View

Sorting

Products found: 11

logo
Offer a reference bonus
2.00

Autodesk AutoCAD

Developed and marketed by Autodesk, AutoCAD was first released in December 1982 as a desktop app running on microcomputers with internal graphics controllers. Since 2010, AutoCAD was released as a mobile- and web app as well, marketed as AutoCAD 360. Auto CAD and AutoCAD LT are available for English, German, French, Italian, Spanish, Korean, Chinese Simplified, Chinese Traditional, Brazilian Portuguese, Russian, Czech, Polish and Hungarian, Albanian (also through additional language packs). The extent of localization varies from full translation of the product to documentation only. The AutoCAD command set is localized as a part of the software localization. Source: https://en.wikipedia.org/wiki/AutoCAD
... Learn more
ROI-
-
19
1
logo
Offer a reference bonus
3.80

Autodesk Revit

What does Revit do? Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage buildings and infrastructure. Revit supports a multidiscipline design process for collaborative design.

  • Design. Model building components, analyze and simulate systems and structures, and iterate designs. Generate documentation from Revit models.
  • Collaborate. Multiple project contributors can access centrally shared models. This results in better coordination, which helps reduce clashes and rework.
  • Visualize. Communicate design intent more effectively to project owners and team members by using models to create high-impact 3D visuals.

One multidiscipline BIM platform Revit has features for all disciplines involved in a building project. When architects, engineers, and construction professionals work on one unified platform, the risk of data translation errors can be reduced and the design process can be more predictable. Interoperability Revit helps you work with members of an extended project team. It imports, exports, and links your data with commonly used formats, including IFC, DWG™ and DGN.  Tools created expressly for your discipline Whether you’re an architect; a mechanical, electrical, or plumbing (MEP) engineer; a structural engineer; or a construction professional, Revit offers BIM features specifically designed for you. For architects Use Revit to take an idea from conceptual design to construction documentation within a single software environment. Optimize building performance and create stunning visualizations. For structural engineers Use tools specific to structural design to create intelligent structure models in coordination with other building components. Evaluate how well they conform to building and safety regulations. For MEP engineers Design MEP building systems with greater accuracy and in better coordination with architectural and structural components, using the coordinated and consistent information inherent in the intelligent model. For construction professionals Evaluate constructability and design intent before construction begins. Gain a better understanding of the means, methods, and materials, and how they all come together. Connect teams with Collaboration for Revit Extend Revit worksharing to project teams in almost any location with this service, which lets multiple users co-author Revit models in the cloud. Increase communication, centralize efforts of distributed teams, and let entire teams take part in the BIM process. Better team communication Use real-time chat within project models. Know who’s working in the model and what they’re doing. Extended team integration Subscribe to Collaboration for Revit and receive a subscription to BIM 360 Team, an integrated, cloud-based web service that provides centralized team access to project data. Access more projects Extend your reach and participate in projects or joint venture partnerships, wherever they’re located. Better allocate team talents and resources Assign the best team members with the strongest skill sets. Let designers work on multiple projects based in different locations at the same time. Minimize in-person meetings or co-location of teams Help lower travel expenses and support greater work-life balance for team members. Visualization and rendering. Show how your product will look with visualization and rendering tools.

... Learn more
ROI-
-
12
8
logo
Offer a reference bonus
3.00

Barracuda NextGen Firewall (NGFW)

Next-Generation Firewalls for the Cloud Era In the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications. The Barracuda NextGen Firewall F-Series is a family of hardware, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control. In addition, the F-Series combines highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network. The F-Series cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures. Security for the Cloud Era Security paradigms are shifting—and securing your network perimeter is no longer good enough. In the cloud era, workloads happen everywhere, users are increasingly mobile, and potential attack surfaces are multiplying. Barracuda NextGen Firewall F-Series is purpose-built to deal with the challenges of securing widely distributed networks. Advanced Threat Protection In today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput. Secure SD-WAN.. Barracuda Cloud Era Firewalls include full next gen Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application. This enables:
  • Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance
  • VPN across multiple broadband connections and MPLs replacement
  • Up to 24 physical uplinks to create highly redundant VPN tunnels
  • Replacing network backhauling central policy enforcement architectures with direct internet break outs
  • Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic
  • Guaranteed users' access to critical applications through granular policy controls
  • Increased available bandwidth with built-in traffic compression and data deduplication
  • Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic
Why Barracuda NextGen Firewall? When selecting security technology, it is critical that your products are supported by people who take your data security as seriously as you do. The Barracuda NextGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data. The Barracuda NextGen Firewall is part of a comprehensive line of data protection, network firewall, and security products and services designed for organizations seeking robust yet affordable protection from ever-increasing cyber threats. Source: https://www.barracuda.com/products/nextgenfirewall_f
... Learn more
ROI-
-
5
0
logo
Offer a reference bonus
3.70

Forcepoint NGFW

Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers around the world, Forcepoint network security solutions enable businesses, government agencies and other organizations to address critical issues efficiently and economically.
Decrypt traffic while safeguarding privacy
Inspect attacks and stolen data hidden inside encrypted SSL/TLS traffic while still protecting users' privacy.
Extend your network into the cloud
Deploy applications safely in Amazon Web Services, Azure, and VMware. Segment different service layers and manage virtual NGFWs and IPSs the same way as physical appliances.
Control access to web content
Limit users' access to entire categories of websites containing inappropriate or unsafe content with URL intelligence that’s depended upon around the globe.
Protect high-assurance systems
Safeguard your most sensitive, mission-critical networks and applications with Forcepoint’s renowned Sidewinder proxy technology.
Regain control of shadow IT
Understand the risk associated with unsanctioned cloud apps so you can redirect users to more appropriate apps or block them altogether.
Offer SD-WAN and NGFW security as an MSSP
Manage enterprise-grade connectivity and protection from your own multi-tenant systems, with a business model tailored to the needs of MSSPs.
Key features: Modular appliances for every environment
Our broad range of appliances provide the right price-performance and form factor for each location; pluggable interface cards let you change networks with ease.
High availability, mixed clustering
Active-active clustering lets you mix up to 16 different models of appliances for unrivaled scalability, longer lifecycles, and seamless updates without dropping packets.
Multi-link connectivity for SD-WAN
Broadband, wireless, and dedicated lines at each location can be centrally deployed and managed, providing full control over what traffic goes over each link with automated failover.
Automated, zero-downtime updates
Policy changes and software updates can be deployed to hundreds of firewalls and IPS devices around the world in minutes, not hours, without the need for service windows.
Policy-driven centralized management
Smart Policies describe your business processes in familiar terms and are automatically implemented throughout the network, managed in-house or via MSSP.
Actionable, interactive 360° visibility
Graphical dashboards and visualizations of network activity go beyond simple reporting, enabling admins to drill into events and respond to incidents faster.
Built-in NGFW, VPN, proxies, and more
Unparalleled security comes standard, from top-ranked Next Generation Firewall and IPS to rapid-setup VPNs and granular decryption, as well as our unique Sidewinder proxy technology.
Top-ranked anti-evasion defense
Multi-layer stream inspection defeats advanced attacks that traditional packet inspection can't detect—see for yourself in our Evader video series.
Human-centric endpoint context
Access policies can whitelist or blacklist specific endpoint apps, patch levels or AV status. Users' behaviors are consolidated into actionable dashboards.
Unified virtual and physical security
Native support for AWS, Azure, and VMware has the same capabilities, management, and high performance of our physical appliances.
CASB and web security
Our reknowned URL filtering and industry-leading cloud services work together to protect your data and people as they use apps and web content.
Anti-malware sandboxing
Forcepoint Advanced Malware Detection blocks previously undetected ransomware, zero-days, and other attacks before they steal sensitive data or damage your systems.
... Learn more
ROI-
-
3
9
logo
Offer a reference bonus
3.00

Forcepoint URL Filtering

Forcepoint URL Filtering is the industry’s most effective, continually up-to-date web filtering solution. Powered by our ThreatSeeker Intelligence, Forcepoint URL Filtering collects and analyzes up to 5 billion incidents every day (from over 155 countries), producing updated threat analytics for Forcepoint solutions at up to 3.2 updates per second. Forcepoint URL Filtering blocks web threats to reduce malware infections, decrease help desk incidents and provide relief to valuable IT resources. Forcepoint URL Filtering is an easy-to-deploy, transparent filter and security solution that avoids the complexity of a proxy gateway. It’s equipped with more than 120 security and web filtering categories, hundreds of web application and protocol controls, and 60-plus reports with customization and role-based access.

The Forcepoint Advantage
Web filtering with ThreatSeeker threat intelligence
Identify threats with over 10,000 analytics, machine learning and other advanced techniques maintained through real-time global threat intelligence with Forcepoint Web Security.
Granular user behavior analysis and productivity reporting
More than 60 reports with customization and role-based access.
Customizable allowed/denied url filters
Utilize both timed and/or permanent web filters for managing access to websites.
Industry-leading web security policy controls
More than 120 security and content categories
... Learn more
ROI-
-
4
5
logo
Offer a reference bonus
2.00

Hideez Authentication Service

Hideez Authentication Service is a comprehensive security solution designed to meet the needs of businesses of all sizes. The service includes a range of featured to enhance security and streamline access management, multi-factor authentication, passwordless SSO and other security tools.

With Hideez Service, multi-user organizations can try passwordless authentication and contactless desktop logins with a mobile app (Hideez Authenticator), or manage all of their passwords, securely storing them in encrypted hardware vaults (Hideez Keys). This helps to reduce the risk of password-related cyber threats, such as phishing and credential stuffing.
Hideez Service is a powerful security solution that can help you enhance your security posture and reduce the risk of cyber threats. 

Learn more: https://hideez.com/pages/hideez-authentication-service
Try for free: https://share.hsforms.com/1ZDkB4l-YSy-1rS3yKD4N9w2zlyp
... Learn more
-
-
ROI-
-
0
18
logo
Offer a reference bonus
4.00

Microsoft 365

Microsoft 365 is the productivity cloud that brings together best-in-class Office apps with powerful cloud services, device management, and advanced security.

 

Be more productive wherever you are

Connect employees to the people, information, and content they need to do their best work, from any device.

Comes with Office apps

Stay up to date with the latest versions of Word, Excel, PowerPoint, and more.

Email and calendaring

Connect with customers and coworkers using Outlook and Exchange.

Chat, call, and meet

Keep your team on the same page with group chat, online meetings, and calling in Microsoft Teams.

Cloud storage

Manage your files from anywhere with 1 TB of OneDrive storage.

 

Don’t drown in paperwork

Transform the way you manage your business and simplify the way work gets done with modern tools that streamline business processes.

Manage customer appointments

Simplify how customers schedule and manage appointments with Bookings.

Capture employee and customer insights

Create surveys, polls, and questionnaires to gather data and insights with Microsoft Forms.

Make repetitive tasks easy

Automate everyday business processes with Power Automate.

Works with what you have

Sign in once to access all your tools. Microsoft 365 integrates with hundreds of third-party cloud apps.

 

Protect what matters most

Help protect your employees, data, and customer information with enterprise-grade security you can trust.

Defend against cyberthreats

Protect against phishing attempts, ransomware, spam, malware, viruses, malicious links, and other threats.

Keep customer data safe

Protect sensitive business information from cybercriminals, unauthorized access, and accidental deletion.

Secure your devices

Help keep your data safe, even when accessed on employees’ personal devices.

Simplify IT management

Easily setup and manage your users, devices, and data, giving you time back to focus on running your business.

... Learn more
ROI-
-
14
13
logo
Offer a reference bonus
2.00

ROI4CIO Review platform

ROI4CIO is a unique cooperation platform for IT-vendors, suppliers, distributors, resellers, users.

ROI4CIO is a salestools for Vendors and marketplace for Users. ROI4CIO is a platform designed to support interaction among IT market players and sourcing of IT products, partners, contractors and customers. ROI4CIO customizes IT products for clients based on neural network, automatically calculates pricing and configuration, projects ROI, and supports sending requests to all suppliers of a solution. IT vendors (distributors, resellers, developers) get new clients, close deals faster, cut costs and expand partnerships.

The main idea of ROI4CIO is to reduce costs of IT-market participants for searching partners and to create all the necessary interaction tools in the sales chain.

VALUE PROPOSITION FOR IT BUYERS

  • Foster competitiveness and security
  • Find the effective IT product based on individual business objectives and pain points
  • Compare IT-products by characteristics
  • Estimate IT products cost
  • Calculate ROI, NPV, IRR, PP
  • Request proposals on IT products
  • Get Rebate for Reference

VALUE PROPOSITION FOR VENDOR & SUPPLIER

  • Lead Generation
  • Close Deals Down Quicker
  • Fosters competitiveness
  • Reduces HQ workload
  • Optimization for Sales managers
  • Streamlined Sales and reduce costs
  • Expand partnerships and foot print
  • Receive more references

ROI4CIO has been started with the founder Paul Zhdanovych question: "What are the benefits of IT technologies? How to see the benefits of information technologies before an deployment?". Starting with the catalog of IT-products, deployments, suppliers and vendors, ROI4CIO has become a B2B IT-sales automator. ROI4CIO has automated the price and quoting calculation, requests for proposals or consultations. Later, it became possible to attach an individual price specifications to the proposal request. The ROI calculator has been improved. For the initially central function of the project - a selection of solutions - a neural network algorithm has been developed.

ROI4CIO is a unique online channel for partner sales for vendors, distributors, and suppliers. It is the only resource on the IT market that collects information about all IT market from the market experts. Technical support and consultations of the users are carried out online.

ROI4CIO team is 16 people: project managers, programmers, testers, designers, science math analyst. Experience of team members in IT projects from 5 to 25 years.

... Learn more
-
-
ROI-
-
20
15
logo
Offer a reference bonus
3.30

TrapX DeceptionGrid platform

DeceptionGrid
TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals. Deceive, Detect and Defeat Advanced Cyber Attackers. DeceptionGrid, named the Best Deception Technology of 2018, deploys a shifting minefield of Traps (decoys) and Deception Tokens (lures) that appear identical to your real IT & IoT assets that no attacker can avoid. Actionable Intelligence Just one touch of a Trap by an attacker sets off a high-confidence alert. DeceptionGrid integrates with key elements of the network and security ecosystem to contain attacks and enable a return to normal operations. The Deception Product of Choice DeceptionGrid analyzes your network and automatically provisions hundreds-to-thousands of Traps and Lures. Each Trap is tailor-made to be identical to your native environment. Attackers can never tell what’s real and what’s fake because each Trap is designed to look and behave exactly like your real assets. In addition, Traps can also be camouflaged as any specialized IoT and OT devices. Gain Access to a Powerful Community For the first time, defenders can collaborate and share deceptive counter-measures with each other. The DeceptionNet Community enables cyber-security teams to deceive cyber attackers by sharing deception strategies, new types of Traps, third-party connectors, best practices and more. Deception Tokens Deception Tokens (lures) appear as ordinary files, scripts and configurations, are embedded within real IT assets to bait and divert attackers away from real high value assets and into the traps. Active Traps Active Traps create a stream of false network traffic between deployed Traps to confuse and divert attackers that monitor the network traffic. Emulated Traps Medium Interaction Emulated Traps Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and Traps tailor-made to your organization’s native environment. After a Trap is interacted with and the cyber-attack is thwarted, the Trap will change its shape and location, so the attacker will never learn if something is a Trap or a real asset. Hundreds of New Industry Templates The DeceptionNet Community now offers hundreds of new industry templates (updated regularly) that are available for your use. In addition, our patented medium interaction traps also include expanded templates for specialized devices based on specific industries. These templates include, ATM and SWIFT assets for financial services, Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more. This allows you to determine if attackers are targeting your specialized devices that are often vulnerable to attack. FullOS Traps High Interaction (Full Operating System) Traps DeceptionGrid enables the provision of full operating system (FullOS) Traps. Our medium interaction Traps automatically extend engaged attackers through our smart deception to our FullOS Traps for the deepest attacker diversion and engagement. FullOS Traps also enable you to clone existing assets – you can completely replicate actual production servers to further deceive attackers.
... Learn more
ROI-
-
18
10
logo
Offer a reference bonus
2.40

TrapX DeceptionGrid platform from SOFTPROM

The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals. The Deception Product of Choice DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below. Console with Attack Visualization New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment. Attacker ID New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods. Automated Provisioning  Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys). Deception Tokens Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers. Active Traps New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic. Emulated Traps Medium Interaction Emulated Traps Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more. Industry Templates The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack. FullOS Traps High Interaction (Full Operating System) Traps DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.
... Learn more
-
ROI-
-
14
10

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.