{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"en":"Configurator","ru":"Конфигуратор","_type":"localeString"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"en":"Using","ru":"Используют","_type":"localeString"},"sort-title-asc":{"en":"From A to Z","ru":"От А до Я","_type":"localeString"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"en":"deployment","ru":"внедрение","_type":"localeString"},"vendor-popover":{"en":"vendor","ru":"производитель","_type":"localeString"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"_type":"localeString","en":"Rating ascending","ru":"По возрастанию рейтинга"},"sort-rating-desc":{"en":"Rating descending","ru":"По убыванию рейтинга","_type":"localeString"},"sort-discount-asc":{"_type":"localeString","en":"Rebate ascending","ru":"По возрастанию скидки"},"sort-discount-desc":{"en":"Rebate descending","ru":"По убыванию скидки","_type":"localeString"},"i-use-it-popover":{"en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString"},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"rebate-for-poc":{"_type":"localeString","en":"Bonus 4 POC","ru":"Бонус 4 POC"},"rebate":{"_type":"localeString","en":"Bonus","ru":"Бонус"},"vendor-verified":{"ru":"Поставщик потверждён","_type":"localeString","en":"Vendor verified"},"program-sends-data":{"en":"Program sends data","_type":"localeString"},"learn-more-btn":{"_type":"localeString","en":"Learn more","ru":"Узнать больше"},"categories-popover":{"en":"categories","ru":"категории","_type":"localeString"},"sort-popular-asc":{"_type":"localeString","en":"Popular ascending","ru":"По возростанию популярности"},"sort-popular-desc":{"ru":"По убыванию популярности","_type":"localeString","en":"Popular descending"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"login":{"ru":"Войти","_type":"localeString","en":"Login","de":"Einloggen"},"register":{"de":"Registrieren","ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"auth-message":{"de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You need to register or login."},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"items-found":{"ru":"Продуктов найдено","_type":"localeString","en":"Products found"},"sort-sales-desc":{"en":"By sale","ru":"По продаже","_type":"localeString"},"sort-purchases-desc":{"ru":"По покупке","_type":"localeString","en":"By purchase"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"en":"Product producer","ru":"Производитель продукта","_type":"localeString"},"products-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"_type":"localeString","en":"Requests","de":"References","ru":"Мои запросы"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}},"filters":{"from":{"en":"from","ru":"от","_type":"localeString"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"_type":"localeString","en":"Filter by price","ru":"Фильтр по цене"},"view-type-label":{"_type":"localeString","en":"View","ru":"Вид"},"sort-type-label":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"category":{"en":"Category","ru":"Категория","_type":"localeString"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"_type":"localeString","en":"Providers","ru":"Поставщик, производитель"},"business-tasks-field":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"en":"Configurator","ru":"Конфигуратор","_type":"localeString"},"roi-calculator-checkbox":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"apply-filter-button":{"en":"Apply filter","ru":"Применить фильтр","_type":"localeString"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"en":"Show all","ru":"Показать все","_type":"localeString"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"_type":"localeString","en":"Product Categories","ru":"Категории продуктов"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"_type":"localeString","en":"Seller","ru":"Продавец"},"vendors":{"en":"User products vendors","ru":"Производители продуктов пользователя","_type":"localeString"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"en":"Users","ru":"Пользователи","_type":"localeString"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"_type":"localeString","en":"With reference","ru":"С референсами"},"show-deal-checkbox":{"_type":"localeString","en":"Show deal with noname","ru":"Показывать сделки с noname"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"find":{"_type":"localeString","en":"Find","ru":"Выполнить поиск"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"_type":"localeString","en":"Add deployment","ru":"Добавить внедрение"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"sort-title-desc":{"en":"From Z to A","ru":"От Я до А","_type":"localeString"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"_type":"localeString","en":"Supply type","ru":"Тип поставки"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"en":"Company type","ru":"Тип компании","_type":"localeString"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"_type":"localeString","en":"Customers","ru":"Покупатели"},"product-supplier":{"en":"Product supplier","ru":"Поставщик продукта","_type":"localeString"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"en":"Canceled","ru":"Отменено","_type":"localeString"},"deal-canceled":{"en":"Deal canceled","ru":"Сделка отменена","_type":"localeString"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"_type":"localeString","en":"Finished","ru":"Завершено"},"in-process":{"en":"In Process","ru":"Ведется","_type":"localeString"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"label":"catalog-products-text-block","body":{"en":[{"style":"normal","_key":"8bebcfb34955","markDefs":[],"children":[{"marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550","_type":"span"}],"_type":"block"}],"ru":[{"children":[{"marks":[],"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0","_type":"span"}],"_type":"block","style":"normal","_key":"28241882db7a","markDefs":[]}],"_type":"localeBlock"}}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"title":{"_type":"localeString","en":"ROI4CIO: Products","ru":"ROI4CIO: Продукты"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Продукты","_type":"localeString","en":"Products"}},{"translations":{"_type":"localeString","en":"Description","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI"},"name":"description"},{"name":"og:description","translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI"}},{"translations":{"ru":"каталог, программное обеспечение, софт, ит услуги","_type":"localeString","en":"keyword"},"name":"keywords"},{"name":"title","translations":{"en":"Products","ru":"Продукты","_type":"localeString"}}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"skybox-firewall-assurance":{"id":1172,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/SKYBOX_FIREWALL_ASSURANCE.png","logo":true,"scheme":false,"title":"Skybox Firewall Assurance (FA)","vendorVerified":0,"rating":"1.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"skybox-firewall-assurance","companyTitle":"SkyBox","companyTypes":["supplier","vendor"],"companyId":4065,"companyAlias":"skybox","description":" Skybox® Firewall Assurance provides comprehensive automation of firewall management tasks across different firewall vendors and complex rulesets. It simplifies compliance management, ensuring the state of your network is always in line with security policy design. And Firewall Assurance supports implementation of DISA STIGs and CIS benchmarks.\r\nSkybox also helps reduce risk on firewalls themselves, so they can better protect your assets. With config data, OS versions and powerful analytics, Firewall Assurance can spot vulnerabilities on firewall devices.\r\nDesigned as a complete firewall life cycle management solution, Firewall Assurance empowers you to:\r\n<ul><li>Analyze virtual and cloud–based firewalls to better control east–west or north–south traffic</li></ul>\r\n<ul><li>Detect security and compliance problems using out–of–the–box or customized policies</li></ul>\r\n<ul><li>Track changes for continuous firewall monitoring</li></ul>\r\n<ul><li>Clean up and optimize firewall rules</li></ul>\r\n<ul><li>Normalize firewall rulesets for a consistent view across multiple vendors</li></ul>\r\n<span style=\"font-weight: bold;\">FIREWALL ASSURANCE BENEFITS</span>\r\n<ul><li>Identify security policy violations and platform vulnerabilities on your firewalls</li></ul>\r\n<ul><li>Get change recommendations to fix overly permissive rules through syslog and ACL data analysis</li></ul>\r\n<ul><li>Analyze how network traffic could flow through a firewall</li></ul>\r\n<ul><li>Automate firewall management for traditional, next–gen, virtual and cloud–based firewalls</li></ul>\r\nWhen you’re responsible for keeping your network secure and firewalls compliant and optimized, you need to see how firewall rules and configurations impact your attack surface. Powerful analytics deliver accurate insights on–demand, and automated end–to–end rule life cycle management ensures continuous control of your firewalls.\r\n<span style=\"font-weight: bold;\">Delivers Continuous Detection of Security Threats and Compliance Risks</span>\r\n<ul><li>Highlights access policy violations and provides root cause analysis</li></ul>\r\n<ul><li>Identifies rule conflicts and misconfigurations</li></ul>\r\n<ul><li>Identifies vulnerabilities on firewalls</li></ul>\r\n<ul><li>Incorporates compliance metrics and configuration analysis</li></ul>\r\n<span style=\"font-weight: bold;\">Supports Next-Generation Firewalls</span>\r\n<ul><li>Supports next-generation firewall access and rule compliance at the user and application level</li></ul>\r\n<ul><li>Shows the relationship between IPS signatures and vulnerability occurrences on assets, helping admins configure IPS signatures correctly</li></ul>\r\n<span style=\"font-weight: bold;\">Provides Comprehensive Visibility and Reporting</span>\r\n<ul><li>Gives fast insight to how firewall risks impact your attack surface</li></ul>\r\n<ul><li>Shows the relation between firewalls and zones on an interactive map</li></ul>\r\n<ul><li>Automates reporting for firewall ruleset audits</li></ul>\r\n<span style=\"font-weight: bold;\">Keeps Firewalls Continuously Optimized</span>\r\n<ul><li>Imports, combines and normalizes firewall data automatically from multiple vendors</li></ul>\r\n<ul><li>Automates rule recertification to streamline rulesets and ensure compliance</li></ul>\r\n<ul><li>Continuously monitors firewalls to eliminate security gaps</li></ul>\r\n<ul><li>Targets redundant, hidden and obsolete rules for cleanup and optimization</li></ul>","shortDescription":"Skybox Firewall Assurance: Firewall management software for a clean, optimized and compliant firewall state","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Skybox Firewall Assurance (FA)","keywords":"firewalls, firewall, rulesets, FIREWALL, Firewall, Assurance, cloud-based, With","description":" Skybox® Firewall Assurance provides comprehensive automation of firewall management tasks across different firewall vendors and complex rulesets. It simplifies compliance management, ensuring the state of your network is always in line with security policy de","og:title":"Skybox Firewall Assurance (FA)","og:description":" Skybox® Firewall Assurance provides comprehensive automation of firewall management tasks across different firewall vendors and complex rulesets. It simplifies compliance management, ensuring the state of your network is always in line with security policy de","og:image":"https://old.roi4cio.com/fileadmin/user_upload/SKYBOX_FIREWALL_ASSURANCE.png"},"eventUrl":"","translationId":1173,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":489,"title":"Network Security Policy Management","alias":"network-security-policy-management","description":" <span style=\"font-weight: bold; \">Network security policy management </span>streamlines security policy design and enforcement. It applies rules and best practices to manage firewalls and other devices more effectively, efficiently, and consistently. Administrators need network security management solutions to get a high level of visibility into network behavior, automate device configuration, enforce global policies, view firewall traffic, generate reports, and provide a single management interface for physical and virtual systems.\r\nSecurity policies govern the integrity and safety of the network. They provide rules for accessing the network, connecting to the Internet, adding or modifying devices or services, and more. However, rules are only effective when they are implemented. Network security management policy helps organizations stay compliant and secure by ensuring that their policies are simplified, consistent, and enforced. It helps reduce manual tasks and human errors by simplifying administration with security policy and workflow tools through a centralized management interface.\r\nNetwork security management can reduce risk across the network and protect data by leveraging the information on threats, network vulnerabilities and their criticality, evaluating potential options to block an attack, and providing intelligence for decision support. Policy administration is improved by unifying common policy tasks within a single interface, automating policy change workflow, including compliance audits and the management of multiple firewall vendors. This simplified and automated security policy management enables IT teams to save time, avoid manual errors, and reduce risk. \r\nThere are the whole network security policy management market with different tools and solutions available. Businesses use them to automate administrative tasks, which can improve accuracy and save time. The solutions can make management processes less tedious and time consuming, and can free up personnel for higher-value projects. These solutions also help IT teams avoid misconfigurations that can cause vulnerabilities in their networks. And if problems arise, network security policy management solutions can ease troubleshooting and remediation. ","materialsDescription":"<h1 class=\"align-center\">Benefits of network security policy management</h1>\r\n<span style=\"font-weight: bold;\">Streamline security policy design and enforcement</span>\r\nA network security policy management solution can help organizations achieve:\r\n<ul><li><span style=\"font-weight: bold;\">Better security.</span> Network security policy management streamlines security policy design and enforcement.</li><li><span style=\"font-weight: bold;\">Ease of use.</span> Network security policy management tools orchestrate policy design and implementation.</li><li><span style=\"font-weight: bold;\">Consistency. </span>Solutions provide templates, model policies, and configurations.</li><li><span style=\"font-weight: bold;\">Time savings.</span> Deployments are faster, and automation helps empower staff to focus on other business priorities.</li><li><span style=\"font-weight: bold;\">Lower costs.</span> Cloud-based solutions scale to thousands of devices, requiring fewer resources and allowing for centralized management.</li></ul>\r\n<span style=\"font-weight: bold;\">Apply best practices to meet challenges in firewall management</span>\r\nOver time, firewalls collect more and more configuration rules and objects. Network security policy management solutions can help combat this bloat and improve security by addressing:\r\n<ul><li><span style=\"font-weight: bold;\">Object auditing.</span> Administrators need to merge and reduce duplicate objects, determine which unused objects should be deleted, and identify inconsistent objects. Network security policy management tools help them achieve a cleaner, more consistent configuration that is less of a nuisance to manage and less vulnerable to attacks.</li><li><span style=\"font-weight: bold;\">Policy inconsistencies.</span> The network security policy management tools locate unused or shadow policies and assist IT to fix possible problems.</li><li><span style=\"font-weight: bold;\">Version control and upgrades.</span> Network security policy management solutions ease these transitions with filters that simplify and automate processes and ensure high availability.</li></ul>\r\n<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Security_Policy_Management.png"},{"id":687,"title":"Network Administration","alias":"network-administration","description":" Computer networks are critical parts of almost every organization. Network and computer systems administrators are responsible for the day-to-day operation of these networks. They organize, install, and support an organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. Administrators manage an organization’s servers and desktop and mobile equipment. They ensure that email and data storage networks work properly. They also make sure that employees’ workstations are working efficiently and stay connected to the central computer network. In some cases, administrators help network architects design and analyze network models. They also participate in decisions about buying future hardware or software to upgrade their organization’s network. Some administrators provide technical support to computer users, and they also may supervise computer support specialists who help solve users’ problems.\r\nAs with many technical roles, network administrator positions require a breadth of technical knowledge and the ability to learn the intricacies of new networking and server software packages quickly. Within smaller organizations, the more senior role of a network engineer is sometimes attached to the responsibilities of the network administrator. It is common for smaller organizations to outsource this function.\r\nA computer network is a telecommunications network that allows computers to exchange data. In computer networks, networked computing devices exchange data with each other along with network links (data connections). The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.\r\nNetwork computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as personal computers, mobile phones, servers as well as networking hardware. Two such devices can be said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other.\r\nComputer networks differ in the transmission media used to carry their signals, the communications protocols to organize network traffic, the network's size, topology, and organizational intent. In most cases, communications protocols are layered on (i.e. work using) other more specific or more general communications protocols, except for the physical layer that directly deals with the transmission media.\r\nComputer networks support an enormous number of applications such as access to the World Wide Web, video, digital audio, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications as well as many others.","materialsDescription":" <span style=\"font-weight: bold; \">What is a network administrator?</span>\r\nA network administrator is responsible for keeping an organization’s computer network up-to-date and operating as intended. Any company or organization that uses multiple computers or software platforms need a network admin to coordinate and connect the different systems. It seems simple enough—but there’s another common IT job title that may trip you up: systems administrator.\r\n<span style=\"font-weight: bold; \">Is a network administrator the same thing as a systems administrator?</span>\r\nIn short — not really. But the lines can blur depending on the work environment. Careers in IT can sometimes take a page from the rules of Whose Line Is It, Anyway? — “Where the titles don’t matter and the duties are made up!” While that’s clearly a bit of an exaggeration, in many smaller organizations, the terms “network administrator” and “systems administrator” are often interchangeable as they cover the same tasks. That being said, the differences between network and systems administrators become much clearer in large organizations. The best way to differentiate between the two is to examine the type of work they do.\r\n<span style=\"font-weight: bold; \">What are the job duties of network and systems administrators?</span>\r\nThe duties of a network administrator will vary considerably depending on the organization they work for. Some work as broad, jack-of-all-trades generalists who cover everything from hardware setup to troubleshooting servers while others have a much narrower focus.\r\nHere are some sample network and systems administrator job duties. In environments where the duties of network administrators and systems administrators are split and more clearly defined, the italicized duties align more with systems administrators:\r\n<ul><li>Configuring network hardware like servers, routers, and switches</li><li>Upgrading and repairing computer networks</li><li>Troubleshooting network issues</li><li>Assisting network architects with the design of network models</li><li>Deploying and updating software</li><li>Managing servers and their operating systems</li><li>Implementing security measures and basic testing</li><li>Managing cloud and physical network storage</li></ul>\r\n<span style=\"font-weight: bold;\">What skills or traits do the best network administrators possess?</span>\r\nObviously, network administration positions will require substantial technical competence, but there’s more to the job than just knowing your stuff. Here are a few of the most common nontechnical abilities that will benefit you as a network administrator:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Analyzing and critical thinking</span></span>\r\nNetwork admins need to explore and solve problems logically and consistently. “[The] ability to take the concepts you’ve learned in school and understand how they work and affect other concepts is the bread and butter of being a network administrator,” says Brad Meyer, systems administrator at TechnologyAdvice. Even if you don’t yet know the solution, he believes thinking critically will help you get there.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Time management</span></span>\r\nNetwork admins juggle several projects, people and problems simultaneously. This means it’s essential to be organized in the present and looking ahead to prepare for what’s coming next. It’s like spinning plates—with a little practice, a network admin can keep everything balanced.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Interpersonal skills</span></span>\r\nNetwork admins work with a range of people, from network engineers to help desk employees to end-users, explains IT consultant Eric Jeffery. He says bridging the gap between diverse groups of people requires patience and understanding.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">A drive to learn more</span></span>\r\nThe IT field is no stranger to change—and new technologies can put even well-established network admins behind the eight balls. This means the best network admins have a passion for learning as they adapt to changing tech demands. This desire to learn more is also important for the more mundane day-to-day work—inevitably you’ll encounter issues you’ve never seen before and the only solution is to start researching potential answers.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Administration.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":" MDR, which stands for Managed Detection & Response, is an all-encompassing threat detection system, which arose from the need for small/medium-sized organizations who lack resources to be able to monitor their network systems in-house. It provides a cost-effective alternative to SIEM (Security Information and Event Management).\r\nEveryday, the capabilities of attackers get more sophisticated and the volume of alerts becomes overwhelming and unmanageable. In-house teams might struggle to analyze and log data, which makes it harder than ever to determine if these threats are harmful. MDR can put a stop to attacks before they even happen. MDR technology monitors your systems and detects any unusual behavior, whilst our expert team responds to the threats detected within your business.\r\nMDR offers real-time threat intelligence, and is able to analyse behaviour which can be missed by traditional endpoint security technology. MDR also provides rapid identification of known threats, which in turn minimises overall attacks. Having remote incident investigation will minimise damage to your business, and will allow you to get back to work in no time. It’s important to note that using MDR services will allow third party access to your company's data. You need to consider working with a provider who understands and respects your data policy.","materialsDescription":" <span style=\"font-weight: bold;\">What is Managed Detection and Response?</span>\r\nManaged Detection and Response (MDR) is a managed cybersecurity service that provides intrusion detection of malware and malicious activity in your network, and assists in rapid incident response to eliminate those threats with succinct remediation actions. MDR typically combines a technology solution with outsourced security analysts that extend your technologies and team.\r\n<span style=\"font-weight: bold;\">Isn’t that What MSSPs or Managed SIEMs Do?</span>\r\nNo. Managed Security Service Providers (MSSPs) monitor network security controls and may send alerts when anomalies are identified. MSSPs typically do not investigate the anomalies to eliminate false positives, nor do they respond to real threats. This means that abnormalities in network usage are forwarded to your IT personnel who must then dig through the data to determine if there is a real threat and what to do about it.\r\n<span style=\"font-weight: bold;\">Doesn’t My Firewall Protect My Network?</span>\r\nFirewalls and other preventive forms of cybersecurity are very important and effective at preventing basic cyberattacks. However, over the past decade, it has become clear that preventive cybersecurity technologies are not enough to secure an organization’s network. Further, they are yet another source of alerts, log messages, and events that contribute to the “alert fatigue” being universally suffered today. Recent major hacks such as the Marriot Hack of 2018, the Anthem Hack of 2015, and the Target Hack of 2013 demonstrate how easily cybercriminals can breach networks at enterprise organizations to steal millions of credit card numbers, medical records, and other forms of PII/PHI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Endpoint_Detection_and_Response.png"},{"id":327,"title":"Change and Configuration Management Software","alias":"change-and-configuration-management-software","description":" Software teams today face significant challenges. Companies require the production of high-quality software at unprecedented speeds. Software application requirements continue to grow more complex often with shorter and more frequent release cycles. Distributed development teams present challenges related to effective teaming, parallel development and diverse platforms - these factors and more intensify the pressures of developing quality software. Developing quality software in a repeatable and predictable fashion requires managing and tracking development artifacts and the activities of the development team. Successful development teams utilize software configuration management and software change management tools to help manage the software development lifecycle.\r\nSoftware configuration management provides version control and parallels development support to manage and control software assets. Software change management provides defect tracking and automation of software processes across the development lifecycle.\r\nSolutions that combine software configuration management and software change management in a single, tightly integrated solution are referred to as software change and configuration management (SCCM) solutions. SCCM solutions utilize activities to easily manage changes made to development artifacts. Unlike standalone SCM tools, SCCM solutions usually include substantial workflow capabilities which automate and effectively govern the software development processes for repeatable and predictable software development.\r\nEssentially, SCCM answers the ‘who’, ‘what’, ‘when’, and ‘why’ of software development. Who made the changes? What changes were made to the software? When were the changes made? Why were the changes made? Development teams and project leaders should be able to obtain answers to these questions to manage a project's activities, determine project status and track the actual product evolution.\r\nA fully comprehensive software change and configuration management (SCCM) solution empowers companies by accelerating software and systems delivery, making global teams more efficient, and governing the end-to-end software development processes. Solutions should be secure, flexible, and robust as well as provide the ability to support any size team, regardless of platform or location. Selecting ‘best in class’ solution, implementing proven best practices and partnering with a company that is a leader in technology reduces the risks associated with quality software development.","materialsDescription":" \r\n<span style=\"font-weight: bold;\">What is software configuration management (SCM)?</span>\r\nSoftware configuration management (SCM) is designed to control change by identifying and tracking changed software artifacts and managing different versions of these artifacts.\r\n<span style=\"font-weight: bold;\">What is software change and configuration management (SCCM)?</span>\r\nSoftware change and configuration management (SCCM) provide the comprehensive integration with best practice guidance of software configuration management and software change management capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Change_and_Configuration_Management_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"skybox-security-suite":{"id":3733,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/SkyBox.png","logo":true,"scheme":false,"title":"Skybox Security Suite","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"skybox-security-suite","companyTitle":"SkyBox","companyTypes":["supplier","vendor"],"companyId":4065,"companyAlias":"skybox","description":"The Skybox® Security Suite is a cyber risk management platform built to conquer security challenges in complex enterprise networks.\r\nBy integrating with more than 120 networking and security technologies, the Suite gives exceptional and seamless visibility across physical IT, multi–cloud and OT networks. Our analytics and intelligence provide the context needed to bridge the gaps between point solutions, so security teams can fulfill the goals of vulnerability, threat, firewall and security policy management programs — even in the world’s largest organizations. \r\n<span style=\"font-weight: bold;\">TOTAL VISIBILITY</span>\r\n<span style=\"font-style: italic;\">See everything in your hybrid network in one view</span>\r\nSkybox analyzes information from your organization’s assets and networks to provide a contextual understanding of your risk of cyberattack so you can proactively address that risk. Collecting data from a variety of sources, \r\nSkybox builds a model encompassing your:\r\n<ul><li>Network topology (routers, load balancers, switches)</li></ul>\r\n<ul><li>Security controls (firewalls, IPS, VPN)</li></ul>\r\n<ul><li>Assets (servers, workstations, networks including traditional IT, multi–cloud and OT)</li></ul>\r\n<ul><li>Vulnerabilities and threats</li></ul>\r\nThe model is regularly and automatically updated to reflect the actual state of your network.\r\n<span style=\"font-weight: bold;\">THREAT–CENTRIC VULNERABILITY MANAGEMENT</span>\r\n<span style=\"font-style: italic;\">Stop chasing the wrong vulnerabilities</span>\r\nSkybox takes a fundamentally different approach to vulnerability management. Using asset, network and threat context, we focus remediation on vulnerabilities most likely to be attacked: those with active exploits in the wild and exposed in your environment.\r\nSkybox analyzes multiple factors to prioritize remediation, including:\r\n<ul><li>Vulnerability severity</li></ul>\r\n<ul><li>Compliance</li></ul>\r\n<ul><li>Age</li></ul>\r\n<ul><li>Location</li></ul>\r\n<ul><li>Exploitability</li></ul>\r\n<ul><li>Prevalence (density)</li></ul>\r\n<ul><li>Asset role</li></ul>\r\n<ul><li>Asset value</li></ul>\r\n<ul><li>Threats</li></ul>\r\n<ul><li>Network topology</li></ul>\r\n<ul><li>Security controls</li></ul>\r\n<span style=\"font-weight: bold;\">SECURITY POLICY MANAGEMENT</span>\r\n<span style=\"font-style: italic;\">Automate and orchestrate across your entire network</span>\r\nSkybox delivers automated tasks and workflows to simplify and centralize security policy management across traditional IT, multi–cloud and OT networks.\r\n<ul><li>Create analytics–driven, automated processes that scale and adapt to a growing network</li></ul>\r\n<ul><li>Ensure firewall rules and security policies enable reliable connectivity and continuous compliance — without exposing the organization to risky attack vectors</li></ul>\r\n<ul><li>Streamline the creation of new firewall rules and efficiently manage rule recertification</li></ul>\r\n<ul><li>Perform same–day audits and simplify reporting</li></ul>\r\nThe Suite includes 5 modules and Research Lab’s intelligence feed on a common platform. Modules can be licensed individually or together:\r\n<ul><li>Skybox® Vulnerability Control </li></ul>\r\n<ul><li>Skybox® Change Manager </li></ul>\r\n<ul><li>Skybox® Firewall Assurance </li></ul>\r\n<ul><li>Skybox® Network Assurance </li></ul>\r\n<ul><li>Skybox® Horizon</li></ul>\r\n<ul><li>Skybox® Research Lab </li></ul>","shortDescription":"Skybox™ Security Suite: Powerful attack vector analytics for integrated cybersecurity management","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Skybox Security Suite","keywords":"","description":"The Skybox® Security Suite is a cyber risk management platform built to conquer security challenges in complex enterprise networks.\r\nBy integrating with more than 120 networking and security technologies, the Suite gives exceptional and seamless visibility acr","og:title":"Skybox Security Suite","og:description":"The Skybox® Security Suite is a cyber risk management platform built to conquer security challenges in complex enterprise networks.\r\nBy integrating with more than 120 networking and security technologies, the Suite gives exceptional and seamless visibility acr","og:image":"https://old.roi4cio.com/fileadmin/user_upload/SkyBox.png"},"eventUrl":"","translationId":3734,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":" MDR, which stands for Managed Detection & Response, is an all-encompassing threat detection system, which arose from the need for small/medium-sized organizations who lack resources to be able to monitor their network systems in-house. It provides a cost-effective alternative to SIEM (Security Information and Event Management).\r\nEveryday, the capabilities of attackers get more sophisticated and the volume of alerts becomes overwhelming and unmanageable. In-house teams might struggle to analyze and log data, which makes it harder than ever to determine if these threats are harmful. MDR can put a stop to attacks before they even happen. MDR technology monitors your systems and detects any unusual behavior, whilst our expert team responds to the threats detected within your business.\r\nMDR offers real-time threat intelligence, and is able to analyse behaviour which can be missed by traditional endpoint security technology. MDR also provides rapid identification of known threats, which in turn minimises overall attacks. Having remote incident investigation will minimise damage to your business, and will allow you to get back to work in no time. It’s important to note that using MDR services will allow third party access to your company's data. You need to consider working with a provider who understands and respects your data policy.","materialsDescription":" <span style=\"font-weight: bold;\">What is Managed Detection and Response?</span>\r\nManaged Detection and Response (MDR) is a managed cybersecurity service that provides intrusion detection of malware and malicious activity in your network, and assists in rapid incident response to eliminate those threats with succinct remediation actions. MDR typically combines a technology solution with outsourced security analysts that extend your technologies and team.\r\n<span style=\"font-weight: bold;\">Isn’t that What MSSPs or Managed SIEMs Do?</span>\r\nNo. Managed Security Service Providers (MSSPs) monitor network security controls and may send alerts when anomalies are identified. MSSPs typically do not investigate the anomalies to eliminate false positives, nor do they respond to real threats. This means that abnormalities in network usage are forwarded to your IT personnel who must then dig through the data to determine if there is a real threat and what to do about it.\r\n<span style=\"font-weight: bold;\">Doesn’t My Firewall Protect My Network?</span>\r\nFirewalls and other preventive forms of cybersecurity are very important and effective at preventing basic cyberattacks. However, over the past decade, it has become clear that preventive cybersecurity technologies are not enough to secure an organization’s network. Further, they are yet another source of alerts, log messages, and events that contribute to the “alert fatigue” being universally suffered today. Recent major hacks such as the Marriot Hack of 2018, the Anthem Hack of 2015, and the Target Hack of 2013 demonstrate how easily cybercriminals can breach networks at enterprise organizations to steal millions of credit card numbers, medical records, and other forms of PII/PHI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Endpoint_Detection_and_Response.png"},{"id":79,"title":"VM - Vulnerability management","alias":"vm-vulnerability-management","description":"Vulnerability management is the "cyclical practice of identifying, classifying, prioritizing, remediating and mitigating" software vulnerabilities. Vulnerability management is integral to computer security and network security, and must not be confused with a Vulnerability assessment.\r\nVulnerability management is an ongoing process that includes proactive asset discovery, continuous monitoring, mitigation, remediation and defense tactics to protect your organization's modern IT attack surface from Cyber Exposure.\r\nVulnerabilities can be discovered with a vulnerability scanner, which analyzes a computer system in search of known vulnerabilities, such as open ports, insecure software configurations, and susceptibility to malware infections. They may also be identified by consulting public sources, such as NVD, or subscribing to a commercial vulnerability alerting services. Unknown vulnerabilities, such as a zero-day, may be found with fuzz testing, which can identify certain kinds of vulnerabilities, such as a buffer overflow with relevant test cases. Such analysis can be facilitated by test automation. In addition, antivirus software capable of heuristic analysis may discover undocumented malware if it finds software behaving suspiciously (such as attempting to overwrite a system file).\r\nCorrecting vulnerabilities may variously involve the installation of a patch, a change in network security policy, reconfiguration of software, or educating users about social engineering.\r\nNetwork vulnerabilities represent security gaps that could be abused by attackers to damage network assets, trigger a denial of service, and/or steal potentially sensitive information. Attackers are constantly looking for new vulnerabilities to exploit — and taking advantage of old vulnerabilities that may have gone unpatched.\r\nHaving a vulnerability management framework in place that regularly checks for new vulnerabilities is crucial for preventing cybersecurity breaches. Without a vulnerability testing and patch management system, old security gaps may be left on the network for extended periods of time. This gives attackers more of an opportunity to exploit vulnerabilities and carry out their attacks.\r\nOne statistic that highlights how crucial vulnerability management was featured in an Infosecurity Magazine article. According to survey data cited in the article, of the organizations that “suffered a breach, almost 60% were due to an unpatched vulnerability.” In other words, nearly 60% of the data breaches suffered by survey respondents could have been easily prevented simply by having a vulnerability management plan that would apply critical patches before attackers leveraged the vulnerability.","materialsDescription":" <span style=\"font-weight: bold;\">What is vulnerability management?</span>\r\nVulnerability management is a pro-active approach to managing network security by reducing the likelihood that flaws in code or design compromise the security of an endpoint or network.\r\n<span style=\"font-weight: bold;\">What processes does vulnerability management include?</span>\r\nVulnerability management processes include:\r\n<ul><li><span style=\"font-style: italic;\">Checking for vulnerabilities:</span> This process should include regular network scanning, firewall logging, penetration testing or use of an automated tool like a vulnerability scanner.</li><li><span style=\"font-style: italic;\">Identifying vulnerabilities:</span> This involves analyzing network scans and pen test results, firewall logs or vulnerability scan results to find anomalies that suggest a malware attack or other malicious event has taken advantage of a security vulnerability, or could possibly do so.</li><li><span style=\"font-style: italic;\">Verifying vulnerabilities:</span> This process includes ascertaining whether the identified vulnerabilities could actually be exploited on servers, applications, networks or other systems. This also includes classifying the severity of a vulnerability and the level of risk it presents to the organization.</li><li><span style=\"font-style: italic;\">Mitigating vulnerabilities:</span> This is the process of figuring out how to prevent vulnerabilities from being exploited before a patch is available, or in the event that there is no patch. It can involve taking the affected part of the system off-line (if it's non-critical), or various other workarounds.</li><li><span style=\"font-style: italic;\">Patching vulnerabilities:</span> This is the process of getting patches -- usually from the vendors of the affected software or hardware -- and applying them to all the affected areas in a timely way. This is sometimes an automated process, done with patch management tools. This step also includes patch testing.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VM_-_Vulnerability_management1.png"},{"id":852,"title":"Network security","alias":"network-security","description":" Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.\r\nNetwork security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name — i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).\r\nOnce authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network like wireshark traffic and may be logged for audit purposes and for later high-level analysis. Newer systems combining unsupervised machine learning with full network traffic analysis can detect active network attackers from malicious insiders or targeted external attackers that have compromised a user machine or account.\r\nCommunication between two hosts using a network may be encrypted to maintain privacy.\r\nHoneypots, essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate purposes. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to further tighten security of the actual network being protected by the honeypot. A honeypot can also direct an attacker's attention away from legitimate servers. A honeypot encourages attackers to spend their time and energy on the decoy server while distracting their attention from the data on the real server. Similar to a honeypot, a honeynet is a network set up with intentional vulnerabilities. Its purpose is also to invite attacks so that the attacker's methods can be studied and that information can be used to increase network security. A honeynet typically contains one or more honeypots.","materialsDescription":" <span style=\"font-weight: bold;\">What is Network Security?</span>\r\nNetwork security is any action an organization takes to prevent malicious use or accidental damage to the network’s private data, its users, or their devices. The goal of network security is to keep the network running and safe for all legitimate users.\r\nBecause there are so many ways that a network can be vulnerable, network security involves a broad range of practices. These include:\r\n<ul><li><span style=\"font-weight: bold;\">Deploying active devices:</span> Using software to block malicious programs from entering, or running within, the network. Blocking users from sending or receiving suspicious-looking emails. Blocking unauthorized use of the network. Also, stopping the network's users accessing websites that are known to be dangerous.</li><li><span style=\"font-weight: bold;\">Deploying passive devices:</span> For instance, using devices and software that report unauthorized intrusions into the network, or suspicious activity by authorized users.</li><li><span style=\"font-weight: bold;\">Using preventative devices:</span> Devices that help identify potential security holes, so that network staff can fix them.</li><li><span style=\"font-weight: bold;\">Ensuring users follow safe practices:</span> Even if the software and hardware are set up to be secure, the actions of users can create security holes. Network security staff is responsible for educating members of the organization about how they can stay safe from potential threats.</li></ul>\r\n<span style=\"font-weight: bold;\">Why is Network Security Important?</span>\r\nUnless it’s properly secured, any network is vulnerable to malicious use and accidental damage. Hackers, disgruntled employees, or poor security practices within the organization can leave private data exposed, including trade secrets and customers’ private details.\r\nLosing confidential research, for example, can potentially cost an organization millions of dollars by taking away competitive advantages it paid to gain. While hackers stealing customers’ details and selling them to be used in fraud, it creates negative publicity and public mistrust of the organization.\r\nThe majority of common attacks against networks are designed to gain access to information, by spying on the communications and data of users, rather than to damage the network itself.\r\nBut attackers can do more than steal data. They may be able to damage users’ devices or manipulate systems to gain physical access to facilities. This leaves the organization’s property and members at risk of harm.\r\nCompetent network security procedures keep data secure and block vulnerable systems from outside interference. This allows the network’s users to remain safe and focus on achieving the organization’s goals.\r\n<span style=\"font-weight: bold;\">Why Do I Need Formal Education to Run a Computer Network?</span>\r\nEven the initial setup of security systems can be difficult for those unfamiliar with the field. A comprehensive security system is made of many pieces, each of which needs specialized knowledge.\r\nBeyond setup, each aspect of security is constantly evolving. New technology creates new opportunities for accidental security leaks, while hackers take advantage of holes in security to do damage as soon as they find them. Whoever is in charge of the network’s security needs to be able to understand the technical news and changes as they happen, so they can implement safety strategies right away.\r\nProperly securing your network using the latest information on vulnerabilities helps minimize the risk that attacks will succeed. Security Week reported that 44% of breaches in 2014 came from exploits that were 2-4 years old.\r\nUnfortunately, many of the technical aspects of network security are beyond those who make hiring decisions. So, the best way an organization can be sure that their network security personnel are able to properly manage the threats is to hire staff with the appropriate qualifications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_security.png"},{"id":840,"title":"ICS/SCADA Cyber Security","alias":"icsscada-cyber-security","description":"SCADA security is the practice of protecting supervisory control and data acquisition (SCADA) networks, a common framework of control systems used in industrial operations. These networks are responsible for providing automated control and remote human management of essential commodities and services such as water, natural gas, electricity and transportation to millions of people. They can also be used to improve the efficiencies and quality in other less essential (but some would say very important!) real-world processes such as snowmaking for ski resorts and beer brewing. SCADA is one of the most common types of industrial control systems (ICS).\r\nThese networks, just like any other network, are under threat from cyber-attacks that could bring down any part of the nation's critical infrastructure quickly and with dire consequences if the right security is not in place. Capital expenditure is another key concern; SCADA systems can cost an organization from tens of thousands to millions of dollars. For these reasons, it is essential that organizations implement robust SCADA security measures to protect their infrastructure and the millions of people that would be affected by the disruption caused by an external attack or internal error.\r\nSCADA security has evolved dramatically in recent years. Before computers, the only way to monitor a SCADA network was to deploy several people to each station to report back on the state of each system. In busier stations, technicians were stationed permanently to manually operate the network and communicate over telephone wires.\r\nIt wasn't until the introduction of the local area network (LAN) and improvements in system miniaturization that we started to see advances in SCADA development such as the distributed SCADA network. Next came networked systems that were able to communicate over a wide area network (WAN) and connect many more components together.\r\nFrom local companies to federal governments, every business or organization that works with SCADA systems are vulnerable to SCADA security threats. These threats can have wide-reaching effects on both the economy and the community. Specific threats to SCADA networks include the following:\r\n<span style=\"font-weight: bold;\">Hackers.</span> Individuals or groups with malicious intent could bring a SCADA network to its knees. By gaining access to key SCADA components, hackers could unleash chaos on an organization that can range from a disruption in services to cyber warfare.\r\n<span style=\"font-weight: bold;\">Malware.</span> Malware, including viruses, spyware and ransomware can pose a risk to SCADA systems. While malware may not be able to specifically target the network itself, it can still pose a threat to the key infrastructure that helps to manage the SCADA network. This includes mobile SCADA applications that are used to monitor and manage SCADA systems.\r\n<span style=\"font-weight: bold;\">Terrorists.</span> Where hackers are usually motivated by sordid gain, terrorists are driven by the desire to cause as much mayhem and damage as possible.\r\n<span style=\"font-weight: bold;\">Employees.</span> Insider threats can be just as damaging as external threats. From human error to a disgruntled employee or contractor, it is essential that SCADA security addresses these risks.\r\nManaging today's SCADA networks can be a challenge without the right security precautions in place. Many networks are still without the necessary detection and monitoring systems and this leaves them vulnerable to attack. Because SCADA network attacks exploit both cyber and physical vulnerabilities, it is critical to align cybersecurity measures accordingly.","materialsDescription":"<span style=\"font-weight: bold;\">What is the difference between ICS/SCADA cybersecurity and information security?</span>\r\nAutomated process control systems (SCADA) have a lot of differences from “traditional” corporate information systems: from the destination, specific data transfer protocols and equipment used and ending with the environment in which they operate. In corporate networks and systems, as a rule, the main protected resource is information that is processed, transmitted and stored in automated systems, and the main goal is to ensure its confidentiality. In ICS, the protected resource, first of all, is the technological process itself, and the main goal is to ensure its continuity (accessibility of all nodes) and integrity (including information transmitted between the nodes of the ICS). Moreover, the field of potential risks and threats to ICS, in comparison with corporate systems, expands with risks of potential damage to life and health of personnel and the public, damage to the environment and infrastructure. That is why it is incorrect to talk about “information security” in relation to ICS/SCADA. In English sources, the term “cybersecurity” is used for this, a direct translation of which (cybersecurity) is increasingly found in our market in relation to the protection of process control systems.\r\n<span style=\"font-weight: bold;\">Is it really necessary?</span>\r\nIt is necessary. There are a number of myths about process control systems, for example: “process control systems are completely isolated from the outside world”, “process control systems are too specific for someone to crack”, “process control systems are reliably protected by the developer”, or even “No one will ever try us, hacking us is not interesting. ” All this is no longer true. Many modern distributed process control systems have one or another connection with the corporate network, even if the system owners are unaware of this. Communication with the outside world greatly simplifies the task of the attacker, but does not remain the only possible option. Automated process control software and data transfer protocols are, as a rule, very, very insecure against cyber threats. This is evidenced by numerous articles and reports of experts involved in the study of the protection of industrial control systems and penetration tests. The PHDays III section on hacking automated process control systems impressed even ardent skeptics. Well, and, of course, the argument “they have NOT attacked us, therefore they will not” - can hardly be considered seriously. Everyone has heard about Stuxnet, which dispelled almost all the myths about the safety of ICS at once.\r\n<span style=\"font-weight: bold;\">Who needs this?</span>\r\nWith the phrase ICS/SCADA, most imagine huge plants, automated CNC machines or something similar. However, the application of process control systems is not limited to these objects - in the modern age of automation, process control systems are used everywhere: from large production facilities, the oil and gas industry, transport management to smart home systems. And, by the way, with the protection of the latter, as a rule, everything can be much worse, because the developer silently and imperceptibly shifts responsibility to the shoulders of the user.\r\nOf course, some of the objects with automated process control systems are more interesting for attackers, others less. But, given the ever-growing number of vulnerabilities discovered and published in the ICS, the spread of "exclusive" (written for specific protocols and ICS software) malware, considering your system safe "by default" is unreasonable.\r\n<span style=\"font-weight: bold;\">Are ICS and SCADA the same thing?</span>\r\nNo. SCADA systems (supervisory control and data acquisition, supervisory control and data collection) are part of the control system. Usually, a SCADA system means centralized control and management systems with the participation of a person as a whole system or a complex of industrial control systems. SCADA is the central link between people (human-machine interfaces) and PLC levels (programmable logic controller) or RTU (remote terminal unit).\r\n<span style=\"font-weight: bold;\">What is ICS/SCADA cybersecurity?</span>\r\nIn fact, ICS cybersecurity is a process similar to “information security” in a number of properties, but very different in details. And the devil, as you know, lies in them. ICS/SCADA also has similar information security-related processes: asset inventory, risk analysis and assessment, threat analysis, security management, change management, incident response, continuity, etc. But these processes themselves are different.<br />The cyber security of ICSs has the same basic target qualities - confidentiality, integrity and accessibility, but the significance and point of application for them are completely different. It should be remembered that in ICS/SCADA we, first of all, protect the technological process. Beyond this - from the risks of damage to human health and life and the environment.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_SCADA_Cyber_Security.png"},{"id":331,"title":"Network Management Software","alias":"network-management-software","description":" <span style=\"font-weight: bold; \">Network management software</span> is software that is used to provision, discover, monitor and maintain computer networks. \r\nWith the expansion of the world wide web and the Internet, computer networks have become very large and complex, making them impossible to manage manually. In response, a suite of network management software was developed to help reduce the burden of managing the growing complexity of computer networks. \r\nNetwork management software usually collects information about network devices (which are called Nodes) using protocols like SNMP, ICMP, CDP etc. This information is then presented to network administrators in an easy to understand and accessible manner to help them quickly identify and remediate problems. \r\nSome advanced network control software may rectify network problems automatically. Network management program may also help with tasks involved in provisioning new networks, such as installing and configuring new network nodes etc. Network management tools may also help with maintenance of existing networks like upgrading software on existing network devices, creating new virtual networks etc. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Functions</span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Provisioning:</span> Enables network managers to provision new network devices in an environment. Automating this step reduces cost and eliminates chances of human error.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Mapping or Discovery:</span> Enables the software to discover the features of a target network. Some features that are usually discovered are: the nodes in a network, the connectivity between these nodes, the vendor types, the performance characteristics etc.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Monitoring:</span> Enables the network management system to monitor the network for problems and to suggest improvements. The software may poll the devices periodically or register itself to receive alerts from network devices. One mechanism for network devices to volunteer information about itself is by sending an SNMP Trap. Monitoring can reveal faults in the network such as failed or misconfigured nodes, performance bottlenecks, intrusions etc.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Configuration management:</span> Enables the software to ensure that the network configuration is as desired and there is no configuration drift.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Regulatory compliance:</span> Enables the network management system software to ensure that the network meets the regulatory standards and complies with applicable laws.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Change control:</span> Enables the software to ensure that the network changes are enacted in a controlled and coordinated manner. Change control can enable audit trails which has applications during a forensic investigation after a network intrusion.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Software Asset Management:</span>Provides software deployment and patch management.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cybersecurity: </span>Enabled the software to use all the data gathered from the nodes to identify security risks in an IT environment.</p>","materialsDescription":"<h1 class=\"align-center\">What does Network Inventory Management system mean?</h1>\r\nNetwork inventory management is the process of keeping records of all the IT or network assets that make up the network.\r\nIt enables network administrators/businesses to have a physical record of all IT and network equipment within the organization.\r\nNetwork inventory management is generally performed to through IT asset tracking software that scans, compiles and records data about each device/node over a network.\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Network inventory management software may include:</span></p>\r\n<ul><li>Number of routers, their make, type and place of installation, serial number</li><li>IP addresses of all devices/nodes, IP addressing scheme used</li><li>Number and type of software along with license keys and expiry dates</li></ul>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">This data helps businesses with:</span></p>\r\n<ul><li>Network size estimation</li><li>Network capacity planning</li><li>Network cost/ROI estimation</li><li>Physical network administration (to deal with device/equipment loss and theft)</li></ul>\r\n<h1 class=\"align-center\">What is SNMP Management Software?</h1>\r\n<span style=\"font-weight: bold; \">SNMP (Simple Network Management Protocol) management software</span> is an application or program used to manage and monitor many network devices – such as servers, printers, hubs, switches, and routers – that are SNMP-aware and which an SNMP agent software can poll and receive alert traps when needed.\r\nSNMP network management software is currently considered the best choice by professionals for IP (Internet Protocol) network management, and as a result, SNMP is widely supported and featured in many hardware devices and network management software packages. \r\nSNMP software is designed to be able to be deployed on a large number of network devices, to have minimal impact and transport requirements on the managed nodes and to continue working when most other network applications fail.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Management_Software.png"},{"id":327,"title":"Change and Configuration Management Software","alias":"change-and-configuration-management-software","description":" Software teams today face significant challenges. Companies require the production of high-quality software at unprecedented speeds. Software application requirements continue to grow more complex often with shorter and more frequent release cycles. Distributed development teams present challenges related to effective teaming, parallel development and diverse platforms - these factors and more intensify the pressures of developing quality software. Developing quality software in a repeatable and predictable fashion requires managing and tracking development artifacts and the activities of the development team. Successful development teams utilize software configuration management and software change management tools to help manage the software development lifecycle.\r\nSoftware configuration management provides version control and parallels development support to manage and control software assets. Software change management provides defect tracking and automation of software processes across the development lifecycle.\r\nSolutions that combine software configuration management and software change management in a single, tightly integrated solution are referred to as software change and configuration management (SCCM) solutions. SCCM solutions utilize activities to easily manage changes made to development artifacts. Unlike standalone SCM tools, SCCM solutions usually include substantial workflow capabilities which automate and effectively govern the software development processes for repeatable and predictable software development.\r\nEssentially, SCCM answers the ‘who’, ‘what’, ‘when’, and ‘why’ of software development. Who made the changes? What changes were made to the software? When were the changes made? Why were the changes made? Development teams and project leaders should be able to obtain answers to these questions to manage a project's activities, determine project status and track the actual product evolution.\r\nA fully comprehensive software change and configuration management (SCCM) solution empowers companies by accelerating software and systems delivery, making global teams more efficient, and governing the end-to-end software development processes. Solutions should be secure, flexible, and robust as well as provide the ability to support any size team, regardless of platform or location. Selecting ‘best in class’ solution, implementing proven best practices and partnering with a company that is a leader in technology reduces the risks associated with quality software development.","materialsDescription":" \r\n<span style=\"font-weight: bold;\">What is software configuration management (SCM)?</span>\r\nSoftware configuration management (SCM) is designed to control change by identifying and tracking changed software artifacts and managing different versions of these artifacts.\r\n<span style=\"font-weight: bold;\">What is software change and configuration management (SCCM)?</span>\r\nSoftware change and configuration management (SCCM) provide the comprehensive integration with best practice guidance of software configuration management and software change management capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Change_and_Configuration_Management_Software.png"},{"id":489,"title":"Network Security Policy Management","alias":"network-security-policy-management","description":" <span style=\"font-weight: bold; \">Network security policy management </span>streamlines security policy design and enforcement. It applies rules and best practices to manage firewalls and other devices more effectively, efficiently, and consistently. Administrators need network security management solutions to get a high level of visibility into network behavior, automate device configuration, enforce global policies, view firewall traffic, generate reports, and provide a single management interface for physical and virtual systems.\r\nSecurity policies govern the integrity and safety of the network. They provide rules for accessing the network, connecting to the Internet, adding or modifying devices or services, and more. However, rules are only effective when they are implemented. Network security management policy helps organizations stay compliant and secure by ensuring that their policies are simplified, consistent, and enforced. It helps reduce manual tasks and human errors by simplifying administration with security policy and workflow tools through a centralized management interface.\r\nNetwork security management can reduce risk across the network and protect data by leveraging the information on threats, network vulnerabilities and their criticality, evaluating potential options to block an attack, and providing intelligence for decision support. Policy administration is improved by unifying common policy tasks within a single interface, automating policy change workflow, including compliance audits and the management of multiple firewall vendors. This simplified and automated security policy management enables IT teams to save time, avoid manual errors, and reduce risk. \r\nThere are the whole network security policy management market with different tools and solutions available. Businesses use them to automate administrative tasks, which can improve accuracy and save time. The solutions can make management processes less tedious and time consuming, and can free up personnel for higher-value projects. These solutions also help IT teams avoid misconfigurations that can cause vulnerabilities in their networks. And if problems arise, network security policy management solutions can ease troubleshooting and remediation. ","materialsDescription":"<h1 class=\"align-center\">Benefits of network security policy management</h1>\r\n<span style=\"font-weight: bold;\">Streamline security policy design and enforcement</span>\r\nA network security policy management solution can help organizations achieve:\r\n<ul><li><span style=\"font-weight: bold;\">Better security.</span> Network security policy management streamlines security policy design and enforcement.</li><li><span style=\"font-weight: bold;\">Ease of use.</span> Network security policy management tools orchestrate policy design and implementation.</li><li><span style=\"font-weight: bold;\">Consistency. </span>Solutions provide templates, model policies, and configurations.</li><li><span style=\"font-weight: bold;\">Time savings.</span> Deployments are faster, and automation helps empower staff to focus on other business priorities.</li><li><span style=\"font-weight: bold;\">Lower costs.</span> Cloud-based solutions scale to thousands of devices, requiring fewer resources and allowing for centralized management.</li></ul>\r\n<span style=\"font-weight: bold;\">Apply best practices to meet challenges in firewall management</span>\r\nOver time, firewalls collect more and more configuration rules and objects. Network security policy management solutions can help combat this bloat and improve security by addressing:\r\n<ul><li><span style=\"font-weight: bold;\">Object auditing.</span> Administrators need to merge and reduce duplicate objects, determine which unused objects should be deleted, and identify inconsistent objects. Network security policy management tools help them achieve a cleaner, more consistent configuration that is less of a nuisance to manage and less vulnerable to attacks.</li><li><span style=\"font-weight: bold;\">Policy inconsistencies.</span> The network security policy management tools locate unused or shadow policies and assist IT to fix possible problems.</li><li><span style=\"font-weight: bold;\">Version control and upgrades.</span> Network security policy management solutions ease these transitions with filters that simplify and automate processes and ensure high availability.</li></ul>\r\n<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Security_Policy_Management.png"},{"id":687,"title":"Network Administration","alias":"network-administration","description":" Computer networks are critical parts of almost every organization. Network and computer systems administrators are responsible for the day-to-day operation of these networks. They organize, install, and support an organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. Administrators manage an organization’s servers and desktop and mobile equipment. They ensure that email and data storage networks work properly. They also make sure that employees’ workstations are working efficiently and stay connected to the central computer network. In some cases, administrators help network architects design and analyze network models. They also participate in decisions about buying future hardware or software to upgrade their organization’s network. Some administrators provide technical support to computer users, and they also may supervise computer support specialists who help solve users’ problems.\r\nAs with many technical roles, network administrator positions require a breadth of technical knowledge and the ability to learn the intricacies of new networking and server software packages quickly. Within smaller organizations, the more senior role of a network engineer is sometimes attached to the responsibilities of the network administrator. It is common for smaller organizations to outsource this function.\r\nA computer network is a telecommunications network that allows computers to exchange data. In computer networks, networked computing devices exchange data with each other along with network links (data connections). The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.\r\nNetwork computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as personal computers, mobile phones, servers as well as networking hardware. Two such devices can be said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other.\r\nComputer networks differ in the transmission media used to carry their signals, the communications protocols to organize network traffic, the network's size, topology, and organizational intent. In most cases, communications protocols are layered on (i.e. work using) other more specific or more general communications protocols, except for the physical layer that directly deals with the transmission media.\r\nComputer networks support an enormous number of applications such as access to the World Wide Web, video, digital audio, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications as well as many others.","materialsDescription":" <span style=\"font-weight: bold; \">What is a network administrator?</span>\r\nA network administrator is responsible for keeping an organization’s computer network up-to-date and operating as intended. Any company or organization that uses multiple computers or software platforms need a network admin to coordinate and connect the different systems. It seems simple enough—but there’s another common IT job title that may trip you up: systems administrator.\r\n<span style=\"font-weight: bold; \">Is a network administrator the same thing as a systems administrator?</span>\r\nIn short — not really. But the lines can blur depending on the work environment. Careers in IT can sometimes take a page from the rules of Whose Line Is It, Anyway? — “Where the titles don’t matter and the duties are made up!” While that’s clearly a bit of an exaggeration, in many smaller organizations, the terms “network administrator” and “systems administrator” are often interchangeable as they cover the same tasks. That being said, the differences between network and systems administrators become much clearer in large organizations. The best way to differentiate between the two is to examine the type of work they do.\r\n<span style=\"font-weight: bold; \">What are the job duties of network and systems administrators?</span>\r\nThe duties of a network administrator will vary considerably depending on the organization they work for. Some work as broad, jack-of-all-trades generalists who cover everything from hardware setup to troubleshooting servers while others have a much narrower focus.\r\nHere are some sample network and systems administrator job duties. In environments where the duties of network administrators and systems administrators are split and more clearly defined, the italicized duties align more with systems administrators:\r\n<ul><li>Configuring network hardware like servers, routers, and switches</li><li>Upgrading and repairing computer networks</li><li>Troubleshooting network issues</li><li>Assisting network architects with the design of network models</li><li>Deploying and updating software</li><li>Managing servers and their operating systems</li><li>Implementing security measures and basic testing</li><li>Managing cloud and physical network storage</li></ul>\r\n<span style=\"font-weight: bold;\">What skills or traits do the best network administrators possess?</span>\r\nObviously, network administration positions will require substantial technical competence, but there’s more to the job than just knowing your stuff. Here are a few of the most common nontechnical abilities that will benefit you as a network administrator:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Analyzing and critical thinking</span></span>\r\nNetwork admins need to explore and solve problems logically and consistently. “[The] ability to take the concepts you’ve learned in school and understand how they work and affect other concepts is the bread and butter of being a network administrator,” says Brad Meyer, systems administrator at TechnologyAdvice. Even if you don’t yet know the solution, he believes thinking critically will help you get there.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Time management</span></span>\r\nNetwork admins juggle several projects, people and problems simultaneously. This means it’s essential to be organized in the present and looking ahead to prepare for what’s coming next. It’s like spinning plates—with a little practice, a network admin can keep everything balanced.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Interpersonal skills</span></span>\r\nNetwork admins work with a range of people, from network engineers to help desk employees to end-users, explains IT consultant Eric Jeffery. He says bridging the gap between diverse groups of people requires patience and understanding.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">A drive to learn more</span></span>\r\nThe IT field is no stranger to change—and new technologies can put even well-established network admins behind the eight balls. This means the best network admins have a passion for learning as they adapt to changing tech demands. This desire to learn more is also important for the more mundane day-to-day work—inevitably you’ll encounter issues you’ve never seen before and the only solution is to start researching potential answers.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Administration.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"zia-networks-network-administration":{"id":5190,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Zia_Networks_Logo.png","logo":true,"scheme":false,"title":"Zia Networks Network Administration","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"zia-networks-network-administration","companyTitle":"Zia Networks","companyTypes":["supplier"],"companyId":8283,"companyAlias":"zia-networks","description":"Do you know everything that is happening in your company IT network right now? Can you be sure that you have the right security solutions in place, that firewalls and antivirus software are up to date, working properly and keeping malicious hackers at bay? Well if the answer is no, then it's time you call in the expert team at <span style=\"font-weight: bold;\">Zia Networks</span> to help you set up and manage the IT network your company deserves.\r\nOur IT network specialists can boast an extensive range of business and project management skills as well as technical expertise which can be combined to help your company reach its full potential by ensuring you have an IT network that works for the way you do business.\r\nWhether you need to set up wireless access for greater employee flexibility, protect your customer database, plan for growth or simply streamline your office IT and applications, our staff will design and implement a network plan that sets you up for success.\r\nA consultation with one of our experienced professionals is the first step to a more efficient network. No matter your industry or the size of your business, we'll develop a customized plan that meets your needs.\r\n<span style=\"font-weight: bold;\">We offer Network Support in the following areas:</span>\r\n<ul><li>Cost-effective network design</li><li>Ongoing network maintenance</li><li>Help Desk services</li><li>Server installation and upgrades</li><li>Remote Access and VPN services</li><li>Mobile solutions</li><li>Fax and printer setup and support</li><li>Network and phone cabling</li></ul>","shortDescription":"We use technology to solve your business problems.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Zia Networks Network Administration","keywords":"","description":"Do you know everything that is happening in your company IT network right now? Can you be sure that you have the right security solutions in place, that firewalls and antivirus software are up to date, working properly and keeping malicious hackers at bay? Wel","og:title":"Zia Networks Network Administration","og:description":"Do you know everything that is happening in your company IT network right now? Can you be sure that you have the right security solutions in place, that firewalls and antivirus software are up to date, working properly and keeping malicious hackers at bay? Wel","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Zia_Networks_Logo.png"},"eventUrl":"","translationId":5191,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":687,"title":"Network Administration","alias":"network-administration","description":" Computer networks are critical parts of almost every organization. Network and computer systems administrators are responsible for the day-to-day operation of these networks. They organize, install, and support an organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. Administrators manage an organization’s servers and desktop and mobile equipment. They ensure that email and data storage networks work properly. They also make sure that employees’ workstations are working efficiently and stay connected to the central computer network. In some cases, administrators help network architects design and analyze network models. They also participate in decisions about buying future hardware or software to upgrade their organization’s network. Some administrators provide technical support to computer users, and they also may supervise computer support specialists who help solve users’ problems.\r\nAs with many technical roles, network administrator positions require a breadth of technical knowledge and the ability to learn the intricacies of new networking and server software packages quickly. Within smaller organizations, the more senior role of a network engineer is sometimes attached to the responsibilities of the network administrator. It is common for smaller organizations to outsource this function.\r\nA computer network is a telecommunications network that allows computers to exchange data. In computer networks, networked computing devices exchange data with each other along with network links (data connections). The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.\r\nNetwork computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as personal computers, mobile phones, servers as well as networking hardware. Two such devices can be said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other.\r\nComputer networks differ in the transmission media used to carry their signals, the communications protocols to organize network traffic, the network's size, topology, and organizational intent. In most cases, communications protocols are layered on (i.e. work using) other more specific or more general communications protocols, except for the physical layer that directly deals with the transmission media.\r\nComputer networks support an enormous number of applications such as access to the World Wide Web, video, digital audio, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications as well as many others.","materialsDescription":" <span style=\"font-weight: bold; \">What is a network administrator?</span>\r\nA network administrator is responsible for keeping an organization’s computer network up-to-date and operating as intended. Any company or organization that uses multiple computers or software platforms need a network admin to coordinate and connect the different systems. It seems simple enough—but there’s another common IT job title that may trip you up: systems administrator.\r\n<span style=\"font-weight: bold; \">Is a network administrator the same thing as a systems administrator?</span>\r\nIn short — not really. But the lines can blur depending on the work environment. Careers in IT can sometimes take a page from the rules of Whose Line Is It, Anyway? — “Where the titles don’t matter and the duties are made up!” While that’s clearly a bit of an exaggeration, in many smaller organizations, the terms “network administrator” and “systems administrator” are often interchangeable as they cover the same tasks. That being said, the differences between network and systems administrators become much clearer in large organizations. The best way to differentiate between the two is to examine the type of work they do.\r\n<span style=\"font-weight: bold; \">What are the job duties of network and systems administrators?</span>\r\nThe duties of a network administrator will vary considerably depending on the organization they work for. Some work as broad, jack-of-all-trades generalists who cover everything from hardware setup to troubleshooting servers while others have a much narrower focus.\r\nHere are some sample network and systems administrator job duties. In environments where the duties of network administrators and systems administrators are split and more clearly defined, the italicized duties align more with systems administrators:\r\n<ul><li>Configuring network hardware like servers, routers, and switches</li><li>Upgrading and repairing computer networks</li><li>Troubleshooting network issues</li><li>Assisting network architects with the design of network models</li><li>Deploying and updating software</li><li>Managing servers and their operating systems</li><li>Implementing security measures and basic testing</li><li>Managing cloud and physical network storage</li></ul>\r\n<span style=\"font-weight: bold;\">What skills or traits do the best network administrators possess?</span>\r\nObviously, network administration positions will require substantial technical competence, but there’s more to the job than just knowing your stuff. Here are a few of the most common nontechnical abilities that will benefit you as a network administrator:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Analyzing and critical thinking</span></span>\r\nNetwork admins need to explore and solve problems logically and consistently. “[The] ability to take the concepts you’ve learned in school and understand how they work and affect other concepts is the bread and butter of being a network administrator,” says Brad Meyer, systems administrator at TechnologyAdvice. Even if you don’t yet know the solution, he believes thinking critically will help you get there.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Time management</span></span>\r\nNetwork admins juggle several projects, people and problems simultaneously. This means it’s essential to be organized in the present and looking ahead to prepare for what’s coming next. It’s like spinning plates—with a little practice, a network admin can keep everything balanced.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Interpersonal skills</span></span>\r\nNetwork admins work with a range of people, from network engineers to help desk employees to end-users, explains IT consultant Eric Jeffery. He says bridging the gap between diverse groups of people requires patience and understanding.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">A drive to learn more</span></span>\r\nThe IT field is no stranger to change—and new technologies can put even well-established network admins behind the eight balls. This means the best network admins have a passion for learning as they adapt to changing tech demands. This desire to learn more is also important for the more mundane day-to-day work—inevitably you’ll encounter issues you’ve never seen before and the only solution is to start researching potential answers.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Administration.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["skybox-firewall-assurance","skybox-security-suite","zia-networks-network-administration"]},"links":{"first":"http://apis.roi4cio.com/api/products?page=1","last":"http://apis.roi4cio.com/api/products?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://apis.roi4cio.com/api/products","per_page":20,"to":3,"total":3},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}