybrid events","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"6Connex Platform","keywords":"","description":"<span style=\"font-weight: bold;\">Unlimited possibilities</span><br />\r\n6Connex is a virtual platform like no other — with the robust flexibility needed to create any interactive environment in the cloud. You have the ability to power fully-remote and hybrid ev","og:title":"6Connex Platform","og:description":"<span style=\"font-weight: bold;\">Unlimited possibilities</span><br />\r\n6Connex is a virtual platform like no other — with the robust flexibility needed to create any interactive environment in the cloud. You have the ability to power fully-remote and hybrid ev","og:image":"https://old.roi4cio.com/fileadmin/user_upload/6Connex_Logo.png"},"eventUrl":"","translationId":5799,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":113,"title":"Virtual Event Platforms"}],"testingArea":"","categories":[{"id":864,"title":"Virtual Event Platforms","alias":"virtual-event-platforms","description":" Virtual events are on the rise. As technology progresses, it has made it possible for companies to host amazing online events - ones that even rival in-person versions. This has led to many benefits for both event planners and attendees alike.\r\nA virtual event, also known as an online event, is an interactive gathering that happens on the internet. Unlike in-person events, virtual ones aren't restricted to a single location. A remote attendee can join and participate from anywhere in the world, given he or she has access to the web.\r\nSome events are completely virtual and every guest attends sessions from the comfort of their own home, favorite coffee shop, or wherever they might be. Others have both in-person and virtual components. Some attendees visit the actual event location and others stream the festivities from their computer.\r\nThere are many reasons why virtual events are valuable. First off, virtual events allow the individuals or companies hosting them to reach a wider audience. Were you to host your event in New York City, for example, not every person in your audience would be able to attend due to the cost of travel. With a virtual event, travel isn't an issue.\r\nIn general, virtual events are also much cheaper to put on. Event planners don't have to book a giant venue or hire a bunch of temporary staff. These cost savings can then be passed on to each virtual attendee in the form of lower ticket prices.\r\nLastly, virtual events are extremely measurable. Companies can easily learn which sessions were the most popular, how many people attended, where those attendees live, how they paid for their tickets, and much more. Just about every attendee action can be easily tracked and analyzed. This information can then be used to improve event strategy.","materialsDescription":" <span style=\"font-weight: bold; \">What is a virtual event?</span>\r\nIn an industry with lots of jargon and acronyms flying about, it’s easy to become bamboozled by terminology. However, in the case of virtual events, there’s little room for ambiguity – they are as they sound – events that take place completely online. Supported by specialist AV technology, virtual events negate the need for a physical location and work to bring people together virtually from across the world. Whilst a virtual event can’t replace the power and value of in-person interactions, they’re an effective tool that can be an engaging and immersive alternative to delivering business content and information.\r\n<span style=\"font-weight: bold; \">How many people can attend a virtual event?</span>\r\nVirtual events have the capacity to facilitate large audience numbers: from hundreds of thousands to thousands, hundreds or smaller groups. Understanding, from the outset, what you want to achieve from your event and the complexity of the program, will provide a good guide to how many attendees should be invited.\r\n<span style=\"font-weight: bold; \">How do attendees gain access to a virtual event?</span>\r\nIn theory, this is an easy one to answer: attendees will receive an invite with access details, which will allow them to enter the virtual event on the date and time outlined. However, before this happens, there are some important things for you to consider first, including:\r\n<ul><li>Are you charging an entry fee for the event?</li><li>Will the event be live, on-demand or a combination of the two?</li><li>How will you market your event, so your audience knows it’s taking place and want to be part of it?</li><li>Is your audience tech-savvy? Might they need a pre-event virtual guide/tour, so they are familiar with how to join and the features of a virtual event set up?</li></ul>\r\nHaving questions like these answered will define the platform required, help maximize attendance and optimize your delegates overall experience of the virtual event offering.\r\n<span style=\"font-weight: bold; \">What are the main benefits of a virtual event?</span>\r\n<ul><li><span style=\"font-weight: bold; \">Scope:</span> Whilst not all events will suit a virtual treatment, many programs can be adapted into a digital format. It really comes down to your objectives and whether or not these can be achieved through holding an online event.</li><li><span style=\"font-weight: bold; \">Accessibility:</span> Expand the reach of your brand without the need for travel. Not only can virtual events connect you with a global audience in real-time, but with event recording, event content can be made available on-demand; providing more opportunities for people to consume your content at a time that suits their schedule best. What’s more, all that attendees and speakers need to attend/talk is a computer, laptop, or mobile device and a good, reliable internet connection.</li><li><span style=\"font-weight: bold; \">Engagement:</span> In-person events are unrivaled in their ability to engage and facilitate real human-to-human connections through creative interactions. For this reason, you might be concerned that virtual events can’t engage audiences. Whilst there’s no escaping the fact that there are limitations vs face-to-face meetings, there are lots of potentials to mix rich content with live polling, Q&As and whiteboards to keep engagement levels high throughout sessions. Social media can also be employed as a great engagement tool – use event hashtags, encourage attendees to post images of their highlights from the event, and get imaginative with other ways a sense of community can be created via social channels.</li><li><span style=\"font-weight: bold; \">Multiple or Single Content Experiences:</span> As with physical events, virtual events offer the opportunity to run multiple content streams concurrently; allowing different speakers to host sessions simultaneously and giving attendees the option to select sessions most relevant to them. If this isn’t required for your event, then a multiple single content experience may be a better fit.</li><li><span style=\"font-weight: bold; \">Networking:</span> While there’s no escaping the fact that in-person events are the most conducive way to network and make meaningful business connections, networking can still be factored into a virtual event program. Give attendees the chance to schedule one-on-one time or assemble into group breakouts, where they can speak to each other, your team, sponsors or speakers over the internet. A range of tools can be used to ensure attendees can leverage the best from their interactions.</li><li><span style=\"font-weight: bold; \">Insight:</span> The metrics and data insights that can be captured from virtual event platforms can help measure ROI and success against pre-defined KPIs. Information derived can be used to articulate if your event was successful and to influence future event decision making.</li></ul>\r\n<span style=\"font-weight: bold; \">Is there a potential to incorporate sponsorship?</span>\r\nYes. Virtual event spaces, presentations and other assets can be customised to reflect your branding and the branding of any sponsors you may partner with. This maximises brand exposure and maintains a sponsor revenue stream coming into your event.\r\n<span style=\"font-weight: bold;\">Can virtual events be used as part of a hybrid event strayegy?</span>\r\nAbsolutely. Incorporating virtual events with a holistic approach can be a good way to enhance your existing event strategy. Integrating virtual events into your wider events and meetings program will give you an additional tool to utilize alongside your live events; extending reach and engagement with your audience further.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/1999104__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"6scan":{"id":5706,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/sixscan.png","logo":true,"scheme":false,"title":"6Scan","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"6scan","companyTitle":"6Scan","companyTypes":["supplier","vendor"],"companyId":8606,"companyAlias":"6scan","description":"<span style=\"font-weight: bold;\">6Scan</span> is a full service security solution for you website. Patent-pending technology combines a full suite of features that scan and automatically fix critical issues that - if left unresolved - could damage your business and customers, your reputation and destroy your web presence. \r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">What Does 6Scan Do?</span></p>\r\n<ol><li><span style=\"font-weight: bold;\">Find.</span> The 6Scan six independent scanners work to detect vulnerabilities, scan for malware and inspect your website's files to determine any security issues or risks.<span style=\"font-weight: bold;\"></span></li><li><span style=\"font-weight: bold;\">Fix.</span> Patent-pending technology automatically fixes any security issues as soon as they are detected. We deploy a WAF (Web Application Firewall) and custom vulnerability patches to make sure any attack vectors are blocked. The entire process of detecting and fixing vulnerabilities is fully automated, managed through a unified dashboard.</li><li><span style=\"font-weight: bold;\">Protect.</span> 6Scan will continue to monitor your site for new vulnerabilities and security risks. The scanning is scheduled automatically or can be triggered manually and you will be notified of any issues. As with all our services, this process can be monitored from your dashboard where you have the opportunity to roll back any changes.</li></ol>\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Malware Scan. </span></span>A complex scan that runs a number of different tests to detect any signs of malware on your website. The 6Scan malware scan deploys a much larger set of tests than most of the simple or embedded scanners to make sure that even the latest emerging threats are detected. \r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Malware Removal.</span></span> A service to restore your website after a malware attack. 6Scan's security experts will access your website and remove any malicious code or backdoors. \r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Server-Side Scan.</span></span> A scan and examination of the files on your hosting account for any signs of backdoors or hidden malware code which could be used to compromise your website. \r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Website Scan.</span></span> Detects vulnerabilities that could make your site a target for attacks. The proactive service works seamlessly in the background to maintain website security. \r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Auto Vulnerability Repair.</span></span> Patent-pending patching technology acts immediately to resolve problems with vulnerable website code. Left unchecked these issues become entry points for hackers to gain access to your website. \r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">CMS Scan/Repair.</span></span> Automatically repairs problems created by outdated and vulnerable plug-ins and content management systems such as WordPress, Drupal, and Joomla, used by millions of websites.<br /><br />","shortDescription":"The First Automated Website Security Suite. Simple Yet Powerful Monitoring And Protection.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"6Scan","keywords":"","description":"<span style=\"font-weight: bold;\">6Scan</span> is a full service security solution for you website. Patent-pending technology combines a full suite of features that scan and automatically fix critical issues that - if left unresolved - could damage your busines","og:title":"6Scan","og:description":"<span style=\"font-weight: bold;\">6Scan</span> is a full service security solution for you website. Patent-pending technology combines a full suite of features that scan and automatically fix critical issues that - if left unresolved - could damage your busines","og:image":"https://old.roi4cio.com/fileadmin/user_upload/sixscan.png"},"eventUrl":"","translationId":5706,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":485,"title":"Web security","alias":"web-security","description":" Web security basically means protecting a website or web application by detecting, preventing and responding to cyber threats.\r\nWebsites and web applications are just as prone to security breaches as physical homes, stores, and government locations. Unfortunately, cybercrime happens every day, and great web security measures are needed to protect websites and web applications from becoming compromised.\r\nThat’s exactly what web security does – it is a system of protection measures and protocols that can protect your website or web application from being hacked or entered by unauthorized personnel. This integral division of Information Security is vital to the protection of websites, web applications, and web services. Anything that is applied over the Internet should have some form of web security to protect it.\r\nThere are a lot of factors that go into web security and web protection. Any website or application that is secure is surely backed by different types of checkpoints and techniques for keeping it safe.\r\nThere are a variety of security standards that must be followed at all times, and these standards are implemented and highlighted by the OWASP. Most experienced web developers from top cybersecurity companies will follow the standards of the OWASP as well as keep a close eye on the Web Hacking Incident Database to see when, how, and why different people are hacking different websites and services.\r\nEssential steps in protecting web apps from attacks include applying up-to-date encryption, setting proper authentication, continuously patching discovered vulnerabilities, avoiding data theft by having secure software development practices. The reality is that clever attackers may be competent enough to find flaws even in a fairly robust secured environment, and so a holistic security strategy is advised.\r\nThere are different types of technologies available for maintaining the best security standards. Some popular technical solutions for testing, building, and preventing threats include black and white box testing tools, fuzzing tools, WAF, security or vulnerability scanners, password cracking tools, and so on.","materialsDescription":" <span style=\"font-weight: bold; \">What is Malware?</span>\r\nThe name malware is short for ‘malicioussoftware’. Malware includes any software program that has been created to perform an unauthorised — and often harmful — action on a user’s device. Examples of malware include:\r\n<ul><li>Computer viruses</li><li>Word and Excel macro viruses</li><li>Boot sector viruses</li><li>Script viruses — including batch, Windows shell, Java and others</li><li>Keyloggers</li><li>Password stealers</li><li>Backdoor Trojan viruses</li><li>Other Trojan viruses</li><li>Crimeware</li><li>Spyware</li><li>Adware... and many other types of malicious software programs</li></ul>\r\n<span style=\"font-weight: bold; \">What is the difference between a computer virus and a worm?</span>\r\n<span style=\"font-weight: bold; \">Computer virus.</span> This is a type of malicious program that can replicate itself — so that it can spread from file to file on a computer, and can also spread from one computer to another. Computer viruses are often programmed to perform damaging actions — such as corrupting or deleting data. The longer a virus remains undetected on your machine, the greater the number of infected files that may be on your computer.\r\n<span style=\"font-weight: bold; \">Worms.</span> Worms are generally considered to be a subset of computer viruses — but with some specific differences:\r\n<ul><li>A worm is a computer program that replicates, but does not infect other files.</li><li>The worm will install itself once on a computer — and then look for a way to spread to other computers.</li><li>Whereas a virus is a set of code that adds itself to existing files, a worm exists as a separate, standalone file.</li></ul>\r\n<span style=\"font-weight: bold; \">What is a Trojan virus?</span>\r\nA Trojan is effectively a program that pretends to be legitimate software — but, when launched, it will perform a harmful action. Unlike computer viruses and worms, Trojans cannot spread by themselves. Typically, Trojans are installed secretly and they deliver their malicious payload without the user’s knowledge.\r\nCybercriminals use many different types of Trojans — and each has been designed to perform a specific malicious function. The most common are:\r\n<ul><li>Backdoor Trojans (these often include a keylogger)</li><li>Trojan Spies</li><li>Password stealing Trojans</li><li>Trojan Proxies — that convert your computer into a spam distribution machine</li></ul>\r\n<span style=\"font-weight: bold; \">Why are Trojan viruses called Trojans?</span>\r\nIn Greek mythology — during the Trojan war — the Greeks used subterfuge to enter the city of Troy. The Greeks constructed a massive wooden horse — and, unaware that the horse contained Greek soldiers, the Trojans pulled the horse into the city. At night, the Greek soldiers escaped from the horse and opened the city gates — for the Greek army to enter Troy.\r\nToday, Trojan viruses use subterfuge to enter unsuspecting users’ computers and devices.\r\n<span style=\"font-weight: bold; \">What is a Keylogger?</span>\r\nA keylogger is a program that can record what you type on your computer keyboard. Criminals use keyloggers to obtain confidential data — such as login details, passwords, credit card numbers, PINs and other items. Backdoor Trojans typically include an integrated keylogger.\r\n<span style=\"font-weight: bold; \">What is Phishing?</span>\r\nPhishing is a very specific type of cybercrime that is designed to trick you into disclosing valuable information — such as details about your bank account or credit cards. Often, cybercriminals will create a fake website that looks just like a legitimate site — such as a bank’s official website. The cybercriminal will try to trick you into visiting their fake site — typically by sending you an email that contains a hyperlink to the fake site. When you visit the fake website, it will generally ask you to type in confidential data — such as your login, password or PIN.\r\n<span style=\"font-weight: bold; \">What is Spyware?</span>\r\nSpyware is software that is designed to collect your data and send it to a third party — without your knowledge or consent. Spyware programs will often:\r\n<ul><li>Monitor the keys you press on your keyboard — using a keylogger</li><li>Collect confidential information — such as your passwords, credit card numbers, PIN numbers and more</li><li>Gather — or ‘harvest’ — email addresses from your computer</li><li>Track your Internet browsing habits</li></ul>\r\n<span style=\"font-weight: bold; \">What is a Rootkit?</span>\r\nRootkits are programs that hackers use in order to evade detection while trying to gain unauthorised access to a computer. Rootkits have been used increasingly as a form of stealth to hide Trojan virus activity. When installed on a computer, rootkits are invisible to the user and also take steps to avoid being detected by security software.\r\nThe fact that many people log into their computers with administrator rights — rather than creating a separate account with restricted access — makes it easier for cybercriminals to install a rootkit.\r\n<span style=\"font-weight: bold; \">What is a Botnet?</span>\r\nA botnet is a network of computers controlled by cybercriminals using a Trojan virus or other malicious program.\r\n<span style=\"font-weight: bold;\">What is a DDoS attack?</span>\r\nA Distributed-Denial-of-Service (DDoS) attack is similar to a DoS. However, a DDoS attack is conducted using multiple machines. Usually, for a DDoS attack, the hacker will use one security compromised computer as the ‘master’ machine that co-ordinates the attack by other ‘zombie machines’. Typically, the cybercriminal will compromise the security on the master and all of the zombie machines, by exploiting a vulnerability in an application on each computer — to install a Trojan or other piece of malicious code.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/security-web-application-security.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":" MDR, which stands for Managed Detection & Response, is an all-encompassing threat detection system, which arose from the need for small/medium-sized organizations who lack resources to be able to monitor their network systems in-house. It provides a cost-effective alternative to SIEM (Security Information and Event Management).\r\nEveryday, the capabilities of attackers get more sophisticated and the volume of alerts becomes overwhelming and unmanageable. In-house teams might struggle to analyze and log data, which makes it harder than ever to determine if these threats are harmful. MDR can put a stop to attacks before they even happen. MDR technology monitors your systems and detects any unusual behavior, whilst our expert team responds to the threats detected within your business.\r\nMDR offers real-time threat intelligence, and is able to analyse behaviour which can be missed by traditional endpoint security technology. MDR also provides rapid identification of known threats, which in turn minimises overall attacks. Having remote incident investigation will minimise damage to your business, and will allow you to get back to work in no time. It’s important to note that using MDR services will allow third party access to your company's data. You need to consider working with a provider who understands and respects your data policy.","materialsDescription":" <span style=\"font-weight: bold;\">What is Managed Detection and Response?</span>\r\nManaged Detection and Response (MDR) is a managed cybersecurity service that provides intrusion detection of malware and malicious activity in your network, and assists in rapid incident response to eliminate those threats with succinct remediation actions. MDR typically combines a technology solution with outsourced security analysts that extend your technologies and team.\r\n<span style=\"font-weight: bold;\">Isn’t that What MSSPs or Managed SIEMs Do?</span>\r\nNo. Managed Security Service Providers (MSSPs) monitor network security controls and may send alerts when anomalies are identified. MSSPs typically do not investigate the anomalies to eliminate false positives, nor do they respond to real threats. This means that abnormalities in network usage are forwarded to your IT personnel who must then dig through the data to determine if there is a real threat and what to do about it.\r\n<span style=\"font-weight: bold;\">Doesn’t My Firewall Protect My Network?</span>\r\nFirewalls and other preventive forms of cybersecurity are very important and effective at preventing basic cyberattacks. However, over the past decade, it has become clear that preventive cybersecurity technologies are not enough to secure an organization’s network. Further, they are yet another source of alerts, log messages, and events that contribute to the “alert fatigue” being universally suffered today. Recent major hacks such as the Marriot Hack of 2018, the Anthem Hack of 2015, and the Target Hack of 2013 demonstrate how easily cybercriminals can breach networks at enterprise organizations to steal millions of credit card numbers, medical records, and other forms of PII/PHI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Endpoint_Detection_and_Response.png"},{"id":79,"title":"VM - Vulnerability management","alias":"vm-vulnerability-management","description":"Vulnerability management is the "cyclical practice of identifying, classifying, prioritizing, remediating and mitigating" software vulnerabilities. Vulnerability management is integral to computer security and network security, and must not be confused with a Vulnerability assessment.\r\nVulnerability management is an ongoing process that includes proactive asset discovery, continuous monitoring, mitigation, remediation and defense tactics to protect your organization's modern IT attack surface from Cyber Exposure.\r\nVulnerabilities can be discovered with a vulnerability scanner, which analyzes a computer system in search of known vulnerabilities, such as open ports, insecure software configurations, and susceptibility to malware infections. They may also be identified by consulting public sources, such as NVD, or subscribing to a commercial vulnerability alerting services. Unknown vulnerabilities, such as a zero-day, may be found with fuzz testing, which can identify certain kinds of vulnerabilities, such as a buffer overflow with relevant test cases. Such analysis can be facilitated by test automation. In addition, antivirus software capable of heuristic analysis may discover undocumented malware if it finds software behaving suspiciously (such as attempting to overwrite a system file).\r\nCorrecting vulnerabilities may variously involve the installation of a patch, a change in network security policy, reconfiguration of software, or educating users about social engineering.\r\nNetwork vulnerabilities represent security gaps that could be abused by attackers to damage network assets, trigger a denial of service, and/or steal potentially sensitive information. Attackers are constantly looking for new vulnerabilities to exploit — and taking advantage of old vulnerabilities that may have gone unpatched.\r\nHaving a vulnerability management framework in place that regularly checks for new vulnerabilities is crucial for preventing cybersecurity breaches. Without a vulnerability testing and patch management system, old security gaps may be left on the network for extended periods of time. This gives attackers more of an opportunity to exploit vulnerabilities and carry out their attacks.\r\nOne statistic that highlights how crucial vulnerability management was featured in an Infosecurity Magazine article. According to survey data cited in the article, of the organizations that “suffered a breach, almost 60% were due to an unpatched vulnerability.” In other words, nearly 60% of the data breaches suffered by survey respondents could have been easily prevented simply by having a vulnerability management plan that would apply critical patches before attackers leveraged the vulnerability.","materialsDescription":" <span style=\"font-weight: bold;\">What is vulnerability management?</span>\r\nVulnerability management is a pro-active approach to managing network security by reducing the likelihood that flaws in code or design compromise the security of an endpoint or network.\r\n<span style=\"font-weight: bold;\">What processes does vulnerability management include?</span>\r\nVulnerability management processes include:\r\n<ul><li><span style=\"font-style: italic;\">Checking for vulnerabilities:</span> This process should include regular network scanning, firewall logging, penetration testing or use of an automated tool like a vulnerability scanner.</li><li><span style=\"font-style: italic;\">Identifying vulnerabilities:</span> This involves analyzing network scans and pen test results, firewall logs or vulnerability scan results to find anomalies that suggest a malware attack or other malicious event has taken advantage of a security vulnerability, or could possibly do so.</li><li><span style=\"font-style: italic;\">Verifying vulnerabilities:</span> This process includes ascertaining whether the identified vulnerabilities could actually be exploited on servers, applications, networks or other systems. This also includes classifying the severity of a vulnerability and the level of risk it presents to the organization.</li><li><span style=\"font-style: italic;\">Mitigating vulnerabilities:</span> This is the process of figuring out how to prevent vulnerabilities from being exploited before a patch is available, or in the event that there is no patch. It can involve taking the affected part of the system off-line (if it's non-critical), or various other workarounds.</li><li><span style=\"font-style: italic;\">Patching vulnerabilities:</span> This is the process of getting patches -- usually from the vendors of the affected software or hardware -- and applying them to all the affected areas in a timely way. This is sometimes an automated process, done with patch management tools. This step also includes patch testing.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VM_-_Vulnerability_management1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"802-secure-airshield":{"id":3421,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/802secure.png","logo":true,"scheme":false,"title":"802 Secure AirShield","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"802-secure-airshield","companyTitle":"802 Secure","companyTypes":["vendor"],"companyId":5163,"companyAlias":"802-secure","description":"The 80% of edge computing is wirelessly enabled today across devices, networks, and IoT. This evolution requires a new level of visibility across not only the IT network but the surrounding Physical environment (off-network systems). Gartner and NIST refer to this as Cyber-Physical Security.\r\nThe lack of Physical visibility, management, and security exposes organizations to risks including unmanaged, Shadow IoT, and adversarial devices such as wireless thermostats, Smart TVs, spy cameras, drones, rogue cell towers, wireless storage devices, and much more.\r\n<span style=\"font-weight: bold;\">AirShield Solution</span>\r\n802 Secure’s AirShield is an autonomous and non-intrusive wireless monitoring solution that provides immediate visibility and protection across the Cyber-Physical space.\r\nAirShield provides scans across multiple wireless protocols and frequencies to detect wireless devices and networks and protect against misconfigurations, Shadow IoT, unknown and unmanaged IoT devices, and previously undetected adversarial attacks. This is accomplished using wireless deep packet inspection, situational awareness, zero trust security, anomaly detection, machine learning, and behavioral analysis.","shortDescription":"802 Secure’s AirShield is an autonomous and non-intrusive wireless monitoring solution that provides immediate visibility and protection across the Cyber Physical space.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"802 Secure AirShield","keywords":"","description":"The 80% of edge computing is wirelessly enabled today across devices, networks, and IoT. This evolution requires a new level of visibility across not only the IT network but the surrounding Physical environment (off-network systems). Gartner and NIST refer to ","og:title":"802 Secure AirShield","og:description":"The 80% of edge computing is wirelessly enabled today across devices, networks, and IoT. This evolution requires a new level of visibility across not only the IT network but the surrounding Physical environment (off-network systems). Gartner and NIST refer to ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/802secure.png"},"eventUrl":"","translationId":3421,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":834,"title":"IoT - Internet of Things Security","alias":"iot-internet-of-things-security","description":" IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).\r\nIoT involves adding internet connectivity to a system of interrelated computing devices, mechanical and digital machines, objects, animals and/or people. Each "thing" is provided a unique identifier and the ability to automatically transfer data over a network. Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.\r\nIoT security has become the subject of scrutiny after a number of high-profile incidents where a common IoT device was used to infiltrate and attack the larger network. Implementing security measures is critical to ensuring the safety of networks with IoT devices connected to them.\r\nIoT security hacks can happen in any industry, from smart home to a manufacturing plant to a connected car. The severity of impact depends greatly on the individual system, the data collected and/or the information it contains.\r\nAn attack disabling the brakes of a connected car, for example, or on a connected health device, such as an insulin pump hacked to administer too much medication to a patient, can be life-threatening. Likewise, an attack on a refrigeration system housing medicine that is monitored by an IoT system can ruin the viability of a medicine if temperatures fluctuate. Similarly, an attack on critical infrastructure -- an oil well, energy grid or water supply -- can be disastrous.\r\nSo, a robust IoT security portfolio must allow protecting devices from all types of vulnerabilities while deploying the security level that best matches application needs. Cryptography technologies are used to combat communication attacks. Security services are offered for protecting against lifecycle attacks. Isolation measures can be implemented to fend off software attacks. And, finally, IoT security should include tamper mitigation and side-channel attack mitigation technologies for fighting physical attacks of the chip.","materialsDescription":" <span style=\"font-weight: bold;\">What are the key requirements of IoT Security?</span>\r\nThe key requirements for any IoT security solution are:\r\n<ul><li>Device and data security, including authentication of devices and confidentiality and integrity of data</li><li>Implementing and running security operations at IoT scale</li><li>Meeting compliance requirements and requests</li><li>Meeting performance requirements as per the use case</li></ul>\r\n<span style=\"font-weight: bold;\">What do connected devices require to participate in the IoT Securely?</span>\r\nTo securely participate in the IoT, each connected device needs a unique identification – even before it has an IP address. This digital credential establishes the root of trust for the device’s entire lifecycle, from initial design to deployment to retirement.\r\n<span style=\"font-weight: bold;\">Why is device authentication necessary for the IoT?</span>\r\nStrong IoT device authentication is required to ensure connected devices on the IoT can be trusted to be what they purport to be. Consequently, each IoT device needs a unique identity that can be authenticated when the device attempts to connect to a gateway or central server. With this unique ID in place, IT system administrators can track each device throughout its lifecycle, communicate securely with it, and prevent it from executing harmful processes. If a device exhibits unexpected behavior, administrators can simply revoke its privileges.\r\n<span style=\"font-weight: bold;\">Why is secure manufacturing necessary for IoT devices?</span>\r\nIoT devices produced through unsecured manufacturing processes provide criminals opportunities to change production runs to introduce unauthorized code or produce additional units that are subsequently sold on the black market.\r\nOne way to secure manufacturing processes is to use hardware security modules (HSMs) and supporting security software to inject cryptographic keys and digital certificates and to control the number of units built and the code incorporated into each.\r\n<span style=\"font-weight: bold;\">Why is code signing necessary for IoT devices?</span>\r\nTo protect businesses, brands, partners, and users from software that has been infected by malware, software developers have adopted code signing. In the IoT, code signing in the software release process ensures the integrity of IoT device software and firmware updates and defends against the risks associated with code tampering or code that deviates from organizational policies.\r\nIn public key cryptography, code signing is a specific use of certificate-based digital signatures that enables an organization to verify the identity of the software publisher and certify the software has not been changed since it was published.\r\n<span style=\"font-weight: bold;\">What is IoT PKI?</span>\r\nToday there are more things (devices) online than there are people on the planet! Devices are the number one users of the Internet and need digital identities for secure operation. As enterprises seek to transform their business models to stay competitive, rapid adoption of IoT technologies is creating increasing demand for Public Key Infrastructures (PKIs) to provide digital certificates for the growing number of devices and the software and firmware they run.\r\nSafe IoT deployments require not only trusting the devices to be authentic and to be who they say they are, but also trusting that the data they collect is real and not altered. If one cannot trust the IoT devices and the data, there is no point in collecting, running analytics, and executing decisions based on the information collected.\r\nSecure adoption of IoT requires:\r\n<ul><li>Enabling mutual authentication between connected devices and applications</li><li>Maintaining the integrity and confidentiality of the data collected by devices</li><li>Ensuring the legitimacy and integrity of the software downloaded to devices</li><li>Preserving the privacy of sensitive data in light of stricter security regulations</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/iot.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"a10-thunderrtps":{"id":1274,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/A10_THUNDER_R_TPS1.jpg","logo":true,"scheme":false,"title":"A10 THUNDER®TPS","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"a10-thunderrtps","companyTitle":"A10 Networks","companyTypes":["supplier","vendor"],"companyId":4094,"companyAlias":"a10-networks","description":"<span style=\"font-weight: bold;\">SURGICAL MULTI-VECTOR DDOS PROTECTION</span>\r\nMitigate volumetric, protocol, resource, application and IoT-based DDoS attacks while protecting legitimate users.\r\n\r\n<span style=\"font-weight: bold;\">POWERFUL & EFFICIENT</span>\r\nLower TCO with industry-best 300 Gbps at 440 Mpps. FPGA-based acceleration mitigates without burdening CPUs.\r\n\r\n<span style=\"font-weight: bold;\">AUTOMATED THREAT MITIGATION</span>\r\nRespond faster and minimize manual changes with automated mitigation and escalation based on 28 behavioral indicators.\r\n\r\n<span style=\"font-weight: bold;\">PRECISE DETECTION</span>\r\nSwiftly detect attacks with in-line or flow-based methods, or integrate third party detection with open APIs.\r\n\r\n<span style=\"font-weight: bold;\">HYBRID DDOS PROTECTION</span>\r\nOn-premise protection integrates with Verisign’s cloud-based DDoS Protection Services.\r\n\r\n<span style=\"font-weight: bold;\">FLEXIBLE MANAGEMENT</span>\r\nUse 100 percent API coverage for SecOps, on-box GUI, CLI, or to manage multiple TPS devices via aGalaxy.\r\n\r\n<span style=\"font-weight: bold;\">THREAT INTELLIGENCE SERVICE</span>\r\nLeverage more than three dozen intelligence sources to block malicious traffic. Included with A10 support.\r\n\r\n<span style=\"font-weight: bold;\">24-7 ATTACK SUPPORT</span>\r\nSpin up 24-7 DDoS attack support from the A10 DDoS Security Incident Response Team (DSIRT). Included with A10 support.\r\n\r\n<span style=\"font-weight: bold;\">REACTIVE MODE</span>\r\nLarger networks benefit from on-demand mitigation, which is triggered manually or via flow-based analytical systems. Thunder TPS fits any network configuration with integrated BGP and other routing protocols support.\r\n\r\n<span style=\"font-weight: bold;\">PROACTIVE MODE</span>\r\nProactive mode provides continuous, comprehensive detection and faster mitigation. Deployable in asymmetric or symmetric configurations, this mode is most useful for real-time environments where the user experience is critical.\r\n\r\n<span style=\"font-weight: bold;\">OUT-OF-BAND (TAP) MODE</span>\r\nThe out-of-band mode is used when packet-based DDoS detection and monitoring is required.\r\n","shortDescription":"A10 THUNDER®TPS - DDOS DETECTION & MITIGATION\r\nThe world’s highest-performance DDoS protection solution, the A10 Thunder TPS™ (Threat Protection System) detects and mitigates megabit to terabit DDoS attacks at the network edge.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"A10 THUNDER®TPS","keywords":"with, DDoS, support, mode, detection, MODE, mitigation, 24-7","description":"<span style=\"font-weight: bold;\">SURGICAL MULTI-VECTOR DDOS PROTECTION</span>\r\nMitigate volumetric, protocol, resource, application and IoT-based DDoS attacks while protecting legitimate users.\r\n\r\n<span style=\"font-weight: bold;\">POWERFUL & EFFICIENT</span","og:title":"A10 THUNDER®TPS","og:description":"<span style=\"font-weight: bold;\">SURGICAL MULTI-VECTOR DDOS PROTECTION</span>\r\nMitigate volumetric, protocol, resource, application and IoT-based DDoS attacks while protecting legitimate users.\r\n\r\n<span style=\"font-weight: bold;\">POWERFUL & EFFICIENT</span","og:image":"https://old.roi4cio.com/fileadmin/user_upload/A10_THUNDER_R_TPS1.jpg"},"eventUrl":"","translationId":1274,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":" A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.\r\nIn a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.\r\nA DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, disrupting trade.\r\nCriminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways. Revenge, blackmail and activism can motivate these attacks. ","materialsDescription":" <span style=\"font-weight: bold;\">What are the Different Types of DDoS Attacks?</span>\r\nDistributed Denial of Service attacks vary significantly, and there are thousands of different ways an attack can be carried out (attack vectors), but an attack vector will generally fall into one of three broad categories:\r\n<span style=\"font-weight: bold;\">Volumetric Attacks:</span>\r\nVolumetric attacks attempt to consume the bandwidth either within the target network/service or between the target network/service and the rest of the Internet. These attacks are simply about causing congestion.\r\n<span style=\"font-weight: bold;\">TCP State-Exhaustion Attacks:</span>\r\nTCP State-Exhaustion attacks attempt to consume the connection state tables which are present in many infrastructure components such as load-balancers, firewalls and the application servers themselves. Even high capacity devices capable of maintaining state on millions of connections can be taken down by these attacks.\r\n<span style=\"font-weight: bold;\">Application Layer Attacks:</span>\r\nApplication Layer attacks target some aspect of an application or service at Layer-7. These are the deadliest kind of attacks as they can be very effective with as few as one attacking machine generating a low traffic rate (this makes these attacks very difficult to proactively detect and mitigate). Application layer attacks have come to prevalence over the past three or four years and simple application layer flood attacks (HTTP GET flood etc.) have been some of the most common denials of service attacks seen in the wild.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DDoS_Protection.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"abatis-for-maritime-ics-scada":{"id":3259,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Abatis_logo.jpg","logo":true,"scheme":false,"title":"Abatis for Maritime ICS SCADA","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"abatis-for-maritime-ics-scada","companyTitle":"Abatis","companyTypes":["supplier","vendor"],"companyId":5132,"companyAlias":"abatis","description":"In conjunction with our partners CLA Consulting, SETEL PowerLineand ECDIS Ltd, Abatis is pleased to launch a Cyber Malware Protection System created specifically to meet the needs of the Maritime sector. In particular, it can protect the following vulnerable systems on board ship as well as shore-based systems:\r\n<ul><li>Communication Systems</li><li>Bridge Systems including ECDIS</li><li>Propulsion & Power Control</li><li>Access Control Systems</li><li>Cargo Management Systems</li><li>Passenger Servicing & Mgt.</li><li>Passenger-facing Networks</li><li>Core Infrastructure Systems</li><li>Admin & Crew Welfare Systems</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Protect Your Fleet from External and Internal Threats</span>\r\n<ul><li>Proactive Protection</li><li>No Updates Required</li><li>Fast</li><li>Safe</li><li>Efficient</li><li>Low Power Consumption</li><li>Evaluated Extremely Small Footprint (<100KB)</li><li>Fit-and-Forget</li><li>Protects Legacy and New Operating Systems Can Identify and Isolate Existing Malware Infections</li><li>Works with Existing Security Tools</li><li>Easy to Use Reduces Maintenance Burden</li><li>Improve Green Credentials through Energy Saving</li><li>Ship & Shore Capability</li></ul>","shortDescription":"Abatis launches a Cyber Malware Protection System created specifically to meet the needs of the Maritime sector.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Abatis for Maritime ICS SCADA","keywords":"","description":"In conjunction with our partners CLA Consulting, SETEL PowerLineand ECDIS Ltd, Abatis is pleased to launch a Cyber Malware Protection System created specifically to meet the needs of the Maritime sector. In particular, it can protect the following vulner","og:title":"Abatis for Maritime ICS SCADA","og:description":"In conjunction with our partners CLA Consulting, SETEL PowerLineand ECDIS Ltd, Abatis is pleased to launch a Cyber Malware Protection System created specifically to meet the needs of the Maritime sector. In particular, it can protect the following vulner","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Abatis_logo.jpg"},"eventUrl":"","translationId":3259,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":59,"title":"SCADA - Supervisory Control And Data Acquisition","alias":"scada-supervisory-control-and-data-acquisition","description":"<span style=\"font-weight: bold; \">SCADA</span> stands for <span style=\"font-weight: bold; \">Supervisory Control and Data Acquisition</span>, a term which describes the basic functions of a SCADA system. Companies use SCADA systems to control equipment across their sites and to collect and record data about their operations. SCADA is not a specific technology, but a type of application. Any application that gets operating data about a system in order to control and optimise that system is a SCADA application. That application may be a petrochemical distillation process, a water filtration system, a pipeline compressor, or just about anything else.\r\nSCADA solutions typically come in a combination of software and hardware elements, such as programmable logic controllers (PLCs) and remote terminal units (RTUs). Data acquisition in SCADA starts with PLCs and RTUs, which communicate with plant floor equipment such as factory machinery and sensors. Data gathered from the equipment is then sent to the next level, such as a control room, where operators can supervise the PLC and RTU controls using human-machine interfaces (HMIs). HMIs are an important element of SCADA systems. They are the screens that operators use to communicate with the SCADA system.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">The major components of a SCADA technology include:</span></p>\r\n<ul><li><span style=\"font-weight: bold;\">Master Terminal Unit (MTU).</span> It comprises a computer, PLC and a network server that helps MTU to communicate with the RTUs. MTU begins communication, collects and saves data, helps to interface with operators and to communicate data to other systems.</li><li><span style=\"font-weight: bold;\">Remote Terminal Unit (RTU).</span> RTU is used to collect information from these sensors and further sends the data to MTU. RTUs have the storage capacity facility. So, it stores the data and transmits the data when MTU sends the corresponding command.</li><li><span style=\"font-weight: bold;\">Communication Network (defined by its network topology).</span> In general, network means connection. When you tell a SCADA communication network, it is defined as a link between RTU in the field to MTU in the central location. The bidirectional wired or wireless communication channel is used for the networking purpose. Various other communication mediums like fiber optic cables, twisted pair cables, etc. are also used.</li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Objectives of Supervisory Control and Data Acquisition system</span></p>\r\n<ul><li><span style=\"font-weight: bold;\">Monitor:</span> SCADA control system continuously monitors the physical parameters</li><li><span style=\"font-weight: bold;\">Measure:</span> It measures the parameter for processing</li><li><span style=\"font-weight: bold;\">Data Acquisition:</span> It acquires data from RTU, data loggers, etc</li><li><span style=\"font-weight: bold;\">Data Communication:</span> It helps to communicate and transmit a large amount of data between MTU and RTU units</li><li><span style=\"font-weight: bold;\">Controlling:</span> Online real-time monitoring and controlling of the process</li><li><span style=\"font-weight: bold;\">Automation:</span> It helps for automatic transmission and functionality</li></ul>\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Who Uses SCADA?</h1>\r\nSCADA systems are used by industrial organizations and companies in the public and private sectors to control and maintain efficiency, distribute data for smarter decisions, and communicate system issues to help mitigate downtime. Supervisory control systems work well in many different types of enterprises because they can range from simple configurations to large, complex installations. They are the backbone of many modern industries, including:\r\n<ul><li>Energy</li><li>Food and beverage</li><li>Manufacturing</li><li>Oil and gas</li><li>Power</li><li>Recycling</li><li>Transportation</li><li>Water and waste water</li><li>And many more</li></ul>\r\nVirtually anywhere you look in today's world, there is some type of SCADA monitoring system running behind the scenes: maintaining the refrigeration systems at the local supermarket, ensuring production and safety at a refinery, achieving quality standards at a waste water treatment plant, or even tracking your energy use at home, to give a few examples. Effective SCADA systems can result in significant savings of time and money. Numerous case studies have been published highlighting the benefits and savings of using a modern SCADA software.\r\n<h1 class=\"align-center\">Benefits of using SCADA software</h1>\r\nUsing modern SCADA software provides numerous benefits to businesses, and helps companies make the most of those benefits. Some of these advantages include:\r\n<span style=\"font-weight: bold; \">Easier engineering:</span> An advanced supervisory control application such provides easy-to-locate tools, wizards, graphic templates and other pre-configured elements, so engineers can create automation projects and set parameters quickly, even if they don't have programming experience. In addition, you can also easily maintain and expand existing applications as needed. The ability to automate the engineering process allows users, particularly system integrators and original equipment manufacturers (OEM), to set up complex projects much more efficiently and accurately.\r\n<span style=\"font-weight: bold; \">Improved data management:</span> A high-quality SCADA system makes it easier to collect, manage, access and analyze your operational data. It can enable automatic data recording and provide a central location for data storage. Additionally, it can transfer data to other systems such as MES and ERP as needed. \r\n<span style=\"font-weight: bold; \">Greater visibility:</span> One of the main advantages of using SCADA software is the improvement in visibility into your operations. It provides you with real-time information about your operations and enables you to conveniently view that information via an HMI. SCADA monitoring can also help in generating reports and analyzing data.\r\n<span style=\"font-weight: bold; \">Enhanced efficiency:</span> A SCADA system allows you to streamline processes through automated actions and user-friendly tools. The data that SCADA provides allows you to uncover opportunities for improving the efficiency of the operations, which can be used to make long-term changes to processes or even respond to real-time changes in conditions.\r\n<span style=\"font-weight: bold; \">Increased usability:</span> SCADA systems enable workers to control equipment more quickly, easily and safely through an HMI. Rather than having to control each piece of machinery manually, workers can manage them remotely and often control many pieces of equipment from a single location. Managers, even those who are not currently on the floor, also gain this capability.\r\n<span style=\"font-weight: bold; \">Reduced downtime:</span> A SCADA system can detect faults at an early stage and push instant alerts to the responsible personnel. Powered by predictive analytics, a SCADA system can also inform you of a potential issue of the machinery before it fails and causes larger problems. These features can help improve the overall equipment effectiveness (OEE) and reduce the amount of time and cost on troubleshooting and maintenance.\r\n<span style=\"font-weight: bold;\">Easy integration:</span> Connectivity to existing machine environments is key to removing data silos and maximizing productivity. \r\n<span style=\"font-weight: bold;\">Unified platform:</span>All of your data is also available in one platform, which helps you to get a clear overview of your operations and take full advantage of your data. All users also get real-time updates locally or remotely, ensuring everyone on your team is on the same page.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/SCADA__-_Supervisory_Control_And_Data_Acquisition.png"},{"id":5,"title":"Security Software","alias":"security-software","description":" Computer security software or cybersecurity software is any computer program designed to enhance information security. Security software is a broad term that encompasses a suite of different types of software that deliver data and computer and network security in various forms. \r\nSecurity software can protect a computer from viruses, malware, unauthorized users and other security exploits originating from the Internet. Different types of security software include anti-virus software, firewall software, network security software, Internet security software, malware/spamware removal and protection software, cryptographic software, and more.\r\nIn end-user computing environments, anti-spam and anti-virus security software is the most common type of software used, whereas enterprise users add a firewall and intrusion detection system on top of it. \r\nSecurity soft may be focused on preventing attacks from reaching their target, on limiting the damage attacks can cause if they reach their target and on tracking the damage that has been caused so that it can be repaired. As the nature of malicious code evolves, security software also evolves.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Firewall. </span>Firewall security software prevents unauthorized users from accessing a computer or network without restricting those who are authorized. Firewalls can be implemented with hardware or software. Some computer operating systems include software firewalls in the operating system itself. For example, Microsoft Windows has a built-in firewall. Routers and servers can include firewalls. There are also dedicated hardware firewalls that have no other function other than protecting a network from unauthorized access.\r\n<span style=\"font-weight: bold; \">Antivirus.</span> Antivirus solutions work to prevent malicious code from attacking a computer by recognizing the attack before it begins. But it is also designed to stop an attack in progress that could not be prevented, and to repair damage done by the attack once the attack abates. Antivirus software is useful because it addresses security issues in cases where attacks have made it past a firewall. New computer viruses appear daily, so antivirus and security software must be continuously updated to remain effective.\r\n<span style=\"font-weight: bold; \">Antispyware.</span> While antivirus software is designed to prevent malicious software from attacking, the goal of antispyware software is to prevent unauthorized software from stealing information that is on a computer or being processed through the computer. Since spyware does not need to attempt to damage data files or the operating system, it does not trigger antivirus software into action. However, antispyware software can recognize the particular actions spyware is taking by monitoring the communications between a computer and external message recipients. When communications occur that the user has not authorized, antispyware can notify the user and block further communications.\r\n<span style=\"font-weight: bold; \">Home Computers.</span> Home computers and some small businesses usually implement security software at the desktop level - meaning on the PC itself. This category of computer security and protection, sometimes referred to as end-point security, remains resident, or continuously operating, on the desktop. Because the software is running, it uses system resources, and can slow the computer's performance. However, because it operates in real time, it can react rapidly to attacks and seek to shut them down when they occur.\r\n<span style=\"font-weight: bold; \">Network Security.</span> When several computers are all on the same network, it's more cost-effective to implement security at the network level. Antivirus software can be installed on a server and then loaded automatically to each desktop. However firewalls are usually installed on a server or purchased as an independent device that is inserted into the network where the Internet connection comes in. All of the computers inside the network communicate unimpeded, but any data going in or out of the network over the Internet is filtered trough the firewall.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is IT security software?</span></h1>\r\nIT security software provides protection to businesses’ computer or network. It serves as a defense against unauthorized access and intrusion in such a system. It comes in various types, with many businesses and individuals already using some of them in one form or another.\r\nWith the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations. Since more and more businesses are now relying their crucial operations on software products, the importance of security system software assurance must be taken seriously – now more than ever. Having reliable protection such as a security software programs is crucial to safeguard your computing environments and data. \r\n<p class=\"align-left\">It is not just the government or big corporations that become victims of cyber threats. In fact, small and medium-sized businesses have increasingly become targets of cybercrime over the past years. </p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">What are the features of IT security software?</span></h1>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Automatic updates. </span>This ensures you don’t miss any update and your system is the most up-to-date version to respond to the constantly emerging new cyber threats.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Real-time scanning.</span> Dynamic scanning features make it easier to detect and infiltrate malicious entities promptly. Without this feature, you’ll risk not being able to prevent damage to your system before it happens.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Auto-clean.</span> A feature that rids itself of viruses even without the user manually removing it from its quarantine zone upon detection. Unless you want the option to review the malware, there is no reason to keep the malicious software on your computer which makes this feature essential.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Multiple app protection.</span> This feature ensures all your apps and services are protected, whether they’re in email, instant messenger, and internet browsers, among others.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application level security.</span> This enables you to control access to the application on a per-user role or per-user basis to guarantee only the right individuals can enter the appropriate applications.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Role-based menu.</span> This displays menu options showing different users according to their roles for easier assigning of access and control.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Row-level (multi-tenant) security.</span> This gives you control over data access at a row-level for a single application. This means you can allow multiple users to access the same application but you can control the data they are authorized to view.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Single sign-on.</span> A session or user authentication process that allows users to access multiple related applications as long as they are authorized in a single session by only logging in their name and password in a single place.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">User privilege parameters.</span> These are customizable features and security as per individual user or role that can be accessed in their profile throughout every application.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application activity auditing.</span> Vital for IT departments to quickly view when a user logged in and off and which application they accessed. Developers can log end-user activity using their sign-on/signoff activities.</li></ul>\r\n<p class=\"align-left\"><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Security_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"abatis-hdf":{"id":3423,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Abatis_logo.jpg","logo":true,"scheme":false,"title":"Abatis HDF","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"abatis-hdf","companyTitle":"Abatis","companyTypes":["supplier","vendor"],"companyId":5132,"companyAlias":"abatis","description":"Abatis HDF is a host-based software-only solution that is implemented as a kernel driver on Windows platforms. It intercepts and mediates file write access to the computer’s permanent storage e.g. local hard disk, network shares and removable storage devices such as USB stick and external disk. It is designed to help enforce system and file integrity without complex management overheads. It achieves this security objective by exercising robust access control over the writing of executable files and user-defined files (protected files) to a computer. It protects against unauthorized modification and denies unauthorized write operations. While HDFblocks unwanted executables by default, the HDF system administration can define files for integrity protection according to the computer’s roles.\r\nIdeally, Abatis HDF should be deployed on a newly installed ‘clean’ operating system. From this secure initial state (baseline), Abatis HDF will prevent malware infection than on. For most corporate environments, Abatis HDFis rolled out in stages and there may be extant undetected infections on systems –often referred to as Advanced Persistent Threats (APTs). Abatis HDF’s unique operation and extensive audit log allow the malware to be identified. Abatis HDF can also reveal rootkit infections and facilitates the subsequent removal of such programs.\r\n<span style=\"font-weight: bold;\">Features:</span>\r\n<ul><li>Defeats zero-day malware, rootkits, Trojans, APTs and viruses/worms</li><li>Protects legacy and new operating systems from Windows NT4 to Windows 7</li><li>Has a tiny software footprint(less than 100KB)that requires no ongoing updates</li><li>Is extremely fast in operation</li><li>Prevents exploitation of Alternate Data Streams (ADS)</li><li>Protects all permanent storage on the device, thereby ensuring no threats can penetrate</li><li>Is non-signature-based protection for Windows and Linux</li><li>Provides anti-malware and anti-hacker protection</li></ul>","shortDescription":"Abatis HDF is a host-based software-only solution that blocks unwanted executables. It is implemented as a kernel driver on Windows platforms.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Abatis HDF","keywords":"","description":"Abatis HDF is a host-based software-only solution that is implemented as a kernel driver on Windows platforms. It intercepts and mediates file write access to the computer’s permanent storage e.g. local hard disk, network shares and removable storage devices s","og:title":"Abatis HDF","og:description":"Abatis HDF is a host-based software-only solution that is implemented as a kernel driver on Windows platforms. It intercepts and mediates file write access to the computer’s permanent storage e.g. local hard disk, network shares and removable storage devices s","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Abatis_logo.jpg"},"eventUrl":"","translationId":3423,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":" Computer security software or cybersecurity software is any computer program designed to enhance information security. Security software is a broad term that encompasses a suite of different types of software that deliver data and computer and network security in various forms. \r\nSecurity software can protect a computer from viruses, malware, unauthorized users and other security exploits originating from the Internet. Different types of security software include anti-virus software, firewall software, network security software, Internet security software, malware/spamware removal and protection software, cryptographic software, and more.\r\nIn end-user computing environments, anti-spam and anti-virus security software is the most common type of software used, whereas enterprise users add a firewall and intrusion detection system on top of it. \r\nSecurity soft may be focused on preventing attacks from reaching their target, on limiting the damage attacks can cause if they reach their target and on tracking the damage that has been caused so that it can be repaired. As the nature of malicious code evolves, security software also evolves.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Firewall. </span>Firewall security software prevents unauthorized users from accessing a computer or network without restricting those who are authorized. Firewalls can be implemented with hardware or software. Some computer operating systems include software firewalls in the operating system itself. For example, Microsoft Windows has a built-in firewall. Routers and servers can include firewalls. There are also dedicated hardware firewalls that have no other function other than protecting a network from unauthorized access.\r\n<span style=\"font-weight: bold; \">Antivirus.</span> Antivirus solutions work to prevent malicious code from attacking a computer by recognizing the attack before it begins. But it is also designed to stop an attack in progress that could not be prevented, and to repair damage done by the attack once the attack abates. Antivirus software is useful because it addresses security issues in cases where attacks have made it past a firewall. New computer viruses appear daily, so antivirus and security software must be continuously updated to remain effective.\r\n<span style=\"font-weight: bold; \">Antispyware.</span> While antivirus software is designed to prevent malicious software from attacking, the goal of antispyware software is to prevent unauthorized software from stealing information that is on a computer or being processed through the computer. Since spyware does not need to attempt to damage data files or the operating system, it does not trigger antivirus software into action. However, antispyware software can recognize the particular actions spyware is taking by monitoring the communications between a computer and external message recipients. When communications occur that the user has not authorized, antispyware can notify the user and block further communications.\r\n<span style=\"font-weight: bold; \">Home Computers.</span> Home computers and some small businesses usually implement security software at the desktop level - meaning on the PC itself. This category of computer security and protection, sometimes referred to as end-point security, remains resident, or continuously operating, on the desktop. Because the software is running, it uses system resources, and can slow the computer's performance. However, because it operates in real time, it can react rapidly to attacks and seek to shut them down when they occur.\r\n<span style=\"font-weight: bold; \">Network Security.</span> When several computers are all on the same network, it's more cost-effective to implement security at the network level. Antivirus software can be installed on a server and then loaded automatically to each desktop. However firewalls are usually installed on a server or purchased as an independent device that is inserted into the network where the Internet connection comes in. All of the computers inside the network communicate unimpeded, but any data going in or out of the network over the Internet is filtered trough the firewall.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is IT security software?</span></h1>\r\nIT security software provides protection to businesses’ computer or network. It serves as a defense against unauthorized access and intrusion in such a system. It comes in various types, with many businesses and individuals already using some of them in one form or another.\r\nWith the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations. Since more and more businesses are now relying their crucial operations on software products, the importance of security system software assurance must be taken seriously – now more than ever. Having reliable protection such as a security software programs is crucial to safeguard your computing environments and data. \r\n<p class=\"align-left\">It is not just the government or big corporations that become victims of cyber threats. In fact, small and medium-sized businesses have increasingly become targets of cybercrime over the past years. </p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">What are the features of IT security software?</span></h1>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Automatic updates. </span>This ensures you don’t miss any update and your system is the most up-to-date version to respond to the constantly emerging new cyber threats.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Real-time scanning.</span> Dynamic scanning features make it easier to detect and infiltrate malicious entities promptly. Without this feature, you’ll risk not being able to prevent damage to your system before it happens.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Auto-clean.</span> A feature that rids itself of viruses even without the user manually removing it from its quarantine zone upon detection. Unless you want the option to review the malware, there is no reason to keep the malicious software on your computer which makes this feature essential.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Multiple app protection.</span> This feature ensures all your apps and services are protected, whether they’re in email, instant messenger, and internet browsers, among others.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application level security.</span> This enables you to control access to the application on a per-user role or per-user basis to guarantee only the right individuals can enter the appropriate applications.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Role-based menu.</span> This displays menu options showing different users according to their roles for easier assigning of access and control.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Row-level (multi-tenant) security.</span> This gives you control over data access at a row-level for a single application. This means you can allow multiple users to access the same application but you can control the data they are authorized to view.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Single sign-on.</span> A session or user authentication process that allows users to access multiple related applications as long as they are authorized in a single session by only logging in their name and password in a single place.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">User privilege parameters.</span> These are customizable features and security as per individual user or role that can be accessed in their profile throughout every application.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application activity auditing.</span> Vital for IT departments to quickly view when a user logged in and off and which application they accessed. Developers can log end-user activity using their sign-on/signoff activities.</li></ul>\r\n<p class=\"align-left\"><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Security_Software.png"},{"id":834,"title":"IoT - Internet of Things Security","alias":"iot-internet-of-things-security","description":" IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).\r\nIoT involves adding internet connectivity to a system of interrelated computing devices, mechanical and digital machines, objects, animals and/or people. Each "thing" is provided a unique identifier and the ability to automatically transfer data over a network. Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.\r\nIoT security has become the subject of scrutiny after a number of high-profile incidents where a common IoT device was used to infiltrate and attack the larger network. Implementing security measures is critical to ensuring the safety of networks with IoT devices connected to them.\r\nIoT security hacks can happen in any industry, from smart home to a manufacturing plant to a connected car. The severity of impact depends greatly on the individual system, the data collected and/or the information it contains.\r\nAn attack disabling the brakes of a connected car, for example, or on a connected health device, such as an insulin pump hacked to administer too much medication to a patient, can be life-threatening. Likewise, an attack on a refrigeration system housing medicine that is monitored by an IoT system can ruin the viability of a medicine if temperatures fluctuate. Similarly, an attack on critical infrastructure -- an oil well, energy grid or water supply -- can be disastrous.\r\nSo, a robust IoT security portfolio must allow protecting devices from all types of vulnerabilities while deploying the security level that best matches application needs. Cryptography technologies are used to combat communication attacks. Security services are offered for protecting against lifecycle attacks. Isolation measures can be implemented to fend off software attacks. And, finally, IoT security should include tamper mitigation and side-channel attack mitigation technologies for fighting physical attacks of the chip.","materialsDescription":" <span style=\"font-weight: bold;\">What are the key requirements of IoT Security?</span>\r\nThe key requirements for any IoT security solution are:\r\n<ul><li>Device and data security, including authentication of devices and confidentiality and integrity of data</li><li>Implementing and running security operations at IoT scale</li><li>Meeting compliance requirements and requests</li><li>Meeting performance requirements as per the use case</li></ul>\r\n<span style=\"font-weight: bold;\">What do connected devices require to participate in the IoT Securely?</span>\r\nTo securely participate in the IoT, each connected device needs a unique identification – even before it has an IP address. This digital credential establishes the root of trust for the device’s entire lifecycle, from initial design to deployment to retirement.\r\n<span style=\"font-weight: bold;\">Why is device authentication necessary for the IoT?</span>\r\nStrong IoT device authentication is required to ensure connected devices on the IoT can be trusted to be what they purport to be. Consequently, each IoT device needs a unique identity that can be authenticated when the device attempts to connect to a gateway or central server. With this unique ID in place, IT system administrators can track each device throughout its lifecycle, communicate securely with it, and prevent it from executing harmful processes. If a device exhibits unexpected behavior, administrators can simply revoke its privileges.\r\n<span style=\"font-weight: bold;\">Why is secure manufacturing necessary for IoT devices?</span>\r\nIoT devices produced through unsecured manufacturing processes provide criminals opportunities to change production runs to introduce unauthorized code or produce additional units that are subsequently sold on the black market.\r\nOne way to secure manufacturing processes is to use hardware security modules (HSMs) and supporting security software to inject cryptographic keys and digital certificates and to control the number of units built and the code incorporated into each.\r\n<span style=\"font-weight: bold;\">Why is code signing necessary for IoT devices?</span>\r\nTo protect businesses, brands, partners, and users from software that has been infected by malware, software developers have adopted code signing. In the IoT, code signing in the software release process ensures the integrity of IoT device software and firmware updates and defends against the risks associated with code tampering or code that deviates from organizational policies.\r\nIn public key cryptography, code signing is a specific use of certificate-based digital signatures that enables an organization to verify the identity of the software publisher and certify the software has not been changed since it was published.\r\n<span style=\"font-weight: bold;\">What is IoT PKI?</span>\r\nToday there are more things (devices) online than there are people on the planet! Devices are the number one users of the Internet and need digital identities for secure operation. As enterprises seek to transform their business models to stay competitive, rapid adoption of IoT technologies is creating increasing demand for Public Key Infrastructures (PKIs) to provide digital certificates for the growing number of devices and the software and firmware they run.\r\nSafe IoT deployments require not only trusting the devices to be authentic and to be who they say they are, but also trusting that the data they collect is real and not altered. If one cannot trust the IoT devices and the data, there is no point in collecting, running analytics, and executing decisions based on the information collected.\r\nSecure adoption of IoT requires:\r\n<ul><li>Enabling mutual authentication between connected devices and applications</li><li>Maintaining the integrity and confidentiality of the data collected by devices</li><li>Ensuring the legitimacy and integrity of the software downloaded to devices</li><li>Preserving the privacy of sensitive data in light of stricter security regulations</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/iot.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"abbyy-finereader":{"id":182,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ABBYY-FineReader.png","logo":true,"scheme":false,"title":"ABBYY FineReader","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"abbyy-finereader","companyTitle":"ABBYY","companyTypes":["vendor"],"companyId":2060,"companyAlias":"abbyy","description":"ABBYY FineReader is a versatile PDF tool which empowers information workers to efficiently manage documents in the digital workplace. It harnesses ABBYY’s AI-based OCR technology to make it easier to digitize, retrieve, edit, protect, share, and collaborate on all kinds of documents in the modern working world.\r\nFineReader reduces inefficiencies resulting from a variety of causes: inaccessible, nonsearchable documents and information; workflows that involve a mix of paper and digital documents; and tasks that require the use of multiple software applications. This allows information workers to focus on their areas of expertise, rather than the intricacies of their administrative tasks.<br /><br /><span style=\"font-weight: bold;\">BENEFITS</span><br />\r\n<span style=\"font-weight: bold;\">Optimize document processes</span><br />\r\nDigitize, retrieve, edit, protect, share, and collaborate on all kinds of documents in one workflow.<br /><span style=\"font-weight: bold;\"></span>\r\n<span style=\"font-weight: bold;\">Make the most of PDFs</span><br />\r\nEdit digital and scanned PDFs with a newfound ease: correct whole sentences and paragraphs or even adjust the layout.<br /><br /><span style=\"font-weight: bold;\">Digitize the document workflow</span><br />\r\nIncorporate paper documents into a digital workplace with AI-based OCR technology to simplify daily work.<br /><br /><span style=\"font-weight: bold;\">Streamline IT costs</span><br />\r\nBenefit from one-time payment and progressive volume discounts to maximize the impact across your organization.<br /><br /><span style=\"font-weight: bold;\">Standardize software assets</span><br />\r\nDeploy one PDF solution throughout your organization to ensure multiple stakeholders can collaborate smoothly.<br /><br /><span style=\"font-weight: bold;\">Simplify license management</span><br />\r\nLower IT workload with automated deployment and straightforward license management.","shortDescription":"ABBYY FineReader is a Highly intelligent text recognition (OCR) software for everyday, ad-hoc digitization and document conversion.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ABBYY FineReader","keywords":"document, software, ABBYY, FineReader, Corporate, business, processing, tool","description":"ABBYY FineReader is a versatile PDF tool which empowers information workers to efficiently manage documents in the digital workplace. It harnesses ABBYY’s AI-based OCR technology to make it easier to digitize, retrieve, edit, protect, share, and collaborate on","og:title":"ABBYY FineReader","og:description":"ABBYY FineReader is a versatile PDF tool which empowers information workers to efficiently manage documents in the digital workplace. It harnesses ABBYY’s AI-based OCR technology to make it easier to digitize, retrieve, edit, protect, share, and collaborate on","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ABBYY-FineReader.png"},"eventUrl":"","translationId":182,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":184,"title":"OCR - Optical character recognition","alias":"ocr-optical-character-recognition","description":"<span style=\"font-weight: bold; \">Optical character recognition</span> (optical character reader, OCR) is the mechanical or electronic conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo (for example the text on signs and billboards in a landscape photo) or from subtitle text superimposed on an image (for example from a television broadcast). The basic process of OCR involves examining the text of a document and translating the characters into code that can be used for data processing. OCR is sometimes also referred to as <span style=\"font-weight: bold; \">text recognition.</span>\r\nIt is widely used as a form of data entry from printed paper data records, whether passport documents, invoices, bank statements, computerised receipts, business cards, mail, printouts of static-data, or any suitable documentation. OCR program works best on text that has already been typed, either in cases where an original printout has been lost, or in scanning sheets typed on a typewriter. Good OCR software may also be able to translate handwritten text, however, although the error rate on this sort of conversion tends to be much higher.\r\nThe actual term OCR software is a bit misleading, as most modern versions do not in fact use optical character recognition, but actually use digital character recognition. This is because some years ago the fields effectively merged, and both fields adopted the more attractive term optical character recognition. Character recognition software has advanced a great deal in recent years, with modern programs substantially better than their predecessors at identifying text.\r\n<span style=\"color: rgb(97, 97, 97); \">OCR systems are made up of a combination of hardware and software that is used to convert physical documents into machine-readable text. Hardware, such as an optical scanner or specialized circuit board is used to copy or read text while optical recognition software typically handles the advanced processing. OCR technology software can also take advantage of artificial intelligence (AI) to implement more advanced methods of intelligent character recognition (ICR), like identifying languages or styles of handwriting.</span> \r\nThe process of OCR is most commonly used to turn hard copy legal or historic documents into PDFs. Once placed in this soft copy, users can edit, format and search the document as if it was created with a word processor.\r\nThe <span style=\"font-weight: bold; \">first step of OCR</span> is using a scanner to process the physical form of a document. Once all pages are copied, optical character recognition software converts the document into a two-color, or black and white, version. The scanned-in image or bitmap is analyzed for light and dark areas, where the dark areas are identified as characters that need to be recognized and light areas are identified as background.\r\nThe dark areas are then processed further to find alphabetic letters or numeric digits. OCR products can vary in their techniques, but typically involve targeting one character, word or block of text at a time. Characters are then identified using one of two algorithms:\r\n<span style=\"font-weight: bold; \">Pattern recognition</span> - OCR<span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">recognition</span>programs are fed examples of text in various fonts and formats which are then used to compare, and recognize, characters in the scanned document.\r\n<span style=\"font-weight: bold; \">Feature detection</span> - OCR programs apply rules regarding the features of a specific letter or number to recognize characters in the scanned document. Features could include the number of angled lines, crossed lines or curves in a character for comparison. For example, the capital letter “A” may be stored as two diagonal lines that meet with a horizontal line across the middle.\r\nWhen a character is identified, it is <span style=\"font-weight: bold; \">converted into an ASCII code</span> that can be used by computer systems to handle further manipulations. Users should correct basic errors, proofread and make sure complex layouts were handled properly before saving the document for future use.","materialsDescription":"<h1 class=\"align-center\"> OCR (Optical Character Recognition) use cases</h1>\r\n<p class=\"align-center\">Uses of OCR have a variety of applications, including:</p>\r\n<ul><li>Scanning printed documents into versions that can be edited with word processors, like Microsoft Word or Google Docs.</li><li>Indexing print material for search engines.</li><li>Automating data entry, extraction and processing.</li><li>Deciphering documents into text that can be read aloud to visually-impaired or blind users.</li><li>Archiving historic information, such as newspapers, magazines or phonebooks, into searchable formats.</li><li>Electronically depositing checks without the need for a bank teller.</li><li>Placing important, signed legal documents into an electronic database.</li><li>Recognizing text, such as license plates, with a camera or software.</li><li>Sorting letters for mail delivery.</li><li>Translating words within an image into a specified language.</li></ul>\r\n<h1 class=\"align-center\">Choosing the Right Character Recognition Solution: OCR and ICR</h1>\r\nThough recent technology advancements improved data recognition, many offices continue to rely on manual entry and sorting processes. OCR (Optical Character Recognition) and ICR (Intelligent Character Recognition or Intelligent Document Recognition software) are essential components of Advanced Data Capture that digitally capture images and text. Both technologies provide companies with enhanced images and critical business information. So, what are the differences between OCR and ICR, and how do these differences pertain to your documents? \r\n<span style=\"font-weight: bold; \">Optical Character Recognition</span> refers to the process where documents are captured and digitally converted into searchable text that you can edit. OCR is primarily used to read machine-generated documents with typed or printed text. The technology reads brightness and text font of these documents, recognizing characters with utmost accuracy. OCR is a perfect solution for companies that need information from paper documents and PDF files, and is great for translating longer documents. For example, if you need to pull quotes from a document for another project, OCR will allow you to easily search, retrieve and extract text.\r\n<span style=\"font-weight: bold; \">Intelligent Character Recognition</span>, takes OCR a step further with more intensive character recognition. While OCR mainly encompasses machine-printed characters, the best of best intelligent character recognition software can recognize handwritten text, and translate them into searchable files. Like OCR, ICR scans, reviews and translates the text. ICR is a compatible solution for offices with many checks, timesheets and other handwritten documents.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/OCR_-_Optical_character_recognition.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"abbyy-flexicapture":{"id":478,"logo":false,"scheme":false,"title":"ABBYY FlexiCapture","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":2,"alias":"abbyy-flexicapture","companyTitle":"ABBYY","companyTypes":["vendor"],"companyId":2060,"companyAlias":"abbyy","description":"ABBYY FlexiCapture is a powerful data capture and document processing solution from a world-leading technology vendor. It is designed to transform streams of documents of any structure and complexity into business-ready data. And its award-winning recognition technologies, automatic document classification, plus a highly scalable and customizable architecture, mean that it can help companies and organizations of any size to streamline their business processes, increase efficiency and reduce costs.\r\nTransform streams of documents of any structure and complexity into business-ready data\r\nCapture With Mobile\r\nABBYY FlexiCapture for iOS turns smartphones into portable scanners that capture information from paper documents and deliver it to back-end systems.\r\nSoftware for Document-driven Business Processes\r\nOne system for processing all kinds of paper documents in any industry\r\nIntelligent Auto-learning Technology Makes Set Up Easy\r\nInteractive training technology simplifies system implementation and set up.\r\nMobile Document Capture\r\nFlexiCapture’s mobile capture client provides an alternative entry point for documents – usable at anytime, from anywhere.\r\nWhat is Forms Processing?\r\nForms processing is a process whereby information entered into data fields is converted into electronic form. Automated form processing software interprets machine-print (OCR), isolated handprint (ICR), mark sense (OMR) and barcodes from paper forms. \r\nProduct History\r\nThe development of ABBYY data capture products started in 1995. At that time the team was working on two projects: the development of hand-written form recognition and FlexiCapture technology - which enables data extraction from documents with flexible layouts.","shortDescription":"ABBYY FlexiCapture - Capture data from any documents, from structured forms and surveys to unstructured text-heavy papers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ABBYY FlexiCapture","keywords":"data, documents, from, into, ABBYY, capture, FlexiCapture, processing","description":"ABBYY FlexiCapture is a powerful data capture and document processing solution from a world-leading technology vendor. It is designed to transform streams of documents of any structure and complexity into business-ready data. And its award-winning recognition ","og:title":"ABBYY FlexiCapture","og:description":"ABBYY FlexiCapture is a powerful data capture and document processing solution from a world-leading technology vendor. It is designed to transform streams of documents of any structure and complexity into business-ready data. And its award-winning recognition "},"eventUrl":"","translationId":478,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":184,"title":"OCR - Optical character recognition","alias":"ocr-optical-character-recognition","description":"<span style=\"font-weight: bold; \">Optical character recognition</span> (optical character reader, OCR) is the mechanical or electronic conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo (for example the text on signs and billboards in a landscape photo) or from subtitle text superimposed on an image (for example from a television broadcast). The basic process of OCR involves examining the text of a document and translating the characters into code that can be used for data processing. OCR is sometimes also referred to as <span style=\"font-weight: bold; \">text recognition.</span>\r\nIt is widely used as a form of data entry from printed paper data records, whether passport documents, invoices, bank statements, computerised receipts, business cards, mail, printouts of static-data, or any suitable documentation. OCR program works best on text that has already been typed, either in cases where an original printout has been lost, or in scanning sheets typed on a typewriter. Good OCR software may also be able to translate handwritten text, however, although the error rate on this sort of conversion tends to be much higher.\r\nThe actual term OCR software is a bit misleading, as most modern versions do not in fact use optical character recognition, but actually use digital character recognition. This is because some years ago the fields effectively merged, and both fields adopted the more attractive term optical character recognition. Character recognition software has advanced a great deal in recent years, with modern programs substantially better than their predecessors at identifying text.\r\n<span style=\"color: rgb(97, 97, 97); \">OCR systems are made up of a combination of hardware and software that is used to convert physical documents into machine-readable text. Hardware, such as an optical scanner or specialized circuit board is used to copy or read text while optical recognition software typically handles the advanced processing. OCR technology software can also take advantage of artificial intelligence (AI) to implement more advanced methods of intelligent character recognition (ICR), like identifying languages or styles of handwriting.</span> \r\nThe process of OCR is most commonly used to turn hard copy legal or historic documents into PDFs. Once placed in this soft copy, users can edit, format and search the document as if it was created with a word processor.\r\nThe <span style=\"font-weight: bold; \">first step of OCR</span> is using a scanner to process the physical form of a document. Once all pages are copied, optical character recognition software converts the document into a two-color, or black and white, version. The scanned-in image or bitmap is analyzed for light and dark areas, where the dark areas are identified as characters that need to be recognized and light areas are identified as background.\r\nThe dark areas are then processed further to find alphabetic letters or numeric digits. OCR products can vary in their techniques, but typically involve targeting one character, word or block of text at a time. Characters are then identified using one of two algorithms:\r\n<span style=\"font-weight: bold; \">Pattern recognition</span> - OCR<span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">recognition</span>programs are fed examples of text in various fonts and formats which are then used to compare, and recognize, characters in the scanned document.\r\n<span style=\"font-weight: bold; \">Feature detection</span> - OCR programs apply rules regarding the features of a specific letter or number to recognize characters in the scanned document. Features could include the number of angled lines, crossed lines or curves in a character for comparison. For example, the capital letter “A” may be stored as two diagonal lines that meet with a horizontal line across the middle.\r\nWhen a character is identified, it is <span style=\"font-weight: bold; \">converted into an ASCII code</span> that can be used by computer systems to handle further manipulations. Users should correct basic errors, proofread and make sure complex layouts were handled properly before saving the document for future use.","materialsDescription":"<h1 class=\"align-center\"> OCR (Optical Character Recognition) use cases</h1>\r\n<p class=\"align-center\">Uses of OCR have a variety of applications, including:</p>\r\n<ul><li>Scanning printed documents into versions that can be edited with word processors, like Microsoft Word or Google Docs.</li><li>Indexing print material for search engines.</li><li>Automating data entry, extraction and processing.</li><li>Deciphering documents into text that can be read aloud to visually-impaired or blind users.</li><li>Archiving historic information, such as newspapers, magazines or phonebooks, into searchable formats.</li><li>Electronically depositing checks without the need for a bank teller.</li><li>Placing important, signed legal documents into an electronic database.</li><li>Recognizing text, such as license plates, with a camera or software.</li><li>Sorting letters for mail delivery.</li><li>Translating words within an image into a specified language.</li></ul>\r\n<h1 class=\"align-center\">Choosing the Right Character Recognition Solution: OCR and ICR</h1>\r\nThough recent technology advancements improved data recognition, many offices continue to rely on manual entry and sorting processes. OCR (Optical Character Recognition) and ICR (Intelligent Character Recognition or Intelligent Document Recognition software) are essential components of Advanced Data Capture that digitally capture images and text. Both technologies provide companies with enhanced images and critical business information. So, what are the differences between OCR and ICR, and how do these differences pertain to your documents? \r\n<span style=\"font-weight: bold; \">Optical Character Recognition</span> refers to the process where documents are captured and digitally converted into searchable text that you can edit. OCR is primarily used to read machine-generated documents with typed or printed text. The technology reads brightness and text font of these documents, recognizing characters with utmost accuracy. OCR is a perfect solution for companies that need information from paper documents and PDF files, and is great for translating longer documents. For example, if you need to pull quotes from a document for another project, OCR will allow you to easily search, retrieve and extract text.\r\n<span style=\"font-weight: bold; \">Intelligent Character Recognition</span>, takes OCR a step further with more intensive character recognition. While OCR mainly encompasses machine-printed characters, the best of best intelligent character recognition software can recognize handwritten text, and translate them into searchable files. Like OCR, ICR scans, reviews and translates the text. ICR is a compatible solution for offices with many checks, timesheets and other handwritten documents.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/OCR_-_Optical_character_recognition.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"abbyy-lingvo":{"id":601,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ABBYY_Lingvo.png","logo":true,"scheme":false,"title":"ABBYY Lingvo","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"abbyy-lingvo","companyTitle":"ABBYY","companyTypes":["vendor"],"companyId":2060,"companyAlias":"abbyy","description":"ABBYY Lingvo Dictionaries ABBYY Lingvo Dictionaries for desktop and mobile devices let you translate words, expand your vocabulary and master foreign languages. It contains trusted dictionaries for up to 29 languages, including German, Spanish, Italian, and English. Choose Platform ABBYY Lingvo for Windows ABBYY Lingvo for Mac ABBYY Lingvo Live for Web ABBYY Lingvo for Windows 8 Touch ABBYY Lingvo Mobile Dictionaries ABBYY Lingvo API","shortDescription":"ABBYY Lingvo — Instant access to high-quality translation dictionaries.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ABBYY Lingvo","keywords":"Lingvo, ABBYY, Dictionaries, languages, Windows, Italian, English, German","description":"ABBYY Lingvo Dictionaries ABBYY Lingvo Dictionaries for desktop and mobile devices let you translate words, expand your vocabulary and master foreign languages. It contains trusted dictionaries for up to 29 languages, including German, Spanish, Italian, and En","og:title":"ABBYY Lingvo","og:description":"ABBYY Lingvo Dictionaries ABBYY Lingvo Dictionaries for desktop and mobile devices let you translate words, expand your vocabulary and master foreign languages. It contains trusted dictionaries for up to 29 languages, including German, Spanish, Italian, and En","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ABBYY_Lingvo.png"},"eventUrl":"","translationId":601,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":431,"title":"Electronic dictionaries","alias":"electronic-dictionaries","description":" An electronic dictionary is a dictionary whose data exists in digital form and can be accessed through a number of different media. Electronic dictionaries can be found in several forms, including software installed on tablet or desktop computers, mobile apps, web applications, and as a built-in function of E-readers. They may be free or require payment.\r\nMost of the early electronic dictionaries were, in effect, print dictionaries made available in digital form: the content was identical, but the electronic editions provided users with more powerful search functions. But soon the opportunities offered by digital media began to be exploited. Two obvious advantages are that limitations of space (and the need to optimize its use) become less pressing, so additional content can be provided; and the possibility arises of including multimedia content, such as audio pronunciations and video clips.\r\nElectronic dictionary databases, especially those included with software dictionaries are often extensive and can contain up to 500,000 headwords and definitions, verb conjugation tables, and a grammar reference section. Bilingual electronic dictionaries and monolingual dictionaries of inflected languages often include an interactive verb conjugator, and are capable of word stemming and lemmatization.\r\nPublishers and developers of electronic dictionaries may offer native content from their own lexicographers, licensed data from print publications, or both, as in the case of Babylon offering premium content from Merriam Webster, and Ultralingua offering additional premium content from Collins, Masson, and Simon & Schuster, and Paragon Software offering original content from Duden, Britannica, Harrap, Merriam-Webster and Oxford. ","materialsDescription":" <span style=\"font-weight: bold;\">What are the capabilities of electronic dictionaries?</span>\r\nCompared with printed analogues, computer dictionaries provide the user with many additional features:\r\n<ul><li>multiple increase in search speed;</li><li>a set of entries in the dictionary: vocabulary, alphabetical index, entering words and phrases from the keyboard, from a text editor;</li><li>search for words with insufficient spelling;</li><li>full-text search (not only in the vocabulary, but also in the texts of all dictionary entries);</li><li>the use of multimedia tools for vocabulary semantization;</li><li>the presence of a hyperlink system;</li><li>the presence of cross-references to all words in the dictionary;</li><li>the ability to store a large amount of information;</li><li>in bilingual dictionaries - the possibility of direct and reverse translation;</li><li>the inclusion in the structure of a computer dictionary of several dictionaries of different types and genres;</li><li>simultaneous search in several dictionaries;</li><li>restriction of the search area by keywords, thematic groups, parts of speech, etc.;</li><li> replenishing the dictionary by the user, or creating a custom dictionary;</li><li>preservation of the search sequence during the session (the so-called chronology/search history);</li><li>saving "bookmarks" in the dictionary;</li><li> compatibility with text editors, the ability to copy dictionary entries and access to the dictionary from the editor;</li><li>compatibility with machine translation programs;</li><li>compatibility with web browsers and other types of programs (application, training, gaming);</li><li>providing additional background information on phonetics, grammar, style and other aspects of the language;</li><li>the possibility of using dictionaries in local and global networks, etc.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Electronic_dictionaries.png"},{"id":425,"title":"Linguistics Software","alias":"linguistics-software","description":" <span style=\"font-weight: bold; \">Linguistic software</span> - computer programs and data that provide analysis, processing, storage and retrieval of audio data, pictures (OCR) and texts in natural language.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Linguistic analysis software</span> is a tool that enhances the comprehension of information present in documents, or across a set of documents. Some linguistic analysis software tools use an automatic mathematical or statistical approach to analyze and extract relations that occur in a set of documents and the words they contain. The idea is that the distribution and frequency of relevant terms in documents that cover a specific topic is similar and that the meaning of a specific word can be inferred by the above assumption. \r\nThe term CAT stands for <span style=\"font-weight: bold;\">Computer-Assisted Translation Tool</span>. CAT tools have significantly changed the way how translators work and manage translation projects today. CAT tools split large multilingual documents into segments (phrases & paragraphs) which are stored in a database. This is called translation memory which means that previously translated material can be reused at any time. Nowadays, it is more common for enterprises and translators to use CAT tools to speed up their work and increase their productivity globally.A number of computer-assisted translation software and websites exists for various platforms and access types.\r\nAccording to a 2006 survey undertaken by Imperial College of 874 translation professionals from 54 countries, primary tool usage was reported as follows: Trados (35%), Wordfast (17%), Déjà Vu (16%), SDL Trados 2006 (15%), SDLX (4%), STAR Transit (3%), OmegaT (3%), others (7%).\r\n\r\n<br /><br />","materialsDescription":"<h1 class=\"align-center\">CAT Tool Functionality</h1>\r\n<ul><li>Spell checkers, autocorrect—automatically highlight and fix spelling and grammar mistakes.</li><li>In-context review—display multimedia documents with images, text box sizes and layout in real time in both source and target language.</li><li>Integrated machine translation—suggest translations for segments from a connected MT engine.</li><li>Adaptive machine translation—offer translations for segments from a connected MT engine as autosuggest pop-ups, learn from user input.</li><li>Concordance—retrieve instances of a word or an expression and their respective context in a text corpus, such as a translation memory database, to check their usage.</li><li>Electronic dictionaries—allow term search inside the tool, track usage statistics.</li><li>Text search tools—find phrases or terms in the text for reference.</li><li>Alignment—build translation memories texts from source text and its translation. When a translation company adopts a CAT-tool, they often use alignment to create their first TM databases.</li></ul>\r\nThere are online and offline CAT tools available for purchase. Web-based CAT tools work in the web browser; desktop CAT tools require installation and do not depend on internet connection stability.\r\nBasic CAT tools support MS Office formats, such as .docx, .odt, .csv, .xlsx, plus .html files and .xml. The primary translation industry formats are XLIFF, and tmx. Advanced tools also support various software formats, such as .json, .properties, Visual Studio, as well layout building software such as InDesign, Corel Draw and sometimes AutoCAD.\r\nCAT tools are useful when translating multimedia formats. They extract text for editing and rebuild files in the target language after the translation is finished. This ability reduces the time needed to create multilingual artwork. Instead of fishing for each individual bit of text on the page, the translator simply goes segment by segment in plain text.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Automated Quality Assurance (AutoQA)</span></p>\r\nAutoQA tools scan bilingual texts and detect errors in translation, such as wrong numbers and number format, incorrect terminology, missing tags, missing segments, erroneous formatting and many others. Complementary to spellcheckers, AutoQA helps editing.\r\nWhile popular translation memory tools feature built-in QA components, standalone software offers extended functionality and support for morphology of selected languages. Advanced functionality leads to better error detection and fewer false positives. Standalone tools may require import/export of translation files from the TMS, unless there is an integration in place.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Terminology Management</span></p>\r\nTerminology Management or glossary management, refers to technologies that centrally maintain lists of subject matter-specific, company, or other technical terms to improve consistency and speed of translation. Such systems usually include guidance on terms that should not be translated to target languages or additional reference material and images to assist translators in understanding the translation material.\r\nAdvanced terminology systems include integrations with authoring tools, workflows for terminology creation and validation processes, and automated term mining functions.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Linguistics_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"abbyy-mobile-imaging-sdk-ii":{"id":2675,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ABBYY.png","logo":true,"scheme":false,"title":"ABBYY Mobile Imaging SDK II","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":2,"alias":"abbyy-mobile-imaging-sdk-ii","companyTitle":"ABBYY","companyTypes":["vendor"],"companyId":2060,"companyAlias":"abbyy","description":"Create apps that transform mobile devices into high-quality front-end data capture solutions. Reduce manual interaction for users, save on development resources and optimize your back-end processes with ABBYY Mobile Imaging SDK II.\r\n<span style=\"font-weight: bold;\">Available for iOS and Android</span>\r\n<ul><li>Fast image capture - Save your end users time and resources. Create apps that reduce manual interaction and capture the best quality images for OCR.</li><li>Front-end mobile data capture solution - Increase your apps’ productivity. Power up your mobile apps with a front-end mobile data capture solution that can easily integrate into your back-end systems.</li><li>Pre-built comprehensive image capture solution - Optimize your development resources. Easily integrate a pre-built comprehensive image capture solution into your mobile app.</li></ul>\r\n<span style=\"font-weight: bold;\">Key features</span>\r\n<ul><li>Automatic photo capture. Automatically captures the best quality image suitable for OCR by hovering the smartphone’s camera over the document, minimizing manual image verification.</li><li>Document detection. This new feature automatically finds the boundaries of the document in a video stream or photo and crops the image and corrects its perspective.</li><li>New API. The new and optimized API, with high level methods for image capturing, saves you development time. In additional, it supports common programming languages used for mobile application development.</li><li>Image export. Improved export functionality provides you the flexibility to choose between different image export formats (PDF, JPEG, JPEG2000, PNG) and compression levels for further back-end processing.</li></ul>","shortDescription":"ABBYY Mobile Imaging SDK II is a high-quality front-end data capture solution. Reduce manual interaction for users, save on development resources and optimize your back-end processes","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ABBYY Mobile Imaging SDK II","keywords":"","description":"Create apps that transform mobile devices into high-quality front-end data capture solutions. Reduce manual interaction for users, save on development resources and optimize your back-end processes with ABBYY Mobile Imaging SDK II.\r\n<span style=\"font-weight: b","og:title":"ABBYY Mobile Imaging SDK II","og:description":"Create apps that transform mobile devices into high-quality front-end data capture solutions. Reduce manual interaction for users, save on development resources and optimize your back-end processes with ABBYY Mobile Imaging SDK II.\r\n<span style=\"font-weight: b","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ABBYY.png"},"eventUrl":"","translationId":2675,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":146,"title":"ECM - Enterprise Content Management","alias":"ecm-enterprise-content-management","description":"<span style=\"font-weight: bold; \">Enterprise content management (ECM)</span> extends the concept of content management by adding a time line for each content item and possibly enforcing processes for the creation, approval and distribution of them. Systems that implement ECM generally provide a secure repository for managed items, be they analog or digital, that indexes them. They also include one or more methods for importing content to bring new items under management and several presentation methods to make items available for use. The key feature of ECM that distinguishes it from "simple" content management is that an ECM is at least cognizant of the processes and procedures of the enterprise it is created for, and as such is particular to it. \r\nECM as an umbrella term covers enterprise document management system, Web content management, search, collaboration, records management, digital asset management (DAM), workflow management, capture and scanning. ECM is primarily aimed at managing the life-cycle of information from initial publication or creation all the way through archival and eventual disposal. ECM enterprise content management software is delivered in four ways:\r\n- on-premises software (installed on an organization's own network)\r\n- software as a service (SaaS) (Web access to information that is stored on a software manufacturer's system)\r\n- a hybrid composed of both on-premises and SaaS components\r\n- Infrastructure as a Service (IaaS) (which refers to online services that abstract the user from the details of infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.)\r\n<span style=\"font-weight: bold;\">ECM provides</span> a centralized platform where content can be held and disseminated in a manner that meets regulatory compliance requirements and risk management guidelines. An ECM achieves the latter two benefits by eliminating ad hoc processes that can expose an enterprise to regulatory compliance risks and other potential problems. Full-function enterprise content management solutions include features such as content taxonomies, auditing capabilities, check-in/check-out and other workflow controls and security mechanisms.\r\nAn <span style=\"font-weight: bold;\">effective ECM </span>can streamline access and business processes, eliminate bottlenecks by reducing storage, as well as paper and mailing needs, optimize security, maintain integrity and minimize overhead. All of these can lead to increased productivity. The first step is to document all the types of content that the organization deals with, the business processes its part of and who handles the content. \r\nECM software can be used to identify duplicate and near-duplicate content, allowing the organization to keep a few copies of a particular piece of content instead of hundreds. The best ECM software extends the reach of traditional ECM capabilities into previously isolated applications and information silos, such as ERP, CRM, SCM and HCM, to take the shape of a content services platform. Information can now flow across the enterprise to the people and processes—when, where and in whatever context it is needed.\r\nTo understand more specific ways it could help your company, consider these <span style=\"font-weight: bold; \">three types of ECM</span> software solutions.\r\n<span style=\"font-weight: bold; \">Web Content Management.</span> WCM puts control over the look and feel of a website in the hands of specific, key people. It’s used by organizations with relatively complex websites and strict brand guidelines, giving those key personnel the means to easily update, modify and publish content for the sites while adhering to the guidelines.\r\n<span style=\"font-weight: bold; \">Collaborative Content Management.</span> CCM enables multiple people to access and modify a single document, such as a legal document. It’s ideal for organizations that must manage projects involving multiple stakeholders. CCM makes it easy to work together while keeping track of, and updating, the most-current version of the document.\r\n<span style=\"font-weight: bold; \">Transactional Content Management.</span> This type of ECM document management is designed for organizations that repeatedly use varied types of content, including records, paper documents, and digital files. TCM solutions capture content from various channels, classify it, store it, create an automated workflow to ensure the right user receives the content at the right time, and even deletes documents when they’re no longer needed, all while working seamlessly with other apps and databases, ensuring all of that content is available throughout the company.<br /><br /><br />\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: bold; \">What is Enterprise Content Management (ECM)?</span></h1>\r\nEnterprise Content Management is the organization of structured and unstructured documents using technology and software that allows your organization to “work smarter, not harder.” As technology advanced and everything became digital, organizations needed a new way to store and access files, leading to the creation of ECM. \r\nECM document management system consists of four main points:\r\n<ul><li><span style=\"font-weight: bold; \">Capture:</span> Capturing information from hardcopy documents or online forms and transferring it into the system</li><li><span style=\"font-weight: bold; \">Manage:</span> Managing the captured data in a structured format that allows quick and easy retrieval</li><li><span style=\"font-weight: bold; \">Storing:</span> Securely storing files in a central repository that can be accessed from multiple locations</li><li><span style=\"font-weight: bold; \">Delivery:</span> Implementation of business process workflows to automatically move documents from one step to the next</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Five ways ECM software can benefit your organization</span></h1>\r\n<span style=\"font-weight: bold; \">Basic file sharing and library services.</span> At its core, enterprise document management software begins with basic file sharing and library services managed within a networked repository. Individuals and groups with predefined access rights and permissions can access the repository and then create, read, update and delete files stored within it.\r\nMany ECM applications support Content Management Interoperability Services, an industry standard that allows different vendors' products to interoperate; this is an essential capability within large enterprises that maintain content management tools from multiple vendors.\r\n<span style=\"font-weight: bold; \">Content governance, compliance and records management.</span> For many organizations, managing business documents or other content types is a critical use case for ECM. Companies subject to compliance or other industry regulations need document content management system software to capture, manage, archive and ultimately dispose of files after a predefined period.\r\nECM can ensure that only individuals with predefined permissions - determined by access controls - can update or view documents stored within a repository. An organization can thus manage document modification.\r\nIn addition, enterprise content management tools can log all actions, providing an organization with the capabilities to maintain an auditable record of all the changes to documents within the repository.\r\n<span style=\"font-weight: bold; \">Business process management.</span> Companies also use ECM to establish workflows that span departments and geographies to support extended enterprise and inter-enterprise business processes.\r\nMost ECM software provides tools to help both technical and non-technical business users define business processes. Most applications provide audit controls to track each step of the process and analytic capabilities to help identify inefficiencies and streamline business procedures.\r\n<span style=\"font-weight: bold; \">Content repositories linked to other enterprise applications.</span> Some companies use electronic content management software as a repository for documents created by other enterprise applications, including CRM, ERP, HR and financial systems. These enterprise systems can seamlessly access, view or modify content managed by the ECM.\r\n<span style=\"font-weight: bold; \">Enabling mobile and remote workforces.</span> Content management tools often include functionality to allow remote workers to access content from mobile devices. This is an increasingly important feature for many companies.\r\nMobile capabilities also enable new kinds of data capture and presentation functionalities. By combining content management capabilities with other data, for example, a political canvasser can use a tablet to enter new information about a political donor without having to start from scratch, as some of that information is already stored in a content management system. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/ECM_-_Enterprise_Content_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"abbyy-real-time-recognition-sdk":{"id":2677,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ABBYY.png","logo":true,"scheme":false,"title":"ABBYY Real-Time Recognition SDK","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":2,"alias":"abbyy-real-time-recognition-sdk","companyTitle":"ABBYY","companyTypes":["vendor"],"companyId":2060,"companyAlias":"abbyy","description":"<span style=\"font-weight: bold;\">Why ABBYY Real-Time Recognition SDK?</span>\r\n<ul><li>Fast text input. Extracting text directly from the smartphone’s preview screen is significantly faster and more convenient than taking a picture of the text followed by an OCR step or entering the text manually.</li><li>Improved business performance. Real-time text capture from documents such as invoices, waybills, sick notes or letters can be quickly implemented into existing corporate apps in banks, transport companies, insurance, and other organizations.</li><li>Suitable for high security requirements. As the text does not need to be photographed, saved in the memory storage, uploaded to cloud services or external servers, this modern way of information capture is suitable for organizations with the highest data security standards.</li><li>Outstanding recognition accuracy. We have combined ABBYY’s proven OCR technology with new intelligent algorithms that recognize text from live video streams. This SDK technology ensures superior text recognition accuracy within apps for both businesses and consumers.</li></ul>\r\nReal-Time Recognition SDK can be integrated into mobile apps supporting various use cases. The integration of the development toolkit into a mobile app can significantly speed up mobile data capture processes in organizations, allow automated quality control in production companies and offer convenient data entry to users of smartphones and tablets.\r\n<span style=\"font-weight: bold;\">Use cases</span>\r\n<ul><li>Customer registration and on-boarding. By simply pointing the mobile device’s camera at ID cards, passports and other identification documents, customer data is transferred into company systems without the need to type them in.</li><li>Mobile payment. Information necessary for a money transfer can be inserted directly into the fields of a mobile banking app by focusing the smartphone’s camera on payment slips, invoices or other payment documents.</li><li>Customer self-service. Enterprise companies can increase customer satisfaction and loyalty by providing modern apps that allow clients to communicate easily and exchange data with their vendors.</li></ul>\r\n<span style=\"font-weight: bold;\">Key features</span>\r\n<ul><li>Specific data capture. When described by regular expressions, specific data fields can be automatically detected and extracted in real time. Requested information (for example, total amounts on invoices, email addresses or phone numbers on business cards, promotional codes on vouchers, or other data fields) can be obtained immediately, even if they are part of larger text areas.</li><li>Text detection from video stream and photo library. When pointing the smartphone’s camera at text, the technology is continuously recognizing the text from the ‘live’ video stream. This enables instant recognition of text on documents or objects without the need to take a picture. Also the capability to recognize text from images saved within the photo library of the mobile device.</li><li>63 OCR languages. Text recognition in 63 languages allows for the quick creation of mobile apps for international business organizations as well as consumer travel apps.</li></ul>\r\n<span style=\"font-weight: bold;\">See the full list of OCR languages</span>\r\n<ul><li>OCR for iOS and Android. Usage of toolkits from one OCR vendor leads to consistent functionality and comparable recognition results for both the iOS and Android platforms.</li><li>MRZ support and data capture from IDs. Built-in support for capturing MRZ information, coupled with the ability to capture personal information from ID documents such as passports, ID cards, driver’s licenses and other sources, helps create mobile apps with fast personal data entry and identity verification.</li><li>Text capture from objects. Text on objects such as street signs or license plates can now be easily captured. Intelligent algorithms enable quick text detection and produce highly accurate recognition results, even when the mobile device camera is in poor lighting and angle conditions.</li><li>Bank card recognition and IBAN capture. Built-in support for the detection and extraction of IBAN and bank card numbers opens up endless possibilities for mobile banking apps. With SDK integrated, smartphone cameras just focus on the IBAN code or bank card number, and the data is instantly detected and transferred into the mobile banking app.</li><li>Instant translation. Developers can create apps that instantly translate words viewed through smartphones or tablets in real time. The dictionaries with menu lexis and some general lexis are included and allow instant translation with no internet connection**. The translated text will replace the original text on the camera preview screen, giving the user a ‘real-live’ translation experience.</li><li>Highly accurate OCR results. The SDK is based on premium ABBYY text recognition technology, acknowledged by major software developers and used on 100M+ devices worldwide by enterprise companies, and ultimately consumers. </li></ul>","shortDescription":"ABBYY Real-Time Recognition SDK enables developers to add ‘instant’ text capture functionality to mobile apps: payment data on invoices, personal information on ID cards ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ABBYY Real-Time Recognition SDK","keywords":"","description":"<span style=\"font-weight: bold;\">Why ABBYY Real-Time Recognition SDK?</span>\r\n<ul><li>Fast text input. Extracting text directly from the smartphone’s preview screen is significantly faster and more convenient than taking a picture of the text followed by an OC","og:title":"ABBYY Real-Time Recognition SDK","og:description":"<span style=\"font-weight: bold;\">Why ABBYY Real-Time Recognition SDK?</span>\r\n<ul><li>Fast text input. Extracting text directly from the smartphone’s preview screen is significantly faster and more convenient than taking a picture of the text followed by an OC","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ABBYY.png"},"eventUrl":"","translationId":2677,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":146,"title":"ECM - Enterprise Content Management","alias":"ecm-enterprise-content-management","description":"<span style=\"font-weight: bold; \">Enterprise content management (ECM)</span> extends the concept of content management by adding a time line for each content item and possibly enforcing processes for the creation, approval and distribution of them. Systems that implement ECM generally provide a secure repository for managed items, be they analog or digital, that indexes them. They also include one or more methods for importing content to bring new items under management and several presentation methods to make items available for use. The key feature of ECM that distinguishes it from "simple" content management is that an ECM is at least cognizant of the processes and procedures of the enterprise it is created for, and as such is particular to it. \r\nECM as an umbrella term covers enterprise document management system, Web content management, search, collaboration, records management, digital asset management (DAM), workflow management, capture and scanning. ECM is primarily aimed at managing the life-cycle of information from initial publication or creation all the way through archival and eventual disposal. ECM enterprise content management software is delivered in four ways:\r\n- on-premises software (installed on an organization's own network)\r\n- software as a service (SaaS) (Web access to information that is stored on a software manufacturer's system)\r\n- a hybrid composed of both on-premises and SaaS components\r\n- Infrastructure as a Service (IaaS) (which refers to online services that abstract the user from the details of infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.)\r\n<span style=\"font-weight: bold;\">ECM provides</span> a centralized platform where content can be held and disseminated in a manner that meets regulatory compliance requirements and risk management guidelines. An ECM achieves the latter two benefits by eliminating ad hoc processes that can expose an enterprise to regulatory compliance risks and other potential problems. Full-function enterprise content management solutions include features such as content taxonomies, auditing capabilities, check-in/check-out and other workflow controls and security mechanisms.\r\nAn <span style=\"font-weight: bold;\">effective ECM </span>can streamline access and business processes, eliminate bottlenecks by reducing storage, as well as paper and mailing needs, optimize security, maintain integrity and minimize overhead. All of these can lead to increased productivity. The first step is to document all the types of content that the organization deals with, the business processes its part of and who handles the content. \r\nECM software can be used to identify duplicate and near-duplicate content, allowing the organization to keep a few copies of a particular piece of content instead of hundreds. The best ECM software extends the reach of traditional ECM capabilities into previously isolated applications and information silos, such as ERP, CRM, SCM and HCM, to take the shape of a content services platform. Information can now flow across the enterprise to the people and processes—when, where and in whatever context it is needed.\r\nTo understand more specific ways it could help your company, consider these <span style=\"font-weight: bold; \">three types of ECM</span> software solutions.\r\n<span style=\"font-weight: bold; \">Web Content Management.</span> WCM puts control over the look and feel of a website in the hands of specific, key people. It’s used by organizations with relatively complex websites and strict brand guidelines, giving those key personnel the means to easily update, modify and publish content for the sites while adhering to the guidelines.\r\n<span style=\"font-weight: bold; \">Collaborative Content Management.</span> CCM enables multiple people to access and modify a single document, such as a legal document. It’s ideal for organizations that must manage projects involving multiple stakeholders. CCM makes it easy to work together while keeping track of, and updating, the most-current version of the document.\r\n<span style=\"font-weight: bold; \">Transactional Content Management.</span> This type of ECM document management is designed for organizations that repeatedly use varied types of content, including records, paper documents, and digital files. TCM solutions capture content from various channels, classify it, store it, create an automated workflow to ensure the right user receives the content at the right time, and even deletes documents when they’re no longer needed, all while working seamlessly with other apps and databases, ensuring all of that content is available throughout the company.<br /><br /><br />\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: bold; \">What is Enterprise Content Management (ECM)?</span></h1>\r\nEnterprise Content Management is the organization of structured and unstructured documents using technology and software that allows your organization to “work smarter, not harder.” As technology advanced and everything became digital, organizations needed a new way to store and access files, leading to the creation of ECM. \r\nECM document management system consists of four main points:\r\n<ul><li><span style=\"font-weight: bold; \">Capture:</span> Capturing information from hardcopy documents or online forms and transferring it into the system</li><li><span style=\"font-weight: bold; \">Manage:</span> Managing the captured data in a structured format that allows quick and easy retrieval</li><li><span style=\"font-weight: bold; \">Storing:</span> Securely storing files in a central repository that can be accessed from multiple locations</li><li><span style=\"font-weight: bold; \">Delivery:</span> Implementation of business process workflows to automatically move documents from one step to the next</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Five ways ECM software can benefit your organization</span></h1>\r\n<span style=\"font-weight: bold; \">Basic file sharing and library services.</span> At its core, enterprise document management software begins with basic file sharing and library services managed within a networked repository. Individuals and groups with predefined access rights and permissions can access the repository and then create, read, update and delete files stored within it.\r\nMany ECM applications support Content Management Interoperability Services, an industry standard that allows different vendors' products to interoperate; this is an essential capability within large enterprises that maintain content management tools from multiple vendors.\r\n<span style=\"font-weight: bold; \">Content governance, compliance and records management.</span> For many organizations, managing business documents or other content types is a critical use case for ECM. Companies subject to compliance or other industry regulations need document content management system software to capture, manage, archive and ultimately dispose of files after a predefined period.\r\nECM can ensure that only individuals with predefined permissions - determined by access controls - can update or view documents stored within a repository. An organization can thus manage document modification.\r\nIn addition, enterprise content management tools can log all actions, providing an organization with the capabilities to maintain an auditable record of all the changes to documents within the repository.\r\n<span style=\"font-weight: bold; \">Business process management.</span> Companies also use ECM to establish workflows that span departments and geographies to support extended enterprise and inter-enterprise business processes.\r\nMost ECM software provides tools to help both technical and non-technical business users define business processes. Most applications provide audit controls to track each step of the process and analytic capabilities to help identify inefficiencies and streamline business procedures.\r\n<span style=\"font-weight: bold; \">Content repositories linked to other enterprise applications.</span> Some companies use electronic content management software as a repository for documents created by other enterprise applications, including CRM, ERP, HR and financial systems. These enterprise systems can seamlessly access, view or modify content managed by the ECM.\r\n<span style=\"font-weight: bold; \">Enabling mobile and remote workforces.</span> Content management tools often include functionality to allow remote workers to access content from mobile devices. This is an increasingly important feature for many companies.\r\nMobile capabilities also enable new kinds of data capture and presentation functionalities. By combining content management capabilities with other data, for example, a political canvasser can use a tablet to enter new information about a political donor without having to start from scratch, as some of that information is already stored in a content management system. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/ECM_-_Enterprise_Content_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"absalon-crm":{"id":801,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Absalon_CRM.jpg","logo":true,"scheme":false,"title":"Absalon CRM","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"absalon-crm","companyTitle":"Absalon International","companyTypes":["supplier","vendor"],"companyId":3711,"companyAlias":"absalon-international","description":"\r\nAbsalon CRM Modules:\r\n<ol> <li>Marketing</li> <li>Sales</li> <li>Project Management</li> <li>Resource Planning</li> <li>Case Management</li> <li>Service Management</li> </ol>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">MARKETING</span> The marketing module in Microsoft Dynamics CRM is, together with Absalon CRM, covering marketing lists, customer categorization, account plans, event management and more. <span style=\"font-weight: bold;\">Microsoft Dynamics CRM</span>\r\n<ul> <li>Support and registration of marketing activities for reporting, follow up and management</li> <li>Marketing lists: Create dynamic marketing lists, that update subsequently, as well as static marketing lists. Full Outlook integration with mailing possibilities straight from the marketing lists.</li> <li>Create process support for your marketing activities, both simple and complex ones</li> </ul>\r\n<span style=\"font-weight: bold;\">Absalon add-on</span>\r\n<ul> <li>Categorization of customers based on needs of the organization and the area such as industry, sector or geography</li> <li>Event Management, gather all the information in one place. Contacts as event participants and their status at the event, check list for the event, document management through SharePoint</li> <li>Training Management with courses and participants, reuse data you previously created</li> </ul>\r\n<span style=\"font-weight: bold;\">Microsoft add-on products for marketing</span>\r\n<ul> <li>With Microsoft Social Listening you have the possibility to capture activities on social media, arrange searches based on key words and visualize in nice dashboards with graphs and lists</li> <li>Dynamics Marketing gives you the possibility to take care of digital marketing, like newsletters and leads generation, with automation if you like</li> </ul>\r\n<span style=\"font-weight: bold;\">User experience</span>\r\n<ul> <li>Full integration with Outlook contacts and activities</li> <li>Good follow-up possibilities with graphs and views</li> <li>Consistently easy to use interface</li> </ul>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">SALES</span> Absalon add-on extends the sales module developed from the already well-defined sales support that comes with Microsoft Dynamics CRM. With Absalon add-on the updating of data goes even faster, and administration time is reduced. <span style=\"font-weight: bold;\">Microsoft Dynamics CRM</span>\r\n<ul> <li>Business Process Flow with guiding steps in order to complete the sales process</li> <li>Track meetings and emails to your sales activities</li> </ul>\r\n<span style=\"font-weight: bold;\">Absalon add-on</span>\r\n<ul> <li>Dynamic sales processes, helping you to follow the sales processes that apply to you</li> <li>Support for several simultaneous sales processes</li> <li>With Absalon add-on it’s easy to follow which customers you have contacted (and not contacted) for a certain period of time</li> <li>Customer Plans for targeted customer strategy on activity level with follow-up possibilities</li> <li>Opportunities to follow up recurring income over time</li> </ul>\r\n<span style=\"font-weight: bold;\">User experience</span>\r\n<ul> <li>Full integration with Outlook contacts and activities</li> <li>Good follow-up possibilities with graphs, views and dashboards</li> <li>Quick update of progressive sales processes</li> </ul>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">PROJECT MANAGEMENT</span> The module for project management in Absalon CRM gather all information at the one place, where everybody has access to the same material and receives the latest updates. By gathering all the functionality in the same place, in the CRM, you utilize already existing information about customers, contacts, and activities. <span style=\"font-weight: bold;\">Microsoft Dynamics CRM</span>\r\n<ul> <li>Integration with Outlook activities, track emails and other activities in your projects</li> <li>Integration to SharePoint for document management</li> </ul>\r\n<span style=\"font-weight: bold;\">Absalon add-on</span>\r\n<ul> <li>Start from one of your predefined project model</li> <li>Add project activities for each unique project</li> <li>With the ability to follow the people who are relevant to the project</li> <li>Spread the responsibility on project activities and project logs</li> <li>Time reporting on projects and/or project activities</li> <li>Do follow-up on the budget and hours towards activities and timesheets</li> <li>- Analyze and visualize through views, graphs and dashboards</li> </ul>\r\n<span style=\"font-weight: bold;\">User experience</span>\r\n<ul> <li>Access to the same information with the possibility of access control through security roles</li> <li>Connect to SharePoint for an integrated experience</li> <li>Visualize to illustrate the project's success or warning signs</li> <li>Simple time reporting</li> </ul>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">RESOURCE PLANNING</span> With Absalon resource planning, resources can be booked for projects in different plans. Statistics and data for the plans are clear and you can follow the progress of work. By gathering all the functionality in the same place, in the CRM, you utilize already existing information about customers, contacts, and activities. <span style=\"font-weight: bold;\">Microsoft Dynamics CRM</span>\r\n<ul> <li>Integration with Outlook activities, track emails and other activities in your projects</li> <li>Integration to SharePoint for document management</li> </ul>\r\n<span style=\"font-weight: bold;\">Absalon add-on</span>\r\n<ul> <li>Support for multiple simultaneous resource plans with the same or different resource members</li> <li>Save time by copying a resource allocation over time</li> <li>Duplicate resource allocations for faster input</li> <li>Use the built-in graphs to follow allocations as tools to plan for the future and utilize resources maximum</li> <li>Resource allocation to projects and project activities</li> </ul>\r\n<span style=\"font-weight: bold;\">User experience</span>\r\n<ul> <li>The user interface is familiar from other parts of the CRM, instant buttons and custom components make your work easier and graphs provide an instantaneous updated picture of the resource plan.</li> </ul>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">CASE MANAGEMENT</span> Case management is a major part within CRM and Absalon add-on contains additional functionality which works well with existing Microsoft Dynamics CRM components. By gathering all the functionality in the same place, in the CRM, you utilize already existing information about customers, contacts, and activities. <span style=\"font-weight: bold;\">Microsoft Dynamics CRM</span>\r\n<ul> <li>Follow-up on contractual commitments for SLA</li> <li>Case registration with automatic update of entitlement terms, e.g. number of cases or hours, according to agreement</li> <li>Business Process Flow with guiding steps in order to complete the support process</li> <li>Cases automatically created based on in-coming email</li> <li>Support for case management through queues, and automatic routing of cases to queues</li> </ul>\r\n<span style=\"font-weight: bold;\">Absalon add-on</span>\r\n<ul> <li>Dynamic defined process for case management and follow-up. Here you can have one or more processes at the same time, to adapt the work for each unique case.</li> <li>Possibilities to do time reports on projects and/or cases</li> <li>Case management within projects</li> <li>Possibility to continuously follow up aggregated statuses of open cases through graphs, views and dashboards</li> <li>Possibility to build a knowledge database based on recurring problems</li> </ul>\r\n<span style=\"font-weight: bold;\">User experience</span>\r\n<ul> <li>Simple and easy to use web interface</li> <li>Clear responsibilities for users in the process</li> <li>Full integration with Outlook contacts and activities</li> <li>Good follow-up possibilities with graphs and views, for cases as well as users</li> <li>Possibilities for follow-up that suits your organization</li> </ul>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">SERVICE MANAGEMENT</span> Microsoft Dynamics CRM has built-in support for service, which Absalon add-on has expanded with support for service plans, installation, recurring and scheduled service cases. By gathering all the functionality in the same place, in the CRM, you utilize already existing information about customers, contacts, and activities. <span style=\"font-weight: bold;\">Microsoft Dynamics CRM</span>\r\n<ul> <li>Case management with SLA</li> <li>Microsoft Dynamics CRM has functionality for contract management that will help you get an overview of periods, rates and currencies etc</li> <li>Integration with Outlook activities</li> </ul>\r\n<span style=\"font-weight: bold;\">Absalon add-on</span>\r\n<ul> <li>Installation management for the identification of existing installations such as machinery, equipment and products at your customers</li> <li>Add and follow the installation components</li> <li>Service Plans: add installations to a service plan and get control over when and where the services will be performed</li> <li>Work on the field, on- and offline, with Absalon Service app</li> <li>Follow up the maintenance work historically and onwards</li> <li>Register service cases within service plans, for installations and users</li> <li>Create service orders after completing the work, use it for billing purposes and sign in our mobile app solution</li> </ul>\r\n<span style=\"font-weight: bold;\">Microsoft add-on products for Business Intelligence</span>\r\n<ul> <li>Use Microsoft Business Intelligence, e.g. Power Pivot, to clarify the status and plan the work in the best way</li> </ul>\r\n<span style=\"font-weight: bold;\">User experience</span>\r\n<ul> <li>With an easy to use interface and great opportunities for visualization on the user level, the work can be planned in the best way to exploit the resources right and follow-up service based on contract level.</li> <li>With Absalon Service app, users can work online or offline and quickly enter new data.</li> </ul>","shortDescription":"With Absalon CRM, you have full control over your customer relationships, from marketing and sales to service and delivery.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Absalon CRM","keywords":"with, activities, Absalon, Microsoft, management, add-on, Dynamics, project","description":"\r\nAbsalon CRM Modules:\r\n<ol> <li>Marketing</li> <li>Sales</li> <li>Project Management</li> <li>Resource Planning</li> <li>Case Management</li> <li>Service Management</li> </ol>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">MARKETING</span>","og:title":"Absalon CRM","og:description":"\r\nAbsalon CRM Modules:\r\n<ol> <li>Marketing</li> <li>Sales</li> <li>Project Management</li> <li>Resource Planning</li> <li>Case Management</li> <li>Service Management</li> </ol>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">MARKETING</span>","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Absalon_CRM.jpg"},"eventUrl":"","translationId":801,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"<span style=\"font-weight: bold;\">Customer service</span> is the provision of service to customers before, during and after a purchase. The perception of success of such interactions is dependent on employees "who can adjust themselves to the personality of the guest". Customer service concerns the priority an organization assigns to customer service relative to components such as product innovation and pricing. In this sense, an organization that values good customer service may spend more money in training employees than the average organization or may proactively interview customers for feedback.\r\nA <span style=\"font-weight: bold;\">customer support</span> is a range of customer services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, trouble shooting, maintenance, upgrading, and disposal of a product. These services even may be done at customer's side where he/she uses the product or service. In this case it is called "at home customer services" or "at home customer support."\r\nRegarding technology, products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods, it is termed technical support. \r\nCustomer service may be provided by a person (e.g., sales and service representative), or by automated means, such as kiosks, Internet sites, and apps.\r\n<span style=\"font-weight: bold;\">CRM </span>(Customer Relationship Management) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.\r\nOne important aspect of the CRM approach is the systems of CRM that compile data from a range of different communication channels, including a company's website, telephone, email, live chat, marketing materials and more recently, social media. Through the CRM approach and the systems used to facilitate it, businesses learn more about their target audiences and how to best cater to their needs.\r\nCRM helps users focus on their organization’s relationships with individual people including customers, service users, colleagues, or suppliers.\r\nWhen people talk about customer relationship management system, they might mean any of three things: \r\n<ul><li><span style=\"font-weight: bold;\">CRM as Technology</span>: This is a technology product, often in the cloud, that teams use to record, report and analyse interactions between the company and users. This is also called a CRM system or solution.</li><li><span style=\"font-weight: bold;\">CRM as a Strategy</span>: This is a business’ philosophy about how relationships with customers and potential customers should be managed. </li><li><span style=\"font-weight: bold;\">CRM as a Process</span>: Think of this as a system a business adopts to nurture and manage those relationships.</li></ul>\r\n<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why is CRM important?</span></h1>\r\nCRM management system enables a business to deepen its relationships with customers, service users, colleagues, partners and suppliers.\r\nForging good relationships and keeping track of prospects and customers is crucial for customer acquisition and retention, which is at the heart of a CRM’s function. You can see everything in one place — a simple, customizable dashboard that can tell you a customer’s previous history with you, the status of their orders, any outstanding customer service issues, and more.\r\nGartner predicts that by 2021, CRM technology will be the single largest revenue area of spending in enterprise software. If your business is going to last, you know that you need a strategy for the future. For forward-thinking businesses, CRM is the framework for that strategy.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the benefits of CRM?</span></h1>\r\nBy collecting and organising data about customer interactions, making it accessible and actionable for all, and facilitating analysis of that data, CRM offers many benefits and advantages.<br />The benefits and advantages of CRM include:\r\n<ul><li>Enhanced contact management</li><li>Cross-team collaboration</li><li>Heightened productivity</li><li>Empowered sales management</li><li>Accurate sales forecasting</li><li>Reliable reporting</li><li>Improved sales metrics</li><li>Increased customer satisfaction and retention</li><li>Boosted marketing ROI</li><li>Enriched products and services</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the key features of most popular CRM software programs?</span></h1>\r\nWhile many CRM solutions differ in their specific value propositions — depending on your business size, priority function, or industry type — they usually share some core features. These, in fact, are the foundation of any top CRM software, without which you might end up using an inferior app or an over-rated address book. So, let’s discuss the key features you need to look for when figuring out the best CRM software for your business.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Contact management</span>. The best CRM solutions aren’t just an address book that only organizes contact details. It manages customer data in a centralized place and gives you a 360-degree view of your customers. You should be able to organize customers’ personal information, demographics, interactions, and transactions in ways that are meaningful to your goals or processes. Moreover, a good contact management feature lets you personalize your outreach campaign. By collecting personal, social, and purchase data, it will help you to segment target audience groups in different ways.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reporting and dashboards</span>. These features of customer relationship management allow you to use analytics to interpret customer data. Reporting is very useful if you want to consolidate disparate data and churn out insights in different visualizations. This lets you make better decisions or proactively deal with market trends and customer behavioral patterns. The more visual widgets a CRM software has, the better you can present reports. Furthermore, a best customer relationship management software will generate real-time data, making reporting more accurate and timely. Reporting also keeps you tab on sales opportunities like upsell, resell, and cross-sell, especially when integrated with e-commerce platforms.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Lead management</span>. These features let you manage leads all the way to win-loss stage. They pave a clear path to conversion, so you can quickly assess how the business is performing. One of the main three legs that comprises the best client relationship management software (the other two being contact management and reporting), lead management unburdens the sales team from follow-ups, tracking, and repetitive tasks.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Deals and tasks</span>. Deals and tasks are closely associated with leads. Deals are leads at the negotiation stage, so it’s critical to keep a close eye on their associated tasks for a higher chance of conversion.<br />CRM software tools should also let you track both deals and tasks in their respective windows or across the sales stages. Whether you’re viewing a contact or analyzing the sales pipeline, you should be able to immediately check the deal’s tasks and details. Deals and tasks should also have user permissions to protect leaks of sensitive data. Similarly, alerts are critical to tasks so deadlines are met. Notifications are usually sent via email or prominently displayed on the user’s dashboard.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Campaign management</span>. Solid CRM software will integrate this feature to enable marketing processes from outreach concept to A/B testing to deployment and to post analysis. This will allow you to sort campaigns to target segments in your contacts and define deployment strategies. You will also be able to define metrics for various channels, then plow back the insights generated by post-campaign analytics into planning more campaigns.<br />Recurring outreach efforts can also be automated. For instance, you can set to instantly appropriate content to contacts based on their interest or send tiered autoresponders based on campaign feedback.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Email management</span>. By integrating with popular email clients like Gmail and Outlook, CRM solutions can capture email messages and sort important details that can be saved in contacts or synced with leads. They can also track activities like opened emails, forwarded emails, clicked links, and downloaded files. Emails can also be qualified for prospecting.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Social media management. </span>Popular CRM systems feature an integrated social media management where you can view different social media pages from the CRM’s interface. This is a convenient way to post, reply on, and manage all your pages. Likewise, this feature gives you a better perspective on how customers are interacting with your brand. A glean of their likes and dislikes, interests, shares, and public conversations helps you to assess customer biases and preferences. Customers are also increasingly using social media to contact companies; hence, a good CRM should alert you for brand mentions.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Mobile access</span>. With more users accessing apps via mobile devices, many vendors have been prioritizing mobile-first platforms. Emergence Capital Partners study found over 300 mobile-first apps so far and CRM is definitely one their targets. Many CRM solutions have both Android and iOS apps. Mobile access works in two ways to be highly appreciated: accessing data and inputting data while on location. Field sales with the latest sales information on hand may be able to interest prospects better. Conversely, sales reps can quickly update deals across the pipeline even as they come off a client meeting.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CRM_-_Customer_Relationship_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"absalon-crm-for-consumer-goods":{"id":799,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Absalon_CRM.jpg","logo":true,"scheme":false,"title":"Absalon CRM for Consumer Goods","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"absalon-crm-for-consumer-goods","companyTitle":"Absalon International","companyTypes":["supplier","vendor"],"companyId":3711,"companyAlias":"absalon-international","description":"<span style=\"font-weight: bold; text-decoration-line: underline;\">Absalon Consumer Goods – For the Sales Manager</span> Absalon CRM for consumer goods is based on the most widely used processes in sales within the industry. The solution will help the company strengthen its brands while minimizing the time spent on administration. <span style=\"font-weight: bold; text-decoration-line: underline;\">Absalon Consumer Goods – For the Sales Rep</span> Sales representatives’ main focus is to spread information about the various products and brands that their company offers the market. An important task is to report received feedback acquired during the meeting so that the brand can be strengthen even further in the future. With Absalon add-on, we combine a solid database of CRM with efficient processes to report sales meeting, limiting the time spent on administration, and all this is achievable through mobile devices and computers. <span style=\"font-weight: bold; text-decoration-line: underline;\">Absalon Consumer Goods – For the Sales Manager</span> <span style=\"font-weight: bold;\">Microsoft Dynamics CRM</span>\r\n<ul> <li>Manage products, product groups, brands, price lists and discounts</li> <li>Use the built-in marketing lists to reach accounts and contacts</li> <li>Take advantage of Microsoft CRM dashboards, views and charts to track the progress of sales work day by day</li> <li>With Microsoft Social Engagement, you can monitor social media activities and gather information based on keywords, such as the company's brands</li> </ul>\r\n<span style=\"font-weight: bold;\">Absalon add-on data setup</span>\r\n<ul> <li>Organize and guide your sales force by creating business plans, t erritory plans and action plans</li> <li>Prepare materials for each brand so that the sales team works effectively at each sales meeting, and report back meetings directly</li> <li>Understand how the business develops by following up on the data that the sales representative reports after meetings</li> <li>Add up the presentation materials, CLM, that the sales representative can present on their mobile devices or laptops, at sales meetings. Smoothly report feedback back into the system immediately after the meeting</li> <li>Keep track of the distribution of your products on the shelves at your customers</li> <li>Track awareness for your brands at organizations and contacts</li> <li>Manage expenses and product samples to customers</li> <li>Use Absalon add-on to create events and invite contacts</li> </ul>\r\n<span style=\"font-weight: bold;\">Absalon add-on facilitates for the sales reps</span>\r\n<ul> <li>Plan a week effectively using Absalon Sales Cockpit as a visual tool for sales meetings </li> <li>Find your way to customers with help of the map of Absalon add-on that creates the best route</li> <li>Plan for distribution materials and samples ahead and check so sales representatives have what they need for the week</li> <li>Set up the data so that the sales process is made more uniform and streamlined, and time spent on administration is limited</li> <li>Use pre-defined messages, feedback and CLM for each brand</li> <li>The recurring user interface for reporting sales meetings accelerates the reporting process</li> </ul>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Absalon Consumer Goods – For the Sales Rep</span> <span style=\"font-weight: bold;\">Microsoft Dynamics CRM</span>\r\n<ul> <li>Use the built in marketing lists to contact organizations and contact persons with similar features</li> <li>Microsoft CRM dashboards, views and charts helps you following the sales work day by day and see what needs to achieve to reach the set goals</li> </ul>\r\n<span style=\"font-weight: bold;\">Absalon add-on data setup</span>\r\n<ul> <li>Use the built-in map function to locate your contacts and plan the best possible route </li> <li>Plan your week using Absalon Sales Cockpit, which gives you a good overview of the week's various sales meetings</li> <li>Evaluate how your message has been received by the various contact persons</li> <li>Set up action plans with predefined messages and feedback, CLM and hand-out materials</li> <li>Copy an action plan and recycle the data that is already available in the system</li> <li>Create sales meetings on an action plan to auto generate the data that you will use in your sales meeting, and report the meeting in the system afterwards</li> <li>Check contribution margin ratio for each contact in your plan so that you reach your goals</li> <li>Invite your contacts to events with a few simple steps</li> </ul>\r\n<span style=\"font-weight: bold;\">Consumer Goods Sales Rep App</span>\r\n<ul> <li>Absalon Sales Rep App works both online and offline, which allows you to report the meetings no matter where you are</li> <li>The user experiences that the app is easy to understand and easy to use</li> <li>Filtering data in the app to match the needs you have as a sales rep and makes it easier to report meetings</li> <li>Get the contact person's signature on the location of the samples that you handed out</li> <li>Switch between the laptop and the app to find the most efficient way to work</li> </ul>","shortDescription":"Absalon CRM for consumer goods is based on the most widely used processes in sales within the industry. The solution will help the company strengthen its brands while minimizing the time spent on administration.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Absalon CRM for Consumer Goods","keywords":"sales, Absalon, that, your, Sales, meetings, data, report","description":"<span style=\"font-weight: bold; text-decoration-line: underline;\">Absalon Consumer Goods – For the Sales Manager</span> Absalon CRM for consumer goods is based on the most widely used processes in sales within the industry. The solution will help the company s","og:title":"Absalon CRM for Consumer Goods","og:description":"<span style=\"font-weight: bold; text-decoration-line: underline;\">Absalon Consumer Goods – For the Sales Manager</span> Absalon CRM for consumer goods is based on the most widely used processes in sales within the industry. The solution will help the company s","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Absalon_CRM.jpg"},"eventUrl":"","translationId":799,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"<span style=\"font-weight: bold;\">Customer service</span> is the provision of service to customers before, during and after a purchase. The perception of success of such interactions is dependent on employees "who can adjust themselves to the personality of the guest". Customer service concerns the priority an organization assigns to customer service relative to components such as product innovation and pricing. In this sense, an organization that values good customer service may spend more money in training employees than the average organization or may proactively interview customers for feedback.\r\nA <span style=\"font-weight: bold;\">customer support</span> is a range of customer services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, trouble shooting, maintenance, upgrading, and disposal of a product. These services even may be done at customer's side where he/she uses the product or service. In this case it is called "at home customer services" or "at home customer support."\r\nRegarding technology, products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods, it is termed technical support. \r\nCustomer service may be provided by a person (e.g., sales and service representative), or by automated means, such as kiosks, Internet sites, and apps.\r\n<span style=\"font-weight: bold;\">CRM </span>(Customer Relationship Management) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.\r\nOne important aspect of the CRM approach is the systems of CRM that compile data from a range of different communication channels, including a company's website, telephone, email, live chat, marketing materials and more recently, social media. Through the CRM approach and the systems used to facilitate it, businesses learn more about their target audiences and how to best cater to their needs.\r\nCRM helps users focus on their organization’s relationships with individual people including customers, service users, colleagues, or suppliers.\r\nWhen people talk about customer relationship management system, they might mean any of three things: \r\n<ul><li><span style=\"font-weight: bold;\">CRM as Technology</span>: This is a technology product, often in the cloud, that teams use to record, report and analyse interactions between the company and users. This is also called a CRM system or solution.</li><li><span style=\"font-weight: bold;\">CRM as a Strategy</span>: This is a business’ philosophy about how relationships with customers and potential customers should be managed. </li><li><span style=\"font-weight: bold;\">CRM as a Process</span>: Think of this as a system a business adopts to nurture and manage those relationships.</li></ul>\r\n<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why is CRM important?</span></h1>\r\nCRM management system enables a business to deepen its relationships with customers, service users, colleagues, partners and suppliers.\r\nForging good relationships and keeping track of prospects and customers is crucial for customer acquisition and retention, which is at the heart of a CRM’s function. You can see everything in one place — a simple, customizable dashboard that can tell you a customer’s previous history with you, the status of their orders, any outstanding customer service issues, and more.\r\nGartner predicts that by 2021, CRM technology will be the single largest revenue area of spending in enterprise software. If your business is going to last, you know that you need a strategy for the future. For forward-thinking businesses, CRM is the framework for that strategy.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the benefits of CRM?</span></h1>\r\nBy collecting and organising data about customer interactions, making it accessible and actionable for all, and facilitating analysis of that data, CRM offers many benefits and advantages.<br />The benefits and advantages of CRM include:\r\n<ul><li>Enhanced contact management</li><li>Cross-team collaboration</li><li>Heightened productivity</li><li>Empowered sales management</li><li>Accurate sales forecasting</li><li>Reliable reporting</li><li>Improved sales metrics</li><li>Increased customer satisfaction and retention</li><li>Boosted marketing ROI</li><li>Enriched products and services</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the key features of most popular CRM software programs?</span></h1>\r\nWhile many CRM solutions differ in their specific value propositions — depending on your business size, priority function, or industry type — they usually share some core features. These, in fact, are the foundation of any top CRM software, without which you might end up using an inferior app or an over-rated address book. So, let’s discuss the key features you need to look for when figuring out the best CRM software for your business.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Contact management</span>. The best CRM solutions aren’t just an address book that only organizes contact details. It manages customer data in a centralized place and gives you a 360-degree view of your customers. You should be able to organize customers’ personal information, demographics, interactions, and transactions in ways that are meaningful to your goals or processes. Moreover, a good contact management feature lets you personalize your outreach campaign. By collecting personal, social, and purchase data, it will help you to segment target audience groups in different ways.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reporting and dashboards</span>. These features of customer relationship management allow you to use analytics to interpret customer data. Reporting is very useful if you want to consolidate disparate data and churn out insights in different visualizations. This lets you make better decisions or proactively deal with market trends and customer behavioral patterns. The more visual widgets a CRM software has, the better you can present reports. Furthermore, a best customer relationship management software will generate real-time data, making reporting more accurate and timely. Reporting also keeps you tab on sales opportunities like upsell, resell, and cross-sell, especially when integrated with e-commerce platforms.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Lead management</span>. These features let you manage leads all the way to win-loss stage. They pave a clear path to conversion, so you can quickly assess how the business is performing. One of the main three legs that comprises the best client relationship management software (the other two being contact management and reporting), lead management unburdens the sales team from follow-ups, tracking, and repetitive tasks.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Deals and tasks</span>. Deals and tasks are closely associated with leads. Deals are leads at the negotiation stage, so it’s critical to keep a close eye on their associated tasks for a higher chance of conversion.<br />CRM software tools should also let you track both deals and tasks in their respective windows or across the sales stages. Whether you’re viewing a contact or analyzing the sales pipeline, you should be able to immediately check the deal’s tasks and details. Deals and tasks should also have user permissions to protect leaks of sensitive data. Similarly, alerts are critical to tasks so deadlines are met. Notifications are usually sent via email or prominently displayed on the user’s dashboard.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Campaign management</span>. Solid CRM software will integrate this feature to enable marketing processes from outreach concept to A/B testing to deployment and to post analysis. This will allow you to sort campaigns to target segments in your contacts and define deployment strategies. You will also be able to define metrics for various channels, then plow back the insights generated by post-campaign analytics into planning more campaigns.<br />Recurring outreach efforts can also be automated. For instance, you can set to instantly appropriate content to contacts based on their interest or send tiered autoresponders based on campaign feedback.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Email management</span>. By integrating with popular email clients like Gmail and Outlook, CRM solutions can capture email messages and sort important details that can be saved in contacts or synced with leads. They can also track activities like opened emails, forwarded emails, clicked links, and downloaded files. Emails can also be qualified for prospecting.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Social media management. </span>Popular CRM systems feature an integrated social media management where you can view different social media pages from the CRM’s interface. This is a convenient way to post, reply on, and manage all your pages. Likewise, this feature gives you a better perspective on how customers are interacting with your brand. A glean of their likes and dislikes, interests, shares, and public conversations helps you to assess customer biases and preferences. Customers are also increasingly using social media to contact companies; hence, a good CRM should alert you for brand mentions.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Mobile access</span>. With more users accessing apps via mobile devices, many vendors have been prioritizing mobile-first platforms. Emergence Capital Partners study found over 300 mobile-first apps so far and CRM is definitely one their targets. Many CRM solutions have both Android and iOS apps. Mobile access works in two ways to be highly appreciated: accessing data and inputting data while on location. Field sales with the latest sales information on hand may be able to interest prospects better. Conversely, sales reps can quickly update deals across the pipeline even as they come off a client meeting.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CRM_-_Customer_Relationship_Management.png"},{"id":337,"title":"Sales","alias":"sales","description":" Sales are activities related to selling or the number of goods or services sold in a given targeted time period.\r\nThe seller, or the provider of the goods or services, completes a sale in response to an acquisition, appropriation, requisition, or a direct interaction with the buyer at the point of sale. There is a passing of title (property or ownership) of the item, and the settlement of a price, in which agreement is reached on a price for which transfer of ownership of the item will occur. The seller, not the purchaser, typically executes the sale and it may be completed prior to the obligation of payment. In the case of indirect interaction, a person who sells goods or service on behalf of the owner is known as a salesman or saleswoman or salesperson, but this often refers to someone selling goods in a store/shop, in which case other terms are also common, including salesclerk, shop assistant, and retail clerk.\r\nIn common law countries, sales are governed generally by the common law and commercial codes. In the United States, the laws governing sales of goods are somewhat uniform to the extent that most jurisdictions have adopted Article 2 of the Uniform Commercial Code, albeit with some non-uniform variations.\r\nA person or organization expressing an interest in acquiring the offered item of value is referred to as a potential buyer, prospective customer, or prospect. Buying and selling are understood to be two sides of the same "coin" or transaction. Both seller and buyer engage in a process of negotiation to consummate the exchange of values. The exchange, or selling, process has implied rules and identifiable stages. It is implied that the selling process will proceed fairly and ethically so that the parties end up nearly equally rewarded. The stages of selling, and buying, involve getting acquainted, assessing each party's need for the other's item of value, and determining if the values to be exchanged are equivalent or nearly so, or, in buyer's terms, "worth the price". Sometimes, sellers have to use their own experiences when selling products with appropriate discounts.\r\nAlthough the skills required are different, from a management viewpoint, sales is a part of marketing. Sales often form a separate grouping in a corporate structure, employing separate specialist operatives known as salespersons (singular: salesperson). Selling is considered by many to be a sort of persuading "art". Contrary to popular belief, the methodological approach of selling refers to a systematic process of repetitive and measurable milestones, by which a salesman relates his or her offering of a product or service in return enabling the buyer to achieve their goal in an economic way.","materialsDescription":" <span style=\"font-weight: bold;\">What's the Difference Between Sales and Marketing?</span>\r\nSales and Marketing: two terms we often hear together when working with mid-size companies. In some ways, this is logical because the two need to work together. But in fact, Sales and Marketing are two very different functions and require very different skills.\r\nBusiness leaders know what Operations are; they make stuff. They know what Accounting is; they record and control the money. And they know what Sales do; they sell stuff. So if you are not making stuff, selling stuff, or recording the money—what is marketing and why do you need it?\r\nWhat's the difference between Sales and Marketing? To answer this question, let's define what Sales and Marketing are separately and how they support one another.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">What is Marketing? Aligning with Customers, Now and for the Future</span></span>\r\nA key job of Marketing is to understand the marketplace from the perspective of the customer looking back towards the company and helping lead the company where it should be in the future. Marketing’s job is to direct the organization toward the segments, or groups of customers and channels where the company can profitably compete. It should help the organization see how it needs to modify its product offerings, pricing, and communication so that it meets the needs of the distribution channel or end customers.\r\nMarketing also needs to convert the market understanding into tools and tactics to attract the market, build (often digital) relationships, and develop leads. Without Sales, Marketing efforts run short. Marketing directs Sales as to where they should be hunting and what ammo to use. Note, however, that if Marketing becomes a sales support function focused only on the now, the future can become lost.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Without Marketing, Sales Suffers</span></span>\r\nNot even the best hunter can bring home dinner if they are shooting blanks at decoys. Markets are constantly changing. The job of marketing is to stay ahead of the changes and help the hunters see where they should be hunting and provide them with the right ammunition. If Marketing is only focused on delivering the ammunition for today, nobody will see where the industry is moving or where the company needs to hunt next. This limits growth not only for Sales and Marketing but also for your entire organization.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Can You be Both Sales and Marketing?</span></span>\r\nIn all my years, working for companies that ranged from Fortune 100 to mid-size companies I have never met anyone who was really good at both sales and marketing. I have held the title of VP of Sales and Marketing, managing a 500 person sales and merchandising force. I was really a marketing person with sales authority. The skills required to focus on the now and the push of sales are different. In many ways, they are contrary to the skills of looking to the future and the customer perspective of marketing.\r\nEvery Sales organization feels they have a good understanding of their customers. But every Sales conversation with a customer has a sales transaction lurking in the background. Therefore, customers can never be completely open about their needs and want when talking to a sales person.\r\nFor a company to really grow, someone must have the job of looking out the window towards where the company needs to go in the future. For many companies, this is the job of the CEO and Sales hires someone to do some sales support and gives them a marketing title. But as companies grow, the job of CEO starts to become a full-time job in itself and the strategic role of Marketing gets short-changed. A study of mid-size companies by the University of Texas showed that companies that separated the roles of Marketing and Sales were much more likely to grow faster than the industry average.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Sales and Marketing: Today and the Future</span></span>\r\nSales need to be focused on the now. You can’t run a company unless your sales team is focused on bringing in today’s business. But you can’t really ask your Sales leaders where the company should go next and to develop the 18-month plan to get there without losing focus on today’s revenue. Besides, if your sales executive was really good at developing future-focused business strategies and tying that strategy to the plans and tools of marketing to make it happen, they would be a marketing person and not a now-focused sales person.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Sales.png"},{"id":339,"title":"Marketing","alias":"marketing","description":" Marketing is the study and management of exchange relationships. It is the business process of creating relationships with and satisfying customers. Because marketing is used to attract customers, it is one of the primary components of business management and commerce. Marketers can direct product to other businesses (B2B marketing) or directly to consumers (B2C marketing).\r\nRegardless of who is being marketed to, several factors, including the perspective the marketers will use. These market orientations determine how marketers will approach the planning stage of marketing. This leads into the marketing mix, which outlines the specifics of the product and how it will be sold. This can in turn, be affected by the environment surrounding the product, the results of marketing research and market research, and the characteristics of the product's target market.\r\nOnce these factors are determined, marketers must then decide what methods will be used to market the product. This decision is based on the factors analyzed in the planning stage as well as where the product is in the product life cycle.\r\nMarketing is defined by the American Marketing Association as "the activity, set of institutions, and processes for creating, communicating, delivering, and exchanging offerings that have value for customers, clients, partners, and society at large". The term developed from the original meaning which referred literally to going to market with goods for sale. From a sales process engineering perspective, marketing is "a set of processes that are interconnected and interdependent with other functions of a business aimed at achieving customer interest and satisfaction".\r\nPhilip Kotler defined marketing as "Satisfying needs and wants through an exchange process", and a decade later defines it as “a social and managerial process by which individuals and groups obtain what they want and need through creating, offering and exchanging products of value with others.”\r\nThe Chartered Institute of Marketing defines marketing as "the management process responsible for identifying, anticipating and satisfying customer requirements profitably". A similar concept is the value-based marketing which states the role of marketing to contribute to increasing shareholder value. In this context, marketing can be defined as "the management process that seeks to maximise returns to shareholders by developing relationships with valued customers and creating a competitive advantage".\r\nIn the past, marketing practice tended to be seen as a creative industry, which included advertising, distribution and selling. However, because the academic study of marketing makes extensive use of social sciences, psychology, sociology, mathematics, economics, anthropology and neuroscience, the profession is now widely recognized as a science, allowing numerous universities to offer Master-of-Science (MSc) programs.\r\nThe process of marketing is that of bringing a product to market, which includes these steps: broad market research; market targeting and market segmentation; determining distribution, pricing and promotion strategies; developing a communications strategy; budgeting; and visioning long-term market development goals. Many parts of the marketing process (e.g. product design, art director, brand management, advertising, inbound marketing, copywriting etc.) involve use of the creative arts.","materialsDescription":"<span style=\"font-weight: bold; \">What the differences between B2B and B2C Marketing?</span>\r\nThe different goals of B2B and B2C marketing lead to differences in the B2B and B2C markets. The main differences in these markets are demand, purchasing volume, amount of customers, customer concentration, distribution, buying nature, buying influences, negotiations, reciprocity, leasing and promotional methods.\r\n<span style=\"font-style: italic; \">Demand:</span> B2B demand is derived because businesses buy products based on how much demand there is for the final consumer product. Businesses buy products based on customer's wants and needs. B2C demand is primarily because customers buy products based on their own wants and needs.\r\n<span style=\"font-style: italic; \">Purchasing Volume:</span> Businesses buy products in large volumes to distribute to consumers. Consumers buy products in smaller volumes suitable for personal use.\r\n<span style=\"font-style: italic; \">Amount of Customers:</span> There are relatively fewer businesses to market to than direct consumers.\r\n<span style=\"font-style: italic; \">Customer Concentration:</span> Businesses that specialize in a particular market tend to be geographically concentrated while customers that buy products from these businesses are not concentrated.\r\n<span style=\"font-style: italic; \">Distribution:</span> B2B products pass directly from the producer of the product to the business while B2C products must additionally go through a wholesaler or retailer.\r\n<span style=\"font-style: italic; \">Buying Nature:</span> B2B purchasing is a formal process done by professional buyers and sellers while B2C purchasing is informal.\r\n<span style=\"font-style: italic; \">Buying Influences:</span> B2B purchasing is influenced by multiple people in various departments such as quality control, accounting, and logistics while B2C marketing is only influenced by the person making the purchase and possibly a few others.\r\n<span style=\"font-style: italic; \">Negotiations:</span> In B2B marketing, negotiating for lower prices or added benefits is commonly accepted while in B2C marketing (particularly in Western cultures) prices are fixed.\r\n<span style=\"font-style: italic; \">Reciprocity:</span> Businesses tend to buy from businesses they sell to. For example, a business that sells printer ink is more likely to buy office chairs from a supplier that buys the business's printer ink. In B2C marketing, this does not occur because consumers are not also selling products.\r\n<span style=\"font-style: italic; \">Leasing:</span> Businesses tend to lease expensive items while consumers tend to save up to buy expensive items.\r\n<span style=\"font-style: italic; \">Promotional Methods:</span> In B2B marketing, the most common promotional method is personal selling. B2C marketing mostly uses sales promotion, public relations, advertising, and social media.\r\n<span style=\"font-weight: bold; \">What are marketing orientations?</span>\r\nA marketing orientation has been defined as a "philosophy of business management." or "a corporate state of mind" or as an "organization[al] culture". Although scholars continue to debate the precise nature of specific orientations that inform marketing practice, the most commonly cited orientations are as follows:\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Product</span></span>\r\nA firm employing a product orientation is mainly concerned with the quality of its product. A product orientation is based on the assumption that all things being equal, consumers will purchase products of superior quality. The approach is most effective when the firm has deep insights into customer needs and desires as derived from research and/or intuition and understands consumer's quality expectations and price consumers are willing to pay. Although the product orientation has largely been supplanted by the marketing orientation, firms practicing a product orientation can still be found in haute couture and arts marketing.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Sales</span></span>\r\nA sales orientation focuses on the selling/promotion of the firm's existing products, rather than developing new products to satisfy unmet needs or wants. This orientation seeks to attain the highest possible sales through promotion and direct sales techniques. The sales orientation "is typically practiced with unsought goods." One study found that industrial companies are more likely to hold a sales orientation than consumer goods companies. The approach may also suit scenarios in which a firm holds dead stock, or otherwise sells a product that is in high demand, with little likelihood of changes in consumer tastes diminishing demand.\r\nA 2011 meta-analyses found that the factors with the greatest impact on sales performance are a salesperson's sales-related knowledge (knowledge of market segments, sales presentation skills, conflict resolution, and products), degree of adaptiveness (changing behavior based on the aforementioned knowledge), role clarity (salesperson's role is to expressly to sell), cognitive aptitude (intelligence) and work engagement (motivation and interest in a sales role).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Production</span></span>\r\nA firm focusing on a production orientation specializes in producing as much as possible of a given product or service in order to achieve economies of scale or economies of scope. A production orientation may be deployed when a high demand for a product or service exists, coupled with certainty that consumer tastes and preferences remain relatively constant (similar to the sales orientation). The so-called production era is thought to have dominated marketing practice from the 1860s to the 1930s, but other theorists argue that evidence of the production orientation can still be found in some companies or industries. Specifically, Kotler and Armstrong note that the production philosophy is "one of the oldest philosophies that guides sellers... [and] is still useful in some situations."\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Marketing</span></span>\r\nThe marketing orientation is the most common orientation used in contemporary marketing. It is a customer-centric approach that involves a firm basing its marketing program around products that suit new consumer tastes. Firms adopting a marketing orientation typically engage in extensive market research to gauge consumer desires, use R&D (Research & Development) to develop a product attuned to the revealed information, and then utilize promotion techniques to ensure consumers are aware of the product's existence and the benefits it can deliver. Scales designed to measure a firm's overall market orientation have been developed and found to be robust in a variety of contexts.\r\nThe marketing orientation has three prime facets, which are:\r\n<span style=\"font-style: italic; \">Customer orientation:</span> A firm in the market economy can survive by producing goods that people are willing and able to buy. Consequently, ascertaining consumer demand is vital for a firm's future viability and even existence as a going concern.\r\n<span style=\"font-style: italic; \">Organizational orientation:</span> The marketing department is of prime importance within the functional level of an organization. Information from the marketing department is used to guide the actions of a company's other departments.\r\nAs an example, a marketing department could ascertain (via marketing research) that consumers desired a new type of product or a new usage for an existing product. With this in mind, the marketing department would inform the R&D department to create a prototype of a product/service based on consumers' new desires.\r\nThe production department would then start to manufacture the product, while the marketing department would focus on the promotion, distribution, pricing, etc. of the product. Additionally, a firm's finance department would be consulted, with respect to securing appropriate funding for the development, production, and promotion of the product. Finance may oppose the required capital expenditure since it could undermine a healthy cash flow for the organization.\r\n<span style=\"font-style: italic;\">Mutually beneficial exchange:</span> In a transaction in the market economy, a firm gains revenue, which thus leads to more profits, market shares, and/or sales. A consumer, on the other hand, gains the satisfaction of a need/want, utility, reliability and value for money from the purchase of a product or service.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Societal marketing</span></span>\r\nA number of scholars and practitioners have argued that marketers have a greater social responsibility than simply satisfying customers and providing them with superior value. Marketing organizations that have embraced the societal marketing concept typically identify key stakeholder groups such as employees, customers, and local communities. Companies that adopt a societal marketing perspective typically practice triple bottom line reporting whereby they publish social impact and environmental impact reports alongside financial performance reports. Sustainable marketing or green marketing is an extension of societal marketing.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Marketing.png"},{"id":341,"title":"Customer Service","alias":"customer-service","description":" Customer service is the process of ensuring customer satisfaction with a product or service. Often, customer service takes place while performing a transaction for the customer, such as making a sale or returning an item. Customer service can take the form of in-person interaction, a phone call, self-service systems, or by other means.\r\nCustomer service is an important part of maintaining ongoing client relationships, which is key to continuing revenue. For this reason, many companies have worked hard to increase their customer satisfaction levels.\r\nMost successful businesses recognize the importance of providing outstanding customer service. Courteous and empathetic interaction with a trained customer service representative can mean the difference between losing or retaining a customer.\r\nWhen problems arise, customers should receive timely attention to the issue. Prompt attention to emails and phone calls is critical to maintaining good relations. Requiring customers to stand in long lines or sit on hold can sour an interaction before it begins.\r\nIdeally, customer service should be a one-stop endeavor for the consumer. For example, if a customer calls a helpline regarding a problem with a product, the customer service representative should follow through with the customer until the issue is fully resolved.\r\nThis may entail scheduling appointments with in-person repair personnel if the problem cannot be resolved on the phone, or transferring a call to skilled technicians in another department. Proactively following up with the customer to ensure that he or she is fully satisfied is another smart move.","materialsDescription":" What are customer service standards?\r\nCustomer service standards are an internal corporate set of rules governing the company's customer service activities, an algorithm for communicating with customers, and general standards for responding to unusual situations. The standard of customer service is an integral part of the corporate standard of the company.\r\nFunctions of customer service standards:\r\n<ol><li>To order. The client does not encounter problems, does not see them, which means that he is confident that all the staff without exception are professionals who know their business.</li><li>To control. It is difficult to assess and monitor the work of each manager if there are no clear criteria for evaluation. At the same time, the implementation of the sales plan cannot be the only parameter of the assessment; you need to know whether the manager of customer service standards adopted in this company adheres.</li><li>To adapt. Among other things, the availability of customer service standards simplifies the procedure.</li></ol>\r\nCustomer service standards are effective if the customer does not see the difference between the work of two (or more) managers, and sees only “proprietary” service, always the same, regardless of any external factors or circumstances. The customer service standard, which has been tested in practice, backed up by experience (perhaps even someone else's), created on the basis of analytical studies and recognized methods, can be called "gold". It allows you to increase profits, improve the image of the company, attract new customers.\r\nCustomer service standards are an important part of the company's brand. But, in addition, the standards are necessary and other units, in particular, the department to work with staff. Therefore, their development must take into account the needs of all interested services of the company.\r\n<span style=\"font-weight: bold; \">What is the purpose of introducing customer service standards in the company?</span>\r\nThe objectives of implementing the standards are as follows:\r\n<ul><li>For employees with experience: minimize the number of erroneous and unnecessary actions. The result of this will be saving time of each employee (no errors - no need to spend time correcting them). And, as a result, increased productivity.</li><li>For novice employees: customer service standards allow you to transfer the necessary knowledge in the most concise manner and in a short time.</li><li>For the company: the abolition of dependence on the old-timers. Not all employees who have worked in the company for many years (or even since the day of foundation) are able to resist the so-called star disease. Having knowledge and experience, a person loses the ability to objectively evaluate his work, he begins to think that he is the best manager in the company. It can end very badly - in the event of dismissal, such an employee will take the base, and turn clients against the company. Standards for customer service are needed to ensure that all employees can be assessed on a single scale, based on the actual benefits they bring to the company, as well as the attitude of the employee to the company.</li><li>For the company: the uniformity of control activities of managers. Standards are unequivocal, exclude double interpretations, and therefore cannot cause controversy about the rightness of an employee or employer.</li><li>For managers: the standards of uniform customer service are the same for all managers, and this makes it possible to make the pay of each manager absolutely transparent and intelligible. Realizing that there will be no double interpretations, the manager may not be afraid that he will be paid less than expected - all his mistakes and achievements are immediately visible and understandable.</li></ul>\r\n<span style=\"font-weight: bold; \">The application of service standards allows you:</span>\r\n<ul><li>to develop a company style in dealing with clients;</li><li>to increase the effectiveness of the work of managers with new customers;</li><li>to bring the quality of communication with customers to a higher level;</li><li>to create a positive opinion of the company about the company, so that it can be recommended to its acquaintances, thus increasing the number of potential and then real customers;</li><li>to minimize conflicts between the manager and the customer;</li><li>to develop a technology for training newcomers;</li><li>to transfer the assessment of the work of the manager from the subjective to the objective, transparent and understandable to everyone;</li><li>to establish a procedure for controlling the work of personnel;</li><li>to increase the motivation of managers to work.</li></ul>\r\n<span style=\"font-weight: bold;\">Benefits of applying service standards</span>\r\n<ul><li>The accumulation of experience: the entire base focuses on the company, and not on the hands of managers, "old-timers." Thus, the departure of one or several “old” employees does not become a “natural disaster” for the company.</li><li>Motivation, analysis and control: customer service standards make it possible to develop a transparent scheme of managers' motivation based on a clear, almost mathematical analysis of their work. The sales process is optimized.</li><li>Setting goals. With the help of standards, the company has the ability to set clear, reasonable plans. This allows you to keep the atmosphere in the team friendly and stable, and the lack of "muffled" tasks - to increase the loyalty of managers to the company.</li><li>Standards of customer service is a fairly mobile system that allows you to immediately detect errors in working with clients and quickly eliminate them. In addition, at any stage of working with a client, the head of the sales department can intervene in the process, noticing an error in the work of the manager, and even be proactive in order to prevent an error to which the manager is heading.</li><li>Quick and easy start for beginners. Customer service standards are actually a knowledge base, collected, analyzed, and streamlined. Such information is easily transmitted and assimilated by beginners, which means that the beginner quickly gets to work and starts to make a profit. In addition, a newbie will not spoil relations with a client by awkward actions, since he already knows what to do in any conflict and problem situations.</li><li>Customer confidence. Customer service standards allow the latter to feel confident in the company - no matter where the customer is, he will always easily recognize “his” company by brand features and can be absolutely sure that in a small town they will be served as qualitatively as in a million-plus city, because that the company is well aware of their work. So, such a company can be trusted.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Customer_Service.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"absorb-lms":{"id":6860,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/image26.png","logo":true,"scheme":false,"title":"Absorb LMS","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"absorb-lms","companyTitle":"Absorb Software","companyTypes":["vendor"],"companyId":9252,"companyAlias":"absorb-software","description":"<h3>This cloud-based learning management system (LMS) empowers companies around the world to effectively deliver training. Built to facilitate engaging learning experiences, tap Absorb LMS to train internal employees, customers, partners and more. Whether you have 100 or 100,000+ learners, Absorb LMS delivers consistent, on-brand training—regardless of location, device or learning requirements.</h3>\r\nClunky legacy software can hinder your learning achievements or waste time. And basic LMS options might not scale to meet your current business needs. Absorb LMS overcomes both those challenges. This scalable eLearning solution serves 17.5 million learners in 120 verticals. Agile features and intuitive design get you up and training fast. Plus, 24/7/365 in-house support means you always have an Absorb expert in your corner.\r\n<h3 class=\"align-center\">Overview of Absorb LMS Features </h3>\r\n<p class=\"align-left\"> </p>\r\n<ul><li>Automated Workflows</li><li>Social Learning Tools</li><li>eCommerce Module</li><li>Content Libraries</li><li>Integrations</li><li>Reporting and Analytic</li><li>Mobile Learning</li><li>eCommerce Ready</li><li>AICC/SCORM Support</li><li>Built-In Course Authoring</li><li>Automated Certification Management</li><li>Automated Custom Reporting</li><li>Gamification</li><li>Social Learning Options</li><li>Instructor-Led Training Management</li><li>Custom Branded Learner Interface</li><li>Supports 20+ Learner Languages</li><li>HRIS and CRM Integrations via RESTful API</li><li>Gradebook</li><li>xAPI Support</li></ul>\r\n<h3 class=\"align-center\">Top features and benefits of Absorb LMS</h3>\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Engaging learner platform</span></span></li></ul>\r\n<p class=\"align-left\">Absorb LMS fosters deeper learner comprehension and retention. The intuitive platform supports multimedia content formats, responsive design, social learning, branded interfaces and more.</p>\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Reliable support</span></span></li></ul>\r\n<p class=\"align-left\">Count on award-winning 24/7/365 support from anywhere. You’ll always reach an Absorb employee if you need help. Plus, a dedicated Client Success Manager is also available to offer further support.</p>\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Actionable reporting</span></span></li></ul>\r\n<p class=\"align-left\">Prove ROI for your learning program with flexible, out-of-the-box reporting. Configure admin dashboards and schedule automated reporting to put critical data at your fingertips.</p>\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Robust security</span></span></li></ul>\r\n<p class=\"align-left\">Entrust your company’s safety to industry-leading experts. Absorb successfully completed the (SOC) 2 Type 2 examination for Security and Availability. Absorb also maintains the highest LMS compliance standards for data security and privacy protection (GDPR).</p>\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Modern mobile app</span></span></li></ul>\r\n<p class=\"align-left\">Empower learning, even without internet connection. The Absorb Learn mobile app maintains uniformity with the web LMS. Learners can train offline, then course progress automatically syncs when internet connection restores.<br />Rapid onboarding—Get going fast with Absorb Quick Start. This accelerated Absorb LMS onboarding program gets you setup in hours, not weeks. Hit the ground running, then scale as you need.</p>\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">In-the-flow learning</span></span></li></ul>\r\n<p class=\"align-left\">Absorb Infuse enables you to seamlessly integrate training into your native systems and applications your learners are already using—embedding training directly into work flow.</p>\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Immediate Training</span></span></li></ul>\r\n<p class=\"align-left\">With Absorb LMS, you do not have to start from scratch or wait a long time to begin deploying courses. The platform has pre-configured courses that you can distribute immediately. Because of this, you can gain a quick ROI. You can also count on these courses to be top-notch, as they are designed by trustworthy content providers. Indeed, materials from the content library are award-winning. Thus, you can be confident that you are working only with the best.</p>\r\n<p class=\"align-left\">Additionally, there is a broad variety of content available and not just long-form courses. There are videos, quizzes, and microlearning components that make learning more interactive.<br />Learner-centric Platform</p>\r\n<p class=\"align-left\"> </p>\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Collaborative Learning</span></span></li></ul>\r\n<p class=\"align-left\">Absorb LMS enables administrators to have more interactive and collaborative exchanges with students. That is because the solution has a set of collaborative tools for the purpose. Among the features for this are welcome billboards, integrated social media, leaderboards, news articles, and feedback loops. By using the billboards, for example, you can promote certain courses and engage them with externally sourced materials.</p>\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Smart Administration</span></span></li></ul>\r\n<p class=\"align-left\">Absorb LMS has a module called Smart Administration. Its purpose is to maximize the efficiency of the platform with its scheduling and automation tools. This means that your administrators can reduce the time they spend on actual administrative work.</p>\r\n<p class=\"align-left\"> </p>\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Courses Monetization</span></span></li></ul>\r\n<p class=\"align-left\">If you are selling your courses or if you are considering it, Absorb LMS can help. The software has a built-in ecommerce module that lets you control pricing, discounts, and tax setups. There are more than 70 payment gateways you can use, making it flexible. Because of this, you can make your courses accessible to individuals who have different payment method preferences.<br /><br /></p>","shortDescription":"A flexible learning platform that makes it easy to build and manage training programs for internal and external stakeholders. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Absorb LMS","keywords":"","description":"<h3>This cloud-based learning management system (LMS) empowers companies around the world to effectively deliver training. Built to facilitate engaging learning experiences, tap Absorb LMS to train internal employees, customers, partners and more. Whether y","og:title":"Absorb LMS","og:description":"<h3>This cloud-based learning management system (LMS) empowers companies around the world to effectively deliver training. Built to facilitate engaging learning experiences, tap Absorb LMS to train internal employees, customers, partners and more. Whether y","og:image":"https://old.roi4cio.com/fileadmin/user_upload/image26.png"},"eventUrl":"","translationId":6860,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":72,"title":"LMS - Learning Management System","alias":"lms-learning-management-system","description":"A<span style=\"font-weight: bold; \"> learning management system (LMS</span>) is a software application for the administration, documentation, tracking, reporting, and delivery of educational courses, training programs, or learning and development programs. \r\n<ul><li><span style=\"font-weight: bold; \">L — Learning. </span>With an LMS, you can create a single source of online courses and training materials. This will become a unique source of knowledge in your area so that you can keep and increase the in-house expertise of your company.</li><li><span style=\"font-weight: bold; \">M — Management.</span> You can manage courses and learners, and even improve your own efficiency. Unlike file-sharing services, an LMS is not just a heap of files; it’s a well-organized system where you manage the training process. To start training, simply add employees and assign courses.</li><li><span style=\"font-weight: bold; \">S — System.</span> A computer system, to be exact. An LMS automates the most boring and tedious work such as grading, processing statistics, and preparing reports. Plus, you can train your employees without leaving the office, managing all the processes right from your work computer.</li></ul>\r\nThe learning management system concept emerged directly from e-Learning. Although the first LMS appeared in the higher education sector, the majority of the LMSs today focus on the corporate market. Learning Management Systems make up the largest segment of the learning system market. \r\nLearning management systems were designed to identify training and learning gaps, utilizing analytical data and reporting. LMSs are focused on online learning delivery but support a range of uses, acting as a platform for online content, including courses, both asynchronous based and synchronous based. Learning management solutions may offer classroom management for instructor-led training or a flipped classroom, used in higher education, but not in the corporate space. \r\nMost modern learning management systems are web-based. There are a variety of integration strategies for embedding content into LMSs, including AICC, xAPI (also called 'Tin Can'), SCORM (Sharable Content Object Reference Model) and LTI (Learning Tools Interoperability). LMSs were originally designed to be locally hosted on-premises, where the organization purchases a license to a version of the software, and installs it on their own servers and network. Many LMSs are now offered as SaaS (software as a service), with hosting provided by the vendors.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Features Of An LMS</span></p>\r\nAll modern LMSs are loaded with many features. Some of the common features are:\r\n<ul><li><span style=\"font-weight: bold;\">Course content authoring and upload.</span> An LMS lets you author course content and upload course content in a wide variety of formats including audio, video, multimedia, documents, etc.</li><li><span style=\"font-weight: bold;\">User and course management.</span> An LMS offers user management and course management. User enrollment, tagging, course administration, order management, pre-registration and assigning courses can be done semi-automatically.</li><li><span style=\"font-weight: bold;\">Communication management.</span> An LMS can handle all course communications and notifications to concerned users. For example, an LMS can automatically send a notification to all enrolled users when a new assignment is uploaded by the teacher. There is no need to copy and paste contact data or switch between two digital services.<span style=\"font-weight: bold;\"></span></li><li><span style=\"font-weight: bold;\">Report management. </span>An LMS can generate a wide variety of reports, including student progress, score, student engagement, etc. The data can be utilized to gain valuable insight into the effectiveness of the course content.<span style=\"font-weight: bold;\"></span></li><li><span style=\"font-weight: bold;\">Assessment creation and management.</span> Assessments are a key part of any course. An LMS makes it easy to create and manage these assessments, both system evaluated and tutor evaluated. You can get a result in a single click for all students.</li></ul>\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Types of Learning Management Systems</span></h1>\r\n<span style=\"font-weight: bold; \">Free vs. Commercial.</span> This is typically one of the first dilemmas organizations face when choosing an LMS.\r\n<span style=\"font-style: italic; \">Free, open-source software</span> has a pretty clear upside: It’s free. Also, because the source code is open, it can be modified to be highly customizable for each organization. However, most free LMS products tend to be more complicated than commercial products — typically they are utilized by more sophisticated users. \r\n<span style=\"font-style: italic; \">Commercial software</span>, on the other hand, offers users a support staff, and tends to be much easier to deploy, and use. But of course it costs money. Among commercial LMS products, there are typically two main forms: Installed, or the service-based cloud option.\r\n<span style=\"font-weight: bold; \">Installed vs. SaaS.</span> One of the most important elements of an LMS is the ability to scale up or down quickly and easily. Commercial LMS software solutions are typically sold as either a locally hosted enterprise product, which is hosted on an organization’s own servers, or as a Software-as-a-Service (SaaS) offering, which is hosted on the vendor’s servers and is accessible from anywhere (the data is stored in “the cloud”).\r\nGenerally,<span style=\"font-style: italic; \"> cloud-based</span> LMS products offer trainers more flexibility when it comes to scaling up or down. Because the product is sold as a “service” (usually monthly), the burden of making systems upgrades, freeing up bandwidth, and providing IT support falls on the vendor. Because data does not have to be stored on local servers, scalability isn’t a concern; most SaaS LMSs can ramp up or down by thousands of users with ease.\r\nA <span style=\"font-style: italic; \">locally installed LMS</span> offers users the ability to individualize and customize their LMS. So if an organization already has an IT staff in place that can administer the system, handle support and customization and scalability concerns, a locally hosted LMS can be powerful.\r\n<span style=\"font-weight: bold; \">Course-creating or not. </span>Another thing to look for in an LMS is whether it comes with the ability to create training content. In some cases, an LMS is simply a tool to distribute course content, which must be created in a Learning Content Management System elsewhere.\r\nSome LMS systems, however, do come with some authoring tools that allow trainers and designers to develop their own unique content. Other LMS vendors offer separate course-creation tools for purchase, while some offer no authoring tools whatsoever, and instead rely on third-party course materials.\r\n<span style=\"font-weight: bold; \">Integrated. </span>As LMS systems become more sophisticated, one of the most exciting developments is the ability for the system to integrate with other applications your organization already uses — whether that’s internal calendars, email, or social networks. \r\nOther LMS products may also integrate closely with <span style=\"font-style: italic;\">talent management systems</span>, which tend to focus on providing support to Human Resource staff functions like recruiting, performance management, and payroll. Depending on your organization’s needs, you may keep an eye out for an LMS that features this sort of app integration.<span style=\"font-weight: bold; \"></span>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Choosing a Learning Management System</span></h1>\r\n<p class=\"align-left\">Choosing the right LMS is crucial to the success of your eLearning strategy. The selection process may seem overly complicated and stressful, but it doesn’t have to be! With these steps to choosing an LMS, you’ll discover a simple and straightforward technique to help you choose perfect LMS for your business needs. </p>\r\n<span style=\"font-weight: bold; \">Identify your audience.</span> Identify exactly what you need from your LMS and who your learning content is aimed towards. This will vary depending on your learner audience and the type of training you wish to deliver.\r\nIf you’re<span style=\"font-weight: bold; \"> </span><span style=\"font-style: italic; \">training your employees,</span> you’ll need an LMS tools to formalize learning processes, like employee onboarding, and improve employee retention.\r\nIf <span style=\"font-style: italic; \">compliance training </span>is your focus, you’ll need an LMS that makes it easy to achieve, maintain, and track compliance.\r\n<span style=\"font-style: italic; \">Customer training</span> delivered through an LMS optimizes onboarding, increases retention and presents opportunities for upselling thanks to customers who complete training having a more thorough understanding of your product or service.\r\nIf you need an LMS for <span style=\"font-style: italic; \">partner training,</span> your priorities will be scaling your partner business while building and protecting your brand. \r\n<span style=\"font-weight: bold; \">Focus on important features. </span>There are many basic LMS’s out there, but your LMS has to support your “need to have” features to ensure it’s fit for purpose. Some examples of invaluable LMS features include:\r\n<ul><li><span style=\"font-weight: bold; \">Ease of use</span> - A platform that’s easy to use ensures your learners and admins can use the LMS without needing training on how to do so. This makes the process of using the LMS a positive experience, increasing engagement.</li><li><span style=\"font-weight: bold; \">Reporting</span> - LMS reporting makes it easy to accurately track learner progression, course status and completion rate, exam results, etc.</li><li><span style=\"font-weight: bold; \">Integrations</span> - By integrating applications you already use in your organization, you’ll get the most efficiency out of your LMS. LMS integration can help increase learner and admin engagement, and delivers a better user experience.</li><li><span style=\"font-weight: bold; \">SCORM and xAPI compliant </span>- Ensuring your LMS is SCORM and xAPI compliant is a pretty essential feature. If the LMS you’re considering isn’t compliant, it’s likely it’s a very basic system.</li><li><span style=\"font-weight: bold; \">Portals</span> - Learning portals offer your learners a great user experience, but also make it possible to manage multiple training audiences in one system.</li></ul>\r\n<span style=\"font-weight: bold; \"><span style=\"color: rgb(97, 97, 97); \">Evaluate each LMS. </span></span><span style=\"color: rgb(97, 97, 97); \">Start evaluating potential contenders by doing an initial round of high-level research to identify systems that appear to meet both your training audience and features list needs. This will become your LMS longlist. Once compiled you can then evaluate each one individually to rule it in or out of the next stage of selection.</span>\r\n<span style=\"font-weight: bold; \">Look beyond the LMS.</span> Go online and research LMS vendors on your shortlist. Find out as much as you can about each company. Once you’re satisfied with the company’s reputation, peer reviews, and support services, sign yourself up for a free trial and demo so that you can see the LMS in action and understand how the system will meet your audience and feature requirements. You could also submit support tickets to each vendor during your free trial to compare the responsiveness and attentiveness of each support team. \r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What are the advantages and disadvantages?</span><span style=\"font-style: italic; \"></span></h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\"><span style=\"font-style: italic; \">Advantages:</span></span> </p>\r\nThere are six major advantages of LMS: interoperability, accessibility, reusability, durability, maintenance ability and adaptability, which in themselves constitute the concept of LMS.\r\nOther advantages include:\r\n<ul><li>An LMS supports content in various formats: text, video, audio, etc.</li><li>One can access materials anytime, from everywhere, teachers can modify the content, and students can see the updated material.</li><li>The evaluation of students is easier and fair, based on student attendance and online quizzes.</li><li>Students and teachers can re-use the material every time they need.</li><li>Students can learn collaboratively by setting up a School website with the LMS software and helps "Keeps organizations up-to-date with compliance regulations. If your organization must stay up-to-date with current compliance regulations, then a Learning Management System can be an invaluable tool. Compliance laws change on a regular basis, and updating a traditional course to reflect these changes can be a time-consuming chore.</li></ul>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\"><span style=\"font-style: italic; \">Disadvantages:</span></span></p>\r\nAlthough there are many advantages of LMSs, authors have identified some disadvantages of using these systems.\r\n<ul><li>Implementing an LMS requires a well-built technology infrastructure. Teachers have to be willing to adapt their curricula from face to face lectures to online lectures.</li><li>Expense.</li><li>Difficulty of learning to use authoring software.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/LMS_-_Learning_Management_System1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["24-translate-translation-memory-systems","2event","360learning","3ants","3d-warehouse","3dexperience-platform","6connex-platform","6scan","802-secure-airshield","a10-thunderrtps","abatis-for-maritime-ics-scada","abatis-hdf","abbyy-finereader","abbyy-flexicapture","abbyy-lingvo","abbyy-mobile-imaging-sdk-ii","abbyy-real-time-recognition-sdk","absalon-crm","absalon-crm-for-consumer-goods","absorb-lms"]},"links":{"first":"http://apis.roi4cio.com/api/products?page=1","last":"http://apis.roi4cio.com/api/products?page=106","prev":null,"next":"http://apis.roi4cio.com/api/products?page=2"},"meta":{"current_page":1,"from":1,"last_page":106,"path":"http://apis.roi4cio.com/api/products","per_page":20,"to":20,"total":2106},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"113":{"id":113,"title":"Virtual Event Platforms"},"155":{"id":155,"title":"LMS"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}