View

Sorting

Products found: 11

logo
Offer a reference bonus
2.00

Autodesk AutoCAD

Developed and marketed by Autodesk, AutoCAD was first released in December 1982 as a desktop app running on microcomputers with internal graphics controllers. Since 2010, AutoCAD was released as a mobile- and web app as well, marketed as AutoCAD 360. Auto CAD and AutoCAD LT are available for English, German, French, Italian, Spanish, Korean, Chinese Simplified, Chinese Traditional, Brazilian Portuguese, Russian, Czech, Polish and Hungarian, Albanian (also through additional language packs). The extent of localization varies from full translation of the product to documentation only. The AutoCAD command set is localized as a part of the software localization. Source: https://en.wikipedia.org/wiki/AutoCAD
... Learn more
ROI-
-
19
1
logo
Offer a reference bonus
3.80

Autodesk Revit

What does Revit do? Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage buildings and infrastructure. Revit supports a multidiscipline design process for collaborative design.

  • Design. Model building components, analyze and simulate systems and structures, and iterate designs. Generate documentation from Revit models.
  • Collaborate. Multiple project contributors can access centrally shared models. This results in better coordination, which helps reduce clashes and rework.
  • Visualize. Communicate design intent more effectively to project owners and team members by using models to create high-impact 3D visuals.

One multidiscipline BIM platform Revit has features for all disciplines involved in a building project. When architects, engineers, and construction professionals work on one unified platform, the risk of data translation errors can be reduced and the design process can be more predictable. Interoperability Revit helps you work with members of an extended project team. It imports, exports, and links your data with commonly used formats, including IFC, DWG™ and DGN.  Tools created expressly for your discipline Whether you’re an architect; a mechanical, electrical, or plumbing (MEP) engineer; a structural engineer; or a construction professional, Revit offers BIM features specifically designed for you. For architects Use Revit to take an idea from conceptual design to construction documentation within a single software environment. Optimize building performance and create stunning visualizations. For structural engineers Use tools specific to structural design to create intelligent structure models in coordination with other building components. Evaluate how well they conform to building and safety regulations. For MEP engineers Design MEP building systems with greater accuracy and in better coordination with architectural and structural components, using the coordinated and consistent information inherent in the intelligent model. For construction professionals Evaluate constructability and design intent before construction begins. Gain a better understanding of the means, methods, and materials, and how they all come together. Connect teams with Collaboration for Revit Extend Revit worksharing to project teams in almost any location with this service, which lets multiple users co-author Revit models in the cloud. Increase communication, centralize efforts of distributed teams, and let entire teams take part in the BIM process. Better team communication Use real-time chat within project models. Know who’s working in the model and what they’re doing. Extended team integration Subscribe to Collaboration for Revit and receive a subscription to BIM 360 Team, an integrated, cloud-based web service that provides centralized team access to project data. Access more projects Extend your reach and participate in projects or joint venture partnerships, wherever they’re located. Better allocate team talents and resources Assign the best team members with the strongest skill sets. Let designers work on multiple projects based in different locations at the same time. Minimize in-person meetings or co-location of teams Help lower travel expenses and support greater work-life balance for team members. Visualization and rendering. Show how your product will look with visualization and rendering tools.

... Learn more
ROI-
-
12
8
logo
Offer a reference bonus
3.00

Barracuda NextGen Firewall (NGFW)

Next-Generation Firewalls for the Cloud Era In the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications. The Barracuda NextGen Firewall F-Series is a family of hardware, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control. In addition, the F-Series combines highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network. The F-Series cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures. Security for the Cloud Era Security paradigms are shifting—and securing your network perimeter is no longer good enough. In the cloud era, workloads happen everywhere, users are increasingly mobile, and potential attack surfaces are multiplying. Barracuda NextGen Firewall F-Series is purpose-built to deal with the challenges of securing widely distributed networks. Advanced Threat Protection In today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput. Secure SD-WAN.. Barracuda Cloud Era Firewalls include full next gen Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application. This enables:
  • Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance
  • VPN across multiple broadband connections and MPLs replacement
  • Up to 24 physical uplinks to create highly redundant VPN tunnels
  • Replacing network backhauling central policy enforcement architectures with direct internet break outs
  • Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic
  • Guaranteed users' access to critical applications through granular policy controls
  • Increased available bandwidth with built-in traffic compression and data deduplication
  • Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic
Why Barracuda NextGen Firewall? When selecting security technology, it is critical that your products are supported by people who take your data security as seriously as you do. The Barracuda NextGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data. The Barracuda NextGen Firewall is part of a comprehensive line of data protection, network firewall, and security products and services designed for organizations seeking robust yet affordable protection from ever-increasing cyber threats. Source: https://www.barracuda.com/products/nextgenfirewall_f
... Learn more
ROI-
-
5
0
logo
Offer a reference bonus
3.00

Forcepoint NGFW

Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers around the world, Forcepoint network security solutions enable businesses, government agencies and other organizations to address critical issues efficiently and economically.
Decrypt traffic while safeguarding privacy
Inspect attacks and stolen data hidden inside encrypted SSL/TLS traffic while still protecting users' privacy.
Extend your network into the cloud
Deploy applications safely in Amazon Web Services, Azure, and VMware. Segment different service layers and manage virtual NGFWs and IPSs the same way as physical appliances.
Control access to web content
Limit users' access to entire categories of websites containing inappropriate or unsafe content with URL intelligence that’s depended upon around the globe.
Protect high-assurance systems
Safeguard your most sensitive, mission-critical networks and applications with Forcepoint’s renowned Sidewinder proxy technology.
Regain control of shadow IT
Understand the risk associated with unsanctioned cloud apps so you can redirect users to more appropriate apps or block them altogether.
Offer SD-WAN and NGFW security as an MSSP
Manage enterprise-grade connectivity and protection from your own multi-tenant systems, with a business model tailored to the needs of MSSPs.
Key features: Modular appliances for every environment
Our broad range of appliances provide the right price-performance and form factor for each location; pluggable interface cards let you change networks with ease.
High availability, mixed clustering
Active-active clustering lets you mix up to 16 different models of appliances for unrivaled scalability, longer lifecycles, and seamless updates without dropping packets.
Multi-link connectivity for SD-WAN
Broadband, wireless, and dedicated lines at each location can be centrally deployed and managed, providing full control over what traffic goes over each link with automated failover.
Automated, zero-downtime updates
Policy changes and software updates can be deployed to hundreds of firewalls and IPS devices around the world in minutes, not hours, without the need for service windows.
Policy-driven centralized management
Smart Policies describe your business processes in familiar terms and are automatically implemented throughout the network, managed in-house or via MSSP.
Actionable, interactive 360° visibility
Graphical dashboards and visualizations of network activity go beyond simple reporting, enabling admins to drill into events and respond to incidents faster.
Built-in NGFW, VPN, proxies, and more
Unparalleled security comes standard, from top-ranked Next Generation Firewall and IPS to rapid-setup VPNs and granular decryption, as well as our unique Sidewinder proxy technology.
Top-ranked anti-evasion defense
Multi-layer stream inspection defeats advanced attacks that traditional packet inspection can't detect—see for yourself in our Evader video series.
Human-centric endpoint context
Access policies can whitelist or blacklist specific endpoint apps, patch levels or AV status. Users' behaviors are consolidated into actionable dashboards.
Unified virtual and physical security
Native support for AWS, Azure, and VMware has the same capabilities, management, and high performance of our physical appliances.
CASB and web security
Our reknowned URL filtering and industry-leading cloud services work together to protect your data and people as they use apps and web content.
Anti-malware sandboxing
Forcepoint Advanced Malware Detection blocks previously undetected ransomware, zero-days, and other attacks before they steal sensitive data or damage your systems.
... Learn more
ROI-
-
3
9
logo
Offer a reference bonus
3.00

Forcepoint URL Filtering

Forcepoint URL Filtering is the industry’s most effective, continually up-to-date web filtering solution. Powered by our ThreatSeeker Intelligence, Forcepoint URL Filtering collects and analyzes up to 5 billion incidents every day (from over 155 countries), producing updated threat analytics for Forcepoint solutions at up to 3.2 updates per second. Forcepoint URL Filtering blocks web threats to reduce malware infections, decrease help desk incidents and provide relief to valuable IT resources. Forcepoint URL Filtering is an easy-to-deploy, transparent filter and security solution that avoids the complexity of a proxy gateway. It’s equipped with more than 120 security and web filtering categories, hundreds of web application and protocol controls, and 60-plus reports with customization and role-based access.

The Forcepoint Advantage
Web filtering with ThreatSeeker threat intelligence
Identify threats with over 10,000 analytics, machine learning and other advanced techniques maintained through real-time global threat intelligence with Forcepoint Web Security.
Granular user behavior analysis and productivity reporting
More than 60 reports with customization and role-based access.
Customizable allowed/denied url filters
Utilize both timed and/or permanent web filters for managing access to websites.
Industry-leading web security policy controls
More than 120 security and content categories
... Learn more
ROI-
-
4
5
logo
Offer a reference bonus
2.00

Hideez Key (HK)

Hideez Key — Your Only Digital Key Hideez Key will become a daily companion to your computer, smartphone and tablet Forget having to type passwords for apps, websites and services. Hideez Key will do it for you while simply laying in your pocket. Your computer will ask for password if somebody tries accessing it while you are away and will wake automatically and log you in when you come back. You phone won’t ask for passcode anymore, yet it will be securely protected from a stranger. Hideez Key can also be used to open your home, garage and office doors as a single digital key using 125 kHz RFID frequency (Em-Marine and HID compatible). Store Your Passwords in Your Pocket Still spending time and effort to recall that important password? Hideez Key stores up to 1000 passwords for your social networks, emails, cloud services and applications. Just press the button on your Hideez Key or a hotkey on the keyboard of your computer to input your password automatically. Try it, it looks like magic! Enjoy Convenient and Reliable Internet-Security Have you considered that by using a ‘simple’ password for email, banking account or social network you are risking your money and relations with the other people? Hideez Key allows using complicated passwords of any preferred length, which are difficult to brute force. And the good news are that you don’t have to input these passwords from your keyboard all the time. Your passwords aren’t stored on your computer as well, so a hacker cannot intercept them from your phone, browser or a hard drive. You might also consider using your Hideez Key as a second factor in two-factor authentication and to generate one time passwords for various applications. Let Your Smartphone Remind You When You Are About to Lose Something Place your Hideez Key in your bag and your smartphone will notify you when the signal is about to fade away together with your belongings. Even if that happens, you will be able to quickly locate your Hideez Key (and the bag in which it is placed) on the digital map. Ready for the Internet of Things More connected devices are appearing every day. Hideez Key supports over the air updates and you will be able to easily integrate it with your future devices and services. Remote Activation Want to take a selfie with a friend or start recording a conversation without touching your smartphone? Just press the multifunctional button on your Hideez Key and it will do the rest. Need an urgent help? Program the multifunctional button on your Hideez Key as your panic button to activate alarm scenario on your smartphone. For example: your smartphone will send a message with your current location to several trusted contacts from your address book. You can program any other alarm scenario with your Hideez Key. Opening Doors and Locks Hideez Key comes equipped with an RFID module, so it can be used as your RFID token for a modern door equipped with an RFID lock. You can copy the RFID credentials to your Hideez Key from your existing RFID key or access card or ask your local access service provider to do this for you, or you can add your Hideez Key to the access registry on your smart lock. Key Features ● Identify users to information systems. ● Automatic locking/unlocking of the computer, tablet or smartphone. ● External hardware password manager with automated password input that works for applications as well as for websites. ● Theft alarm for valuables like wallet, purse or keychain. ● Remote control for an user computer or smartphone using device button. ● More useful features to be delivered wirelessly via over the air updates. The use of Hideez Key reduces human factor influence on Enterprise information security field. In particular: ● To solve weak password problem ● Employees don’t have to remember passwords. ● Automatically lock PCs or apps when an user is away. ● To turn on 2FA on public or corporate resources without complicating the routine users work. ● To provide Two-hardware factor authentication for users. To authorize, the user need two devices: his/her PC and the Hideez Key. An appropriate control service Hideez Enterprise Server features: ● Eliminates control traffic between Hideez Keys and extranet. All the traffic routes are inside an enterprise perimeter. ● Basic LDAP integration (e.g Active Directory) ● End-to-end encrypted information channel between the control server and Hideez Key keyfobs. Nobody can intercept user passwords. ● Administrator can change, add and delete credentials in users keyfobs remotely. ● Strong passwords and with the limited expiration term without user inconvenience. ● Strong authorization by changing passwords to keys, which are unknown for users. Minimum system requirements Bluetooth 4.0, Windows 7 (an additional USB Bluetooth adapter is needed), Windows 8.1 +, MacOS 10,11+, Android 4.4 or newer, iOS 9.3+. Specifications Model: Hideez Key 1 (ST 101) Processor: Nordic nRF51822 RFID Module: ATMEL T5577 RFID Standards: eM-Marin and HID on 125 kHz Connectivity: Bluetooth 4.0 and higher Power: CR2032 battery, up to 6 months in active mode. User memory: 74 Kb LED Indicators: red and green Buttons: 1 multi-functional button Color: black Weight: 9 grams (package weight is 44 grams) Dimensions: 32,5 x 32,5 x 9 mm Warranty: 12 months What Is In the Box? ● Hideez Key ● Quick Start Manual ● Keychain ● CR2032 battery (installed inside your Hideez Key) ● Spare CR2032 battery ● Hideez Safe application for Windows and Android is available for free from http://hideez.com
... Learn more
-
-
ROI-
-
0
18
logo
Offer a reference bonus
4.00

Microsoft 365

Microsoft 365 is the productivity cloud that brings together best-in-class Office apps with powerful cloud services, device management, and advanced security.

 

Be more productive wherever you are

Connect employees to the people, information, and content they need to do their best work, from any device.

Comes with Office apps

Stay up to date with the latest versions of Word, Excel, PowerPoint, and more.

Email and calendaring

Connect with customers and coworkers using Outlook and Exchange.

Chat, call, and meet

Keep your team on the same page with group chat, online meetings, and calling in Microsoft Teams.

Cloud storage

Manage your files from anywhere with 1 TB of OneDrive storage.

 

Don’t drown in paperwork

Transform the way you manage your business and simplify the way work gets done with modern tools that streamline business processes.

Manage customer appointments

Simplify how customers schedule and manage appointments with Bookings.

Capture employee and customer insights

Create surveys, polls, and questionnaires to gather data and insights with Microsoft Forms.

Make repetitive tasks easy

Automate everyday business processes with Power Automate.

Works with what you have

Sign in once to access all your tools. Microsoft 365 integrates with hundreds of third-party cloud apps.

 

Protect what matters most

Help protect your employees, data, and customer information with enterprise-grade security you can trust.

Defend against cyberthreats

Protect against phishing attempts, ransomware, spam, malware, viruses, malicious links, and other threats.

Keep customer data safe

Protect sensitive business information from cybercriminals, unauthorized access, and accidental deletion.

Secure your devices

Help keep your data safe, even when accessed on employees’ personal devices.

Simplify IT management

Easily setup and manage your users, devices, and data, giving you time back to focus on running your business.

... Learn more
ROI-
-
14
13
logo
Offer a reference bonus
2.00

ROI4CIO Review platform

ROI4CIO is a unique cooperation platform for IT-vendors, suppliers, distributors, resellers, users.

ROI4CIO is a salestools for Vendors and marketplace for Users. ROI4CIO is a platform designed to support interaction among IT market players and sourcing of IT products, partners, contractors and customers. ROI4CIO customizes IT products for clients based on neural network, automatically calculates pricing and configuration, projects ROI, and supports sending requests to all suppliers of a solution. IT vendors (distributors, resellers, developers) get new clients, close deals faster, cut costs and expand partnerships.

The main idea of ROI4CIO is to reduce costs of IT-market participants for searching partners and to create all the necessary interaction tools in the sales chain.

VALUE PROPOSITION FOR IT BUYERS

  • Foster competitiveness and security
  • Find the effective IT product based on individual business objectives and pain points
  • Compare IT-products by characteristics
  • Estimate IT products cost
  • Calculate ROI, NPV, IRR, PP
  • Request proposals on IT products
  • Get Rebate for Reference

VALUE PROPOSITION FOR VENDOR & SUPPLIER

  • Lead Generation
  • Close Deals Down Quicker
  • Fosters competitiveness
  • Reduces HQ workload
  • Optimization for Sales managers
  • Streamlined Sales and reduce costs
  • Expand partnerships and foot print
  • Receive more references

ROI4CIO has been started with the founder Paul Zhdanovych question: "What are the benefits of IT technologies? How to see the benefits of information technologies before an deployment?". Starting with the catalog of IT-products, deployments, suppliers and vendors, ROI4CIO has become a B2B IT-sales automator. ROI4CIO has automated the price and quoting calculation, requests for proposals or consultations. Later, it became possible to attach an individual price specifications to the proposal request. The ROI calculator has been improved. For the initially central function of the project - a selection of solutions - a neural network algorithm has been developed.

ROI4CIO is a unique online channel for partner sales for vendors, distributors, and suppliers. It is the only resource on the IT market that collects information about all IT market from the market experts. Technical support and consultations of the users are carried out online.

ROI4CIO team is 16 people: project managers, programmers, testers, designers, science math analyst. Experience of team members in IT projects from 5 to 25 years.

... Learn more
-
-
ROI-
-
20
15
logo
Offer a reference bonus
3.30

TrapX DeceptionGrid platform

The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals. The Deception Product of Choice DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below. Console with Attack Visualization New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment. Attacker ID New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods. Automated Provisioning  Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys). Deception Tokens Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers. Active Traps New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic. Emulated Traps Medium Interaction Emulated Traps Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more. Industry Templates The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack. FullOS Traps High Interaction (Full Operating System) Traps DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.  
... Learn more
ROI-
-
18
10
logo
Offer a reference bonus
2.40

TrapX DeceptionGrid platform from SOFTPROM

The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals. The Deception Product of Choice DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below. Console with Attack Visualization New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment. Attacker ID New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods. Automated Provisioning  Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys). Deception Tokens Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers. Active Traps New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic. Emulated Traps Medium Interaction Emulated Traps Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more. Industry Templates The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack. FullOS Traps High Interaction (Full Operating System) Traps DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.
... Learn more
-
ROI-
-
14
10

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.