{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"en":"I use it","ru":"I use it","_type":"localeString"},"roi-calculator":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"en":"deployment","ru":"внедрение","_type":"localeString"},"vendor-popover":{"_type":"localeString","en":"vendor","ru":"производитель"},"sort-title-desc":{"en":"From Z to A","ru":"от Я до А","_type":"localeString"},"sort-rating-asc":{"_type":"localeString","en":"Rating ascending","ru":"По возрастанию рейтинга"},"sort-rating-desc":{"en":"Rating descending","ru":"По убыванию рейтинга","_type":"localeString"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"_type":"localeString","en":"Rebate descending","ru":"По убыванию скидки"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"en":"Details","ru":"Детальнее","_type":"localeString"},"rebate-for-poc":{"_type":"localeString","en":"Bonus 4 POC","ru":"Бонус 4 POC"},"rebate":{"en":"Bonus","ru":"Бонус","_type":"localeString"},"vendor-verified":{"_type":"localeString","en":"Vendor verified","ru":"Поставщик потверждён"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"_type":"localeString","en":"Learn more","ru":"Узнать больше"},"categories-popover":{"ru":"категории","_type":"localeString","en":"categories"},"sort-popular-asc":{"en":"Popular ascending","ru":"По возростанию популярности","_type":"localeString"},"sort-popular-desc":{"en":"Popular descending","ru":"По убыванию популярности","_type":"localeString"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"login":{"de":"Einloggen","ru":"Войти","_type":"localeString","en":"Login"},"register":{"de":"Registrieren","ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"auth-message":{"en":"You need to register or login.","de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString"},"add-to-comparison":{"en":"Add to comparison","ru":"Добавить в сравнение","_type":"localeString"},"added-to-comparison":{"en":"Added to comparison","ru":"Добавлено в сравнения","_type":"localeString"},"items-found":{"ru":"Продуктов найдено","_type":"localeString","en":"Products found"},"sort-sales-desc":{"ru":"По продаже","_type":"localeString","en":"By sale"},"sort-purchases-desc":{"en":"By purchase","ru":"По покупке","_type":"localeString"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product producer"},"products-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"_type":"localeString","en":"Company name","ru":"Компания"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"_type":"localeString","en":"Received ROI","ru":"Полученный ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"en":"from","ru":"от","_type":"localeString"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"_type":"localeString","en":"View","ru":"Вид"},"sort-type-label":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"category":{"en":"Category","ru":"Категория","_type":"localeString"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"_type":"localeString","en":"Сlear","ru":"Очистить"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"with-discounts-checkbox":{"_type":"localeString","en":"With discounts","ru":"Со скидками"},"expert-price-checkbox":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"_type":"localeString","en":"Apply filter","ru":"Применить фильтр"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"en":"Show all","ru":"Показать все","_type":"localeString"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"en":"With deployments","ru":"С внедрениями","_type":"localeString"},"bonus-4-reference":{"_type":"localeString","en":"Bonus 4 Reference","ru":"Бонус за референс"},"product-categories":{"en":"Product Categories","ru":"Категории продуктов","_type":"localeString"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"en":"Seller","ru":"Продавец","_type":"localeString"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"_type":"localeString","en":" Branch","ru":"Отрасль"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"_type":"localeString","en":"With reference","ru":"С референсами"},"show-deal-checkbox":{"_type":"localeString","en":"Show deal with noname","ru":"Показывать сделки с noname"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"_type":"localeString","en":"Date","ru":"Дата"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"en":"Add company","ru":"Добавить компанию","_type":"localeString"},"add-implementation":{"en":"Add deployment","ru":"Добавить внедрение","_type":"localeString"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"en":"From Z to A","ru":"От Я до А","_type":"localeString"},"sellers-field":{"_type":"localeString","en":"Sellers","ru":"Поставщики, Производители"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"_type":"localeString","en":"With comments","ru":"С комментариями"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"user":{"en":"User","ru":"Пользователь","_type":"localeString"},"company-type":{"en":"Company type","ru":"Тип компании","_type":"localeString"},"partners-field":{"_type":"localeString","en":"Partners","ru":" Партнеры"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"en":"Product supplier","ru":"Поставщик продукта","_type":"localeString"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"en":"Deployment date","ru":"Дата внедрения","_type":"localeString"},"canceled":{"_type":"localeString","en":"Canceled","ru":"Отменено"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"en":"Deal closed","ru":"Сделка закрыта","_type":"localeString"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"body":{"ru":[{"_key":"28241882db7a","markDefs":[],"children":[{"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0","_type":"span","marks":[]}],"_type":"block","style":"normal"}],"_type":"localeBlock","en":[{"_key":"8bebcfb34955","markDefs":[],"children":[{"_type":"span","marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550"}],"_type":"block","style":"normal"}]},"label":"catalog-products-text-block"}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"translatable_meta":[{"name":"og:title","translations":{"_type":"localeString","en":"Products","ru":"Продукты"}},{"name":"description","translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"Description"}},{"name":"og:description","translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI"}},{"name":"keywords","translations":{"en":"keyword","ru":"каталог, программное обеспечение, софт, ит услуги","_type":"localeString"}},{"translations":{"_type":"localeString","en":"Products","ru":"Продукты"},"name":"title"}],"title":{"_type":"localeString","en":"ROI4CIO: Products","ru":"ROI4CIO: Продукты"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"accessdata-ad-ediscovery":{"id":5410,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/AccessData.png","logo":true,"scheme":false,"title":"AccessData AD EDISCOVERY","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"accessdata-ad-ediscovery","companyTitle":"AccessData","companyTypes":["vendor"],"companyId":6017,"companyAlias":"accessdata","description":"Efficiently and seamlessly conduct enterprisewide search, targeted forensically sound collection, systemized preservation, litigation hold, processing, data assessment and complete legal review—all while keeping costs in line and reducing risk.\r\n<ul> <li>Mitigate Risk. Limit handoffs between vendors and technologies with a single, secure, end-to-end solution and protect against spoliation, data loss and theft. </li> <li>Lower Cost. Process all potentially relevant information, structured and unstructured, inside and outside the enterprise, with a single integrated solution, meaning less cost and wasted resources for your organization. </li> <li>Improve Efficiency. Now you can collect data faster from even more data sources, including Office 365®, with the latest release of AD eDiscovery. We’ve also automated more tasks, speeding up the time between collection and analysis. </li> </ul>\r\n<b>Capabilities</b>\r\n<ul> <li>End-to-end e-discovery platform supporting preservation through production </li> <li>Transform your unstructured data into new discoveries. Brainspace customers can push data from and pull data to AD eDiscovery and back again for deeper insights without using load files. </li> <li>Advanced interactive data visualizations to quickly identify relationships and custodian communication patterns </li> <li>Collect emails—even upgraded/migrated Exchange/O365 emails that contain “illegal” data—directly into your AccessData environment as distinct files, ready for MD5 hashing. </li> <li>Collect data seamlessly with support for the latest Enterprise Vault® and OneDrive® environments. </li> <li>Create/export searchable PDFs from native files. </li> <li>Intuitive litigation hold wizard featuring real-time hold status updates, pre-loaded notification templates and out-of-the-box litigation hold integrations with the leading HR database solutions </li> <li>Ability to assign secure web and role-based access </li> <li>Process over 700 data types (including PSTs/NSFs) with full forensic logging </li> <li>Integrated document review with predictive coding </li> <li>Direct web API export feature enables the seamless transfer of data from AD eDiscovery to Relativity® without the use of load files. </li> </ul>","shortDescription":"End-to-End eDiscovery\r\n\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AccessData AD EDISCOVERY","keywords":"","description":"Efficiently and seamlessly conduct enterprisewide search, targeted forensically sound collection, systemized preservation, litigation hold, processing, data assessment and complete legal review—all while keeping costs in line and reducing risk.\r\n<ul> <li>Mitig","og:title":"AccessData AD EDISCOVERY","og:description":"Efficiently and seamlessly conduct enterprisewide search, targeted forensically sound collection, systemized preservation, litigation hold, processing, data assessment and complete legal review—all while keeping costs in line and reducing risk.\r\n<ul> <li>Mitig","og:image":"https://old.roi4cio.com/fileadmin/user_upload/AccessData.png"},"eventUrl":"","translationId":5410,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"aimbrain-aimface":{"id":5412,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/AimBrain.png","logo":true,"scheme":false,"title":"AimBrain AimFace","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"alias":"aimbrain-aimface","companyTypes":[],"description":"<b>Features:</b>\r\n<ul> <li>Greater user identification accuracy. Our patented technology clusters facial data to identify your users in virtually unlimited contexts, for greater accuracy and a smoother user experience. </li> <li>AI-based image processing. Intuitive quality feedback for the user, including suggestions to improve lighting or positioning, to simplify and support the customer through the step. </li> <li>Deep learning for faster onboarding. Using algorithms enhanced by millions of requests, our technology de-noises and enhances document images in real-time, for faster onboarding. </li> <li>Protects against video and photo fraud. Inbuilt liveliness detection plus checks for signals of video such as Moiré flares and chromatic anomalies, to protect against synthetic fraud. </li> <li>Integrate your apps today. Simple-to-deploy SDKs to connect your web or mobile app and benefit from stronger user identification straightaway; use it for free with AimBrain On Demand. </li> <li>Standalone or add-on authentication. Use AimFace facial authentication on its own, or integrate it with other authentication tools as part of a step-up process for additional security. </li> </ul>\r\n<b>Benefits:</b>\r\n<b>CAST IRON SECURITY </b>\r\nInbuilt liveliness detection and anti-spoof technology lets users in quickly and easily, and our server-side authentication model stops the risk of access through breached devices. \r\n<b>SUPPORTS OMNI-DIGITAL CUSTOMERS </b>\r\nOur Biometric Identity as-a-Service (BIDaaS) model means users enrol just once, for a consistent facial authentication experience use across any device and channel with a camera. \r\n<b>AUTHENTICATION FOR TODAY’S CONSUMERS</b>\r\nDitch the passwords and push notifications for technology more fit for purpose, try it for free with our developer tools. \r\n<b>INSTANT DEPLOYMENT </b>\r\nIntegrate open source SDKs into your web or mobile app and roll out stronger user authentication today. Integrate AimFace today with our free-for-life developer dashboard and tools. \r\n<b>HELLO, REGULATORS </b>\r\nAimFace supports KYC-compliant onboarding, 5AMLD customer verification and PSD2's ‘inherence’ factor for stronger user authentication, whatever your business. \r\n<b>CUT ONBOARDING TIME </b>\r\nOnboard customers quickly by combining AimFace technology with document scanning and image matching, for happier regulators and a higher customer conversion rate. ","shortDescription":"Let your customers unlock the benefits of your business with facial authentication","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AimBrain AimFace","keywords":"","description":"<b>Features:</b>\r\n<ul> <li>Greater user identification accuracy. Our patented technology clusters facial data to identify your users in virtually unlimited contexts, for greater accuracy and a smoother user experience. </li> <li>AI-based image processing. Intu","og:title":"AimBrain AimFace","og:description":"<b>Features:</b>\r\n<ul> <li>Greater user identification accuracy. Our patented technology clusters facial data to identify your users in virtually unlimited contexts, for greater accuracy and a smoother user experience. </li> <li>AI-based image processing. Intu","og:image":"https://old.roi4cio.com/fileadmin/user_upload/AimBrain.png"},"eventUrl":"","translationId":5412,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"armjisoft-pdf-drm-security-ownerguard":{"id":5418,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Armji.png","logo":true,"scheme":false,"title":"Armjisoft PDF DRM Security OwnerGuard","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"armjisoft-pdf-drm-security-ownerguard","companyTitle":"Armjisoft Digital Rights Management Systems","companyTypes":["vendor"],"companyId":8447,"companyAlias":"armjisoft-digital-rights-management-systems","description":"<p class=\"align-center\"><b>DRM FOR PDF Security and Rights Management Systems </b></p>\r\nPDF DRM, Security, Protection and Distribution Management technologies are used as a copyright enforcement mechanism and sometimes as an alternative mechanism to copyright law. Granting exclusive ownership rights to authors and creators through Copyrights, Security and DRM, allows for a better chance of enrichment of more and more creative and cultural products, and they can nominally compensate their efforts and costs. Intellectual efforts for producing a product or artifact must be appropriately prizes, and we must prevent people to benefit from such products free of charge. PDF Security and DRM provide a better base for protecting contents against illegal distributions, usages and sells. PDF Security and Digital Rights Management (DRM) systems are provided to ease distribution of PDF documents for end users by enforcing some usage and distribution limitations like printing, copying, save and transfer.\r\n<b>With PDF Security OwnerGuard you can: </b>\r\n<ul> <li>Protect and Lock your PDF documents to specific User, Computer or USB Drive. </li> <li>Define High Security Expiration Date or Working Duration for your drm protected pdf documents.</li> <li> Stop your valuable PDF documents from being shared and distributed across the Internet.</li> <li> Allow users to use full features of Adobe Reader to access your drm protected pdf documents.</li> <li> Define Print and/or View watermarks for your protected pdf document users.</li> <li> Minimize your users DRM hassles by letting them access your secure pdf documents offline.</li> <li> Distribute and Sell your secure PDF documents easily. </li> <li>Gain full control over your sensitive documents usage rights.</li> <li>Feel free to Store, transfer and share your protected contents using your desired method and media just like before.</li> </ul>\r\n<b>Features:</b>\r\n<ul> <li> Advanced 512 bit unique encryption system for DRM protected PDF Documents. </li> <li> Support a wide range of limitations including Machine-Dependency, Working Duration, Expiration Date, Print Watermarking, Printing, Clipboard, Modification and Screen-Capture. </li> <li> Extremely easy to implement and use licensing system for DRM protected PDF Documents distribution over local networks or internet. </li> <li> Fully automated serial based licensing system for protected pdf documents. </li> <li> Protection and Licensing Application Programming Interface (API) for customization and full integration. </li> <li> Support Machine Dependent/Independent licenses to Lock your DRM Protected PDF documents to specific computers. </li> <li> Multiple projects creation and management to make groups for your protected PDF documents. </li> <li> Hierarchical reseller licensing system to ease license distribution. </li> <li> Built in support for integration with windows Active Directory and Group Policy. </li> </ul>","shortDescription":"PDF Security OwnerGuard is the ultimate Security, DRM, Copy Protection, Licensing, Watermarking and Distribution Management solution for Adobe PDF Documents\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Armjisoft PDF DRM Security OwnerGuard","keywords":"","description":"<p class=\"align-center\"><b>DRM FOR PDF Security and Rights Management Systems </b></p>\r\nPDF DRM, Security, Protection and Distribution Management technologies are used as a copyright enforcement mechanism and sometimes as an alternative mechanism to copyright ","og:title":"Armjisoft PDF DRM Security OwnerGuard","og:description":"<p class=\"align-center\"><b>DRM FOR PDF Security and Rights Management Systems </b></p>\r\nPDF DRM, Security, Protection and Distribution Management technologies are used as a copyright enforcement mechanism and sometimes as an alternative mechanism to copyright ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Armji.png"},"eventUrl":"","translationId":5418,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"behaviosec-platform":{"id":5421,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/BehavioSec.png","logo":true,"scheme":false,"title":"BehavioSec Platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"behaviosec-platform","companyTitle":"BehavioSec","companyTypes":["supplier","vendor"],"companyId":5623,"companyAlias":"behaviosec","description":"<p class=\"align-center\"><b>BEHAVIOSEC’S CONTINUOUS AND TRANSPARENT AUTHENTICATION SOLUTION </b></p>\r\nBehavioSec is the first vendor to pioneer Behavioral Biometrics for the enterprise at scale that can support billions of transactions and millions of users. BehavioSec’s Behavioral Biometrics software is a new method that transparently and continuously verifies human digital identity across mobile and web apps. \r\nWhile traditional authentication technologies offer one-time verification, typically during the sign in phase and introduce friction to the digital experience, they typically validate things that infer the user’s identity. In contrast, BehavioSec’s software platform, as part of a multi-layered authentication approach, verifies people in real-time and continuously as the user engages with the app. \r\n<p class=\"align-center\"><b>BEHAVIOSEC’S UNIQUE BENEFITS TO COMBAT FRAUD AND DIGITAL RISK </b></p>\r\nBehavioSec’s platform delivers precise information on users engaging with mobile and web apps to help detect and stop digital fraud, lower outbound customer calls required to verify identity, reduce uncertainty generated by traditional, one-time authentications tools, and orchestrate appropriate course of actions to combat fraud attacks from malware and criminals. BehavioSec provides unique capabilities to help fraud and security teams effectively combat against the rise of cybercrime. \r\n<b>Features:</b>\r\n<ul> <li>Security. Continuous authentication that complements one-time verification. </li> <li>Frictionless. Transparent authentication that improves digital experience. </li> <li>Integration. Easily connect with existing web and mobile apps.</li> <li>Scalability. Authenticate billions of transactions across millions of users.</li> <li>Orchestrate. Connect to existing anti-fraud and security systems.</li> <li>Savings. Mitigate on-line fraud risk. Automate your response to attacks. </li></ul>\r\n<b>Benefits:</b>\r\n<ul> <li>Ensuring Uptime. Protect the transaction integrity across your digital transformation efforts</li> <li>Less Manual Intervention. Automate your real-time detection and response to online fraud.</li> <li>Lowering False Positives. Identify individual identities based on their unique behavioral traits.</li> <li>Lowering Fraud Risks. Detect real-time and continuously online account attacks.</li> </ul>","shortDescription":"Better Authentication. Better Experience","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"BehavioSec Platform","keywords":"","description":"<p class=\"align-center\"><b>BEHAVIOSEC’S CONTINUOUS AND TRANSPARENT AUTHENTICATION SOLUTION </b></p>\r\nBehavioSec is the first vendor to pioneer Behavioral Biometrics for the enterprise at scale that can support billions of transactions and millions of users. Be","og:title":"BehavioSec Platform","og:description":"<p class=\"align-center\"><b>BEHAVIOSEC’S CONTINUOUS AND TRANSPARENT AUTHENTICATION SOLUTION </b></p>\r\nBehavioSec is the first vendor to pioneer Behavioral Biometrics for the enterprise at scale that can support billions of transactions and millions of users. Be","og:image":"https://old.roi4cio.com/fileadmin/user_upload/BehavioSec.png"},"eventUrl":"","translationId":5420,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"cloudentity-ciamnext":{"id":5429,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Cloudentity.png","logo":true,"scheme":false,"title":"Cloudentity CIAM.next","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cloudentity-ciamnext","companyTitle":"Cloudentity","companyTypes":["supplier","vendor"],"companyId":6570,"companyAlias":"cloudentity","description":"<b>Integration</b>\r\nUsing Cloudentity’s Identity Management with MicroPerimeter™ Security extends the information available for fine-grained policy enforcement and recovery such as triggering MFA at the policy level or evaluating extended attributes or entitlements that might not be available with other IDP integrations. \r\n<b>Flexibility</b>\r\nYour Identity Management needs to reflect your business requirements. Cloudentity’s unique architecture provides your company with the ability to use your existing IDP, scale SAML, OAuth and OIDC integrations, and choose from a range of deployment options with on-prem, in-cloud, managed services or our IDaaS solution. \r\n<b>Features</b>\r\nCloudentity’s Identity Management is a fully robust IAM solution built on a flexible stack of microservices. These services allow for “mix-and-match” to increase performance and lower overhead and risk, all while providing the right services to solve your business requirements. \r\n<b>Basic features include:</b>\r\n<ul> <li>Upstream Federation: Use your existing IDP (or multiple IDPs) as the source of truth for your users </li> <li>SAML Federation: Standard support for SAML Service Providers (SPs) </li> <li>OAuth and OIDC: Integrate applications with 3-Legged OAuth using OIDC JWT tokens with an optional developer portal </li> <li>MFA: Out of the box support for a range of MFA solutions </li> <li>Multi-Organization Support: Our Organization support provides centralized administration if you have different divisions, departments, or groups that require segmentation </li> <li>User Self-Service: Allow users to sign up, verify their accounts using their choice of second factor OTP, and manage their accounts in the future </li> </ul>\r\n<b>More options</b>\r\n<b><i>IDaaS </i></b>\r\nIdentity as a Service gives you the easiest path to setting up and getting going. With support for SAML, OAuth, and OIDC for your service providers, and support for using upstream IDPs like Google auth, Azure AD, Facebook and even Salesforce, Cloudentity’s IDaaS is an easy, economical way to implement a Single Sign On solution. \r\n<b><i>Managed Services </i></b>\r\nIf you have complex business workflows or proprietary systems you need to integrate with your identity solution, but don’t want the hassle of managing your infrastructure, our managed services solution provides single tenancy and the ability to customize the tools as your business needs require. \r\n<b><i>On Prem </i></b>\r\nFor companies that require complete control, Cloudentity offers an on-premises option. With full access to the backend environment, and the ability to customize for legacy systems or workflows, this solution is particularly useful for companies in flux between maintaining existing system while moving to cloud native tools. ","shortDescription":"Our zero-trust authorization delivers full lifecycle management, risk-based authentication and session mobility","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cloudentity CIAM.next","keywords":"","description":"<b>Integration</b>\r\nUsing Cloudentity’s Identity Management with MicroPerimeter™ Security extends the information available for fine-grained policy enforcement and recovery such as triggering MFA at the policy level or evaluating extended attributes or entitle","og:title":"Cloudentity CIAM.next","og:description":"<b>Integration</b>\r\nUsing Cloudentity’s Identity Management with MicroPerimeter™ Security extends the information available for fine-grained policy enforcement and recovery such as triggering MFA at the policy level or evaluating extended attributes or entitle","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Cloudentity.png"},"eventUrl":"","translationId":5428,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"digital-resolve-platform":{"id":5439,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Digital_Resolve.png","logo":true,"scheme":false,"title":"Digital Resolve Platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"digital-resolve-platform","companyTitle":"Digital Resolve","companyTypes":["supplier","vendor"],"companyId":5917,"companyAlias":"digital-resolve","description":"The platform was designed by a team of seasoned experts to provide a comprehensive view of all transactions and interactions, unlike other solutions that merely detect events in isolation. Furthermore, real-time intervention options and a frictionless user experience mean that you can maintain confidence and trust among your user base- all while providing real-time protection against potential risks.\r\n<p class=\"align-center\"><b>Single Sign-On</b></p>\r\nDigital Resolve’s cloud-based security solution eliminates time-intensive integrations by providing easy configurations so SSO can quickly be deployed across your entire enterprise’s technology and business system framework. Digital Resolve’s SSO is the only marketplace solution that automatically incorporates proprietary and proven multi-factor authentication (MFA) to provide another level of security to ensure only authorized users are logging in. \r\n<ul> <li>Replaces integration with easy configuration </li> <li>Strengthens security with safer, stronger credentials </li> <li>Reduces IT administration overhead costs </li> <li>Supports compliance and governance protocols </li> <li>Improves employee productivity </li> </ul>\r\n<p class=\"align-center\"><b>Multifactor Authentication</b></p>\r\nThe Digital Resolve platform combines the power of behavioral profiling, device identification and calculated risk factors to automate the authentication process in a transparent yet powerful manner. Should a login attempt be deemed suspect, adaptive authentication options spring into play to provide robust protection that’s hard to bypass—no matter how seasoned the criminal. \r\n<ul> <li>Challenge/ Response Questions </li> <li>One-Time Passwords </li> <li>Out-of-Band Authentication </li> <li>Real-time robust risk response options </li> </ul>\r\n<p class=\"align-center\"><b>Behavioral Monitoring & Analytics</b></p>\r\nTo address the full fraud lifecycle, the Digital Resolve platform monitors every user interaction and transaction to uncover any suspect behaviors while engaged with your site. All activity is traced at the user, account and site levels to provide a comprehensive view across your entire channel. By determining regular user patterns at multiple levels, suspect activity can be flagged and handled accordingly. \r\n<ul> <li>Application Navigation Analysis </li> <li>Online Session & Transaction Profiling </li> <li>Account/ Personal Information Monitoring </li> <li>Click Analysis </li> <li>Payment Profiling </li> <li>Device Fingerprint Analysis </li> </ul>","shortDescription":"The Digital Resolve platform is a cost-effective and easy-to-deploy solution that effectively mitigates risk on day one of deployment","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Digital Resolve Platform","keywords":"","description":"The platform was designed by a team of seasoned experts to provide a comprehensive view of all transactions and interactions, unlike other solutions that merely detect events in isolation. Furthermore, real-time intervention options and a frictionless user exp","og:title":"Digital Resolve Platform","og:description":"The platform was designed by a team of seasoned experts to provide a comprehensive view of all transactions and interactions, unlike other solutions that merely detect events in isolation. Furthermore, real-time intervention options and a frictionless user exp","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Digital_Resolve.png"},"eventUrl":"","translationId":5438,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"forter-payment-protection":{"id":5441,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/forter.jpg","logo":true,"scheme":false,"title":"Forter Payment Protection","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"forter-payment-protection","companyTitle":"Forter","companyTypes":["vendor"],"companyId":8330,"companyAlias":"forter","description":"<p class=\"align-center\"><b>Payment Protection </b></p>\r\n<b>Payment Fraud Protection </b>\r\nForter protects all of your online transactions from fraud – regardless of payment type – by accurately determining the trustworthiness of every transaction and the user behind it. \r\n<b>Phone Fraud Protection </b>\r\nForter’s adaptive authentication capabilities protect your call centers from fraud in real-time. \r\n<b>PSD2 Solution for Merchants </b>\r\nForter automatically evaluates the risk of each transaction affected by the directive and routes it through the path of least possible friction. \r\n<b>Omnichannel Fraud Protection </b>\r\nForter protects your various customer channels from fraud so you can provide omnichannel offerings like BOPIS (Buy Online, Pickup Instore) and more without risk. \r\n<b>Chargeback Guarantee </b>\r\nForter protects you from chargebacks by assuming full chargeback liability, improving your bottom-line. \r\n<b>Chargeback & Claims Resolution </b>\r\nForter enables merchants to streamline claims management and identify dispute opportunities in real-time. ","shortDescription":"Eliminate chargebacks and fraud to protect your bottom-line\r\n\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Forter Payment Protection","keywords":"","description":"<p class=\"align-center\"><b>Payment Protection </b></p>\r\n<b>Payment Fraud Protection </b>\r\nForter protects all of your online transactions from fraud – regardless of payment type – by accurately determining the trustworthiness of every transaction and the user ","og:title":"Forter Payment Protection","og:description":"<p class=\"align-center\"><b>Payment Protection </b></p>\r\n<b>Payment Fraud Protection </b>\r\nForter protects all of your online transactions from fraud – regardless of payment type – by accurately determining the trustworthiness of every transaction and the user ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/forter.jpg"},"eventUrl":"","translationId":5440,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fraudlogix-live-ip-blocklist":{"id":5443,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Fraudlogix.png","logo":true,"scheme":false,"title":"Fraudlogix Live IP Blocklist","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"fraudlogix-live-ip-blocklist","companyTitle":"Fraudlogix","companyTypes":["vendor"],"companyId":8457,"companyAlias":"fraudlogix","description":"<p class=\"align-center\"><b>Live IP Blocklist </b></p>\r\nComprehensive IP intelligence for use in multiple environments to identify and block malicious Internet traffic generated from bots, compromised devices, data centers, and more. \r\n<ul> <li>Fraudlogix javascript code is embedded on 300+ million URLs and apps, monitoring 640 million unique users monthly. </li> <li>IPs that generate high volumes of fake ad traffic and installs are identified and added to a list, which updates hourly. </li> <li>The list is integrated directly into your environment for preventative blocking. </li></ul>","shortDescription":"Block bots via live intelligence derived from the global programmatic and affiliate communities","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fraudlogix Live IP Blocklist","keywords":"","description":"<p class=\"align-center\"><b>Live IP Blocklist </b></p>\r\nComprehensive IP intelligence for use in multiple environments to identify and block malicious Internet traffic generated from bots, compromised devices, data centers, and more. \r\n<ul> <li>Fraudlogix javas","og:title":"Fraudlogix Live IP Blocklist","og:description":"<p class=\"align-center\"><b>Live IP Blocklist </b></p>\r\nComprehensive IP intelligence for use in multiple environments to identify and block malicious Internet traffic generated from bots, compromised devices, data centers, and more. \r\n<ul> <li>Fraudlogix javas","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Fraudlogix.png"},"eventUrl":"","translationId":5442,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"hoxhunt-gamified-phishing-training-platform":{"id":5445,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Hoxhunt.png","logo":true,"scheme":false,"title":"Hoxhunt Gamified phishing training platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"hoxhunt-gamified-phishing-training-platform","companyTitle":"Hoxhunt","companyTypes":["supplier","vendor"],"companyId":8273,"companyAlias":"hoxhunt","description":"<b>Automation</b>\r\nHoxhunt’s automated phishing simulator sends attacks that resemble real-life threats. Our content is continuously updated by our threat intelligence team. \r\n<b>Personalization </b>\r\nHoxhunt gathers information automatically about your company and your employees. This way the content of the attack is always relevant for the employees. \r\n<b>Gamified user experience </b>\r\nHoxhunt makes cybersecurity training fun and engaging. The employees are rewarded by points when they report threats. They can also compare their progress to other employees on the leaderboard. \r\n<b>Micro training moments </b>\r\nWhen a user reports or fails simulated attacks, we deliver small pieces of education about how they can detect threats. This way their security knowledge is always kept up to date. \r\n<b>Individual learning paths </b>\r\nThe Hoxhunt algorithm automatically recognizes and adapts to user behavior to deliver the right level of difficulty and depth in the attacks. \r\n<b>Localization </b>\r\nThe attacks are personalized based on the users’ language and location. We currently support more than 20 languages. \r\n<b><i>Real, measurable results </i></b>\r\nThe Hoxhunt training platform delivers real measurable results across your organization. Your employees’ behavior towards email threat changes and we have the reporting to prove it. \r\n<ul> <li>Failure rates on simulated attacks drop to less than 2% even with the most sophisticated attacks </li> <li>Reporting rates of real attacks increase to over 60% </li> </ul>\r\n<b><i>Your employees will love us </i></b>\r\nWe make cybersecurity awareness training engaging and fun. Our gamified experience rewards employees for reporting both simulated and real attacks. But don’t just take our word for it. \r\n<ul> <li>Loved by security teams and employees alike </li> </ul>","shortDescription":"Our platform automatically sends individual phishing simulations to your employees and rewards them for reporting threats\r\n\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Hoxhunt Gamified phishing training platform","keywords":"","description":"<b>Automation</b>\r\nHoxhunt’s automated phishing simulator sends attacks that resemble real-life threats. Our content is continuously updated by our threat intelligence team. \r\n<b>Personalization </b>\r\nHoxhunt gathers information automatically about your compan","og:title":"Hoxhunt Gamified phishing training platform","og:description":"<b>Automation</b>\r\nHoxhunt’s automated phishing simulator sends attacks that resemble real-life threats. Our content is continuously updated by our threat intelligence team. \r\n<b>Personalization </b>\r\nHoxhunt gathers information automatically about your compan","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Hoxhunt.png"},"eventUrl":"","translationId":5444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"id-analytics-first-party-fraud":{"id":5447,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ID_Analytics.png","logo":true,"scheme":false,"title":"ID Analytics First-Party Fraud","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"id-analytics-first-party-fraud","companyTitle":"ID Analytics","companyTypes":["supplier","vendor"],"companyId":6615,"companyAlias":"id-analytics","description":"<p class=\"align-center\"><b>Identifying “Mules” Before They Come Back to Bite You </b></p>\r\nOften referred to as “credit muling” or “equipment gaming,” first-party fraud occurs when consumers use their true identities and personal information to apply for multiple, high-value products with no intention of honoring their contractual agreements.2 \r\nWhen consumers set out to steal from a business using their real identities, running a standard credit check – or even a third-party fraud screen – won’t necessarily protect the credit issuer. These “mules” have different profiles from identity fraudsters, so they require a specialized approach using fraud assessment tools and predictive solutions. \r\nConsumer behavioral data from the ID Network incorporates insights from wireless, retail lending, banking, peer-to-peer lending, and checking and savings accounts. By using these insights to form a historical picture of how a consumer typically behaves, ID Analytics can quickly identify when an individual begins to seek credit and services in an unusual and high risk fashion. \r\n<p class=\"align-center\"><b>An In-Depth Analysis of First-Party Fraud </b></p>\r\nBy rank-ordering the risk associated with consumer identity elements being asserted on an application, ID Analytics provides a first-party fraud risk assessment across all channels. Higher risk applications are flagged for remediation while lower-scoring applications may move on to the next step of the purchase process. Organizations choose the score threshold that best balances fraud prevention with fast, convenient adjudication processes. \r\nBusinesses need first-party fraud solutions that can: \r\n<ul> <li>Identify and analyze the special attributes of “mules” across industries </li> <li>Minimize the manual review of legitimate, well-intentioned customers </li> <li>Help reduce first-party fraud losses with a near real-time fraud assessment purpose-built for this unique challenge </li> </ul>","shortDescription":"The True Identities Behind First-Party Fraud\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ID Analytics First-Party Fraud","keywords":"","description":"<p class=\"align-center\"><b>Identifying “Mules” Before They Come Back to Bite You </b></p>\r\nOften referred to as “credit muling” or “equipment gaming,” first-party fraud occurs when consumers use their true identities and personal information to apply for multi","og:title":"ID Analytics First-Party Fraud","og:description":"<p class=\"align-center\"><b>Identifying “Mules” Before They Come Back to Bite You </b></p>\r\nOften referred to as “credit muling” or “equipment gaming,” first-party fraud occurs when consumers use their true identities and personal information to apply for multi","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ID_Analytics.png"},"eventUrl":"","translationId":5446,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"id-experts-myidcare-protection-platform":{"id":5451,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ID_Experts.png","logo":true,"scheme":false,"title":"ID Experts MyIDCare Protection Platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"id-experts-myidcare-protection-platform","companyTitle":"ID Experts","companyTypes":["vendor"],"companyId":8458,"companyAlias":"id-experts","description":"<p class=\"align-center\"><b>Identity & Privacy Protection Services </b></p>\r\n<p class=\"align-center\"><i>Threats to your identity and privacy are everywhere. MyIDCare’s alert-based identity & privacy protection platform scans billions of data points, notifying you of risks to your privacy and identity so you can take action! </i></p>\r\n<b>Advanced Identity Monitoring </b>\r\nID Experts’ MyIDCare includes comprehensive identity monitoring including credit monitoring, deep and dark web monitoring, credit lock, instant inquiry, social security number scanning, and much much more. More than 14 billion data points are scanned for your protection. You will receive alerts if there are changes to monitored information. \r\n<b>Privacy Protection </b>\r\nProtect your privacy with our SocialSentry social media protection. SocialSentry actively scans social networks to detect fraudulent and takeover activity, identifies inappropriate content and reduces personal information exposure. Coupled with our Password Detective, you will be empowered to protect your privacy. \r\n<b>Health Claims Monitoring (MIDAS) </b>\r\nOur MIDAS technology is the first and only consumer-focused healthcare fraud solution. MIDAS alerts members every time a medical claim is made against their identity. This powerful tool enables individuals to review health transactions for potential identity fraud the same way they do for credit transactions. \r\n<p class=\"align-center\"><b>Financial Protection </b></p>\r\n<p class=\"align-center\"><i>$1 million of insurance and stolen funds protection provide a solid backstop for serious cases of identity theft. </i></p>\r\n<b>Putting money back in your hands </b>\r\nMyIDCare members who fall victim to identity crime can rest easy. Our $1 million reimbursement insurance replaces stolen funds—including losses due to medical, financial, and other types of identity crimes. It also covers legal and other professional service expenses related to identity theft. \r\n<p class=\"align-center\"><b>Concierge-Style Identity Recovery </b></p>\r\n<p class=\"align-center\"><i>No other identity protection company provides their members with this level of customer experience. </i></p>\r\n<b>We delight victims with friendly, expert service </b>\r\nFor MyIDCare members whose identity is stolen, our ID Care Team of identity specialists is standing by. Using limited power of attorney (LPOA), we’ll act on a victim’s behalf to restore their identity to pre-theft status, which we’ve done with a 100% success rate. \r\n<p class=\"align-center\"><b>Easy Implementation </b></p>\r\n<p class=\"align-center\"><i>Whether a data breach, an employee benefit, or something valued to offer your members, we can get you up and running quickly and easily. </i></p>\r\n<b>Hassle-free and quick time to value </b>\r\nMyIDCare is simple to offer your customers, members, or employees. We provide the implementation and rollout plan, along with all the tools you need to communicate with your people. The average availability is fast—90 days from signing—so you can provide valuable identity protection right away. ","shortDescription":"Combining innovative monitoring and scanning technologies with concierge-style services in order to protect people from the consequences of data breaches","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ID Experts MyIDCare Protection Platform","keywords":"","description":"<p class=\"align-center\"><b>Identity & Privacy Protection Services </b></p>\r\n<p class=\"align-center\"><i>Threats to your identity and privacy are everywhere. MyIDCare’s alert-based identity & privacy protection platform scans billions of data points, not","og:title":"ID Experts MyIDCare Protection Platform","og:description":"<p class=\"align-center\"><b>Identity & Privacy Protection Services </b></p>\r\n<p class=\"align-center\"><i>Threats to your identity and privacy are everywhere. MyIDCare’s alert-based identity & privacy protection platform scans billions of data points, not","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ID_Experts.png"},"eventUrl":"","translationId":5450,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"identitymind-identitylink-api":{"id":5449,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IdentityMind.png","logo":true,"scheme":false,"title":"IdentityMind IdentityLink API","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"identitymind-identitylink-api","companyTitle":"IdentityMind","companyTypes":["vendor"],"companyId":8274,"companyAlias":"identitymind","description":"The IdentityLink API is built on IdentityMind’s patented eDNA™ engine. It leverages trusted digital identities to provide real-time access to: \r\n<ul> <li><b>Fraud prevention:</b> account origination, account takeover, payment fraud prevention</li> <li><b>Identity reputation:</b> leverage IdentityMind’s digital identity reputation network</li> <li><b>Risk score:</b> machine learning score based off complexity of the entity graph </li> </ul>\r\n<b>Features:</b>\r\n<ul> <li>FRAUD PREVENTION. Account origination, account takeover, payment fraud prevention </li> <li>IDENTITY REPUTATION. Leverage IDM digital identity reputation network </li> <li>RISK SCORE. Machine learning score based off complexity of the entity graph </li> <li>API. Real time based to retrieve risk score, graph stats, reputation, and actual graph </li> </ul>\r\n<b>Benefits:</b>\r\n<ul> <li>REDUCE FRAUD. IdentityMind’s 50+ attribute identity building capabilities enable you to make higher confidence risk assessments. </li> <li>MACHINE LEARNING. Continual improvements and more targeted risk assessment as system learns from your data </li> <li>QUICK DEPLOYMENT. Save time and money through plug and play entity link analysis and machine learning solution </li> </ul>\r\n<p class=\"align-center\"><b>Fraud Prevention</b></p>\r\nLeverage IdentityMind’s Trusted Digital Identities reputation values to expedite trusted users and detect suspicious users before they transact. Detect when users may be related to terrorism, human trafficking, drug cartels, through their network of affiliations. \r\n<p class=\"align-center\"><b>Transaction Monitoring</b></p>\r\nDetect hidden connections in groups of customers and aggregate individual’s activities even when using multiple accounts.","shortDescription":"Enhance Fraud Prevention Through Better KYC Compliance for Your Business","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IdentityMind IdentityLink API","keywords":"","description":"The IdentityLink API is built on IdentityMind’s patented eDNA™ engine. It leverages trusted digital identities to provide real-time access to: \r\n<ul> <li><b>Fraud prevention:</b> account origination, account takeover, payment fraud prevention</li> <li><b>Ident","og:title":"IdentityMind IdentityLink API","og:description":"The IdentityLink API is built on IdentityMind’s patented eDNA™ engine. It leverages trusted digital identities to provide real-time access to: \r\n<ul> <li><b>Fraud prevention:</b> account origination, account takeover, payment fraud prevention</li> <li><b>Ident","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IdentityMind.png"},"eventUrl":"","translationId":5448,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"infoarmor-privacyarmor":{"id":5455,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/InfoArmor.png","logo":true,"scheme":false,"title":"InfoArmor PrivacyArmor","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"infoarmor-privacyarmor","companyTitle":"InfoArmor","companyTypes":["supplier","vendor"],"companyId":6790,"companyAlias":"infoarmor","description":"<p class=\"align-center\"><b>Peace of mind delivered </b></p>\r\n<b>Dark web monitoring </b>\r\nWe use bots and embedded human intelligence operatives to search the dark web for compromised credentials. We then alert members who have been compromised. \r\n<b>Stolen fund reimbursement </b>\r\nFunds stolen from a bank account, 401(k), or HSA? We’ll reimburse it. We even advance tax refunds that were fraudulently issued. \r\n<b>Pre-existing conditions </b>\r\nIf your employees are victims of identity theft or fraud before joining PrivacyArmor, we’ll fully remediate past and present incidents with no extra fees. \r\n<b>Deceased family member coverage </b>\r\nFamily members who pass away are still targets for identity theft. We’ll fully remediate cases for loved ones who have passed on. \r\n<b>PrivacyArmor also offers: </b>\r\n<ul> <li>Service and benefits that fit all industries and company sizes </li> <li>Accounts secured with two-factor authentication </li> <li>Generous family coverage that includes kids, parents, in-laws, and other dependents living at home </li> <li>No age cap on minors or “aging out” of coverage </li> <li>Full-service fraud remediation with a dedicated Privacy Advocate® </li> <li>Pre-existing identity theft coverage at no extra cost </li> <li>In-house Privacy Advocates available 24/7 </li> <li>$1 million identity theft insurance policy† </li> </ul>\r\n<b>Benefits:</b>\r\n<ul> <li>Financial protection far beyon a credit score</li> <li>Keep control of social media accounts</li> <li>Combat advanced fraud</li> </ul>","shortDescription":"The industry leader in employee identity protection","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"InfoArmor PrivacyArmor","keywords":"","description":"<p class=\"align-center\"><b>Peace of mind delivered </b></p>\r\n<b>Dark web monitoring </b>\r\nWe use bots and embedded human intelligence operatives to search the dark web for compromised credentials. We then alert members who have been compromised. \r\n<b>Stolen fu","og:title":"InfoArmor PrivacyArmor","og:description":"<p class=\"align-center\"><b>Peace of mind delivered </b></p>\r\n<b>Dark web monitoring </b>\r\nWe use bots and embedded human intelligence operatives to search the dark web for compromised credentials. We then alert members who have been compromised. \r\n<b>Stolen fu","og:image":"https://old.roi4cio.com/fileadmin/user_upload/InfoArmor.png"},"eventUrl":"","translationId":5454,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"intelligent-wave-aceplus":{"id":5459,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Intelligent_Wave.png","logo":true,"scheme":false,"title":"Intelligent Wave ACEPlus ","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"intelligent-wave-aceplus","companyTitle":"Intelligent Wave, Inc. (IWI)","companyTypes":["supplier","vendor"],"companyId":6642,"companyAlias":"intelligent-wave-inc-iwi","description":"As credit card use expands, criminal use of forged or stolen cards is also increasing. In order to further assure the credibility of the credit card business, we developed the ACEPlus fraudulent use detection system based on a score / rule system for such crime patterns, and further expanded its functions.\r\n<b>Major Functions </b>\r\n<ul> <li>Flexibility to build a system environment in accordance with handling volume (from tens of thousands to tens of millions of card members)</li> <li>Extensive installations in Japanese credit card industries</li> <li>Functions to detect and monitor fraudulent card use in real time, online</li> <li>Automatic suspension function</li> <li>Function to manage information on customer card use</li> <li>Scoring function based on customer behavior model</li> <li>Function to support data analysis effectively utilizing a database</li> <li>Function to search critical alert data</li> <li>Flexible changes in screen display</li> <li>Work efficiency improvements by obtaining statistical information</li> <li>Data mining utilizing accumulated data</li> </ul>\r\n<b>Scoring system </b>\r\nACEPlus achieves highly accurate results that surpass those of conventional scoring systems. This scoring system has achieved high cost performance and highly precise results, as well as minimizing damage, monitoring online credit authorizations from all over the world in real time, and sending warnings.","shortDescription":"ACE Plus achieves high precision and strategically detects fraudulent card use","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Intelligent Wave ACEPlus ","keywords":"","description":"As credit card use expands, criminal use of forged or stolen cards is also increasing. In order to further assure the credibility of the credit card business, we developed the ACEPlus fraudulent use detection system based on a score / rule system for such crim","og:title":"Intelligent Wave ACEPlus ","og:description":"As credit card use expands, criminal use of forged or stolen cards is also increasing. In order to further assure the credibility of the credit card business, we developed the ACEPlus fraudulent use detection system based on a score / rule system for such crim","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Intelligent_Wave.png"},"eventUrl":"","translationId":5458,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"ipsidy-verified":{"id":5461,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Ipsidy.png","logo":true,"scheme":false,"title":"Ipsidy Verified","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"ipsidy-verified","companyTitle":"Ipsidy, Inc.","companyTypes":["supplier","vendor"],"companyId":6646,"companyAlias":"ipsidy-inc","description":"<p class=\"align-center\"><b>Verify Identity of Employees and Customers, Anywhere </b></p>\r\nSecurely manage identity both inside and outside your enterprise with Verified by Ipsidy. Reduce fraud and gain identity certainty of a mobile app logon, online chat, or any digital transaction. \r\n<ul> <li>Trigger an identity authentication from your platform or our Identity Portal to the Ipsidy app on a user’s mobile phone. A user swipes right to confirm the request and details specific to the event. </li> <li>The phone’s camera with liveness detection auto-prompts a user to capture their face with just a blink and a smile. </li> <li>Ipsidy converts the selfie into a biometric facial template and matches against the user’s reference photo. The transaction is confirmed, and the user’s identity is Verified. </li> </ul>\r\n<p class=\"align-center\"><b>Frictionless Biometric Multi-Factor Authentication </b></p>\r\n<b>Key Features </b>\r\n<ul> <li>A full-service web-portal, where you can view and manage data, export reports, and send all authentication requests. </li> <li>Reverse-Verify feature allows customers to request your service providers (whether on the phone or in-person) to verify their identities. </li> <li>Multi-factor authentication technology allows for multiple levels of security: PIN, password, biometrics, dynamic digital signature, etc. </li> </ul>\r\n<b>How will this identity verification solution benefit my business? </b>\r\n<ul> <li>With no integration required, reduce the time it takes to verify customers, whether on the phone, chatting online, or even in-person. </li> <li>Provide customers and employees with a trusted, seamless and secure biometric identification experience, secure corporate transactions, and reduce fraud. </li> <li>Out-of-the-box solution offers flexibility and allows you to get started immediately. However, Ipsidy's APIs and SDKs allow for optional easy integration to enterprise databases. </li> </ul>\r\n<b>Securely Manage Identity Through the Customer Lifecycle </b>\r\nSecure identity beyond the initial KYC customer onboarding experience. Verified offers multi-factor authentication for any follow-on transactions, including seamless logon with face to any website or mobile app. Call center or online chat support can verify customers with a seamless selfie. Account changes, password resets, even wire transfers and stock trades can all be confirmed with Verified. Verified allows you to seamlessly present transaction details, allowing you to receive transaction confirmation and identity certainty. ","shortDescription":"Reduce Identity Fraud with Mobile, Biometric Multi-Factor Authentication","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Ipsidy Verified","keywords":"","description":"<p class=\"align-center\"><b>Verify Identity of Employees and Customers, Anywhere </b></p>\r\nSecurely manage identity both inside and outside your enterprise with Verified by Ipsidy. Reduce fraud and gain identity certainty of a mobile app logon, online chat, or ","og:title":"Ipsidy Verified","og:description":"<p class=\"align-center\"><b>Verify Identity of Employees and Customers, Anywhere </b></p>\r\nSecurely manage identity both inside and outside your enterprise with Verified by Ipsidy. Reduce fraud and gain identity certainty of a mobile app logon, online chat, or ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Ipsidy.png"},"eventUrl":"","translationId":5460,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"iraje-software-activechange-manager":{"id":5463,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Iraje_Software.jpg","logo":true,"scheme":false,"title":"Iraje Software ActiveChange Manager","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"iraje-software-activechange-manager","companyTitle":"Iraje Software","companyTypes":["vendor"],"companyId":6647,"companyAlias":"iraje-software","description":"<b>Product Focus:</b> Control security access to changes in Schema (DDL), Work area hierarchy, and Data (DML), thus providing the mechanisms for real time Computer Audits. \r\n<b>Product Description:</b> ActiveChangeManager allows the user to define the security access for any specific schema, how multiple database users can access and work in a cooperative environment, with restricted privileges with respect to database schema design, data and audit information. \r\n<b>Benefits: </b>\r\n<ul> <li>All users have a consistent real-time secured vision of multiple instances of all corporate database applications. </li> <li>ActiveChangeManager provides an encrypted password algorithm whereby the user is prevented from knowing the direct SQL database passwords for sensitive production databases. </li> <li>All database changes are recorded, along with the exact SQL that has been executed as well as the specific database user who executed the SQL. </li> <li>Ability to freeze the database schema at any time from a single controlling point. </li> <li>Ability to allow the users SQL access to databases with restricted SQL privileges. E.g. DROP table and DELETE CUSTOMER operations may be restricted by the ActiveChangeManager for a particular production database. </li> <li>Ability to restrict specific data access provides the database application owner the means to prevent a developer from querying sensitive production database information, while allowing this developer to modify and work with the schema design if necessary. </li> <li>ActiveChangeManager also allows the changes to work its way around a change management and approval process, thus providing a controlled environment for database design changes. This is an option that can be turned ON when the system enters implementation/production stage. </li> </ul>\r\n<b>Application Area: </b>\r\n<ul> <li>To restrict users from uncontrolled SQL access on production databases. </li> <li>To allow full access to developers on development databases, at the same time controlling the changes via the recording feature whereby all changes and changed by information is being recorded. </li> <li>Changes on one database schema instance can be propagated effortlessly to another database instance, e.g. Changes in the DEVL environment can be propagated to the PROD database. </li> <li>Where it is required to provide access to the audit control information, but not allow direct access to database changes or schema changes. </li> </ul>","shortDescription":"The solution architecture is highly scalable. It can support hundreds of users and thousands of devices. It has multiple options to support active-active or active-passive architectures","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Iraje Software ActiveChange Manager","keywords":"","description":"<b>Product Focus:</b> Control security access to changes in Schema (DDL), Work area hierarchy, and Data (DML), thus providing the mechanisms for real time Computer Audits. \r\n<b>Product Description:</b> ActiveChangeManager allows the user to define the security","og:title":"Iraje Software ActiveChange Manager","og:description":"<b>Product Focus:</b> Control security access to changes in Schema (DDL), Work area hierarchy, and Data (DML), thus providing the mechanisms for real time Computer Audits. \r\n<b>Product Description:</b> ActiveChangeManager allows the user to define the security","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Iraje_Software.jpg"},"eventUrl":"","translationId":5462,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"jumio-corporation-identity-verification":{"id":5465,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Jumio_Corporation.png","logo":true,"scheme":false,"title":"Jumio Corporation Identity Verification","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"jumio-corporation-identity-verification","companyTitle":"Jumio Corporation","companyTypes":["vendor"],"companyId":5705,"companyAlias":"jumio-corporation","description":"<p class=\"align-center\"><b>Know the True Identity of Your Customers </b></p>\r\nThe Jumio Identity Verification process uses machine learning, face-based biometrics and verification experts to ensure the person behind a transaction is present and who they say are. Identity verification goes well beyond traditional authentication methods to deliver a significantly higher level of assurance and establish a trusted digital identity. \r\n<ul> <li>ID Proofing Check. Is the ID document authentic and valid? </li> <li>Similarity Check. Is the person holding the ID the same person shown in the ID photo? </li> <li>Liveness Check. Is the person holding the ID physically present during the transaction? </li> <li>Definitive Answer. Jumio Identity Verification delivers a definitive yes or no answer in seconds. </li> </ul>\r\n<b>Benefits:</b>\r\n<ul> <li>Verify IDs. Ensure the ID document is authentic and valid. </li> <li>Similarity Check. Make sure the person holding the ID is the same person shown in the ID photo. </li> <li>Compliance. Comply with growing regulations & directives including GDPR, PSD2, KYC and AML. </li> <li>Certified Liveness Check. Perform liveness detection using FaceTec’s certified 3D selfie technology. </li> <li>User Experience. Dramatically reduce user friction and verification time while increasing conversion rates. </li> <li>Security. All data is transmitted and stored with strong AES 256 bit encryption. Jumio is PCI Level 1 compliant. </li> </ul>\r\n<b>Use Cases </b>\r\n<ul> <li>Cardholder not present </li> <li>User authentication </li> <li>Fraud detection </li> <li>High risk transactions </li> <li>KBA replacement </li> <li>KYC/AML compliance </li> </ul>","shortDescription":"Jumio provides real-time identity verification, helping you prevent identity fraud while achieving KYC/AML compliance and providing a seamless customer experience\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Jumio Corporation Identity Verification","keywords":"","description":"<p class=\"align-center\"><b>Know the True Identity of Your Customers </b></p>\r\nThe Jumio Identity Verification process uses machine learning, face-based biometrics and verification experts to ensure the person behind a transaction is present and who they say ar","og:title":"Jumio Corporation Identity Verification","og:description":"<p class=\"align-center\"><b>Know the True Identity of Your Customers </b></p>\r\nThe Jumio Identity Verification process uses machine learning, face-based biometrics and verification experts to ensure the person behind a transaction is present and who they say ar","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Jumio_Corporation.png"},"eventUrl":"","translationId":5464,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"markmonitor-domain-security":{"id":5467,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/MarkMonitor.jpg","logo":true,"scheme":false,"title":"MarkMonitor Domain Security","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"markmonitor-domain-security","companyTitle":"MarkMonitor","companyTypes":["supplier","vendor"],"companyId":5739,"companyAlias":"markmonitor","description":"With more than half of the world’s population online, registered domain names totaling 330+ million and 23+ million new gTLDs registered, security threats against domain name assets can have more ramifications on your business than ever. The destruction caused by attacks against domain names and domain registration accounts goes beyond brand reputation, bleeding into customer trust and your organization’s bottom line. A valuable corporate asset, your portfolio merits round-the-clock protection. Fortunately, our best-in-class innovations have made better solutions possible.\r\n<b>Exceptional security for your valuable domain assets </b>\r\nReduce your company’s security vulnerabilities and minimize the likelihood of successful attacks with a suite of security capabilities, featuring: \r\n<ul> <p><b>A simplified experience </b></p><ul> <li>API and single sign-on (SSO) create a streamlined and user-friendly interface </li> <li>Granular permissions and full transaction logging for accountability and control </li> <li>Customizable security levels for each of your domains </li> <li>Count on the MarkMonitor team, trusted by 10 out of 10 most highly trafficked websites worldwide </li> </ul> <p><b>Highly-secured access </b></p><ul> <li>Two-Factor Authentication fortifies account access against account hijacking </li> <li>Portal Access Control to prevent tampering with off-premises registration </li> <li>Secure Account Management automatically notifies a secure email address when changes are made </li> </ul> <p><b>Full-scale protection </b></p><ul> <li>DNS Monitoring identifies unauthorized DNS updates by scanning each domain name under management </li> <li>Domain Masking keeps your ownership confidential until you’re ready to introduce your product or service to the market </li> <li>Mission-Critical Domain Security combines maximum domain renewal periods with domain locking </li> </ul>","shortDescription":"Trusted by the world's most recognized brands\r\n\r\n\r\n\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"MarkMonitor Domain Security","keywords":"","description":"With more than half of the world’s population online, registered domain names totaling 330+ million and 23+ million new gTLDs registered, security threats against domain name assets can have more ramifications on your business than ever. The destruction caused","og:title":"MarkMonitor Domain Security","og:description":"With more than half of the world’s population online, registered domain names totaling 330+ million and 23+ million new gTLDs registered, security threats against domain name assets can have more ramifications on your business than ever. The destruction caused","og:image":"https://old.roi4cio.com/fileadmin/user_upload/MarkMonitor.jpg"},"eventUrl":"","translationId":5466,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"mitek-systems-mobile-verify":{"id":5469,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Mitek_Systems.png","logo":true,"scheme":false,"title":"Mitek Systems Mobile Verify","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"mitek-systems-mobile-verify","companyTitle":"Mitek Systems","companyTypes":["vendor"],"companyId":6673,"companyAlias":"mitek-systems","description":"With hundreds of AI-based analytics, algorithms and biometric facial comparison, Mobile Verify® is a next generation digital identity verification service designed for the world’s leading marketplace and sharing platforms, and financial services organizations. Our layered approach of ID document verification combined with facial biometrics offers a more secure way to verify identities of consumers. \r\n<ul> <li>INTUITIVE CAPTURE EXPERIENCE. Guided and touchless interface to ensure a successful capture</li> <li>GLOBAL ID VERIFICATION. Hundreds of AI analyzers instantly proof the authenticity of global ID documents </li> <li>SMART IDENTITY VERIFICATION. Biometric-comparison and liveness-detection algorithms ensure the ID presented is from its true owner </li> </ul>\r\n<b>Instant mobile verification</b>\r\nRequiring a user to leave your mobile channel can result in abandonment rates as high as 90%. Let our identity verification service help you replace the need for physical documentation to clear your “pending” queue, onboard users more effectively and generate more lifetime value. \r\n<b>Features:</b>\r\n<ul> <li>Powering science</li> <li>Identity verified</li> <li>Document capture</li> <li>Documet classification</li> <li>Data extraction</li> <li>Document authentication</li> <li>Biometric facial comparison</li> <li>ID data anlysis</li> <li>Simultaneous AI-powered development & production</li> </ul>","shortDescription":"Smart, automated identity verification\r\n\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Mitek Systems Mobile Verify","keywords":"","description":"With hundreds of AI-based analytics, algorithms and biometric facial comparison, Mobile Verify® is a next generation digital identity verification service designed for the world’s leading marketplace and sharing platforms, and financial services organizations.","og:title":"Mitek Systems Mobile Verify","og:description":"With hundreds of AI-based analytics, algorithms and biometric facial comparison, Mobile Verify® is a next generation digital identity verification service designed for the world’s leading marketplace and sharing platforms, and financial services organizations.","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Mitek_Systems.png"},"eventUrl":"","translationId":5468,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"next-caller-vericall":{"id":5471,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Next_Caller.png","logo":true,"scheme":false,"title":"Next Caller VeriCall","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"next-caller-vericall","companyTitle":"Next Caller","companyTypes":["vendor"],"companyId":8466,"companyAlias":"next-caller","description":"<b>VeriCall™</b> delivers a threat-level analysis on every phone call in 200 milliseconds immediately after answer. This instant reading allows your business to make authentication and routing decisions in real-time within your IVR. \r\n<p class=\"align-center\"><b>WHY WE’RE DIFFERENT </b></p>\r\n<b>Our team and our technology set us apart </b>\r\n<ul> <li>Detect High Risk Calls. Spoof Proof™ your call center </li> <li>Our Pricing. Security costs shouldn’t be criminal </li> <li>Flexibility. Offline P.O.C. and live API integration </li> <li>Our Team. Responsive, attentive, and authentic </li> <li>75% Authentication. Best rate in the industry </li> <li>200ms Response Time. Immediately after answer </li> </ul>","shortDescription":"Our technology instantly verifies phone numbers, delivering big results to your business\r\n\r\n\r\n\r\n\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Next Caller VeriCall","keywords":"","description":"<b>VeriCall™</b> delivers a threat-level analysis on every phone call in 200 milliseconds immediately after answer. This instant reading allows your business to make authentication and routing decisions in real-time within your IVR. \r\n<p class=\"align-center\"><","og:title":"Next Caller VeriCall","og:description":"<b>VeriCall™</b> delivers a threat-level analysis on every phone call in 200 milliseconds immediately after answer. This instant reading allows your business to make authentication and routing decisions in real-time within your IVR. \r\n<p class=\"align-center\"><","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Next_Caller.png"},"eventUrl":"","translationId":5470,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":830,"title":"DRM - Digital Rights Management","alias":"drm-digital-rights-management","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DRM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["accessdata-ad-ediscovery","aimbrain-aimface","armjisoft-pdf-drm-security-ownerguard","behaviosec-platform","cloudentity-ciamnext","digital-resolve-platform","forter-payment-protection","fraudlogix-live-ip-blocklist","hoxhunt-gamified-phishing-training-platform","id-analytics-first-party-fraud","id-experts-myidcare-protection-platform","identitymind-identitylink-api","infoarmor-privacyarmor","intelligent-wave-aceplus","ipsidy-verified","iraje-software-activechange-manager","jumio-corporation-identity-verification","markmonitor-domain-security","mitek-systems-mobile-verify","next-caller-vericall"]},"links":{"first":"http://apis.roi4cio.com/api/products?page=1","last":"http://apis.roi4cio.com/api/products?page=2","prev":null,"next":"http://apis.roi4cio.com/api/products?page=2"},"meta":{"current_page":1,"from":1,"last_page":2,"path":"http://apis.roi4cio.com/api/products","per_page":20,"to":20,"total":38},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}